Free Juniper JN0-541 Exam Questions (page: 4)

Which statement about the Enterprise Security Profiler (ESP) is true?

  1. The ESP must be configured and started using the IDP sensor CLI before it is used.
  2. The administrator must manually initiate Security Manager to sensor polling to retrieve ESP data.
  3. The ESP must be configured and started on each IDP sensor manually, using the Security Manager GUI.
  4. The ESP is started by default in IDP version 4.0 or newer.

Answer(s): C



What is one use of an IP action?

  1. It blocks subsequent connections from specific IP addresses.
  2. It modifies the IP header to redirect the attack.
  3. It modifies the IP header to prevent the attack.
  4. It permits or denies the traffic, based on the IP header.

Answer(s): A



You update your attack object database on Security Manager.
What must you do before the new attack objects become active on the IDP sensors?

  1. You install the updated security policy on the IDP sensor.
  2. No changes are required.
  3. You must restart the IDP sensor.
  4. You must restart the IDP processes on the IDP sensors.

Answer(s): A



Exhibit:



You work as an administrator at Certkiller .com. Study the exhibit carefully. In the exhibit, which SYN protector mode is the IDP using?

  1. passive
  2. handshake
  3. relay
  4. protective

Answer(s): A



Which two statements are true as they relate to a sniffer mode IDP sensor deployment? (Choose two.)

  1. IDP sensor cannot be managed by Security Manager in sniffer mode.IDP sensor cannot be managed by Security Manager in sniffer mode.
  2. It provides passive monitoring only with limited attack prevention.
  3. An IP address must be assigned to the sniffer interface.
  4. It does not affect the performance or availability of the network.

Answer(s): B,D



If an IDP sensor finds that a packet matchesa particular IDP rule, and then finds a matching exempt rule, what does the sensor do?

  1. Does not create a log entry, does not perform the action in the matching rule, and then examines the next IDP rule in the list.
  2. Creates a log entry for the matching rule, performs the action in the IDP rule, and then examines the next IDP rule in the list.
  3. Creates a log entry for the matching rule, does not perform the action in the IDP rule, and then examines the next IDP rule in the list.
  4. Does not create a log entry or perform the action in the matching rule, and then stops examining the remainder of the IDP rules for that particular packet.

Answer(s): A



Which three actions must be taken prior to deploying an IDP sensor (in transparent mode) in a network?

  1. Assign an IP to the management interface IP.
  2. Establish communication between Security manager and the sensor.
  3. Assign an IP to all forwarding interfaces.
  4. Configure the sensor mode.

Answer(s): A,B,D



Exhibit:



You work as an administrator at Certkiller .com. Study the exhibit carefully. In the exhibit, which rule base would have generated the log message?

  1. traffic anomaly
  2. backdoor
  3. network honeypot
  4. SYN protector

Answer(s): A



Viewing page 4 of 30
Viewing questions 25 - 32 out of 230 questions



Post your Comments and Discuss Juniper JN0-541 exam prep with other Community members:

JN0-541 Exam Discussions & Posts