Juniper JN0-231 Security, Associate JNCIA-SEC Exam Practice Test

Page: 1 / 14
Total 101 questions
Question 1

Which two statements are true about Juniper ATP Cloud? (Choose two.)



Answer : C, D

Juniper ATP Cloud is a cloud-based ATP subscription that delivers advanced threat protection services, such as URL categorization, file reputation analysis, and malware analysis. It is able to quickly and accurately categorize URLs and other web content, and can also provide detailed reporting on web usage, as well as the ability to define and enforce acceptable use policies. Additionally, Juniper ATP Cloud is able to block and allow specific IPs, providing additional protection against malicious content.


Question 2

Which feature would you use to protect clients connected to an SRX Series device from a SYN flood attack?



Answer : D

A screen option in the SRX Series device can be used to protect clients connected to the device from a SYN flood attack. Screens are security measures that you can use to protect your network from various types of attacks, including SYN floods. A screen option specifies a set of rules to match against incoming packets, and it can take specific actions such as discarding, logging, or allowing the packets based on the rules.


Juniper Networks SRX Series Services Gateway Screen Configuration Guide: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-screen-configuring.html

Question 3

You want to verify the peer before IPsec tunnel establishment.

What would be used as a final check in this scenario?



Answer : D

The proxy ID is used as a final check to verify the peer before IPsec tunnel establishment. The proxy ID is a combination of local and remote subnet and protocol, and it is used to match the traffic that is to be encrypted. If the proxy IDs match between the two IPsec peers, the IPsec tunnel is established, and the traffic is encrypted.


Juniper Networks SRX Series Services Gateway IPsec Configuration Guide: https://www.juniper.net/documentation/en_US/release-independent/junos/topics/topic-map/security-ipsec-vpn-configuring.html

Question 4

You have configured a UTM feature profile.

Which two additional configuration steps are required for your UTM feature profile to take effect? (Choose two.)



Answer : C, D

For the UTM feature profile to take effect, it must be associated with a security policy and a UTM policy. The security policy defines the traffic flow and the actions that should be taken on the traffic, while the UTM policy defines the security features to be applied to the traffic, such as antivirus, intrusion prevention, and web filtering. The UTM feature profile provides the necessary configuration for the security features defined in the UTM policy.


Juniper Networks SRX Series Services Gateway UTM Configuration Guide: https://www.juniper.net/documentation/en_US/release-independent/junos/topics/topic-map/security-services-utm.html

Question 5

Which statement is correct about Web filtering?



Answer : C

Web filtering is a feature that allows administrators to control access to websites by categorizing URLs into different categories such as gambling, social networking, or adult content. The decision to permit or deny access to a website is based on the category to which a URL belongs. This is done by comparing the URL against a database of categorized websites and making a decision based on the policy defined by the administrator.


Juniper Networks SRX Series Services Gateway Web Filtering Configuration Guide: https://www.juniper.net/documentation/en_US/release-independent/junos/topics/topic-map/security-services-web-filtering.html

Question 6

What does the number ''2'' indicate in interface ge---0/1/2?



Answer : C


Question 7

Which security policy type will be evaluated first?



Answer : D


Page:    1 / 14   
Total 101 questions