Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Juniper JNCIS-SEC JN0-335 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam JN0-335 Premium Access

View all detail and faqs for the JN0-335 exam


377 Students Passed

94% Average Score

94% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?

Options:

A.

The active sessions allowed by the policy will be dropped.

B.

The active sessions allowed by the policy will be marked as a legacy flow and will continue to be forwarded.

C.

The active sessions allowed by the policy will be reevaluated by the cached

D.

The active sessions allowed by the policy will continue

Questions # 2:

You enable chassis clustering on two devices and assign a cluster ID and a node ID to each device.

In this scenario, what is the correct order for rebooting the devices?

Options:

A.

Reboot the secondary device, then the primary device.

B.

Reboot only the secondary device since the primary will assign itself the correct cluster and node ID.

C.

Reboot the primary device, then the secondary device.

D.

Reboot only the primary device since the secondary will assign itself the correct cluster and node ID.

Questions # 3:

Which two statements are correct about a reth LAG? (Choose two.)

Options:

A.

Links must have the same speed and duplex setting.

B.

Links must use the same cable type

C.

You must have a "minimum-links" statement value of two.

D.

You should have two or more interfaces.

Questions # 4:

You want to deploy a virtualized SRX in your environment.

In this scenario, why would you use a vSRX instead of a cSRX? (Choose two.)

Options:

A.

The vSRX supports Layer 2 and Layer 3 configurations.

B.

Only the vSRX provides clustering.

C.

The vSRX has faster boot times.

D.

Only the vSRX provides NAT, IPS, and UTM services

Questions # 5:

Which statement defines the function of an Application Layer Gateway (ALG)?

Options:

A.

The ALG uses software processes for permitting or disallowing specific IP address ranges.

B.

The ALG uses software that is used by a single TCP session using the same port numbers as the application.

C.

The ALG contains protocols that use one application session for each TCP session.

D.

The ALG uses software processes for managing specific protocols.

Questions # 6:

Exhibit

Question # 6

You are trying to create a security policy on your SRX Series device that permits HTTP traffic from your private 172 25.11.0/24 subnet to the Internet You create a policy named permit-http between the trust and untrust zones that permits HTTP traffic. When you issue a commit command to apply the configuration changes, the commit fails with the error shown in the exhibit.

Which two actions would correct the error? (Choose two.)

Options:

A.

Issue the rollback 1 command from the top of the configuration hierarchy and attempt the commit again.

B.

Execute the Junos commit full command to override the error and apply the configuration.

C.

Create a custom application named http at the [edit applications] hierarchy.

D.

Modify the security policy to use the built-in Junos-http applications.

Questions # 7:

Which two statements are true about mixing traditional and unified security policies? (Choose two.)

Options:

A.

When a packet matches a unified security policy, the evaluation process terminates

B.

Traditional security policies must come before unified security policies

C.

Unified security policies must come before traditional security policies

D.

When a packet matches a traditional security policy, the evaluation process terminates

Questions # 8:

Which two statements are true about the fab interface in a chassis cluster? (Choose two.)

Options:

A.

The fab link does not support fragmentation.

B.

The physical interface for the fab link must be specified in the configuration.

C.

The fab link supports traditional interface features.

D.

The Junos OS supports only one fab link.

Questions # 9:

Which method does the loT Security feature use to identify traffic sourced from IoT devices?

Options:

A.

The SRX Series device streams metadata from the loT device transit traffic to Juniper ATP Cloud

B.

The SRX Series device streams transit traffic received from the IoT device to Juniper ATP Cloud.

C.

The SRX Series device identifies loT devices using their MAC address.

D.

The SRX Series device identifies loT devices from metadata extracted from their transit traffic.

Questions # 10:

You have implemented a vSRX in your VMware environment. You want to implement a second vSRX Series device and enable chassis clustering.

Which two statements are correct in this scenario about the control-link settings? (Choose two.)

Options:

A.

In the vSwitch security settings, accept promiscuous mode.

B.

In the vSwitch properties settings, set the VLAN ID to None.

C.

In the vSwitch security settings, reject forged transmits.

D.

In the vSwitch security settings, reject MAC address changes.

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.