Free JN0-335 Exam Braindumps (page: 4)

Page 3 of 25

You are asked to block malicious applications regardless of the port number being used. In this scenario, which two application security features should be used? (Choose two.)

  1. AppFW
  2. AppQoE
  3. APPID
  4. AppTrack

Answer(s): A,C

Explanation:

you can block applications and users based on network access policies, users and their job roles, time, and application signatures. You can also use Juniper Advanced Threat Prevention (ATP) to find and block commodity and zero-day cyberthreats within files, IP traffic, and DNS requests1



A client has attempted communication with a known command-and-control server and it has reached the configured threat level threshold.
Which feed will the clients IP address be automatically added to in this situation?

  1. the command-and-control cloud feed
  2. the allowlist and blocklist feed
  3. the custom cloud feed
  4. the infected host cloud feed

Answer(s): D

Explanation:

Infected hosts are internal hosts that have been compromised by malware and are communicating with external C&C servers. Juniper ATP Cloud provides infected host feeds that list internal IP addresses or subnets of infected hosts along with a threat level. Once the Juniper ATP Cloud global threshold for an infected host is met, that host is added to the infected host feed and assigned a threat level of 10 by the cloud. You can also configure your SRX Series device to block traffic from these IP addresses using security policies.



When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?

  1. The active sessions allowed by the policy will be dropped.
  2. The active sessions allowed by the policy will be marked as a legacy flow and will continue to be forwarded.
  3. The active sessions allowed by the policy will be reevaluated by the cached
  4. The active sessions allowed by the policy will continue

Answer(s): A

Explanation:

When a security policy is deleted, the active sessions allowed by the policy will be dropped. The default behavior is that all active sessions allowed by the policy will be terminated and the traffic will no longer be forwarded. There is no way to mark the active sessions as a legacy flow or to reevaluate them by the cached rules.


Reference:

Juniper Networks Security, Specialist (JNCIS-SEC) Study Guide, Chapter 3: Security Policies, page 3-9.
According to Juniper Networks Security, Specialist (JNCIS-SEC) Study Guide, when a security policy is deleted, the active sessions allowed by that policy will be dropped. This behavior is the default behavior of the device. There is no way to mark the active sessions as a legacy flow or to re-evaluate them against cached rules. The device will terminate the active sessions and will no longer forward traffic for those sessions.



You are asked to determine how much traffic a popular gaming application is generating on your network.
Which action will you perform to accomplish this task?

  1. Enable AppQoS on the proper security zones
  2. Enable APBR on the proper security zones
  3. Enable screen options on the proper security zones
  4. Enable AppTrack on the proper security zones.

Answer(s): D

Explanation:

AppTrack is a feature of Juniper Networks firewall solutions that allows administrators to track applications, users, and the amount of traffic generated by those applications on the network. AppTrack can be enabled on specific security zones of the network to monitor traffic on those zones. This feature can be used to determine how much traffic a popular gaming application is generating on the network. For more information, please refer to the Juniper Networks JNCIS-SEC Study Guide.


Reference:

Juniper Networks Security, Specialist (JNCIS-SEC) Study Guide, Chapter 4: AppSecure, page 4-15.
AppTrack is a feature of the Junos OS that provides visibility into the applications and users on your network. It tracks the usage of applications and provides detailed reports on the amount of traffic generated by each application. By enabling AppTrack on the proper security zones, you can determine how much traffic a popular gaming application is generating on your network.






Post your Comments and Discuss Juniper JN0-335 exam with other Community members:

JN0-335 Discussions & Posts