[Free] Download New Latest (November) Juniper JN0-522 Actual Tests Topic 1, Volume A part 02

Ensurepass

QUESTION 11  (Topic 1)

 

Which three options allow proper configuration of NAT-dst? (Choose three.)

 

A.

the default address book entry of “any” in the internal zone

B.

the default address book entry of “any” in the external zone

C.

a secondary address on one of the interfaces in the internal zone

D.

an address book entry for the address to be translated in the internal zone

E.

a static route to the appropriate subnet using a private interface as the outbound interface

&
nbsp;

Answer: CDE

 

 

QUESTION 12  (Topic 1)

 

What are three major concerns when sending private data over a public medium? (Choose three.)

 

A.

Confidentiality

B.

Authority

C.

Authentication

D.

Integrity

E.

Capacity

 

Answer: ACD

 

 

QUESTION 13  (Topic 1)

 

Which two statements are true about symmetric key algorithms? (Choose two.)

 

 

 

 

 

A.

Symmetric key algorithms are more suitable for bulk data transfers

B.

DH and RSA are symmetric

C.

DES, 3DES and AES are symmetric

D.

Symmetric key algorithms are computationally more expensive

 

Answer: AC

 

 

QUESTION 14  (Topic 1)

 

Which command would you run to check IPSec Phase 1 active status?

 

A.

Get event 427

B.

Get sa active

C.

Get sa

D.

Get ike cookie

 

Answer: D

 

 

QUESTION 15  (Topic 1)

 

Which three commands are used to verify that routing is correctly configured? (Choose three.)

 

A.

Trace-route

B.

Get route

C.

Ping

D.

Get session

E.

Get interface

 

Answer: ABC

 

 

QUESTION 16  (Topic 1)

 

See the Exhibit:

 

Exhibit:

 

 

 

 

 

clip_image002

 

In the exhibit, what is the correct address book entry for host C?

 

A.

Set address partner C 1.1.70.250/32

B.

Set address partner 1.1.70.250/32

C.

Set address partner C 1.1.70.250

D.

Set address C 1.1.70.250/32

 

Answer: A

 

 

QUESTION 17  (Topic 1)

 

In the packet forwarding decision process, how is the second packet handled differently than the first in a series of allowed interzone packets?

 

A.

The second packet causes an ARP query

B.

The second packet is checked against the policy table

C.

The second packet is forwarded without a sanity check

D.

The second packet is forwarded without checking the route table

 

Answer: D

 

 

QUESTION 18  (Topic 1)

 

 

 

 

Which statement accurately describes the “config rollaback” feature?

 

A.

Once the “Config rollback” feature is enabled, it allows the administrator to re-apply a previously saved configuration file from the flash

B.

Once the “Config rollback” feature is enabled, it allows the administrator to revert to the prior ScreenOS image or configuration file in event an upgrade operation aborts

C.

The “Config rollback” feature is enabled by default, it allows the administrator to re-reply a previously saved configuration file from flash

D.

Once the “Config rollback” feature is enabled, it allows the administrator to re-apply a locked configuration file from a separate area in flash

 

Answer: D

 

 

QUESTION 19  (Topic 1)

 

What needs to be configured in Phase 2 of a route-based VPN that does not need to be configured in a policy-based VPN?

 

A.

Proxy-id

B.

Custom proposals

C.

Tunnel-binding

D.

Transport mode

 

Answer: C

 

 

QUESTION 20  (Topic 1)

 

Address book entries identify hosts and networks by their location in relation to what?

 

A.

Network entries in the routing table

B.

A listing of addresses in the ARP table

C.

Security zones on the firewall

D.

An interface on the firewall

 

Answer: C

 

Free VCE & PDF File for Juniper JN0-522 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-522 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.