لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
You are designing a new network for your organization with the characteristics shown below. All traffic must pass inspection by a security device. A center-positioned segmentation gateway must provide deep inspection of each packet using 10 Gbps interfaces. Policy enforcement must be centrally managed. Which security model should you choose for your network design?
A. Intrazone Permit
B. trust but verify
C. user-role firewall policies
D. Zero Trust
عرض الإجابة
اجابة صحيحة: D
السؤال #2
You are working on a network design that will use EX Series devices as Layer 2 access switches in a campus environment. You must include Junos Space in your design. You want to take advantage of security features supported on the devices. Which two security features would satisfy this requirement? (Choose two.)
A. SDSN
B. Stateful Firewall
C. Access Control
D. ALG
عرض الإجابة
اجابة صحيحة: BC
السؤال #3
You are creating a data center security design. Virtual security functions must be performed on east-west traffic. Security functions must be commissioned and decommissioned frequently, and the least resource-intensive architecture must be used. In this scenario, what will accomplish this task?
A. all-in-one NFV security devices with device templates
B. service chaining with container-based security functions
C. a security appliance segmented into logical systems
D. filter-based forwarding to direct traffic to the required security devices
عرض الإجابة
اجابة صحيحة: A
السؤال #4
You are responding to an RFP for securing a large enterprise. The RFP requires an onsite security solution which can use logs from third-party sources to prevent threats. The solution should also have the capability to detect and stop zero- day attacks. Which Juniper Networks solution satisfies this requirement?
A. IDP
B. Sky ATP
C. JSA
D. JATP
عرض الإجابة
اجابة صحيحة: D
السؤال #5
You are asked to design a VPN solution between 25 branches of a company. The company wants to have the sites talk directly to each other in the event of a hub device failure. The solution should follow industry standards. Which solution would you choose in this scenario?
A. AutoVPN
B. Auto Discovery VPN
C. Group VPN
D. full mesh VPN
عرض الإجابة
اجابة صحيحة: B
السؤال #6
You are asked to provide a design proposal for a campus network. As part of the design, the customer requires that all end user devices must be authenticated before being granted access to their Layer 2 network. Which feature meets this requirement?
A. IPsec
B. 802
C. NAT
D. ALGs
عرض الإجابة
اجابة صحيحة: B
السؤال #7
In a data center, what are two characteristics of access tier VLAN termination on the aggregation tier? (Choose two.)
A. Multiple VLANs can be part of one security zone
B. A security zone is limited to a single VLAN
C. Inter-VLAN traffic within a zone can bypass firewall services
D. Inter-VLAN traffic is secured through firewall services
عرض الإجابة
اجابة صحيحة: AD
السؤال #8
What are two benefits of the vSRX in a virtualized private or public cloud multitenant environment? (Choose two.)
A. full logical systems capabilities
B. stateful firewall protection at the tenant edge
C. 100GbE interface support
D. OSPFv3 capabilities
عرض الإجابة
اجابة صحيحة: AB
السؤال #9
You are designing a data center interconnect between two sites across a service provider Layer 3 VPN service. The sites require Layer 2 connectivity between hosts, and the connection must be secure. In this scenario, what will accomplish this task?
A. EVPN over IPsec
B. MACsec encryption
C. SSL VPN encryption
D. stacked VLAN tagging
عرض الإجابة
اجابة صحيحة: B
السؤال #10
You are deploying a data center Clos architecture and require secure data transfers within the switching fabric. In this scenario, what will accomplish this task?
A. MACsec encryption
B. LAG Layer 2 hashing
C. IRB VLAN routing between hosts
D. stacked VLAN tagging on the core switches
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Click the Exhibit button. Which type of security solution is shown in this exhibit?
A. service chain model
B. centralized model
C. inline security model
D. de-centralized model
عرض الإجابة
اجابة صحيحة: A
السؤال #12
You are asked to design a security solution for your client's new two-tier data center. The client has a need for some flows to bypass firewall inspection entirely. Where should the firewall be deployed in this data center?
A. inline, between the core switches and the access switches
B. inline, between the core switches and the edge routers
C. one-arm configuration, connected to the core switches
D. one-arm configuration, connected to each access switch
عرض الإجابة
اجابة صحيحة: C
السؤال #13
You are implementing Routing Engine protection, and packets are processed in a specific order. In this scenario, which function processed a received packet last?
A. loopback interface input policer
B. loopback interface input firewall filter
C. physical interface input firewall filters
D. physical interface input policer
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which two steps should be included in your security design process? (Choose two.)
A. Identify external attackers
B. Define safety requirements for the customer's organization
C. Identify the firewall enforcement points
D. Define overall security policies
عرض الإجابة
اجابة صحيحة: CD
السؤال #15
Which statement about IPsec tunnels is true?
A. They are used to provide in-depth packet inspection for traffic leaving your network
B. They are used to prevent routing loops in a Layer 2 environment
C. They are used to secure and encrypt traffic between tunnel endpoints
D. They are used to combine multiple interfaces into a single bundle
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: