New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Juniper > Associate JNCIA-SEC > JN0-231

JN0-231 Security-Associate (JNCIA-SEC) Question and Answers

Question # 4

Which two addresses are valid address book entries? (Choose two.)

A.

173.145.5.21/255.255.255.0

B.

153.146.0.145/255.255.0.255

C.

203.150.108.10/24

D.

191.168.203.0/24

Full Access
Question # 5

You are deploying an SRX Series firewall with multiple NAT scenarios.

In this situation, which NAT scenario takes priority?

A.

interface NAT

B.

source NAT

C.

static NAT

D.

destination NAT

Full Access
Question # 6

When are Unified Threat Management services performed in a packet flow?

A.

before security policies are evaluated

B.

as the packet enters an SRX Series device

C.

only during the first path process

D.

after network address translation

Full Access
Question # 7

Which two statements about user-defined security zones are correct? (Choose two.)

A.

Users cannot share security zones between routing instances.

B.

Users can configure multiple security zones.

C.

Users can share security zones between routing instances.

D.

User-defined security zones do not apply to transit traffic.

Full Access
Question # 8

You are investigating a communication problem between two hosts and have opened a session on the SRX Series device closest to one of the hosts and entered the show security flow session command.

What information will this command provide? (Choose two.)

A.

The total active time of the session.

B.

The end-to-end data path that the packets are taking.

C.

The IP address of the host that initiates the session.

D.

The security policy name that is controlling the session.

Full Access
Question # 9

The UTM features are performed during which process of the SRX Series device's packet flow?

A.

services

B.

security policies

C.

zones

D.

screens

Full Access
Question # 10

Which statement is correct about static NAT?

A.

Static NAT supports port translation.

B.

Static NAT rules are evaluated after source NAT rules.

C.

Static NAT implements unidirectional one-to-one mappings.

D.

Static NAT implements unidirectional one-to-many mappings.

Full Access
Question # 11

What are two characteristics of a null zone? (Choose two.)

A.

The null zone is configured by the super user.

B.

By default, all unassigned interfaces are placed in the null zone.

C.

All ingress and egress traffic on an interface in a null zone is permitted.

D.

When an interface is deleted from a zone, it is assigned back to the null zone.

Full Access
Question # 12

What are two Juniper ATP Cloud feed analysis components? (Choose two.)

A.

IDP signature feed

B.

C&C cloud feed

C.

infected host cloud feed

D.

US CERT threat feed

Full Access
Question # 13

When operating in packet mode, which two services are available on the SRX Series device? (Choose two.)

A.

MPLS

B.

UTM

C.

CoS

D.

IDP

Full Access
Question # 14

Which two statements are correct about screens? (Choose two.)

A.

Screens process inbound packets.

B.

Screens are processed on the routing engine.

C.

Screens process outbound packets.

D.

Screens are processed on the flow module.

Full Access
Question # 15

Corporate security requests that you implement a policy to block all POP3 traffic from traversing the Internet firewall.

In this scenario, which security feature would you use to satisfy this request?

A.

antivirus

B.

Web filtering

C.

content filtering

D.

antispam

Full Access
Question # 16

Which two IPsec hashing algorithms are supported on an SRX Series device? (Choose two.)

A.

SHA-1

B.

SHAKE128

C.

MD5

D.

RIPEMD-256

Full Access
Question # 17

What does the number ‘’2’’ indicate in interface ge—0/1/2?

A.

The interface logical number

B.

The physical interface card (PIC)

C.

The port number

D.

The flexible PIC concentrator (FPC)

Full Access
Question # 18

You are configuring an SRX Series device. You have a set of servers inside your private network that need one-to-one mappings to public IP addresses.

Which NAT configuration is appropriate in this scenario?

A.

source NAT with PAT

B.

destination NAT

C.

NAT-T

D.

static NAT

Full Access
Question # 19

You are monitoring an SRX Series device that has the factory-default configuration applied.

In this scenario, where are log messages sent by default?

A.

Junos Space Log Director

B.

Junos Space Security Director

C.

to a local syslog server on the management network

D.

to a local log file named messages

Full Access
Question # 20

What is the order of the first path packet processing when a packet enters a device?

A.

security policies –> screens –> zones

B.

screens –> security policies –> zones

C.

screens –> zones –> security policies

D.

security policies –> zones –> screens

Full Access
Question # 21

You are assigned a project to configure SRX Series devices to allow connections to your webservers. The webservers have a private IP address, and the packets must use NAT to be accessible from the Internet. The webservers must use the same address for both connections from the Internet and communication with update servers.

Which NAT type must be used to complete this project?

A.

source NAT

B.

destination NAT

C.

static NAT

D.

hairpin NAT

Full Access
Question # 22

When transit traffic matches a security policy, which three actions are available? (Choose three.)

A.

Allow

B.

Discard

C.

Deny

D.

Reject

E.

Permit

Full Access
Question # 23

Which two statements are correct about IPsec security associations? (Choose two.)

A.

IPsec security associations are bidirectional.

B.

IPsec security associations are unidirectional.

C.

IPsec security associations are established during IKE Phase 1 negotiations.

D.

IPsec security associations are established during IKE Phase 2 negotiations.

Full Access
Question # 24

Which Juniper ATP feed provides a dynamic list of known botnet servers and known sources of malware downloads?

A.

infected host cloud feed

B.

Geo IP feed

C.

C&C cloud feed

D.

blocklist feed

Full Access
Question # 25

Which three operating systems are supported for installing and running Juniper Secure Connect client software? (Choose three.)

A.

Windows 7

B.

Android

C.

Windows 10

D.

Linux

E.

macOS

Full Access
Question # 26

Which two UTM features should be used for tracking productivity and corporate user behavior? (Choose two.)

A.

the content filtering UTM feature

B.

the antivirus UTM feature

C.

the Web filtering UTM feature

D.

the antispam UTM feature

Full Access
Question # 27

What are two features of the Juniper ATP Cloud service? (Choose two.)

A.

sandbox

B.

malware detection

C.

EX Series device integration

D.

honeypot

Full Access
Question # 28

Which statement is correct about packet mode processing?

A.

Packet mode enables session-based processing of incoming packets.

B.

Packet mode works with NAT, VPNs, UTM, IDP, and other advanced security services.

C.

Packet mode bypasses the flow module.

D.

Packet mode is the basis for stateful processing.

Full Access
Question # 29

Which statement about service objects is correct?

A.

All applications are predefined by Junos.

B.

All applications are custom defined by the administrator.

C.

All applications are either custom or Junos defined.

D.

All applications in service objects are not available on the vSRX Series device.

Full Access
Question # 30

Which feature would you use to protect clients connected to an SRX Series device from a SYN flood attack?

A.

security policy

B.

host inbound traffic

C.

application layer gateway

D.

screen option

Full Access
Question # 31

You must monitor security policies on SRX Series devices dispersed throughout locations in your organization using a 'single pane of glass' cloud-based solution.

Which solution satisfies the requirement?

A.

Juniper Sky Enterprise

B.

J-Web

C.

Junos Secure Connect

D.

Junos Space

Full Access