Documente Academic
Documente Profesional
Documente Cultură
==============================================
B. Sky ATP is used to automatically push out changes to the AppSecure suite.
C. Sky ATP only support sending threat feeds to vSRX Series devices
D. Sky ATP is a cloud-based security threat analyzer that performs multiple tasks
Answer: D
NO.2 The free licensing model for Sky ATP includes which features? (Choose two.)
A. C & C feeds
Answer: B C
NO.3 Which security feature is applied to traffic on an SRX Series device when the
device is running on packet mode?
A. Sky ATP
B. ALGs
C. Firewall filters
D. Unified policies
Answer: C
NO.4 Which two match conditions would be used in both static NAT and destination
NAT rule sets?
(Choose two.)
A. Destination zone
B. Destination address
C. Source interface
D. Source zone
Answer: B D
Which action must be performed before the Web filtering UTM policy takes effect?
A. The UTM policy must be linked to an egress interface
Answer: D
NO.6 What should you configure if you want to translate private source IP address
to a single public
IP address?
A. Source NAT
B. Destination NAT
C. Content filtering
D. Security Director
Answer: A
Answer: C
NO.8 On an SRX device, you want to regulate traffic base on network segments.
A. Screens
B. Zones
C. ALGs
D. NAT
Answer: B
NO.9 Which type of security policy protect restricted services from running on non-
standard ports?
A. Application firewall
B. IDP
C. Sky ATP
D. antivirus
Answer: B
NO.10 Exhibit.
Answer: A D
NO.11 What are configuring the antispam UTM feature on an SRX Series device.
Which two actions would be performed by the SRX Series device for e-mail that is
identified as spam?
(Choose two.)
D. Quarantine e-mail
Answer: A C
that zone.
which to types of management traffic would be performed on the SRX Series device?
(Choose two.)
A. HTTPS
B. SSH
C. Finger
D. HTTP
Answer: B D
NO.13 Which two feature on the SRX Series device are common across all Junos
devices? (Choose
two.)
B. UTM services
D. screens
Answer: A C
NO.14 Which two notifications are available when the antivirus engine detects and
infected file?
(Choose two.)
A. e-mail notifications
B. SNMP notifications
C. SMS notifications
D. Protocol-only notification
Answer: A D
NO.15 Which two statements are true about security policy actions? (Choose two.)
A. The reject action drops the traffic and sends a message to the source device.
C. The deny action drops the traffic and sends a message to the source device.
Answer: A B
A. Global policies allow you to regulate traffic with addresses and applications,
regardless of their
security zones.
Answer: A
NO.17 You configure and applied several global policies and some of the policies
have overlapping
match criteria. In this scenario, how are these global policies applies?
B. The first matched policy is the only policy applied.
Answer: B
NO.18 Which actions would be applied for the pre-ID default policy unified
policies?
Answer: C
NO.19 The Sky ATP premium or basic-Threat Feed license is needed fort which two
features?
(Choose two.)
A. Outbound protection
B. C&C feeds
C. Executable inspection
D. Custom feeds
Answer: B D
NO.20 Exhibit.
Answer: C
NO.21 Which security object defines a source or destination IP address that is used
for an employee
Workstation?
A. Zone
B. Screen
D. scheduler
Answer: C
Answer: C
NO.23 You have configured antispam to allow e-mail from example.com, however the
logs you see
Answer: B C
NO.24 You want to generate reports from the l-Web on an SRX Series device.
A. Syslog
B. Stream
C. Event
D. local
Answer: C
NO.25 Which two private cloud solution support vSRX devices? (Choose two.)
A. Microsoft Azure
E. Contrail Cloud
Answer: A B
****Exhibit is Missing****
Answer: D
NO.27 A new SRX Series device has been delivered to your location. The device has
the factorydefault
configuration loaded. You have powered on the device and connected to the console
port.
What would you use to log into the device to begin the initial configuration?
Answer: B
NO.28 What must you do first to use the Monitor/Alarms/Policy Log workspace in J-
Web?
B. You must enable security logging that uses the TLS transport mode.
C. You must enable stream mode security logging on the SRX Series device.
D. You must enable event mode security logging on the SRX Series device.
Answer: D
NO.29 You have created a zones-based security policy that permits traffic to a
specific webserver for the marketing team. Other groups in the company are not
permitted to access the webserver. When marketing users attempt to access the
server they are unable to do so.
What are two reasons for this access failure? (Choose two.)
A. You failed to change the source zone to include any source zone.
B. You failed to position the policy after the policy that denies access to the
webserver.
D. You failed to position the policy before the policy that denies access the
webserver
Answer: C D
NO.30 Which two elements are needed on an SRX Series device to set up a remote
syslog server?
(Choose two.)
A. Data type
B. Data throughput
C. IP address
D. Data size
Answer: A C
C. IPsec VPNs use security to secure traffic over a public network between two
remote sites.
D. IPsec VPNs are dedicated physical connections between two private networks.
Answer: A C
NO.32 Users on the network are restricted from accessing Facebook, however, a
recent examination
Answer: D
NO.33 Which two statements are true about the null zone? (Choose two.)
Answer: A B
NO.34 Your company uses SRX Series devices to secure the edge of the network. You
are asked
A. Sky ATP
B. AppSecure
D. screens
Answer: A
NO.35 Which UTM feature should you use to protect users from visiting certain
blacklisted
websites?
A. Content filtering
B. Web filtering
C. Antivirus
D. antispam
Answer: B
NO.36 Users should not have access to Facebook, however, a recent examination of
the logs security show that users are accessing Facebook.
A. Change the source address for the Block-Facebook-Access rule to the prefix of
the users
NO.37 Users in your network are downloading files with file extensions that you
consider to be
unsafe for your network. You must prevent files with specific file extensions from
entering your
network.
Which UTM feature should be enable on an SRX Series device to accomplish this task?
A. Content filtering
B. Web filtering
C. Antispam
D. URL filtering
Answer: A
NO.38 You are configuring an IPsec VPN tunnel between two location on your network.
Each packet
A. MD5
B. ESP
C. AH
D. SHA
Answer: B
A. Stateful
B. Stateless
C. NGFW
D. Dynamic enforcement
Answer: B
NO.40 What are the valid actions for a source NAT rule in J-Web? (choose three.)
A. On
B. Off
C. Pool
D. Source
E. interface
Answer: B C E
Explanation
Hidden Content
pool.html
A. Policy
B. Zones
C. Services
D. Screen options
Answer: C
A. The Shadow Policies workspace shows unused security policies due to policy
overlap.
B. The Shadow Policies workspace shows unused IPS policies due to policy overlap.
C. The Shadow Policies workspace shows used security policies due to policy overlap
D. The Shadow Policies workspace shows used IPS policies due to policy overlap
Answer: A
NO.43 You are designing a new security policy on an SRX Series device. You must
block an
In this scenario, which two actions must be enabled in the security policy? (Choose
two.)
Answer: A D
NO.44 Your company has been assigned one public IP address. You want to enable
internet traffic to
reach multiple servers in your DMZ that are configured with private address.
In this scenario, which type of NAT would be used to accomplish this tasks?
A. Static NAT
B. Destination NAT
C. Source NAT
Answer: B
NO.45 What are two characteristic of static NAT SRX Series devices? (Choose two.)
A. Source and destination NAT rules take precedence over static NAT rules.
C. Static NAT rule take precedence over source and destination NAT rules.
D. Static rules cannot coexist with destination NAT rules on the same SRX Series
device configuration.
Answer: B C
NO.46 You want to automatically generate the encryption and authentication keys
during IPsec VPN
establishment.
A. IPsec
B. Diffie_Hellman
C. Main mode
D. Aggregate mode
Answer: B
NO.47 Which two statements are true about UTM on an SRX340? (Choose two.)
Answer: B C
NO.48 Which management software supports metadata-based security policies that are
ideal for
cloud deployments?
A. Security Director
B. J-Web
C. Network Director
D. Sky Enterprise
Answer: A
NO.49 You want to integrate an SRX Series device with SKY ATP.
B. Copy the operational script from the Sky ATP Web UI.
D. Create the SSL VPN tunnel between the SRX Series device and Sky ATP.
Answer: C
NO.50 Which two statements are correct about using global-based policies over zone-
based
A. With global-based policies, you do not need to specify a destination zone in the
match criteria.
B. With global-based policies, you do not need to specify a source zone in the
match criteria.
D. With global-based policies, you do not need to specify a source address in the
match criteria.
Answer: A B
A. When multiple NAT rules have overlapping match conditions, the rule listed first
is chosen.
D. When multiple NAT rules have overlapping match conditions, the most specific
rule is chosen.
Answer: A C
NO.52 What is the correct order of processing when configuring NAT rules and
security policies?
A. Policy lookup > source NAT > static NAT > destination NAT
B. Source NAT > static NAT > destination NAT > policy lookup
C. Static NAT > destination NAT> policy lookup > source NAT
D. Destination NAT > policy lookup > source NAT > static NAT
Answer: C
Answer: A
NO.54 Which two statements are correct about functional zones? (Choose two.)
A. A functional zone uses security policies to enforce rules for transit traffic.
interface.
Answer: B D
NO.55 What must you do first to use the Monitor/Events workspace in the j-Web
interface?
A. You must enable stream mode security logging on the SRX Series device
B. You must enable event mode security logging on the SRX Series device.
C. You must enable security logging that uses the SD-Syslog format.
D. You must enable security logging that uses the TLS transport mode.
Answer: B
NO.56 Which two actions are performed on an incoming packet matching an existing
session?
(Choose two.)
A. Zone processing
D. Screens processing
Answer: C D
NO.57 You verify that the SSH service is configured correctly on your SRX Series
device, yet
Answer: B
NO.58 Which method do VPNs use to prevent outside parties from viewing packet in
clear text?
A. Integrity
B. Authentication
C. Encryption
D. NAT_T
Answer: C
NO.59 On an SRX Series device, how should you configure your IKE gateway if the
remote endpoint
Answer: B
NO.60 Which two statements are true regarding zone-based security policies? (Choose
two.)
Answer: A C
NO.61 Which three actions would be performed on traffic traversing an IPsec VPAN?
(Choose three.)
A. Port forwarding
B. Authentication
C. Encryption
D. Deep inspection
E. Payload verification
Answer: B C E
Answer: C
NO.63 BY default, revenue interface are placed into which system-defined security
zone on an SRX
series device?
A. Trust
B. Null
C. Junos-trust
D. untrust
Answer: B
Answer: C
NO.65 You are concerned that unauthorized traffic is using non-standardized ports
on your network.
A. Application firewall
B. Sky ATP
C. Firewall filters
D. Zone-based policies
Answer: A