Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

JN0-636 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

JN0-636 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Security, Professional (JNCIP-SEC)
  • Last Update: Apr 25, 2024
  • Questions and Answers: 115
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

JN0-636 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

JN0-636 Practice Exam Questions with Answers Security, Professional (JNCIP-SEC) Certification

Question # 6

Your IPsec VPN configuration uses two CoS forwarding classes to separate voice and data traffic. How many IKE security associations are required between the IPsec peers in this scenario?

A.

1

B.

3

C.

4

D.

2

Full Access
Question # 7

SRX Series device enrollment with Policy Enforcer fails To debug further, the user issues the following command show configuration services security—intelligence url

https : //cloudfeeds . argon . juniperaecurity . net/api/manifeat. xml

and receives the following output:

What is the problem in this scenario?

A.

The device is directly enrolled with Juniper ATP Cloud.

B.

The device is already enrolled with Policy Enforcer.

C.

The SRX Series device does not have a valid license.

D.

Junos Space does not have matching schema based on the

Full Access
Question # 8

You are asked to provide single sign-on (SSO) to Juniper ATP Cloud. Which two steps accomplish this goal? (Choose two.)

A.

Configure Microsoft Azure as the service provider (SP).

B.

Configure Microsoft Azure as the identity provider (IdP).

C.

Configure Juniper ATP Cloud as the service provider (SP).

D.

Configure Juniper ATP Cloud as the identity provider (IdP).

Full Access
Question # 9

Click the Exhibit button.

JN0-636 question answer

Referring to the exhibit, which three topologies are supported by Policy Enforcer? (Choose three.)

A.

Topology 3

B.

Topology 5

C.

Topology 2

D.

Topology 4

E.

Topology 1

Full Access
Question # 10

Exhibit:

JN0-636 question answer

Referring to the exhibit, your company’s infrastructure team implemented new printers

To make sure that the policy enforcer pushes the updated Ip address list to the SRX.

Which three actions are required to complete the requirement? (Choose three )

A.

Configure the server feed URL as http://172.25.10.254/myprinters

B.

Create a security policy that uses the dynamic address feed to allow access

C.

Configure Security Director to create a dynamic address feed

D.

Configure Security Director to create a C&C feed.

E.

Configure server feed URL as https://172.25.10.254/myprinters.

Full Access
Question # 11

Exhibit

JN0-636 question answer

You configure Source NAT using a pool of addresses that are in the same subnet range as the external ge-0/0/0 interface on your vSRX device. Traffic that is exiting the internal network can reach external destinations, but the return traffic is being dropped by the service provider router.

Referring to the exhibit, what must be enabled on the vSRX device to solve this problem?

A.

STUN

B.

Proxy ARP

C.

Persistent NAT

D.

DNS Doctoring

Full Access
Question # 12

You want to configure a threat prevention policy.

Which three profiles are configurable in this scenario? (Choose three.)

A.

device profile

B.

SSL proxy profile

C.

infected host profile

D.

C&C profile

E.

malware profile

Full Access
Question # 13

Which two statements are correct regarding tenant systems on SRX Series devices? (Choose two.)

A.

A maximum of 32 tenant systems can be configured on a physical SRX device.

B.

All tenant systems share a single routing protocol process.

C.

Each tenant system runs its own instance of the routing protocol process

D.

A maximum of 500 tenant systems can be configured on a physical SRX device.

Full Access
Question # 14

You have noticed a high number of TCP-based attacks directed toward your primary edge device. You are asked to

configure the IDP feature on your SRX Series device to block this attack.

Which two IDP attack objects would you configure to solve this problem? (Choose two.)

A.

Network

B.

Signature

C.

Protocol anomaly

D.

host

Full Access
Question # 15

You are deploying a virtualization solution with the security devices in your network Each SRX Series device must support at least 100 virtualized instances and each virtualized instance must have its own discrete administrative domain.

In this scenario, which solution would you choose?

A.

VRF instances

B.

virtual router instances

C.

logical systems

D.

tenant systems

Full Access
Question # 16

You are not able to activate the SSH honeypot on the all-in-one Juniper ATP appliance.

What would be a cause of this problem?

A.

The collector must have a minimum of two interfaces.

B.

The collector must have a minimum of three interfaces.

C.

The collector must have a minimum of five interfaces.

D.

The collector must have a minimum of four interfaces.

Full Access
Question # 17

Your Source NAT implementation uses an address pool that contains multiple IPv4 addresses Your users report that when they establish more than one session with an external application, they are prompted to authenticate multiple times External hosts must not be able to establish sessions with internal network hosts

What will solve this problem?

A.

Disable PAT.

B.

Enable destination NAT.

C.

Enable persistent NAT

D.

Enable address persistence.

Full Access
Question # 18

Exhibit

JN0-636 question answer

Referring to the exhibit, which two statements are true? (Choose two.)

A.

The data that traverses the ge-0/070 interface is secured by a secure association key.

B.

The data that traverses the ge-070/0 interface can be intercepted and read by anyone.

C.

The data that traverses the ge-070/0 interface cannot be intercepted and read by anyone.

D.

The data that traverses the ge-O/0/0 interface is secured by a connectivity association key.

Full Access
Question # 19

Which two features would be used for DNS doctoring on an SRX Series firewall? (Choose two.)

A.

The DNS ALG must be enabled.

B.

static NAT

C.

The DNS ALG must be disabled.

D.

source NAT

Full Access
Question # 20

Which method does an SRX Series device in transparent mode use to learn about unknown devices in a network?

A.

LLDP-MED

B.

IGMP snooping

C.

RSTP

D.

packet flooding

Full Access
Question # 21

You are asked to configure a security policy on the SRX Series device. After committing the policy, you receive the “Policy is out of sync between RE and PFE .” error.

Which command would be used to solve the problem?

A.

request security polices resync

B.

request service-deployment

C.

request security polices check

D.

restart security-intelligence

Full Access
Question # 22

Your organization has multiple Active Directory domain to control user access. You must ensure that security polices are passing traffic based upon the user’s access rights.

What would you use to assist your SRX series devices to accomplish this task?

A.

JIMS

B.

Junos Space

C.

JSA

D.

JATP Appliance

Full Access
Question # 23

What are two valid modes for the Juniper ATP Appliance? (Choose two.)

A.

flow collector

B.

event collector

C.

all-in-one

D.

core

Full Access
Question # 24

While troubleshooting security policies, you added the count action. Where do you see the result of this action?

A.

In the show security policies hit-count command output.

B.

In the show security flow statistics command output.

C.

In the show security policies detail command output.

D.

In the show firewall log command output.

Full Access
Question # 25

Exhibit

JN0-636 question answer

You are using trace options to verity NAT session information on your SRX Series device

Referring to the exhibit, which two statements are correct? (Choose two.)

A.

This packet is part of an existing session.

B.

The SRX device is changing the source address on this packet from

C.

This is the first packet in the session

D.

The SRX device is changing the destination address on this packet 10.0.1 1 to 172 20.101.10.

Full Access
Question # 26

You want to enroll an SRX Series device with Juniper ATP Appliance. There is a firewall device in the path between the devices. In this scenario, which port should be opened in the firewall device?

A.

8080

B.

443

C.

80

D.

22

Full Access
Question # 27

You want to use selective stateless packet-based forwarding based on the source address.

In this scenario, which command will allow traffic to bypass the SRX Series device flow daemon?

A.

set firewall family inet filter bypaa3_flowd term t1 then skip—services accept

B.

set firewall family inet filter bypass_flowd term t1 then routing-instance stateless

C.

set firewall family inet filter bypas3_flowd term t1 then virtual-channel stateless

D.

set firewall family inet filter bypass__f lowd term t1 then packet—mode

Full Access
Question # 28

Exhibit.

JN0-636 question answer

Referring to the exhibit, which two statements are true? (Choose two.)

A.

The c-1 TSYS has a reservation for the security flow resource.

B.

The c-1 TSYS can use security flow resources up to the system maximum.

C.

The c-1 TSYS cannot use any security flow resources.

D.

The c-1 TSYS has no reservation for the security flow resource.

Full Access
Question # 29

Exhibit:

JN0-636 question answer

You are troubleshooting a firewall filter shown in the exhibit that is intended to log all traffic and block

only inbound telnet traffic on interface ge-0/0/3.

How should you modify the configuration to fulfill the requirements?

A.

Modify the log-all term to add the next term action

B.

Delete the log-all term

C.

Add a term before the log-all term that blocks Telnet

D.

Apply a firewall filter to the loopback interface that blocks Telnet traffic

Full Access
Question # 30

Exhibit

JN0-636 question answer

You are implementing filter-based forwarding to send traffic from the 172.25.0.0/24 network through ISP-1 while sending all other traffic through your connection to ISP-2. Your ge-0/0/1 interface connects to two networks, including the 172.25.0.0/24 network. You have implemented the configuration shown in the exhibit. The traffic from the 172.25.0.0/24 network is being forwarded as expected to 172.20.0.2, however traffic from the other network (172.25.1.0/24) is not being forwarded to the upstream 172.21.0.2 neighbor.

In this scenario, which action will solve this problem?

A.

You must specify that the 172.25.1.1/24 IP address is the primary address on the ge-0/0/1 interface.

B.

You must apply the firewall filter to the lo0 interface when using filter-based forwarding.

C.

You must add another term to the firewall filter to accept the traffic from the 172.25.1.0/24 network.

D.

You must create the static default route to neighbor 172.21 0.2 under the ISP-1 routing instance hierarchy.

Full Access
Question # 31

You are asked to share threat intelligence from your environment with third party tools so that those

tools can be identify and block lateral threat propagation from compromised hosts.

Which two steps accomplish this goal? (Choose Two)

A.

Configure application tokens in the SRX Series firewalls to limit who has access

B.

Enable Juniper ATP Cloud to share threat intelligence

C.

Configure application tokens in the Juniper ATP Cloud to limit who has access

D.

Enable SRX Series firewalls to share Threat intelligence with third party tool.

Full Access
Question # 32

You are required to secure a network against malware. You must ensure that in the event that a

compromised host is identified within the network. In this scenario after a threat has been

identified, which two components are responsible for enforcing MAC-level infected host ?

A.

SRX Series device

B.

Juniper ATP Appliance

C.

Policy Enforcer

D.

EX Series device

Full Access
Question # 33

In an effort to reduce client-server latency transparent mode was enabled an SRX series device.

Which two types of traffic will be permitted in this scenario? (Choose Two )

A.

ARP

B.

Layer 2 non-IP multicast

C.

BGP

D.

IPsec

Full Access