Juniper JN0-231 Security, Associate JNCIA-SEC Exam Practice Test

Page: 1 / 14
Total 105 questions
Question 1

An application firewall processes the first packet in a session for which the application has not yet been identified.

In this scenario, which action does the application firewall take on the packet?



Answer : D

This is necessary to ensure that the application firewall can properly identify the application and the correct security policies can be applied before allowing any traffic to pass through.

If the first packet was allowed to pass without first being identified, then the application firewall would not know which security policies to apply - and this could potentially lead to security vulnerabilities or breaches. So it's important that the first packet is held until the application is identified.


Question 2

You want to verify the peer before IPsec tunnel establishment.

What would be used as a final check in this scenario?



Answer : D

The proxy ID is used as a final check to verify the peer before IPsec tunnel establishment. The proxy ID is a combination of local and remote subnet and protocol, and it is used to match the traffic that is to be encrypted. If the proxy IDs match between the two IPsec peers, the IPsec tunnel is established, and the traffic is encrypted.


Juniper Networks SRX Series Services Gateway IPsec Configuration Guide: https://www.juniper.net/documentation/en_US/release-independent/junos/topics/topic-map/security-ipsec-vpn-configuring.html

Question 3

You have configured a UTM feature profile.

Which two additional configuration steps are required for your UTM feature profile to take effect? (Choose two.)



Answer : C, D

For the UTM feature profile to take effect, it must be associated with a security policy and a UTM policy. The security policy defines the traffic flow and the actions that should be taken on the traffic, while the UTM policy defines the security features to be applied to the traffic, such as antivirus, intrusion prevention, and web filtering. The UTM feature profile provides the necessary configuration for the security features defined in the UTM policy.


Juniper Networks SRX Series Services Gateway UTM Configuration Guide: https://www.juniper.net/documentation/en_US/release-independent/junos/topics/topic-map/security-services-utm.html

Question 4

Which statement is correct about Web filtering?



Answer : C

Web filtering is a feature that allows administrators to control access to websites by categorizing URLs into different categories such as gambling, social networking, or adult content. The decision to permit or deny access to a website is based on the category to which a URL belongs. This is done by comparing the URL against a database of categorized websites and making a decision based on the policy defined by the administrator.


Juniper Networks SRX Series Services Gateway Web Filtering Configuration Guide: https://www.juniper.net/documentation/en_US/release-independent/junos/topics/topic-map/security-services-web-filtering.html

Question 5

Which two statements are correct about global policies? (Choose two.)



Question 6

You want to prevent other users from modifying or discarding your changes while you are also editing the configuration file.

In this scenario, which command would accomplish this task?



Answer : C


Question 7

What are two features of the Juniper ATP Cloud service? (Choose two.)



Answer : A, B


Page:    1 / 14   
Total 105 questions