[Free] Download New Latest (November) Juniper JN0-332 Actual Tests Topic 1, Volume A part 06

Ensurepass

QUESTION 51  (Topic 1)

 

For which network anomaly does Junos provide a SCREEN?

 

A.

a telnet to port 80

B.

a TCP packet with the SYN and ACK flags set

C.

an SNMP getnext request

D.

an ICMP packet larger than 1024 bytes

 

Answer: D

 

 

QUESTION 52  (Topic 1)

 

 

 

 

Which two UTM features require a license to be activated? (Choose two.)

 

A.

antispam

B.

antivirus (full AV)

C.

content filtering

D.

Web-filtering redirect

 

Answer: AB

 

 

QUESTION 53  (Topic 1)

 

Click the Exhibit button.

 

clip_image002

 

You need to alter the security policy shown in the exhibit to send matching traffic to an IPsec VPN tunnel. Which command causes traffic to be sent through an IPsec VPN named remote-vpn?

 

A.

[edit security policies from-zone trust to-zone untrust] user@host# set policy tunnel-traffic then tunnel remote-vpn

B.

[edit security policies from-zone trust to-zone untrust] user@host# set policy tunnel-traffic then tunnel ipsec-vpn remote-vpn

C.

[edit security policies from-zone trust to-zone untrust] user@host# set policy tunnel-traffic then permit ipsec-vpn remote-vpn

D.

[edit security policies from-zone trust to-zone untrust] user@host# set policy tunnel-traffic then permit tunnel ipsec-vpn remote-vpn

 

Answer: D

 

 

QUESTION 54  (Topic 1)

 

 

 

 

Which statement is correct about HTTP trickling?

 

A.

It prevents the HTTP client or server from timing-out during an antivirus update.

B.

It prevents the HTTP client or server from timing-out during antivirus scanning.

C.

It is an attack.

D.

It is used to bypass antivirus scanners.

 

Answer: B

 

 

QUESTION 55  (Topic 1)

 

Which UTM feature requires a license to function?

 

A.

integrated Web filtering

B.

local Web filtering

C.

redirect Web filtering

D.

content filtering

 

Answer: A

 

 

QUESTION 56  (Topic 1)

 

Which two statements regarding symmetric key encryption are true? (Choose two.)

 

A.

The same key is used for encryption and decryption.

B.

It is commonly used to create digital certificate signatures.

C.

It uses two keys: one for encryption and a different key for decryption.

D.

An attacker can decrypt data if the attacker captures the key used for encryption.

 

Answer: AD

 

 

QUESTION 57  (Topic 1)

 

Which three features are part of the branch SRX series UTM suite? (Choose three.)

 

A.

antispam

B.

antivirus

 

 

 

 

C.

IPS

D.

application firewalling

E.

Web filtering

 

Answer: ABE

 

 

QUESTION 58  (Topic 1)

 

Which IDP policy action closes the connection and sends an RST packet to both the client and the server?

 

A.

close-connection

B.

terminate-connection

C.

close-client-and-server

D.

terminate-session

 

Answer: C

 

 

QUESTION 59  (Topic 1)

 

You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails. Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?

 

A.

set security policies from-zone dmz to-zone untrust policy anti-spam then permit application-services utm-policy Block-Spam

B.

set security policies from-zone untrust to-zone dmz policy anti-spam then permit application-services utm-policy Block-Spam

C.

set security policies from-zone untrust to-zone dmz policy anti-spam then permit application-services anti-spam-policy Block-Spam

D.

set security policies from-zone untrust to-zone dmz policy anti-spam then permit application-services Block-Spam

 

Answer: B

 

 

QUESTION 60  (Topic 1)

 

Which security or functional zone name has special significance to the Junos OS?

 

 

 

 

 

A.

self

B.

trust

C.

untrust

D.

junos-global

 

Answer: D

 

Free VCE & PDF File for Juniper JN0-332 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-332 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.