Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Juniper JN0-335 Practice Exam with Questions & Answers | Set: 3

Questions 21

Click the Exhibit button.

JN0-335 Question 21

Referring to the exhibit, what will the SRX Series device do in this configuration?

Options:
A.

Packets from the infected hosts with a threat level of 8 will be dropped and a log message will be generated.

B.

Packets from the infected hosts with a threat level of 8 or above will be dropped and a log message will be generated.

C.

Packets from the infected hosts with a threat level of 8 or above will be dropped and no log message will be generated.

D.

Packets from the infected hosts with a threat level of 8 will be dropped and no log message will be generated.

Juniper JN0-335 Premium Access
Questions 22

Which statement defines the function of an Application Layer Gateway (ALG)?

Options:
A.

The ALG uses software processes for permitting or disallowing specific IP address ranges.

B.

The ALG uses software that is used by a single TCP session using the same port numbers as the application.

C.

The ALG contains protocols that use one application session for each TCP session.

D.

The ALG uses software processes for managing specific protocols.

Questions 23

You are experiencing excessive packet loss on one of your two WAN links route traffic from the degraded link to the working link

Which AppSecure component would you use to accomplish this task?

Options:
A.

AppFW

B.

AppQoE

C.

AppQoS

D.

APBR

Questions 24

On which three Hypervisors is vSRX supported? (Choose three.)

Options:
A.

VMware ESXi

B.

Citrix Hypervisor

C.

Hyper-V

D.

KVM

E.

Oracle VM

Questions 25

When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?

Options:
A.

The active sessions allowed by the policy will be dropped.

B.

The active sessions allowed by the policy will be marked as a legacy flow and will continue to be forwarded.

C.

The active sessions allowed by the policy will be reevaluated by the cached

D.

The active sessions allowed by the policy will continue

Questions 26

Which two statements are correct about the fab interface in a chassis cluster? (Choose two.)

Options:
A.

Real-time objects (RTOs) are exchanged on the fab interface to maintain session synchronization.

B.

In an active/active configuration, inter-chassis transit traffic is sent over the fab interface.

C.

The fab interface enables configuration synchronization.

D.

Heartbeat signals sent on the fab interface monitor the health of the control plane link.

Questions 27

You have implemented a vSRX in your VMware environment. You want to implement a second vSRX Series device and enable chassis clustering.

Which two statements are correct in this scenario about the control-link settings? (Choose two.)

Options:
A.

In the vSwitch security settings, accept promiscuous mode.

B.

In the vSwitch properties settings, set the VLAN ID to None.

C.

In the vSwitch security settings, reject forged transmits.

D.

In the vSwitch security settings, reject MAC address changes.

Questions 28

Click the Exhibit button.

JN0-335 Question 28

You are asked to create a security policy that will automatically add infected hosts to the infected hosts feed and block further communication through the SRX Series device.

What needs to be added to this configuration to complete this task?

Options:
A.

Add a security intelligence policy to the permit portion of the security policy.

B.

Add an action to the permit portion of the security policy.

C.

Add logging to the permit portion of the security policy.

D.

Add a match rule to the security policy with an appropriate threat level.

Questions 29

Exhibit

JN0-335 Question 29

You are trying to create a security policy on your SRX Series device that permits HTTP traffic from your private 172 25.11.0/24 subnet to the Internet You create a policy named permit-http between the trust and untrust zones that permits HTTP traffic. When you issue a commit command to apply the configuration changes, the commit fails with the error shown in the exhibit.

Which two actions would correct the error? (Choose two.)

Options:
A.

Issue the rollback 1 command from the top of the configuration hierarchy and attempt the commit again.

B.

Execute the Junos commit full command to override the error and apply the configuration.

C.

Create a custom application named http at the [edit applications] hierarchy.

D.

Modify the security policy to use the built-in Junos-http applications.