[Free] 2018(Jan) EnsurePass Examcollection Juniper JN0-346 Dumps with VCE and PDF 251-260

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Juniper Official New Released JN0-346
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/JN0-346.html

Juniper Networks Certified Internet Specialist, SEC (JNCIS-SEC)

Question No: 251 – (Topic 3)

Click the Exhibit button.

Ensurepass 2018 PDF and VCE

Which configuration would result in the output shown in the exhibit?

  1. [edit security zones security-zone trust] user@host# show

    host-inbound-traffic { system-services {

    ping; telnet;

    }}

    interfaces { ge-0/0/0.0 {

    host-inbound-traffic { system-services { ssh;

    telnet;

    }}}}

  2. [edit security zones functional-zone management] user@host# show

    interfaces { all;

    }

    host-inbound-traffic { system-services { all;

    ftp { except;

    }}}

  3. [edit security zones functional-zone management] user@host# show

    interfaces { all {

    host-inbound-traffic { system-services { ping;

    }}}}

    host-inbound-traffic { system-services { telnet;

    ssh;

    }}

  4. [edit security zones security-zone trust] user@host# show

host-inbound-traffic { system-services { ssh;

ping; telnet;

}}

interfaces { ge-0/0/3.0 {

host-inbound-traffic { system-services {

ping;

}}}

ge-0/0/0.0;

}

Answer: D

Question No: 252 – (Topic 3)

You are implementing an IDP policy template from Juniper Networks. Which three steps are included in this process? (Choose three.)

  1. activating a JUNOS Software commit script?

  2. configuring an IDP groups statement

  3. setting up a chassis cluster

  4. downloading the IDP policy templates

  5. installing the policy templates

Answer: A,D,E

Question No: 253 – (Topic 3)

Which statement describes the behavior of a security policy?

  1. The implicit default security policy permits all traffic.

  2. Traffic destined to the device itself always requires a security policy.

  3. Traffic destined to the device#39;s incoming interface does not require a security policy.

  4. The factory-default configuration permits all traffic from all interfaces.

Answer: C

Question No: 254 – (Topic 3)

What are two rulebase types within an IPS policy on an SRX Series device? (Choose two.)

  1. rulebase-ips

  2. rulebase-ignore

  3. rulebase-idp

  4. rulebase-exempt

Answer: A,D

Question No: 255 – (Topic 3)

Where do you configure SCREEN options?

  1. zones on which an attack might arrive

  2. zones you want to protect from attack

  3. interfaces on which an attack might arrive

  4. interfaces you want to protect from attack

Answer: A

Question No: 256 – (Topic 3)

Which two functions of JUNOS Software are handled by the data plane? (Choose two.)

  1. NAT

  2. OSPF

  3. SNMP

  4. SCREEN options

Answer: A,D

Question No: 257 – (Topic 3)

Which statement accurately describes firewall user authentication?

  1. Firewall user authentication provides another layer of security in a network.

  2. Firewall user authentication provides a means for accessing a JUNOS Software-based security device.

  3. Firewall user authentication enables session-based forwarding.

  4. Firewall user authentication is used as a last resort security method in a network.

Answer: A

Question No: 258 – (Topic 3)

What is a security policy?

  1. a set of rules that controls traffic from a specified source to a specified destination using a specified service

  2. a collection of one or more network segments sharing identical security requirements

  3. a method of providing a secure connection across a network

  4. a tool to protect against DoS attacks

Answer: A Explanation:

A security policy is a set of statements that controls traffic from a specified source to a specified destination using a specified service.If a packet arrives that matches those specifications, the SRX Series device performs the action specified in the policy.

Question No: 259 – (Topic 3)

Click the Exhibit button.

Ensurepass 2018 PDF and VCE

Based on the configuration shown in the exhibit, what will happen to the traffic matching the security policy?

  1. The traffic is permitted through the myTunnel IPsec tunnel only on Tuesdays.

  2. The traffic is permitted through the myTunnel IPsec tunnel daily, with the exception of Mondays.

  3. The traffic is permitted through the myTunnel IPsec tunnel all day on Mondays and Wednesdays between 7:00 am and 6:00 pm, and Thursdays between 7:00 am and 6:00 pm.

  4. The traffic is permitted through the myTunnel IPsec tunnel all day on Mondays and Wednesdays between 6:01 pm and 6:59 am, and Thursdays between 6:01 pm and 6:59 am.

Answer: C

Question No: 260 – (Topic 3)

Which two configuration elements are required for a policy-based VPN? (Choose two.)

  1. IKE gateway

  2. secure tunnel interface

  3. security policy to permit the IKE traffic

  4. security policy referencing the IPsec VPN tunnel

Answer: A,D

100% Ensurepass Free Download!
Download Free Demo:JN0-346 Demo PDF
100% Ensurepass Free Guaranteed!
JN0-346 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

This entry was posted in JN0-346 Latest Exam (Jan 2018) and tagged , , , , , , , . Bookmark the permalink.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.