لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
You are asked to design a security solution for your client’s new two-tier data center. The client has a need for some flows to bypass firewall inspection entirely. Where should the firewall be deployed in this data center?
A. inline, between the core switches and the access switches
B. inline, between the core switches and the edge routers
C. one-arm configuration, connected to the core switches
D. one-arm configuration, connected to each access switch
عرض الإجابة
اجابة صحيحة: B
السؤال #2
You are working with a customer to create a design proposal using SRX Series devices. As part of the design, you must consider the requirements shown below: You must ensure that every packet entering your device is independently inspected against a set of rules. You must provide a way to protect the device from undesired access attempts. You must ensure that you can apply a different set of rules for traffic leaving the device than are in use for traffic entering the device. In this scenario, what do you re
A. firewall filters
B. intrusion prevention system
C. unified threat management
D. screens
عرض الإجابة
اجابة صحيحة: ACD
السؤال #3
You are designing a data center security solution for a customer. The customer asks that you provide a DDoS solution. Several IPsec tunnels will be terminated at the data center gateway. Which type of security is your customer asking you to implement?
A. segmentation
B. intra-data center policy enforcement
C. perimeter protection
D. compliance
عرض الإجابة
اجابة صحيحة: BC
السؤال #4
You are deploying Security Director with the logging and reporting functionality for VMs that use SSDs. You expect to have approximately 20,000 events per second of logging in your network. In this scenario, what is the minimum number of log receiver devices that you should use?
A. 4
B. 3
C. 2
D. 1
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Your company has 500 branch sites and the CIO is concerned about minimizing the potential impact of a VPN router being stolen from an enterprise branch site. You want the ability to quickly disable a stolen VPN router while minimizing administrative overhead. Which solution accomplishes this task?
A. Implement a certificate-based VPN using a public key infrastructure (PKI)
B. Modify your IKE proposals to use Diffie-Hellman group 14 or higher
C. Use firewall filters to block traffic from the stolen VPN router
D. Rotate VPN pre-shared keys every month
عرض الإجابة
اجابة صحيحة: D
السؤال #6
You are asked to include anti-malware features into an existing network design. Traffic from the infected machines must be moved to a quarantined VLAN. Which product will provide this segregation?
A. screens
B. Sky ATP
C. unified threat management
D. Software Defined Secure Network
عرض الإجابة
اجابة صحيحة: CD
السؤال #7
You have a campus location with multiple WAN links. You want to specify the primary link used for your VoIP traffic. In this scenario, which type of WAN load balancing would you use?
A. BGP
B. OSPF
C. FBF
D. ECMP
عرض الإجابة
اجابة صحيحة: C
السؤال #8
You are designing a DDoS solution for an ISP using BGP FlowSpec. You want to ensure that BGP FlowSpec does not overwhelm the ISP’s edge routers. Which two requirements should be included in your design? (Choose two.)
A. Specify a maximum number BGP FlowSpec prefixes per neighbor
B. Implement a route policy to limit advertised routes to /24 subnets
C. Implement a route policy to limit advertised routes to any public IP space
D. Specify a maximum number of BGP FlowSpec prefixes per device
عرض الإجابة
اجابة صحيحة: A
السؤال #9
You are designing a data center security architecture. The design requires automated scaling of security services according to real-time traffic flows. Which two design components will accomplish this task? (Choose two.)
A. telemetry with an SDN controller
B. JFlow traffic monitoring with event scripts
C. VNF security devices deployed on x86 servers
D. VRF segmentation on high-capacity physical security appliances
عرض الإجابة
اجابة صحيحة: C
السؤال #10
You have a site that has two Internet connections but no switch on the outside of the firewall. You want to use ISP-A over ISP-B during normal operations. Which type of chassis cluster design would you propose to satisfy this requirement?
A. Propose active/active cluster deployment with separate redundancy groups
B. Propose active/passive cluster deployment with separate redundancy groups
C. Propose active/active cluster deployment without separate redundancy groups
D. Propose active/passive cluster deployment without separate redundancy groups
عرض الإجابة
اجابة صحيحة: AB
السؤال #11
You are asked to design a secure enterprise WAN where all payload data is encrypted and branch sites communicate directly without routing all traffic through a central hub. Which two technologies would accomplish this task? (Choose two.)
A. group VPN
B. AutoVPN
C. MPLS Layer 3 VPN
D. Auto Discovery VPN
عرض الإجابة
اجابة صحيحة: BC
السؤال #12
You are asked to deploy a security solution in your data center that ensures all traffic flows through the SRX Series devices. Which firewall deployment method meets this requirement?
A. one-arm
B. two-arm
C. transparent
D. inline
عرض الإجابة
اجابة صحيحة: D
السؤال #13
You are designing an SDSN security solution for a new campus network. The network will consist of Juniper Networks Policy Enforcer, Juniper Networks switches, third-party switches, and SRX Series devices. The switches and the SRX Series devices will be used as security enforcement points. The design must be able to change the VLAN mapping of the switch port of a user that is already authenticated to the network in the event that the end user device becomes compromised. Which component satisfies this require
A. certificate server
B. RADIUS server
C. Security Director
D. DHCP server
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: