[Free] 2018(Jan) EnsurePass Examcollection Juniper JN0-343 Dumps with VCE and PDF 351-360

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Juniper Official New Released JN0-343
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/JN0-343.html

Juniper Networks Certified Internet Specialist, SEC (JNCIS-SEC)

Question No: 351 – (Topic 4)

Which two are negotiated during Phase 2 of an IPsec VPN tunnel establishment? (Choose two.)

  1. security protocol

  2. VPN monitor interval

  3. UDP port number

  4. proxy IDs

Answer: A,D

Question No: 352 – (Topic 4)

Click the Exhibit button.

Ensurepass 2018 PDF and VCE

Referring to the exhibit, you are setting up the hub in a hub-and-spoke IPsec VPN. You have verified that all configured parameters are correct at all sites, but your IPsec VPN is not establishing to both sites.

Which configuration parameter is missing at the hub to complete the configuration?

  1. A different external-interface is needed for vpn1.

  2. A different st0 logical interface is needed for vpn2.

  3. Establish-tunnels immediately must be configured for vpn1.

  4. Multipoint needs to be configured under the st0.0 interface.

Answer: D

Question No: 353 – (Topic 4)

Which two statements are correct regarding the cluster ID? (Choose two.)

  1. You can have up to 15 unique cluster IDs on a single chassis cluster device.

  2. The cluster ID value of 0 indicates that this is the primary chassis cluster on this device.

  3. The cluster ID is used to calculate the reth interface#39;s virtual MAC addresses.

  4. You must reboot both nodes if you change the cluster ID value.

Answer: C,D

Question No: 354 – (Topic 4)

You have implemented Integrated SurfControl Web filtering on an SRX Series device. You have also created a whitelist and a blacklist on the SRX device. One particular Web site is matching all three the whitelist, blacklist, and Surfcontrol policy.

Which statement is correct?

  1. Access is not allowed because the blacklist is processed first.

  2. Access is allowed because the whitelist is processed first.

  3. Access will be controlled by the SurfControl policy, because it is processed first.

  4. Access is based on the priority of each policy as defined in the fallback settings in the UTM policy.

Answer: A

Question No: 355 – (Topic 4)

Which three Unified Threat Management features require a license? (Choose three.)

  1. antivirus

  2. surf control Web filtering

  3. Websense Web filtering

  4. content filtering

  5. antispam

Answer: A,B,E

Question No: 356 – (Topic 4)

Which two SRX platforms support UTM features? (Choose two.)

  1. SRX240 with base memory

  2. SRX100 with high memory

  3. SRX650 with base memory

  4. SRX1400 with base memory

Answer: B,C

Question No: 357 – (Topic 4)

Which two statements are true about zones? (Choose two.)

  1. Null zones accept all traffic to and from an interface.

  2. Security zones filter transit traffic and traffic destined for the device itself.

  3. Functional zones filter transit traffic and traffic destined for the device itself.

  4. Functional zones do not pass transit traffic and allow only management access to the device.

Answer: B,D

Question No: 358 – (Topic 4)

Click the Exhibit button.

Ensurepass 2018 PDF and VCE

You are troubleshooting an IPsec VPN connection between a local SRX Series device using IP address 192.168.1.100 and a remote SRX device using IP address 192.168.2.100. A VPN connection cannot be established. Referring to the exhibit, you examine the kmd log file.

What is the problem?

  1. The Phase 2 proposal is invalid.

  2. The Phase 1 proposal is invalid.

  3. The Phase 1 gateway is invalid.

  4. The Phase 2 gateway is invalid.

Answer: B

Question No: 359 – (Topic 4)

Which three algorithms are used by an SRX Series device to validate the integrity of the data exchanged through an IPsec VPN? (Choose three.)

  1. 3DES

  2. MD5

  3. NHTB

  4. SHA1

  5. SHA2

Answer: B,D,E

Question No: 360 – (Topic 4)

Which global UTM configuration parameter contains lists, such as MIME patterns, filename extensions, and URL patterns, that can be used across all UTM features?

  1. custom objects

  2. feature profile

  3. UTM policy

  4. address sets

Answer: A

100% Ensurepass Free Download!
Download Free Demo:JN0-343 Demo PDF
100% Ensurepass Free Guaranteed!
JN0-343 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

This entry was posted in JN0-343 Latest Exam (Jan 2018) and tagged , , , , , , , . Bookmark the permalink.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.