Free JN0-335 Exam Braindumps (page: 7)

Page 6 of 25

Your manager asks you to provide firewall and NAT services in a private cloud.
Which two solutions will fulfill the minimum requirements for this deployment? (Choose two.)

  1. a single vSRX
  2. a vSRX for firewall services and a separate vSRX for NAT services
  3. a cSRX for firewall services and a separate cSRX for NAT services
  4. a single cSRX

Answer(s): B,C

Explanation:

A single vSRX or cSRX cannot provide both firewall and NAT services simultaneously. To meet the minimum requirements for this deployment, you need to deploy a vSRX for firewall services and a separate vSRX for NAT services (option B), or a cSRX for firewall services and a separate cSRX for NAT services (option C). This is according to the Juniper Networks Certified Security Specialist (JNCIS-SEC) Study Guide.



Which two statements are true about mixing traditional and unified security policies? (Choose two.)

  1. When a packet matches a unified security policy, the evaluation process terminates
  2. Traditional security policies must come before unified security policies
  3. Unified security policies must come before traditional security policies
  4. When a packet matches a traditional security policy, the evaluation process terminates

Answer(s): A,D



Exhibit



Referring to the exhibit, what do you determine about the status of the cluster.

  1. Both nodes determine that they are in a primary state.
  2. Node 1 is down
  3. Node 2 is down.
  4. There are no issues with the cluster.

Answer(s): C



Which two features are configurable on Juniper Secure Analytics (JSA) to ensure that alerts are triggered when matching certain criteria? (Choose two.)

  1. building blocks
  2. assets
  3. events
  4. tests

Answer(s): C,D

Explanation:

The two configurable features on Juniper Secure Analytics (JSA) that can be used to ensure that alerts are triggered when matching certain criteria are events and tests. Events refer to the collection of data from different sources, while tests are used to define the criteria for which an alert is triggered. For example, you can use events to collect data from a firewall and tests to define criteria such as IP address, port number, and the type of traffic. The Security, Specialist (JNCIS-SEC) Study guide provides further information on how to configure these features on JSA.






Post your Comments and Discuss Juniper JN0-335 exam with other Community members:

JN0-335 Discussions & Posts