Filters
Question type

Study Flashcards

You want to deploy a VPN that will connect branch locations to the main office. You will eventually add additional branch locations to the topology, and you must avoid additional configuration on the hub when those sites are added. In this scenario, which VPN solution would you recommend?


A) Site-to-Site VPN
B) Hub-and-Spoke VPN
C) AutoVPN
D) Group VPN

E) None of the above
F) All of the above

Correct Answer

verifed

verified

You are asked to virtualize numerous stateful firewalls in your customer's data center. The customer wants the solution to use the existing Kubernetes-orchestrated architecture. Which Juniper Networks product would satisfy this requirement?


A) vMX
B) vSRX
C) cSRX
D) CTP Series

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

You are using SRX Series devices to secure your network and you require sandboxing for malicious file detonation. However, per company policy, you cannot send potentially malicious files outside your network for sandboxing. Which feature should you use in this situation?


A) Sky ATP
B) UTM antivirus
C) IPS
D) JATP

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

You are creating a security design proposal for a customer who is connecting their headquarters to a remote branch site over an unsecured Internet connection. As part of your design, you must recommend a solution to connect these sites together and ensure that the communication is secured and encrypted. In this scenario, which solution do you recommend?


A) GRE
B) XMPP
C) IPsec
D) MPLS

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

C

You are designing a data center security architecture. The design requires automated scaling of security services according to real-time traffic flows. Which two design components will accomplish this task? (Choose two.)


A) telemetry with an SDN controller
B) JFlow traffic monitoring with event scripts
C) VNF security devices deployed on x86 servers
D) VRF segmentation on high-capacity physical security appliances

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

You are designing a network management solution that provides automation for Junos devices. Your customer wants to know which solutions would require additional software to be deployed to existing Junos devices. Which two solutions satisfy this scenario? (Choose two.)


A) SaltStack
B) Ansible
C) Puppet
D) Chef

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

You are designing a new campus Internet access service that implements dynamic NAT for customer IP addressing. The customer requires services that allow peer-to-peer networking and online gaming. In this scenario, what will accomplish this task?


A) EVPN over IPsec
B) one-to-one NAT
C) stacked VLAN tagging
D) endpoint independent mapping

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

C

You have a campus location with multiple WAN links. You want to specify the primary link used for your VoIP traffic. In this scenario, which type of WAN load balancing would you use?


A) BGP
B) OSPF
C) FBF
D) ECMP

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

A hosting company is migrating to cloud-based solutions. Their customers share a physical firewall cluster, subdivided into individual logical firewalls for each customer. Projection data shows that the cloud service will soon deplete all the resources within the physical firewall. As a consultant, you must propose a scalable solution that continues to protect all the cloud customers while still securing the existing physical network. In this scenario, which solution would you propose?


A) Deploy a vSRX cluster in front of each customer's servers while keeping the physical firewall cluster
B) Deploy a software-defined networking solution
C) Remove the physical firewall cluster and deploy vSRX clusters dedicated to each customer's servers
D) Replace the physical firewall cluster with a higher-performance firewall

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

You are designing a new network for your organization with the characteristics shown below. All traffic must pass inspection by a security device. A center-positioned segmentation gateway must provide deep inspection of each packet using 10 Gbps interfaces. Policy enforcement must be centrally managed. Which security model should you choose for your network design?


A) Intrazone Permit
B) trust but verify
C) user-role firewall policies
D) Zero Trust

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

What is the maximum number of SRX Series devices in a chassis cluster?


A) 2
B) 3
C) 4
D) 5

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What are two benefits of the vSRX in a virtualized private or public cloud multitenant environment? (Choose two.)


A) full logical systems capabilities
B) stateful firewall protection at the tenant edge
C) 100GbE interface support
D) OSPFv3 capabilities

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

What are two reasons for using cSRX over vSRX? (Choose two.)


A) cSRX loads faster
B) cSRX uses less memory
C) cSRX supports the BGP protocol
D) cSRX supports IPsec

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

You are designing a data center security architecture. The design requires automated scaling of security services according to real-time traffic flows. Which two design components will accomplish this task? (Choose two.)


A) telemetry with an SDN controller
B) JFlow traffic monitoring with event scripts
C) VNF security devices deployed on x86 servers
D) VRF segmentation on high-capacity physical security appliances

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Your company has outgrown its existing secure enterprise WAN that is configured to use OSPF, AutoVPN, and IKE version 1. You are asked if it is possible to make a design change to improve the WAN performance without purchasing new hardware. Which two design changes satisfy these requirements? (Choose two.)


A) Modify the IPsec proposal from AES-128 to AES-256
B) Change the IGP from OSPF to IS-IS
C) Migrate to IKE version 2
D) Implement Auto Discovery VPN

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Your company has 500 branch sites and the CIO is concerned about minimizing the potential impact of a VPN router being stolen from an enterprise branch site. You want the ability to quickly disable a stolen VPN router while minimizing administrative overhead. Which solution accomplishes this task?


A) Implement a certificate-based VPN using a public key infrastructure (PKI)
B) Modify your IKE proposals to use Diffie-Hellman group 14 or higher
C) Use firewall filters to block traffic from the stolen VPN router
D) Rotate VPN pre-shared keys every month

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

C

You are designing a data center security solution for a customer. The customer asks that you provide a DDoS solution. Several IPsec tunnels will be terminated at the data center gateway. Which type of security is your customer asking you to implement?


A) segmentation
B) intra-data center policy enforcement
C) perimeter protection
D) compliance

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Your customer needs help designing a single solution to protect their combination of various Junos network devices from unauthorized management access. Which Junos OS feature will provide this protection?


A) Use a firewall filter applied to the fxp0 interface
B) Use a security policy with the destination of the junos-host zone
C) Use the management zone host-inbound-traffic feature
D) Use a firewall filter applied to the lo0 interface

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

You are responding to an RFP for securing a large enterprise. The RFP requires an onsite security solution which can use logs from third-party sources to prevent threats. The solution should also have the capability to detect and stop zero-day attacks. Which Juniper Networks solution satisfies this requirement?


A) IDP
B) Sky ATP
C) JSA
D) JATP

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

You have a site that has two Internet connections but no switch on the outside of the firewall. You want to use ISP-A over ISP-B during normal operations. Which type of chassis cluster design would you propose to satisfy this requirement?


A) Propose active/active cluster deployment with separate redundancy groups
B) Propose active/passive cluster deployment with separate redundancy groups
C) Propose active/active cluster deployment without separate redundancy groups
D) Propose active/passive cluster deployment without separate redundancy groups

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 69

Related Exams

Show Answer