Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Juniper JN0-232 Practice Exam with Questions & Answers

Questions 1

Click the Exhibit button.

JN0-232 Question 1

Which two statements are correct about the content filter shown in the exhibit? (Choose two.)

Options:
A.

.exe files will not be allowed to be uploaded over HTTP.

B.

.exe files will not be allowed to be downloaded over HTTP.

C.

There will be a notice added to the SRX log file about the file being blocked.

D.

There will be an e-mail sent to the user about why the SRX is blocking the file.

Juniper JN0-232 Premium Access
Questions 2

Which two statements are correct about security zones and functional zones? (Choose two.)

Options:
A.

Traffic entering an interface in a functional zone cannot exit any other transit interface.

B.

Traffic entering transit interfaces can exit an interface in a functional zone.

C.

Traffic entering an interface in a functional zone can exit any other transit interface.

D.

Traffic entering transit interfaces cannot exit an interface in a functional zone.

Questions 3

When does screening occur in the flow module?

Options:
A.

before session lookup

B.

during policy lookup

C.

during route lookup

D.

after session lookup

Questions 4

What is the purpose of rate-limiting exception traffic in the Junos OS?

Options:
A.

to enhance the performance of the forwarding plane

B.

to simplify the configuration of network interfaces

C.

to prevent denial-of-service attacks on the Routing Engine

D.

to manage routing protocols and updates

Questions 5

What must also be enabled when using source NAT if the address pool is in the same subnet as the interface?

Options:
A.

static NAT

B.

dynamic DNS

C.

destination NAT

D.

proxy ARP

Questions 6

Click the Exhibit button.

JN0-232 Question 6

The exhibit shows a table representing security policies from the trust zone to the untrust zone.

In this scenario, which two statements are correct? (Choose two.)

Options:
A.

SSH requests from the source IP address of 172.25.11.10 are permitted to the destination IP address of 10.1.0.10.

B.

Ping command requests from the source IP address of 172.25.11.100 are denied to the destination IP address of 10.1.0.10.

C.

FTP requests from the source IP address of 10.1.0.10 are permitted to the destination IP address of 172.25.11.100.

D.

FTP requests from the source IP address of 172.25.11.11 are denied to the destination IP address of 10.1.0.10.

Questions 7

What is the purpose of a feature profile in a UTM configuration?

Options:
A.

It applies a UTM feature to a security policy.

B.

It applies a UTM feature to protocol traffic.

C.

It defines the operation of a specific UTM feature.

D.

It defines an object list.

Questions 8

When a new traffic flow enters an SRX Series device, in which order are these processes performed?

Options:
A.

screens → security policies → zones → routes

B.

screens → routes → zones → security policies

C.

routes → zones → screens → security policies

D.

screens → zones → security policies → routes

Questions 9

A new packet arrives on an interface on your SRX Series Firewall that is assigned to the trust security zone.

In this scenario, how does the SRX Series Firewall determine the egress security zone?

Options:
A.

by performing a session lookup

B.

by examining the destination port

C.

by performing a route lookup

D.

by examining the ingress security zone properties

Questions 10

You want to show the effectiveness of your SRX Series Firewall content filter.

Which operational mode command would you use in this scenario?

Options:
A.

show security utm anti-spam status

B.

show security utm anti-virus status

C.

show security web filtering status

D.

show security utm content-filtering statistics