Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Juniper JN0-335 Practice Exam with Questions & Answers | Set: 2

Questions 11

What are two benefits of using a vSRX in a software-defined network? (Choose two.)

Options:
A.

scalability

B.

no required software license

C.

granular security

D.

infinite number of interfaces

Juniper JN0-335 Premium Access
Questions 12

How does the SSL proxy detect if encryption is being used?

Options:
A.

It uses application identity services.

B.

It verifies the length of the packet

C.

It queries the client device.

D.

It looks at the destination port number.

Questions 13

Exhibit

JN0-335 Question 13

Using the information from the exhibit, which statement is correct?

Options:
A.

Redundancy group 1 is in an ineligible state.

B.

Node1 is the active node for the control plane

C.

There are no issues with the cluster.

D.

Redundancy group 0 is in an ineligible state.

Questions 14

Exhibit

JN0-335 Question 14

Referring to the exhibit, which two statements are true? (Choose two.)

Options:
A.

Nancy logged in to the juniper.net Active Directory domain.

B.

The IP address of Nancy's client PC is 172.25.11.

C.

The IP address of the authenticating domain controller is 172.25.11.140.

D.

Nancy is a member of the Active Directory sales group.

Questions 15

Exhibit

JN0-335 Question 15

You are asked to track BitTorrent traffic on your network. You need to automatically add the workstations to the High_Risk_Workstations feed and the servers to the BitTorrent_Servers feed automatically to help mitigate future threats.

Which two commands would add this functionality to the FindThreat policy? (Choose two.)

A)

JN0-335 Question 15

B)

JN0-335 Question 15

C)

JN0-335 Question 15

D)

JN0-335 Question 15

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 16

You want to permit access to an application but block application sub-Which two security policy features provide this capability? (Choose two.)

Options:
A.

URL filtering

B.

micro application detection

C.

content filtering

D.

APPID

Questions 17

Exhibit

JN0-335 Question 17

Which two statements are correct about the configuration shown in the exhibit? (Choose two.)

Options:
A.

The session-class parameter in only used when troubleshooting.

B.

The others 300 parameter means unidentified traffic flows will be dropped in 300 milliseconds.

C.

Every session that enters the SRX Series device will generate an event

D.

Replacing the session-init parameter with session-lose will log unidentified flows.

Questions 18

Which two statements are true about mixing traditional and unified security policies? (Choose two.)

Options:
A.

When a packet matches a unified security policy, the evaluation process terminates

B.

Traditional security policies must come before unified security policies

C.

Unified security policies must come before traditional security policies

D.

When a packet matches a traditional security policy, the evaluation process terminates

Questions 19

You are asked to create an IPS-exempt rule base to eliminate false positives from happening.

Which two configuration parameters are available to exclude traffic from being examined? (Choose two.)

Options:
A.

source port

B.

source IP address

C.

destination IP address

D.

destination port

Questions 20

Which two statements are true about application identification? (Choose two.)

Options:
A.

Application identification can identity nested applications that are within Layer 7.

B.

Application identification cannot identify nested applications that are within Layer 7.

C.

Application signatures are the same as IDP signatures.

D.

Application signatures are not the same as IDP signatures.