Month End Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

JN0-231 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

JN0-231 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: Security-Associate (JNCIA-SEC)
  • Last Update: Apr 28, 2025
  • Questions and Answers: 105
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

JN0-231 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

JN0-231 Practice Exam Questions with Answers Security-Associate (JNCIA-SEC) Certification

Question # 6

Unified threat management (UTM) inspects traffic from which three protocols? (Choose three.)

A.

FTP

B.

SMTP

C.

SNMP

D.

HTTP

E.

SSH

Full Access
Question # 7

In J-Web. the management and loopback address configuration option allows you to configure which area?

A.

the IP address of the primary Gigabit Ethernet port

B.

the IP address of the Network Time Protocol server

C.

the CIDR address

D.

the IP address of the device management port

Full Access
Question # 8

What does the number ‘’2’’ indicate in interface ge—0/1/2?

A.

The interface logical number

B.

The physical interface card (PIC)

C.

The port number

D.

The flexible PIC concentrator (FPC)

Full Access
Question # 9

When configuring antispam, where do you apply any local lists that are configured?

A.

custom objects

B.

advanced security policy

C.

antispam feature-profile

D.

antispam UTM policy

Full Access
Question # 10

When are Unified Threat Management services performed in a packet flow?

A.

before security policies are evaluated

B.

as the packet enters an SRX Series device

C.

only during the first path process

D.

after network address translation

Full Access
Question # 11

Which two traffic types are considered exception traffic and require some form of special handling by the PFE? (Choose two.)

A.

SSH sessions

B.

ICMP reply messages

C.

HTTP sessions

D.

traceroute packets

Full Access
Question # 12

You want to verify the peer before IPsec tunnel establishment.

What would be used as a final check in this scenario?

A.

traffic selector

B.

perfect forward secrecy

C.

st0 interfaces

D.

proxy ID

Full Access
Question # 13

You want to provide remote access to an internal development environment for 10 remote developers.

Which two components are required to implement Juniper Secure Connect to satisfy this requirement? (Choose two.)

A.

an additional license for an SRX Series device

B.

Juniper Secure Connect client software

C.

an SRX Series device with an SPC3 services card

D.

Marvis virtual network assistant

Full Access
Question # 14

Which two addresses are valid address book entries? (Choose two.)

A.

173.145.5.21/255.255.255.0

B.

153.146.0.145/255.255.0.255

C.

203.150.108.10/24

D.

191.168.203.0/24

Full Access
Question # 15

You are asked to configure your SRX Series device to block all traffic from certain countries. The solution must be automatically updated as IP prefixes become allocated to those certain countries.

Which Juniper ATP solution will accomplish this task?

A.

Geo IP

B.

unified security policies

C.

IDP

D.

C&C feed

Full Access
Question # 16

You are investigating a communication problem between two hosts and have opened a session on the SRX Series device closest to one of the hosts and entered the show security flow session command.

What information will this command provide? (Choose two.)

A.

The total active time of the session.

B.

The end-to-end data path that the packets are taking.

C.

The IP address of the host that initiates the session.

D.

The security policy name that is controlling the session.

Full Access
Question # 17

You are configuring an SRX Series device. You have a set of servers inside your private network that need one-to-one mappings to public IP addresses.

Which NAT configuration is appropriate in this scenario?

A.

source NAT with PAT

B.

destination NAT

C.

NAT-T

D.

static NAT

Full Access
Question # 18

Which two services does Juniper Connected Security provide? (Choose two.)

A.

protection against zero-day threats

B.

IPsec VPNs

C.

Layer 2 VPN tunnels

D.

inline malware blocking

Full Access
Question # 19

You have an FTP server and a webserver on the inside of your network that you want to make available to users outside of the network. You are allocated a single public IP address.

In this scenario, which two NAT elements should you configure? (Choose two.)

A.

destination NAT

B.

NAT pool

C.

source NAT

D.

static NAT

Full Access
Question # 20

You are creating Ipsec connections.

In this scenario, which two statements are correct about proxy IDs? (Choose two.)

A.

Proxy IDs are used to configure traffic selectors.

B.

Proxy IDs are optional for Phase 2 session establishment.

C.

Proxy IDs must match for Phase 2 session establishment.

D.

Proxy IDs default to 0.0.0.0/0 for policy-based VPNs.

Full Access
Question # 21

Which two statements are correct about IPsec security associations? (Choose two.)

A.

IPsec security associations are bidirectional.

B.

IPsec security associations are unidirectional.

C.

IPsec security associations are established during IKE Phase 1 negotiations.

D.

IPsec security associations are established during IKE Phase 2 negotiations.

Full Access
Question # 22

What are three Junos UTM features? (Choose three.)

A.

screens

B.

antivirus

C.

Web filtering

D.

IDP/IPS

E.

content filtering

Full Access
Question # 23

Which statement is correct about global security policies on SRX Series devices?

A.

The to-zone any command configures a global policy.

B.

The from-zone any command configures a global policy.

C.

Global policies are always evaluated first.

D.

Global policies can include zone context.

Full Access
Question # 24

Click the Exhibit button.

JN0-231 question answer

You are asked to allow only ping and SSH access to the security policies shown in the exhibit.

Which statement will accomplish this task?

A.

Rename policy Rule-2 to policy Rule-0.

B.

Insert policy Rule-2 before policy Rule-1.

C.

Replace application any with application [junos-ping junos-ssh] in policy Rule-1.

D.

Rename policy Rule-1 to policy Rule-3.

Full Access
Question # 25

Which two statements are correct about functional zones? (Choose two.)

A.

Functional zones must have a user-defined name.

B.

Functional zone cannot be referenced in security policies or pass transit traffic.

C.

Multiple types of functional zones can be defined by the user.

D.

Functional zones are used for out-of-band device management.

Full Access
Question # 26

Which statement about service objects is correct?

A.

All applications are predefined by Junos.

B.

All applications are custom defined by the administrator.

C.

All applications are either custom or Junos defined.

D.

All applications in service objects are not available on the vSRX Series device.

Full Access
Question # 27

Which statement is correct about unified security policies on an SRX Series device?

A.

A zone-based policy is always evaluated first.

B.

The most restrictive policy is applied regardless of the policy level.

C.

A global policy is always evaluated first.

D.

The first policy rule is applied regardless of the policy level.

Full Access
Question # 28

Corporate security requests that you implement a policy to block all POP3 traffic from traversing the Internet firewall.

In this scenario, which security feature would you use to satisfy this request?

A.

antivirus

B.

Web filtering

C.

content filtering

D.

antispam

Full Access
Question # 29

Which two criteria should a zone-based security policy include? (Choose two.)

A.

a source port

B.

a destination port

C.

zone context

D.

an action

Full Access
Question # 30

What are three primary match criteria used in a Junos security policy? (Choose three.)

A.

application

B.

source address

C.

source port

D.

class

E.

destination address

Full Access
Question # 31

Which statement about global NAT address persistence is correct?

A.

The same IP address from a source NAT pool will be assigned for all sessions from a given host.

B.

The same IP address from a source NAT pool is not guaranteed to be assigned for all sessions from a given host.

C.

The same IP address from a destination NAT pool will be assigned for all sessions for a given host.

D.

The same IP address from a destination NAT pool is not guaranteed to be assigned for all sessions for a given host.

Full Access