Complete list of current Q & A>> Download Juniper Security, Specialist (JNCIS-SEC) (JN0-335) – Quiz 1 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 1. When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy? A. The active sessions allowed by the policy will be dropped. B. The active sessions allowed by the policy will be marked as a legacy flow and will continue to be forwarded. C. The active sessions allowed by the policy will be reevaluated by the cached D. The active sessions allowed by the policy will continue 2 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 2. You are asked to block malicious applications regardless of the port number being used. In this scenario, which two application security features should be used? (Choose two.) A. AppFW B. AppQoE C. APPID D. AppTrack 3 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 3. You have deployed an SRX300 Series device and determined that files have stopped being scanned. In this scenario, what is a reason for this problem? A. The software license is a free model and only scans executable type files. B. The infected host communicated with a command-and-control server, but it did not download malware. C. The file is too small to have a virus. D. You have exceeded the maximum files submission for your SRX platform size. 4 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 4. You are asked to reduce the load that the JIMS server places on your Which action should you take in this situation? A. Connect JIMS to the RADIUS server B. Connect JIMS to the domain Exchange server C. Connect JIMS to the domain SQL server. D. Connect JIMS to another SRX Series device. 5 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 5. Regarding static attack object groups, which two statements are true? (Choose two.) A. Matching attack objects are automatically added to a custom group. B. Group membership automatically changes when Juniper updates the IPS signature database. C. Group membership does not automatically change when Juniper updates the IPS signature database. D. You must manually add matching attack objects to a custom group. 6 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 6. Which two types of SSL proxy are available on SRX Series devices? (Choose two.) A. Web proxy B. client-protection C. server-protection D. DNS proxy 7 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 7. You want to set up JSA to collect network traffic flows from network devices on your network. Which two statements are correct when performing this task? (Choose two.) A. BGP FlowSpec is used to collect traffic flows from Junos OS devices. B. Statistical sampling increases processor utilization C. Statistical sampling decreases event correlation accuracy. D. Superflows reduce traffic licensing requirements. 8 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 8. What are two types of system logs that Junos generates? (Choose two.) A. SQL log files B. data plane logs C. system core dump files D. control plane logs 9 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 9. Which two statements about SRX Series device chassis clusters are true? (Choose two.) A. Redundancy group 0 is only active on the cluster backup node. B. Each chassis cluster member requires a unique cluster ID value. C. Each chassis cluster member device can host active redundancy groups D. Chassis cluster member devices must be the same model. 10 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 10. What are two benefits of using a vSRX in a software-defined network? (Choose two.) A. scalability B. no required software license C. granular security D. infinite number of interfaces 11 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 11. Which solution enables you to create security policies that include user and group information? A. JIMS B. ATP Appliance C. Network Director D. NETCONF 12 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 12. What are three capabilities of AppQoS? (Choose three.) A. re-write DSCP values B. assign a forwarding class C. re-write the TTL D. rate-limit traffic E. reserve bandwidth 13 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 13. Which statement about security policy schedulers is correct? A. Multiple policies can use the same scheduler. B. A policy can have multiple schedulers. C. When the scheduler is disabled, the policy will still be available D. A policy without a defined scheduler will not become active 14 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 14. You are asked to implement IPS on your SRX Series device. In this scenario, which two tasks must be completed before a configuration will work? (Choose two.) A. Download the IPS signature database B. Enroll the SRX Series device with Juniper ATP Cloud C. Install the IPS signature database. D. Reboot the SRX Series device. 15 / 15 Category: Juniper Security, Specialist (JNCIS-SEC) (JN0-335) 15. You want to manually failover the primary Routing Engine in an SRX Series high availability cluster pair. Which step is necessary to accomplish this task? A. Issue the set chassis cluster disable reboot command on the primary node. B. Implement the control link recover/ solution before adjusting the priorities. C. Manually request the failover and identify the secondary node D. Adjust the priority in the configuration on the secondary node. Your score is 0% Restart quiz Send feedback