Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Juniper JN0-636 Practice Exam with Questions & Answers | Set: 3

Questions 21

What are two valid modes for the Juniper ATP Appliance? (Choose two.)

Options:
A.

flow collector

B.

event collector

C.

all-in-one

D.

core

Juniper JN0-636 Premium Access
Questions 22

Exhibit

JN0-636 Question 22

Referring to the exhibit, which three statements are true? (Choose three.)

Options:
A.

The packet's destination is to an interface on the SRX Series device.

B.

The packet's destination is to a server in the DMZ zone.

C.

The packet originated within the Trust zone.

D.

The packet is dropped before making an SSH connection.

E.

The packet is allowed to make an SSH connection.

Questions 23

You must setup a Ddos solution for your ISP. The solution must be agile and not block legitimate traffic.

Which two products will accomplish this task? (Choose two.)

Options:
A.

Contrail Insights

B.

MX Series device

C.

Corero Smartwall TDD

D.

SRX Series device

Questions 24

Exhibit

JN0-636 Question 24

You configure a traceoptions file called radius on your returns the output shown in the exhibit

What is the source of the problem?

Options:
A.

An incorrect password is being used.

B.

The authentication order is misconfigured.

C.

The RADIUS server IP address is unreachable.

D.

The RADIUS server suffered a hardware failure.

Questions 25

Exhibit

JN0-636 Question 25

You have recently configured Adaptive Threat Profiling and notice 20 IP address entries in the monitoring section of the Juniper ATP Cloud portal that do not match the number of entries locally on the SRX Series device, as shown in the exhibit.

What is the correct action to solve this problem on the SRX device?

Options:
A.

You must configure the DAE in a security policy on the SRX device.

B.

Refresh the feed in ATP Cloud.

C.

Force a manual download of the Proxy__Nodes feed.

D.

Flush the DNS cache on the SRX device.

Questions 26

which two statements about the configuration shown in the exhibit are correct ?

Exhibit:

JN0-636 Question 26

Options:
A.

The remote IKE gateway IP address is 203.0.113.100.

B.

The local peer is assigned a dynamic IP address.

C.

The local IKE gateway IP address is 203.0.113.100.

D.

The remote peer is assigned a dynamic IP address.

Questions 27

You are asked to share threat intelligence from your environment with third party tools so that those

tools can be identify and block lateral threat propagation from compromised hosts.

Which two steps accomplish this goal? (Choose Two)

Options:
A.

Configure application tokens in the SRX Series firewalls to limit who has access

B.

Enable Juniper ATP Cloud to share threat intelligence

C.

Configure application tokens in the Juniper ATP Cloud to limit who has access

D.

Enable SRX Series firewalls to share Threat intelligence with third party tool.

Questions 28

Refer to the exhibit,

JN0-636 Question 28

which two potential violations will generate alarm ? (Choose Two)

Options:
A.

the number of policy violations by a source network identifier

B.

the ratio of policy violation traffic compared to accepted traffic.

C.

the number of policy violation by a destination TCP port

D.

the number of policy violation to an application within a specified period

Questions 29

Exhibit.

JN0-636 Question 29

Referring to the exhibit, which two statements are true? (Choose two.)

Options:
A.

Juniper Networks will not investigate false positives generated by this custom feed.

B.

The custom infected hosts feed will not overwrite the Sky ATP infected host’s feed.

C.

The custom infected hosts feed will overwrite the Sky ATP infected host’s feed.

D.

Juniper Networks will investigate false positives generated by this custom feed.

Questions 30

Exhibit

JN0-636 Question 30

Referring to the exhibit, which two statements are true about the CAK status for the CAK named "FFFP"? (Choose two.)

Options:
A.

CAK is not used for encryption and decryption of the MACsec session.

B.

SAK is successfully generated using this key.

C.

CAK is used for encryption and decryption of the MACsec session.

D.

SAK is not generated using this key.