[Free] Download New Latest (November) Juniper JN0-521 Actual Tests Topic 1 part 02

Ensurepass

QUESTION 71  (Topic 1)

 

Which command is used when configuring web management on the VLAN1 interface for a client connected to an e3 interface in the DMZ zone?

 

A.

set int eth3 manage web

B.

set zone v1-dmz manage web

C.

set int dmz zone manage web

D.

set int VLAN1 zone dmz manage web

 

Answer: B

 

 

QUESTION 72  (Topic 1)

 

What are two benefits of configuring a ScreenOS device in transparent mode? (Choose two.)

 

A.

There is no need to reconfigure the IP addresses of routers or protected servers.

B.

There is no need to create MIPs or VIPs for incoming traffic to reach protected servers.

C.

Policies are easier to create since you do not have to include source and destination IP addresses.

D.

The product can support more VPNs and obtain greater throughput because there is less overhead to manage.

 

 

 

 

 

Answer: AB

 

 

QUESTION 73  (Topic 1)

 

Which command would you run to check IPSec Phase 1 active status?

 

A.

get sa

B.

get event 427

C.

get sa active

D.

get ike cookie

 

Answer: D

 

 

QUESTION 74  (Topic 1)

 

When performing an image upgrade using the CLI, which three locations would be a source for this image? (Choose three.)

 

A.

FTP server

B.

TFTP server

C.

internal flash

D.

PC local disk

E.

Compact Flash Card

 

Answer: BCE

 

 

QUESTION 75  (Topic 1)

 

What are three components of a tunnel interface configuration? (Choose three.)

 

A.

zone

B.

virtual router

C.

subnet mask

D.

IP addressing

E.

virtual system

 

Answer: ACD

 

 

 

 

 

QUESTION 76  (Topic 1)

 

In the packet forwarding decision process, how is the second packet handled differently than the first in a series of allowed interzone packets?

 

A.

The second packet causes an ARP query.

B.

The second packet is checked against the policy table.

C.

The second packet is forwarded without a sanity check.

D.

The second packet is forwarded without checking the route table.

 

Answer: D

 

 

QUESTION 77  (Topic 1)

 

What are two reasons for using HMACs? (Choose two.)

 

A.

data integrity

B.

hash encryption

C.< /font>

source authentication

D.

simplify device configuration

 

Answer: AC

 

 

QUESTION 78  (Topic 1)

 

Address book entries identify hosts and networks by their location in relation to what?

 

A.

security zones on the CLI

B.

an interface on the firewall

C.

a listing of addresses in the ARP table

D.

autoassignment using Security Manager

 

Answer: A

 

 

QUESTION 79  (Topic 1)

 

Which command is used to avoid IP fragmentation when configuring IPSec on a ScreenOS device?

 

 

 

 

 

A.

set flow

B.

set tcp-mss flow

C.

set flow tcp-mss

D.

set mss-flow size

 

Answer: C

 

 

QUESTION 80  (Topic 1)

 

What is the purpose of the “Permitted IP” address on a ScreenOS device?

 

A.

It defines a list of addresses that are trusted to perform management on the ScreenOS device.

B.

< font face="Arial">It is used in policy rules to determine which user traffic is allowed through the ScreenOS device.

C.

It defines which range of addresses that can access devices connected to the ScreenOS device.

D.

It is the address that an external device uses to gain management access to a ScreenOS device.

 

Answer: A

 

Free VCE & PDF File for Juniper JN0-521 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-521 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.