[Free] Download New Latest (November) Juniper JN0-532 Actual Tests 81-90

Ensurepass

QUESTION 81

Which item in a virtual system is shared by default?

 

A.

trust zone in the trust-vr

B.

trust zone in the untrust-vr

C.

untrust zone in the trust-vr

D.

untrust zone in the untrust-vr

 

Answer: C

 

 

QUESTION 82

Your ScreenOS device receives an HTTP get request.

 

What is the correct search order used by integrated URL filtering to determine an action?

 

A.

In pre-defined category? ; In user-defined category? ; In black list? ; In white list? ; In “other” category?

B.

In user-defined category? ; In pre-defined category?; In “other” category? ; In white list? ; In black list?

C.

In white list? ; In black list? ; In pre-defined category?; In user-defined category? ; In “other” category?

D.

In black list? ; In white list? ; In user-defined category? ; In pre-defined category? ; In “other” category?

 

Answer: D

 

 

 

 

 

QUESTION 83

Your ScreenOS device has come under a SYN flood attack.

 

In the logs, which severity level would you search to see this event?

 

A.

Alert

B.

Critical

C.

Warning

D.

Emergency

 

Answer: D

< font style="font-size: 10pt" color="#000000"> 

 

QUESTION 84

Click the Exhibit button.

 

clip_image002

 

Review the exhibit. Track-ip has failed on the device, but the device did not fail over to the second unit in the cluster:

 

Why has failover not occurred?

 

A.

The physical interfaces have not failed.

B.

The track-ip interval is not sufficient to cause failover.

C.

The track-ip address weight is not sufficient to cause failover.

D.

The track-ip address threshold is not sufficient to cause failover.

 

Answer: C

 

 

 

 

 

QUESTION 85

Click the Exhibit button.

 

clip_image004

 

In the exhibit, the firewall administrator at the Storefront is complaining that when the communication to the DataCenter1 fails, the preexisting transfers and applications are dropped when the traffic is switched to DataCenter2.

 

Which statement explains this behavior?

 

A.

SYN checking is enabled in the tunnel.

B.

The weight value for the DataCenter2 is too high.

C.

VPN monitor is misconfigured in the DataCenter2.

D.

Phase 1 and Phase 2 negotiations to DataCenter2 did not occur on time.

 

Answer: A

 

 

QUESTION 86

Which command will show address translation for sessions that have ended?

 

A.

snoop

B.

get session

C.

get log traffic

D.

get dbuf stream

 

Answer: C

 

 

QUESTION 87

 

What must be configured differently for a route-based VPN and a policy-based VPN?

 

A.

proxy-id

B.

proposals

C.

remote gateway type

D.

binding the tunnel interface

 

Answer: D

 

 

QUESTION 88

You have configured a secondary path for the NSRP cluster.

 

Which type of traffic is sent over the secondary path?

 

A.

NSRP heartbeats

B.

RTO message sync

C.

NSRP data packet forwarding

D.

configuration sync messages

 

Answer: A

 

 

QUESTION 89

Which two of the following statements regarding ScreenOS antivirus functionality are true? (Choose two.)

 

A.

ICAP-based external scanning requires an AV profile.

B.

External scanning requires a Trend Micro antivirus scanner.

C.

Embedded scanning can be based on file extension and content type.

D.

You can use policy-based routing to implement AV in a high-performance environment.

 

Answer: CD

 

 

QUESTION 90

 

Click the Exhibit button.

 

clip_image006

 

In the exhibit, which statement can be verified from the debug output?

 

A.

Traffic is departing from the root virtual system.

B.

Traffic is arriving from the virtual system CustA.

C.

Traffic is departing from the virtual system CustA.

D.

The matched policy is from a custom zone to a system-defined zone.

 

Answer: C

 

Free VCE & PDF File for Juniper JN0-532 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-532 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.