Juniper JN0-231 Exam Questions
Security, Associate (JNCIA-SEC) (Page 3 )

Updated On: 17-Feb-2026

SRX Series devices have a maximum of how many rollback configurations?

  1. 40
  2. 60
  3. 50
  4. 10

Answer(s): C



Unified threat management (UTM) inspects traffic from which three protocols? (Choose three.)

  1. FTP
  2. SMTP
  3. SNMP
  4. HTTP
  5. SSH

Answer(s): A,B,D

Explanation:

https://www.inetzero.com/blog/unified-threat-management-deeper-dive-traffic-inspection/



When are Unified Threat Management services performed in a packet flow?

  1. before security policies are evaluated
  2. as the packet enters an SRX Series device
  3. only during the first path process
  4. after network address translation

Answer(s): D

Explanation:

https://iosonounrouter.wordpress.com/2018/07/07/how-does-a-flow-based-srx-work/



When configuring antispam, where do you apply any local lists that are configured?

  1. custom objects
  2. advanced security policy
  3. antispam feature-profile
  4. antispam UTM policy

Answer(s): A

Explanation:

user@host# set security utm custom-objects url-pattern url-pattern-name https://www.juniper.net/documentation/us/en/software/junos/utm/topics/topic-map/security- local-list-antispam-filtering.html



Screens on an SRX Series device protect against which two types of threats? (Choose two.)

  1. IP spoofing
  2. ICMP flooding
  3. zero-day outbreaks
  4. malicious e-mail attachments

Answer(s): A,B

Explanation:

ICMP flood

Use the ICMP flood IDS option to protect against ICMP flood attacks. An ICMP flood attack typically occurs when ICMP echo requests use all resources in responding, such that valid network traffic can no longer be processed.

The threshold value defines the number of ICMP packets per second (pps) allowed to be send to the same destination address before the device rejects further ICMP packets.

IP spoofing

Use the IP address spoofing IDS option to prevent spoofing attacks. IP spoofing occurs when an invalid source address is inserted in the packet header to make the packet appear to come from a trusted source.

https://www.juniper.net/documentation/us/en/software/junos/denial-of-service/topics/topic- map/security-introduction-to-adp.html






Post your Comments and Discuss Juniper JN0-231 exam dumps with other Community members:

Join the JN0-231 Discussion