Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Juniper JN0-636 Practice Exam with Questions & Answers

Questions 1

Exhibit.

JN0-636 Question 1

A hub member of an ADVPN is not functioning correctly.

Referring the exhibit, which action should you take to solve the problem?

Options:
A.

[edit interfaces]

root@vSRX-1# delete st0.0 multipoint

B.

[edit interfaces]

user@hub-1# delete ipsec vpn advpn-vpn traffic-selector

C.

[edit security]

user@hub-1# set ike gateway advpn-gateway advpn suggester disable

D.

[edit security]

user@hub-1# delete ike gateway advpn-gateway advpn partner

Juniper JN0-636 Premium Access
Questions 2

Exhibit:

JN0-636 Question 2

Referring to the exhibit, your company’s infrastructure team implemented new printers

To make sure that the policy enforcer pushes the updated Ip address list to the SRX.

Which three actions are required to complete the requirement? (Choose three )

Options:
A.

Configure the server feed URL as <a href="http://172.25.10.254/myprinters">http://172.25.10.254/myprinters</a>

B.

Create a security policy that uses the dynamic address feed to allow access

C.

Configure Security Director to create a dynamic address feed

D.

Configure Security Director to create a C&C feed.

E.

Configure server feed URL as https://172.25.10.254/myprinters.

Questions 3

Your Source NAT implementation uses an address pool that contains multiple IPv4 addresses Your users report that when they establish more than one session with an external application, they are prompted to authenticate multiple times External hosts must not be able to establish sessions with internal network hosts

What will solve this problem?

Options:
A.

Disable PAT.

B.

Enable destination NAT.

C.

Enable persistent NAT

D.

Enable address persistence.

Questions 4

While troubleshooting security policies, you added the count action. Where do you see the result of this action?

Options:
A.

In the show security policies hit-count command output.

B.

In the show security flow statistics command output.

C.

In the show security policies detail command output.

D.

In the show firewall log command output.

Questions 5

Which method does an SRX Series device in transparent mode use to learn about unknown devices in a network?

Options:
A.

LLDP-MED

B.

IGMP snooping

C.

RSTP

D.

packet flooding

Questions 6

Exhibit

JN0-636 Question 6

Referring to the exhibit, which type of NAT is being performed?

Options:
A.

Static NAT

B.

Destination NAT

C.

Persistent NAT

D.

Source NAT

Questions 7

Exhibit:

JN0-636 Question 7

Referring to the exhibit, which two statements are correct?

Options:
A.

All of the entries are a threat level 8

B.

All of the entries are command and control entries.

C.

All of the entries are Dshield entries

D.

All of the entries are a threat level 10.

Questions 8

Regarding IPsec CoS-based VPNs, what is the number of IPsec SAs associated with a peer based upon?

Options:
A.

The number of traffic selectors configured for the VPN.

B.

The number of CoS queues configured for the VPN.

C.

The number of classifiers configured for the VPN.

D.

The number of forwarding classes configured for the VPN.

Questions 9

Exhibit

JN0-636 Question 9

You are trying to configure an IPsec tunnel between SRX Series devices in the corporate office and branch1. You have committed the configuration shown in the exhibit, but the IPsec tunnel is not establishing.

In this scenario, what would solve this problem.

Options:
A.

Add multipoint to the st0.0 interface configuration on the branch1 device.

B.

Change the IKE proposal-set to compatible on the branch1 and corporate devices.

C.

Change the local identity to inet advpn on the branch1 device.

D.

Change the IKE mode to aggressive on the branch1 and corporate devices.

Questions 10

you are connecting two remote sites to your corporate headquarters site. You must ensure that traffic

passes corporate headquarter.

In this scenario, which VPN should be used?

Options:
A.

full mesh IPsec VPNs with tunnels between all sites

B.

a full mesh Layer 3 VPN with the BGP route reflector behind the corporate firewall device

C.

a Layer 3 VPN with the corporate firewall acting as the hub device

D.

hub-and-spoke IPsec VPN with the corporate firewall acting as the hub device