Free JN0-335 Exam Braindumps (page: 12)

Page 11 of 25

You are asked to find systems running applications that increase the risks on your network. You must ensure these systems are processed through IPS and Juniper ATP Cloud for malware and virus protection.
Which Juniper Networks solution will accomplish this task?

  1. JIMS
  2. Encrypted Traffic Insights
  3. UTM
  4. Adaptive Threat Profiling

Answer(s): D

Explanation:

Adaptive Threat Profiling (ATP) is a Juniper Networks solution that enables organizations to detect malicious activity on their networks and process it through IPS and Juniper ATP Cloud for malware and virus protection. ATP is powered by Juniper's advanced Machine Learning and Artificial Intelligence (AI) capabilities, allowing it to detect and block malicious activity in real-time. ATP is integrated with Juniper's Unified Threat Management (UTM) and Encrypted Traffic Insights (ETI) solutions, providing an end-to-end network protection solution.



Exhibit



Which two statements are correct about the configuration shown in the exhibit? (Choose two.)

  1. The session-class parameter in only used when troubleshooting.
  2. The others 300 parameter means unidentified traffic flows will be dropped in 300 milliseconds.
  3. Every session that enters the SRX Series device will generate an event
  4. Replacing the session-init parameter with session-lose will log unidentified flows.

Answer(s): B,C

Explanation:

The configuration shown in the exhibit is for a Juniper SRX Series firewall. The session-init parameter is used to control how the firewall processes unknown traffic flows. With the session-init parameter set to 300, any traffic flows that the firewall does not recognize will be dropped after 300

milliseconds. Additionally, every session that enters the device, whether it is known or unknown, will generate an event, which can be used for logging and troubleshooting purposes. The session-lose parameter is used to control how the firewall handles established sessions that are terminated.



Your company is using the Juniper ATP Cloud free model. The current inspection profile is set at 10 MB You are asked to configure ATP Cloud so that executable files up to 30 MB can be scanned while at the same time minimizing the change in scan time for other file types.
Which configuration should you use in this scenario?

  1. Use the CLI to create a custom profile and increase the scan limit.
  2. Use the ATP Cloud Ul to change the default profile to increase the scan limit for all files to 30 M
  3. Use the CLI to change the default profile to increase the scan limit for all files to 30 MB.
  4. Use the ATP Cloud Ul to update a custom profile and increase the scan limit for executable files to 30 MB.

Answer(s): D

Explanation:

In this scenario, you should use the ATP Cloud Ul to create a custom profile and update the scan limit for executable files to 30 MB. This will ensure that executable files up to 30 MB can be scanned, while at the same time minimizing the change in scan time for other file types. To do this, log in to the ATP Cloud Ul and go to the Profiles tab. Click the Create button to create a new profile, and then adjust the scan limits for executable files to 30 MB. Once you have saved the custom profile, you can apply it to the desired systems and the new scan limit will be in effect.



You are configuring logging for a security policy.
In this scenario, in which two situations would log entries be generated? (Choose two.)

  1. every 10 minutes
  2. at session initialization
  3. every 60 seconds
  4. at session close

Answer(s): B,D

Explanation:

Log entries would be generated in two situations: at session initialization and at session close. At session initialization, the log entry would include details about the connection, such as the source and destination IP addresses, the service being used, and the action taken by the security policy. At session close, the log entry would include details about the connection, such as the duration of the session, the bytes sent/received, and the action taken by the security policy. For more information, you can refer to the Juniper Security documentation at https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-

statement/security-log-configuration.html.






Post your Comments and Discuss Juniper JN0-335 exam with other Community members:

JN0-335 Discussions & Posts