Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Juniper Security-Associate (JNCIA-SEC) JN0-231 Questions and answers with ValidTests

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which two traffic types are considered exception traffic and require some form of special handling by the PFE? (Choose two.)

Options:

A.

SSH sessions

B.

ICMP reply messages

C.

HTTP sessions

D.

traceroute packets

Expert Solution
Questions # 2:

Which statement is correct about static NAT?

Options:

A.

Static NAT supports port translation.

B.

Static NAT rules are evaluated after source NAT rules.

C.

Static NAT implements unidirectional one-to-one mappings.

D.

Static NAT implements unidirectional one-to-many mappings.

Expert Solution
Questions # 3:

Which two security features inspect traffic at Layer 7? (Choose two.)

Options:

A.

IPS/IDP

B.

security zones

C.

application firewall

D.

integrated user firewall

Expert Solution
Questions # 4:

Which two IPsec hashing algorithms are supported on an SRX Series device? (Choose two.)

Options:

A.

SHA-1

B.

SHAKE128

C.

MD5

D.

RIPEMD-256

Expert Solution
Questions # 5:

Which order is correct for Junos security devices that examine policies for transit traffic?

Options:

A.

zone policies

global policies

default policies

B.

default policies

zone policies

global policies

C.

default policies

global policies

zone policies

D.

global policies

zone policies

default policies

Expert Solution
Questions # 6:

Which two UTM features should be used for tracking productivity and corporate user behavior? (Choose two.)

Options:

A.

the content filtering UTM feature

B.

the antivirus UTM feature

C.

the Web filtering UTM feature

D.

the antispam UTM feature

Expert Solution
Questions # 7:

When configuring antispam, where do you apply any local lists that are configured?

Options:

A.

custom objects

B.

advanced security policy

C.

antispam feature-profile

D.

antispam UTM policy

Expert Solution
Questions # 8:

Click the Exhibit button.

Question # 8

What is the purpose of the host-inbound-traffic configuration shown in the exhibit?

Options:

A.

to permit host inbound HTTP traffic and deny all other traffic on the internal security zone

B.

to deny and log all host inbound traffic on the internal security zone, except for HTTP traffic

C.

to permit all host inbound traffic on the internal security zone, but deny HTTP traffic

D.

to permit host inbound HTTP traffic on the internal security zone

Expert Solution
Questions # 9:

You want to implement user-based enforcement of security policies without the requirement of certificates and supplicant software.

Which security feature should you implement in this scenario?

Options:

A.

integrated user firewall

B.

screens

C.

802.1X

D.

Juniper ATP

Expert Solution
Questions # 10:

Corporate security requests that you implement a policy to block all POP3 traffic from traversing the Internet firewall.

In this scenario, which security feature would you use to satisfy this request?

Options:

A.

antivirus

B.

Web filtering

C.

content filtering

D.

antispam

Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions