Pass4itsure > Juniper > JNCIS-SEC > JN0-334 > JN0-334 Online Practice Questions and Answers

JN0-334 Online Practice Questions and Answers

Questions 4

Which two statements describe client-protection SSL proxy on an SRX Series device? (Choose two.)

A. The server-protection SSL proxy intercepts the server certificate.

B. The server-protection SSL proxy is also known as SSL reverse proxy.

C. The server-protection SSL proxy forwards the server certificate after modification.

D. The server-protection SSL proxy acts as the server from the client's perspective.

Buy Now
Questions 5

Which two statements describe application-layer gateways (ALGs)? (Choose two.)

A. ALGs are designed for specific protocols that require multiple sessions.

B. ALGs are used with protocols that use multiple ports.

C. ALGs can only be configured using Security Director.

D. ALGs are designed for specific protocols that use a single TCP session.

Buy Now
Questions 6

You must configure JSA to accept events from an unsupported third-party log source. In this scenario, what should you do?

A. Separate event collection and flow collection on separate collectors.

B. Configure an RPM for a third-party device service module.

C. Configure JSA to silently discard unsupported log types.

D. Configure a universal device service module.

Buy Now
Questions 7

Click the Exhibit button.

You have implemented SSL proxy client protection. After implementing this feature, your users are complaining about the warning message shown in the exhibit.

Which action must you perform to eliminate the warning message?

A. Configure the SRX Series device as a trusted site in the client Web browsers.

B. Regenerate the SRX self-signed CA certificate and include the correct organization name.

C. Import the SRX self-signed CA certificate into the client Web browsers.

D. Import the SRX self-signed CA certificate into the SRX certificate public store.

Buy Now
Questions 8

Click the Exhibit button.

Referring to the exhibit, which statement is true?

A. IDP blocks root users.

B. IDP closes the connection on matched sessions.

C. IDP ignores the connection on matched sessions.

D. IDP blocks all users.

Buy Now
Questions 9

Which three statements are true about the difference between cSRX-based virtual security deployments and vSRX-based virtual security deployments? (Choose three.)

A. vSRX provides Layer 2 to Layer 7 secure services and cSRX provides Layer 4 to Layer 7 secure services.

B. cSRX requires less storage and memory space for a given deployment than vSRX-based solutions.

C. cSRX-based solutions are more scalable than vSRX-based solutions.

D. vSRX and cSRX both provide Layer 2 to Layer 7 secure services.

E. vSRX provides faster deployment time and faster reboots compared to cSRX.

Buy Now
Questions 10

When working with network events on a Juniper Secure Analytics device, flow records come from which source?

A. tap port

B. SPAN

C. switch

D. mirror

Buy Now
Questions 11

You are troubleshooting advanced policy-based routing (APBR). Which two actions should you perform in this scenario? (Choose two.)

A. Verify that the APBR profiles are applied to the egress zone.

B. Verity inet.0 for correct route leaking.

C. Review the APBR statistics for matching rules and route modifications.

D. Inspect the application system cache for the application entry.

Buy Now
Questions 12

Where is AppSecure executed in the flow process on an SRX Series device?

A. screens

B. security policy

C. zones

D. services

Buy Now
Questions 13

Which two statements describe IPS? (Choose two.)

A. IPS can be used to prevent future attacks from occurring.

B. IPS dynamically sends policy changes to SRX Series devices.

C. IPS inspects up to Layer 4 in the OSI model.

D. IPS inspects up to Layer 7 in the OSI model.

Buy Now
Exam Code: JN0-334
Exam Name: Security-Specialist (JNCIS-SEC)
Last Update: Apr 14, 2024
Questions: 90
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99