لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which two statements are true about security policy actions? (Choose two.)
A. The reject action drops the traffic and sends a message to the source device
B. The deny action silently drop the traffic
C. The deny action drops the traffic and sends a message to the source device
D. The reject action silently drops the traffic
عرض الإجابة
اجابة صحيحة: BD
السؤال #2
Which two elements are needed on an SRX Series device to set up a remote syslog server? (Choose two.)
A. Data type
B. Data throughput
C. IP address
D. Data size
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Exhibit. Which statement is correct regarding the interface configuration shown in the exhibit?
A. The interface MTU has been increased
B. The IP address has an invalid subnet mask
C. The IP address is assigned to unit 0
D. The interface is assigned to the trust zone by default
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Host-inbound-traffic is configured on the DMZ zone and the ge-0/0/9.0 interface attached to that zone. Referring to the exhibit, which to types of management traffic would be performed on the SRX Series device? (Choose two.)
A. HTTPS
B. SSH
C. Finger
D. HTTP
عرض الإجابة
اجابة صحيحة: BD
السؤال #5
You are designing a new security policy on an SRX Series device. You must block an application and log all occurrence of the application access attempts. In this scenario, which two actions must be enabled in the security policy? (Choose two.)
A. Log the session initiations
B. Enable a reject action
C. Log the session closures
D. Enable a deny action
عرض الإجابة
اجابة صحيحة: B
السؤال #6
You have configured a Web filtering UTM policy? Which action must be performed before the Web filtering UTM policy takes effect?
A. The UTM policy must be linked to an egress interface
B. The UTM policy be configured as a routing next hop
C. The UTM policy must be linked to an ingress interface
D. The UTM policy must be linked to a security policy
عرض الإجابة
اجابة صحيحة: A
السؤال #7
What is the purpose of the Shadow Policies workspace in J-Web?
A. The Shadow Policies workspace shows unused security policies due to policy overlap
B. The Shadow Policies workspace shows unused IPS policies due to policy overlap
C. The Shadow Policies workspace shows used security policies due to policy overlap
D. The Shadow Policies workspace shows used IPS policies due to policy overlap
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which statements is correct about global security policies?
A. Global policies allow you to regulate traffic with addresses and applications, regardless of their security zones
B. Traffic matching global is not added to the session table
C. Global policies eliminate the need to assign interface to security zones
D. Global security require you to identify a source and destination zone
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Which two actions are performed on an incoming packet matching an existing session? (Choose two.)
A. Zone processing
B. Security policy evolution
C. Service ALG processing
D. Screens processing
عرض الإجابة
اجابة صحيحة: BC
السؤال #10
What must you do first to use the Monitor/Events workspace in the j-Web interface?
A. You must enable stream mode security logging on the SRX Series device
B. You must enable event mode security logging on the SRX Series device
C. You must enable security logging that uses the SD-Syslog format
D. You must enable security logging that uses the TLS transport mode
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Users should not have access to Facebook, however, a recent examination of the logs security show that users are accessing Facebook. Referring to the exhibit, what should you do to solve this problem?
A. Change the source address for the Block-Facebook-Access rule to the prefix of the users
B. Move the Block-Facebook-Access rule before the Internet-Access rule
C. Move the Block-Facebook-Access rule from a zone policy to a global policy
D. Change the Internet-Access rule from a zone policy to a global policy
عرض الإجابة
اجابة صحيحة: D
السؤال #12
Which statements is correct about SKY ATP?
A. Sky ATP is an open-source security solution
B. Sky ATP is used to automatically push out changes to the AppSecure suite
C. Sky ATP only support sending threat feeds to vSRX Series devices
D. Sky ATP is a cloud-based security threat analyzer that performs multiple tasks
عرض الإجابة
اجابة صحيحة: D
السؤال #13
You are concerned that unauthorized traffic is using non-standardized ports on your network. In this scenario, which type of security feature should you implement?
A. Application firewall
B. Sky ATP
C. Firewall filters
D. Zone-based policies
عرض الإجابة
اجابة صحيحة: A
السؤال #14
On an SRX device, you want to regulate traffic base on network segments. In this scenario, what do you configure to accomplish this task?
A. Screens
B. Zones
C. ALGs
D. NAT
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which two match conditions would be used in both static NAT and destination NAT rule sets? (Choose two.)
A. Destination zone
B. Destination interface
C. Source interface
D. Source zone
عرض الإجابة
اجابة صحيحة: BD
السؤال #16
Which security object defines a source or destination IP address that is used for an employee Workstation?
A. Zone
B. Screen
C. Address book entry
D. scheduler
عرض الإجابة
اجابة صحيحة: AD

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: