لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
You need to provide wireless access to the user community without reducing security. Which action accomplishes this task?
A. Provide all users with the pre-shared key to the SSID to validate their access
B. Record the users’ MAC addresses
C. Require users to authenticate with EAP-TLS
D. Hide the broadcast of the SSID
عرض الإجابة
اجابة صحيحة: ABE
السؤال #2
You must implement access control lists to protect the control plane of a service provider’s core devices. What are two ways to accomplish this task? (Choose two.)
A. Implement access control lists to filter RFC 1918 IP addresses from reaching the control plane
B. Implement access control lists to permit only internal management networks to reach the control plane
C. Implement access control lists to drop all IP packets that are fragments
D. Implement access control lists to protect the control plane against unauthorized user credentials
عرض الإجابة
اجابة صحيحة: BD
السؤال #3
Due to changes in security requirements you must place a firewall between an existing Web server farm and a database server farm residing in the same subnet. In this scenario, why would you choose transparent mode as your operating mode?
A. Transparent mode does not require zones to be configured
B. Transparent mode can be implemented with no changes to the current IP addresses
C. Transparent mode policies can be enforced based on MAC address ranges
D. Transparent mode allows only IP packets to pass through the security policies
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which three statements about Sky Advanced Threat Prevention are true? (Choose three.)
A. Dynamic analysis involves unique deception techniques
B. Machine-learning algorithms are enabled to adapt to and identify new malware
C. Rapid cache lookups are used to quickly identify known files
D. Files are flagged for next-day analysis for certain malware types
E. It uses a single, best-in-class antivirus engine
عرض الإجابة
اجابة صحيحة: ABC
السؤال #5
Which two components are required to implement a Contrail service chain? (Choose two.)
A. AppSecure
B. service policy
C. Express Path
D. virtual network
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Your client modifies an event script and needs to update 100 SRX Series devices with this new script. They want to use the refresh-from parameter to refresh the script from a centralized location. In this scenario, which three protocols would you use to accomplish this task? (Choose three.)
A. HTTP
B. SCP
C. TFTP
D. FTP
E. CIFS
عرض الإجابة
اجابة صحيحة: ABD
السؤال #7
Your customer is purchasing another company. They must establish communication between the two corporate networks, which use an overlapping IPv4 address space. The customer knows they must deploy some of Network Address Translation (NAT). Which type of NAT should you use?
A. destination
B. source
C. persistent
D. static
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which security solution protects against zero-day attacks?
A. DDoS protection
B. advanced anti-malware
C. content filtering
D. Application Layer Gateways
عرض الإجابة
اجابة صحيحة: B
السؤال #9
You are designing a WAN solution for a small service provider. The service provider has asked you to include ways to mitigate potential DDoS attacks against their customers. Which two solutions should you include in your proposal? (Choose two.)
A. BGP flowspec
B. remote triggered back hole
C. intrusion prevention system
D. unified threat management
عرض الإجابة
اجابة صحيحة: AB
السؤال #10
What is the maximum number of SRX Series devices in a chassis cluster?
A. 2
B. 3
C. 4
D. 5
عرض الإجابة
اجابة صحيحة: BC
السؤال #11
You are asked to implement a new application to share documents with trusted external organizations while minimizing the risk of an attack that would enable access to other enterprise systems. In this scenario, which two locations would you recommend to deploy the application? (Choose two.)
A. public cloud
B. management VLAN
C. enterprise LAN
D. enterprise DMZ
عرض الإجابة
اجابة صحيحة: AD
السؤال #12
Which component of the Juniper NFV solution architecture acts as the VNF manager?
A. MetaFabric
B. Service Control Gateway
C. Contrail
D. vSRX
عرض الإجابة
اجابة صحيحة: C
السؤال #13
You are designing a Log Director deployment that must be able to handle 6,500 sustained events per second. What is the minimum deployment scenario?
A. three Log Collector VMs and one Log Concentrator VM
B. two Log Collector VMs and one Log Concentrator VM
C. one Log Collector VM
D. four Log Collector VMs and one Log Concentrator VM
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Spotlight Secure provides which benefit?
A. log management
B. botnet protection
C. centralized management of security devices
D. IPsec encryption
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Where are the security policies enforced for next-generation firewalls?
A. at the Presentation Layer
B. at the Session Layer
C. at the Data Link Layer
D. at the Application Layer
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: