Download Juniper.JN0-633.TestInside.2018-12-08.108q.tqb

Vendor: Juniper
Exam Code: JN0-633
Exam Name: Juniper Networks Certified Professional Security (JNCIP-SEC)
Date: Dec 08, 2018
File Size: 3 MB

Demo Questions

Question 1
You are asked to change the configuration of your company's SRX device so that you can block nested traffic from certain Web sites, but the main pages of these Web sites must remain available to users. Which two methods will accomplish this goal? (Choose two.) 
  1. Enable the HTTP ALG.
  2. Implement a firewall filter for Web traffic.
  3. Use an IDP policy to inspect the Web traffic.
  4. Configure an application firewall rule set.
Correct answer: BD
Explanation:
Reference: An application layer gateway (ALG) is a feature on ScreenOS gateways that enables the gateway to parse application layer payloads and take decisions on them. ALGs are typically employed to support applications that use the application layer payload to communicate the dynamic Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) ports on which the applications open data connections (http://kb.juniper.net/InfoCenter/index?page=content&id=KB13530)IDP policy defines the rule for defining the type of traffic permitted on network (http://www.juniper.net/techpubs/software/junos-security/junos-security95/junos-security-swconfig- security/enable-idp-security-policy-section.html)
Reference: An application layer gateway (ALG) is a feature on ScreenOS gateways that enables the gateway to parse application layer payloads and take decisions on them. ALGs are typically employed to support applications that use the application layer payload to communicate the dynamic Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) ports on which the applications open data connections (http://kb.juniper.net/InfoCenter/index?page=content&id=KB13530)
IDP policy defines the rule for defining the type of traffic permitted on network (http://www.juniper.net/techpubs/software/junos-security/junos-security95/junos-security-swconfig- security/enable-idp-security-policy-section.html)
Question 2
You are using the AppDoS feature to control against malicious bot client attacks. The bot clients are using file downloads to attack your server farm. You have configured a context value rate of 10,000 hits in 60 seconds. At which threshold will the bot clients no longer be classified as malicious?
  1. 5000 hits in 60 seconds
  2. 8000 hits in 60 seconds
  3. 7500 hits in 60 seconds
  4. 9999 hits in 60 seconds
Correct answer: B
Explanation:
Reference :http://www.juniper.net/techpubs/software/junos-security/junos-security10.0/junos-security-swconfig- security/appddos-protection-overview.html
Reference :
http://www.juniper.net/techpubs/software/junos-security/junos-security10.0/junos-security-swconfig- security/appddos-protection-overview.html
Question 3
You recently implemented application firewall rules on an SRX device to act upon encrypted traffic. However, the encrypted traffic is not being correctly identified. 
Which two actions will help the SRX device correctly identify the encrypted traffic? (Choose two.)
  1. Enable heuristics to detect the encrypted traffic.
  2. Disable the application system cache.
  3. Use the junos:UNSPECIFIED-ENCRYPTED application signature.
  4. Use the junos:SPECIFIED-ENCRYPTED application signature.
Correct answer: AC
Explanation:
Reference: http://www.juniper.net/techpubs/en_US/junos12.1x44/topics/concept/encrypted-p2p- heuristics-detection.html
Reference: http://www.juniper.net/techpubs/en_US/junos12.1x44/topics/concept/encrypted-p2p- heuristics-detection.html
EXAM SIMULATOR

How to Open TQB Files?

Use Taurus Exam Simulator to open TQB files

Taurus Exam Simulator


Taurus Exam Simulator for Windows/macOS/Linus

Download

Taurus Exam Studio
Enjoy a 20% discount on Taurus Exam Studio!

You now have the chance to acquire Exam Studio at a discounted rate of 20%.

Get Now!
-->