Free Juniper JN0-541 Exam Questions (page: 7)

You want Enterprise Security Profiler (ESP) to capture layer 7 data of packets traversing the network.
Which two steps must you perform? (Choose two.)

  1. Configure ESP to enable application profiling, and select the contexts to profile.
  2. Under the Violation Viewer tab, create a permitted object, select that object, and then click Apply.
  3. Start or restart the profiler process.
  4. Create a filter in the ESP to show only tracked hosts.

Answer(s): A,C



Which two statements are true regarding static and dynamic attack object groups? (Choose two.)

  1. Attack objects in a dynamic group can be added or updated during the attack object database update process.
  2. You create a dynamic attack object group by specifying particular filters to apply to the attack object database, such as severity, product, and service.
  3. The critical attack object group is a static group.
  4. Dynamic groups require that an administrator manually add new attack objects after an attack database update.

Answer(s): A,B



Which command will display the mode of the IDP sensor?

  1. sctop "m" option
  2. scio agentconfig list
  3. scio getsystem
  4. scio agentstats display

Answer(s): C



Which three actions must be taken prior to deploying an IDP sensor (in transparent mode) in a network?

  1. Assign an IP to all forwarding interfaces.
  2. Establish communication between Security manager and the sensor.
  3. Assign an IP to the management interface IP.
  4. Configure the sensor mode.

Answer(s): B,C,D



Which statement is true regarding policy installation on an IDP sensor?

  1. A policy version is created when a new policy is successfully installed.
  2. The pkid process on the sensor handles the policy installation.
  3. The policy.set file is updated on the sensor.
  4. The sensor stops processing traffic when the policy is being installed.

Answer(s): C



In IDP Sensor clustering, which port is used to send state synchronization information to other devices in the cluster?

  1. eth2
  2. eth1
  3. eth0
  4. console port

Answer(s): B



Which three fields in a packet must match an IDP rule before that packet is examined for an attack? (Choose three.)

  1. destination address
  2. service
  3. terminate match
  4. source address
  5. attack object

Answer(s): A,B,D



What is one use of an IP action?

  1. It modifies the IP header to prevent the attack.
  2. It blocks subsequent connections from specific IP addresses.
  3. It permits or denies the traffic, based on the IP header.
  4. It modifies the IP header to redirect the attack.

Answer(s): B



Viewing page 7 of 30
Viewing questions 49 - 56 out of 230 questions



Post your Comments and Discuss Juniper JN0-541 exam prep with other Community members:

JN0-541 Exam Discussions & Posts