لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which two security features inspect traffic at Layer 7? (Choose two.)
A. IPS/IDP
B. security zones
C. application firewall
D. integrated user firewall
عرض الإجابة
اجابة صحيحة: AC
السؤال #2
When configuring antispam, where do you apply any local lists that are configured?
A. custom objects
B. advanced security policy
C. antispam feature-profile
D. antispam UTM policy
عرض الإجابة
اجابة صحيحة: AC
السؤال #3
Which IPsec protocol is used to encrypt the data payload?
A. ESP
B. IKE
C. AH
D. TCP
عرض الإجابة
اجابة صحيحة: CD
السؤال #4
Which two components are configured for host inbound traffic? (Choose two.)
A. zone
B. logical interface
C. physical interface
D. routing instance
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which statement is correct about Web filtering?
A. The Juniper Enhanced Web Filtering solution requires a locally managed server
B. The decision to permit or deny is based on the body content of an HTTP packet
C. The decision to permit or deny is based on the category to which a URL belongs
D. The client can receive an e-mail notification when traffic is blocked
عرض الإجابة
اجابة صحيحة: A
السؤال #6
What are two features of the Juniper ATP Cloud service? (Choose two.)
A. sandbox
B. malware detection
C. EX Series device integration
D. honeypot
عرض الإجابة
اجابة صحيحة: D
السؤال #7
You want to block executable files ("exe) from being downloaded onto your network. Which UTM feature would you use in this scenario?
A. IPS
B. Web filtering
C. content filtering
D. antivirus
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which two addresses are valid address book entries? (Choose two.)
A. 173
B. 153
C. 203
D. 191
عرض الإجابة
اجابة صحيحة: C
السؤال #9
You must monitor security policies on SRX Series devices dispersed throughout locations in your organization using a 'single pane of glass' cloud-based solution. Which solution satisfies the requirement?
A. Juniper Sky Enterprise
B. J-Web
C. Junos Secure Connect
D. Junos Space
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Click the Exhibit button. You are asked to allow only ping and SSH access to the security policies shown in the exhibit. Which statement will accomplish this task?
A. Rename policy Rule-2 to policy Rule-0
B. Insert policy Rule-2 before policy Rule-1
C. Replace application any with application [junos-ping junos-ssh] in policy Rule-1
D. Rename policy Rule-1 to policy Rule-3
عرض الإجابة
اجابة صحيحة: C
السؤال #11
You are installing a new SRX Series device and you are only provided one IP address from your ISP. In this scenario, which NAT solution would you implement?
A. pool-based NAT with PAT
B. pool-based NAT with address shifting
C. interface-based source NAT
D. pool-based NAT without PAT
عرض الإجابة
اجابة صحيحة: D
السؤال #12
What is the number of concurrent Secure Connect user licenses that an SRX Series device has by default?
A. 3
B. 4
C. 2
D. 5
عرض الإجابة
اجابة صحيحة: D
السؤال #13
Which Juniper Networks solution uses static and dynamic analysis to search for day-zero malware threats?
A. firewall filters
B. UTM
C. Juniper ATP Cloud
D. IPS
عرض الإجابة
اجابة صحيحة: BD
السؤال #14
You want to prevent other users from modifying or discarding your changes while you are also editing the configuration file. In this scenario, which command would accomplish this task?
A. configure master
B. cli privileged
C. configure exclusive
D. configure
عرض الإجابة
اجابة صحيحة: AC
السؤال #15
You need to collect the serial number of an SRX Series device to replace it. Which command will accomplish this task?
A. show chassis hardware
B. show system information
C. show chassis firmware
D. show chassis environment
عرض الإجابة
اجابة صحيحة: AB
السؤال #16
An application firewall processes the first packet in a session for which the application has not yet been identified. In this scenario, which action does the application firewall take on the packet?
A. It allows the first packet
B. It denies the first packet and sends an error message to the user
C. It denies the first packet
D. It holds the first packet until the application is identified
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Click the Exhibit button. Referring to the exhibit, which two statements are correct about the ping command? (Choose two.)
A. The DMZ routing-instance is the source
B. The 10
C. The 10
D. The DMZ routing-instance is the destination
عرض الإجابة
اجابة صحيحة: AD
السؤال #18
When creating a site-to-site VPN using the J-Web shown in the exhibit, which statement is correct?
A. The remote gateway is configured automatically based on the local gateway settings
B. RIP, OSPF, and BGP are supported under Routing mode
C. The authentication method is pre-shared key or certificate based
D. Privately routable IP addresses are required
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Which two statements are correct about IKE security associations? (Choose two.)
A. IKE security associations are established during IKE Phase 1 negotiations
B. IKE security associations are unidirectional
C. IKE security associations are established during IKE Phase 2 negotiations
D. IKE security associations are bidirectional
عرض الإجابة
اجابة صحيحة: AB

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: