Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Juniper JN0-334 Security-Specialist (JNCIS-SEC) Exam Practice Test

Demo: 13 questions
Total 91 questions

Security-Specialist (JNCIS-SEC) Questions and Answers

Question 1

Click the Exhibit button.

The output shown in the exhibit is displayed in which format?

Options:

A.

syslog

B.

WELF

C.

binary

D.

sd-syslog

Question 2

Data plane logging operates in which two modes? (Choose two.)

Options:

A.

syslog

B.

binary

C.

event

D.

stream

Question 3

Click the Exhibit button.

You have configured your SRX Series device to receive authentication information from a JIMS server. However, the SRX is not receiving any authentication information.

Referring to the exhibit, how would you solve the problem?

Options:

A.

Use the JIMS Administrator user interface to add the SRX device as client.

B.

Generate an access token on the SRX device that matches the access token on the JIMS server.

C.

Update the IP address of the JIMS server

D.

Change the SRX configuration to connect to the JIMS server using HTTP.

Question 4

Which three statements are correct about fabric interfaces on the SRX5800? (Choose three.)

Options:

A.

Fabric interfaces must be user-assigned interfaces.

B.

Fabric interfaces must have a user-assigned IP address.

C.

Fabric interfaces must be same interface type.

D.

Fabric interfaces must be on the same Layer 2 segment.

E.

Fabric interfaces must be system-assigned interfaces.

Question 5

Which default protocol and port are used for JIMS to SRX client communication?

Options:

A.

WMI over TCP; port 389

B.

ADSI over TCP; port 389

C.

HTTPS over TCP: port 443

D.

RPC over TCP, port 135

Question 6

What information does JIMS collect from domain event log sources? (Choose two.)

Options:

A.

For user login events, JIMS collects the username and group membership information.

B.

For device login events. JIMS collects the devide IP address and operating system version.

C.

For device login events, JIMS collects the device IP address and machine name information.

D.

For user login events, JIMS collects the login source IP address and username information.

Question 7

Which two statements describe how rules are used with Juniper Secure Analytics? (Choose two.)

Options:

A.

When a rule is triggered, JSA can respond by sending an e-mail to JSA administrators.

B.

Rules are defined on Junos Space Security Director, and then pushed to JSA log collectors.

C.

A rule defines matching criteria and actions that should be taken when an events matches the rule.

D.

When a rule is triggered, JSA can respond by blocking all traffic from a specific source address.

Question 8

Click the Exhibit button.

You are configuring an SRX chassis cluster with the node-specific hostname and management address. Referring to the exhibit, which configuration completes this requirement?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 9

You have deployed JSA and you need to view events and network activity that match rule criteria. You must view this data using a single interface.

Which JSA feature should you use in this scenario?

Options:

A.

Log Collector

B.

Assets

C.

Network Activity

D.

Offense Manager

Question 10

Your manager asks you to find employees that are watching YouTube during office hours.

Which AppSecure component would you configure to accomplish this task?

Options:

A.

AppQoE

B.

AppFW

C.

AppTrack

D.

AppQoS

Question 11

Which two session parameters would be used to manage space on the session table? (Choose two.)

Options:

A.

low watermark

B.

high watermark

C.

TCP MSS

D.

TCP RST

Question 12

In an Active/Active chassis cluster deployment, which chassis cluster component is responsible for RG0 traffic?

Options:

A.

the backup routing engine of the primary node

B.

the master routing engine of the secondary node

C.

the primary node

D.

the secondary node

Question 13

When working with network events on a Juniper Secure Analytics device, flow records come from which source?

Options:

A.

tap port

B.

SPAN

C.

switch

D.

mirror

Demo: 13 questions
Total 91 questions