Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

JN0-231 Security-Associate (JNCIA-SEC) Questions and Answers

Questions 4

Which two user authentication methods are supported when using a Juniper Secure Connect VPN? (Choose two.)

Options:

A.

certificate-based

B.

multi-factor authentication

C.

local authentication

D.

active directory

Buy Now
Questions 5

A security zone is configured with the source IP address 192.168.0.12/255.255.0.255 wildcard match.

In this scenario, which two IP packets will match the criteria? (Choose two.)

Options:

A.

192.168.1.21

B.

192.168.0.1

C.

192.168.1.12

D.

192.168.22.12

Buy Now
Questions 6

What information does the show chassis routing-engine command provide?

Options:

A.

chassis serial number

B.

resource utilization

C.

system version

D.

routing tables

Buy Now
Questions 7

Corporate security requests that you implement a policy to block all POP3 traffic from traversing the Internet firewall.

In this scenario, which security feature would you use to satisfy this request?

Options:

A.

antivirus

B.

Web filtering

C.

content filtering

D.

antispam

Buy Now
Questions 8

Which statement is correct about Web filtering?

Options:

A.

The Juniper Enhanced Web Filtering solution requires a locally managed server.

B.

The decision to permit or deny is based on the body content of an HTTP packet.

C.

The decision to permit or deny is based on the category to which a URL belongs.

D.

The client can receive an e-mail notification when traffic is blocked.

Buy Now
Questions 9

You are investigating a communication problem between two hosts and have opened a session on the SRX Series device closest to one of the hosts and entered the show security flow session command.

What information will this command provide? (Choose two.)

Options:

A.

The total active time of the session.

B.

The end-to-end data path that the packets are taking.

C.

The IP address of the host that initiates the session.

D.

The security policy name that is controlling the session.

Buy Now
Questions 10

Which two non-configurable zones exist by default on an SRX Series device? (Choose two.)

Options:

A.

Junos-host

B.

functional

C.

null

D.

management

Buy Now
Questions 11

Which feature would you use to protect clients connected to an SRX Series device from a SYN flood attack?

Options:

A.

security policy

B.

host inbound traffic

C.

application layer gateway

D.

screen option

Buy Now
Questions 12

What is the number of concurrent Secure Connect user licenses that an SRX Series device has by default?

Options:

A.

3

B.

4

C.

2

D.

5

Buy Now
Questions 13

Which two statements are correct about functional zones? (Choose two.)

Options:

A.

Functional zones must have a user-defined name.

B.

Functional zone cannot be referenced in security policies or pass transit traffic.

C.

Multiple types of functional zones can be defined by the user.

D.

Functional zones are used for out-of-band device management.

Buy Now
Questions 14

Which security policy type will be evaluated first?

Options:

A.

A zone policy with no dynamic application set

B.

A global with no dynamic application set

C.

A zone policy with a dynamic application set

D.

A global policy with a dynamic application set

Buy Now
Questions 15

Which statement about service objects is correct?

Options:

A.

All applications are predefined by Junos.

B.

All applications are custom defined by the administrator.

C.

All applications are either custom or Junos defined.

D.

All applications in service objects are not available on the vSRX Series device.

Buy Now
Questions 16

You are monitoring an SRX Series device that has the factory-default configuration applied.

In this scenario, where are log messages sent by default?

Options:

A.

Junos Space Log Director

B.

Junos Space Security Director

C.

to a local syslog server on the management network

D.

to a local log file named messages

Buy Now
Questions 17

Which two features are included with UTM on an SRX Series device? (Choose two.)

Options:

A.

antivirus

B.

NAT

C.

IDP

D.

content filtering

Buy Now
Questions 18

What is the correct order in which interface names should be identified?

Options:

A.

system slot number –> interface media type –> port number –> line card slot number

B.

system slot number –> port number –> interface media type –> line card slot number

C.

interface media type –> system slot number –> line card slot number –> port number

D.

interface media type –> port number –> system slot number –> line card slot number

Buy Now
Questions 19

What is the order of the first path packet processing when a packet enters a device?

Options:

A.

security policies –> screens –> zones

B.

screens –> security policies –> zones

C.

screens –> zones –> security policies

D.

security policies –> zones –> screens

Buy Now
Questions 20

What must be enabled on an SRX Series device for the reporting engine to create reports?

Options:

A.

System logging

B.

SNMP

C.

Packet capture

D.

Security logging

Buy Now
Questions 21

In J-Web. the management and loopback address configuration option allows you to configure which area?

Options:

A.

the IP address of the primary Gigabit Ethernet port

B.

the IP address of the Network Time Protocol server

C.

the CIDR address

D.

the IP address of the device management port

Buy Now
Questions 22

Which two criteria should a zone-based security policy include? (Choose two.)

Options:

A.

a source port

B.

a destination port

C.

zone context

D.

an action

Buy Now
Questions 23

You want to verify the peer before IPsec tunnel establishment.

What would be used as a final check in this scenario?

Options:

A.

traffic selector

B.

perfect forward secrecy

C.

st0 interfaces

D.

proxy ID

Buy Now
Questions 24

Which two statements are correct about the null zone on an SRX Series device? (Choose two.)

Options:

A.

The null zone is created by default.

B.

The null zone is a functional security zone.

C.

Traffic sent or received by an interface in the null zone is discarded.

D.

You must enable the null zone before you can place interfaces into it.

Buy Now
Questions 25

Which Juniper ATP feed provides a dynamic list of known botnet servers and known sources of malware downloads?

Options:

A.

infected host cloud feed

B.

Geo IP feed

C.

C&C cloud feed

D.

blocklist feed

Buy Now
Questions 26

Exhibit.

JN0-231 Question 26

Which two statements are correct referring to the output shown in the exhibit? (Choose two.)

Options:

A.

FTP and ping access for the Trust-DMZ-Access policy is permitted.

B.

FTP and ping access for the Trust-DMZ-Access policy is denied.

C.

The SSH access for the Trust-DMZ-Block policy is permitted.

D.

The SSH access for the Trust-DMZ-Block policy is denied.

Buy Now
Questions 27

Which two statements are correct about IKE security associations? (Choose two.)

Options:

A.

IKE security associations are established during IKE Phase 1 negotiations.

B.

IKE security associations are unidirectional.

C.

IKE security associations are established during IKE Phase 2 negotiations.

D.

IKE security associations are bidirectional.

Buy Now
Questions 28

Click the Exhibit button.

JN0-231 Question 28

Referring to the exhibit, a user is placed in which hierarchy when the exit command is run?

Options:

A.

[edit security policies from-zone trust to-zone dmz]

user@vSRX-1#

B.

[edit]

user@vSRX-1#

C.

[edit security policies]

user@vSRX-1#

D.

user@vSRX-1>

Buy Now
Questions 29

You have configured a UTM feature profile.

Which two additional configuration steps are required for your UTM feature profile to take effect? (Choose two.)

Options:

A.

Associate the UTM policy with an address book.

B.

Associate the UTM policy with a firewall filter.

C.

Associate the UTM policy with a security policy.

D.

Associate the UTM feature profile with a UTM policy.

Buy Now
Questions 30

What does the number “2” indicate in interface ge-0/1/2?

Options:

A.

the physical interface card (PIC)

B.

the flexible PIC concentrator (FPC)

C.

the interface logical number

D.

the port number

Buy Now
Questions 31

Which statement is correct about Junos security policies?

Options:

A.

Security policies enforce rules that should be applied to traffic transiting an SRX Series device.

B.

Security policies determine which users are allowed to access an SRX Series device.

C.

Security policies control the flow of internal traffic within an SRX Series device.

D.

Security policies identity groups of users that have access to different features on an SRX Series device.

Buy Now
Exam Code: JN0-231
Exam Name: Security-Associate (JNCIA-SEC)
Last Update: Jan 12, 2025
Questions: 105

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now JN0-231 testing engine

PDF (Q&A)

$36.75  $104.99
buy now JN0-231 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 18 Jan 2025