لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
You are designing a corporate WAN using SRX Series devices as a combined firewall and router at each site. Regarding packet-mode and flow-mode operations in this scenario, which statement is true?
A. Packet-mode on SRX Series devices is required for deep packet inspection
B. Packet-mode is only supported on high-end SRX Series devices
C. An SRX Series device in flow-mode cannot forward packet-mode traffic
D. Flow-mode on SRX Series devices is required for security services
عرض الإجابة
اجابة صحيحة: D
السؤال #2
You are concerned about users attacking the publicly accessible servers in your data center through encrypted channels. You want to block these attacks using your SRX Series devices. In this scenario, which two features should you use? (Choose two.)
A. Sky ATP
B. IPS
C. SSL forward proxy
D. SSL reverse proxy
عرض الإجابة
اجابة صحيحة: BC
السؤال #3
You are designing an SDSN security solution for a new campus network. The network will consist of Juniper Networks Policy Enforcer, Juniper Networks switches, third-party switches, and SRX Series devices. The switches and the SRX Series devices will be used as security enforcement points. Which component supports the SRX Series devices in this scenario?
A. Security Director
B. RADIUS server
C. certificate server
D. DHCP server
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which two protocols are supported natively by the Junos automation stack? (Choose two.)
A. NETCONF
B. PyEZ
C. Jenkins
D. CIP
عرض الإجابة
اجابة صحيحة: AB
السؤال #5
You are creating a security design proposal for a customer who is connecting their headquarters to a remote branch site over an unsecured Internet connection. As part of your design, you must recommend a solution to connect these sites together and ensure that the communication is secured and encrypted. In this scenario, which solution do you recommend?
A. GRE
B. XMPP
C. IPsec
D. MPLS
عرض الإجابة
اجابة صحيحة: C
السؤال #6
You are designing a data center interconnect between two sites across a service provider Layer 2 leased line. The sites require Layer 2 connectivity between hosts, and the connection must be secure. In this scenario, what will accomplish this task?
A. IRB VLAN routing
B. MACsec encryption
C. EVPN over IPsec
D. IPsec encryption
عرض الإجابة
اجابة صحيحة: B
السؤال #7
You are designing a network management solution that provides automation for Junos devices. Your customer wants to know which solutions would require additional software to be deployed to existing Junos devices. Which two solutions satisfy this scenario? (Choose two.)
A. SaltStack
B. Ansible
C. Puppet
D. Chef
عرض الإجابة
اجابة صحيحة: AD
السؤال #8
You are asked to design a secure enterprise WAN where all payload data is encrypted and branch sites communicate directly without routing all traffic through a central hub. Which two technologies would accomplish this task? (Choose two.)
A. group VPN
B. AutoVPN
C. MPLS Layer 3 VPN
D. Auto Discovery VPN
عرض الإجابة
اجابة صحيحة: CD
السؤال #9
Click the Exhibit button. You are designing the virtualized server deployment shown in the exhibit in your data center. The vSRX device is acting as a Layer 2 firewall and the two VMs must communicate through the vSRX device. Which two actions must you perform to accomplish this task? (Choose two.)
A. Place both VMs in the same vSwitch
B. Place both VMs in the same VLAN
C. Place both VMs in different vSwitches
D. Place both VMs in different VLANs
عرض الإجابة
اجابة صحيحة: BC
السؤال #10
You are using SRX Series devices to secure your network and you require sandboxing for malicious file detonation. However, per company policy, you cannot send potentially malicious files outside your network for sandboxing. Which feature should you use in this situation?
A. Sky ATP
B. UTM antivirus
C. IPS
D. JATP
عرض الإجابة
اجابة صحيحة: D
السؤال #11
You have a site that has two Internet connections but no switch on the outside of the firewall. You want to use ISP-A over ISP-B during normal operations. Which type of chassis cluster design would you propose to satisfy this requirement?
A. Propose active/active cluster deployment with separate redundancy groups
B. Propose active/passive cluster deployment with separate redundancy groups
C. Propose active/active cluster deployment without separate redundancy groups
D. Propose active/passive cluster deployment without separate redundancy groups
عرض الإجابة
اجابة صحيحة: A
السؤال #12
You are designing an enterprise WAN network that must connect multiple sites. You must provide a design proposal for the security elements needed to encrypt traffic between the remote sites. Which feature will secure the traffic?
A. BFD
B. OSPF
C. GRE
D. IPsec
عرض الإجابة
اجابة صحيحة: D
السؤال #13
Which solution provides a certificate based on user identity for network access?
A. network access control
B. user firewall
C. IP filtering
D. MAC filtering
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Your company has 500 branch sites and the CIO is concerned about minimizing the potential impact of a VPN router being stolen from an enterprise branch site. You want the ability to quickly disable a stolen VPN router while minimizing administrative overhead. Which solution accomplishes this task?
A. Implement a certificate-based VPN using a public key infrastructure (PKI)
B. Modify your IKE proposals to use Diffie-Hellman group 14 or higher
C. Use firewall filters to block traffic from the stolen VPN router
D. Rotate VPN pre-shared keys every month
عرض الإجابة
اجابة صحيحة: C
السؤال #15
You are required to design a university network to meet the conditions shown below. Users connected to the university network should be able to access the Internet and the research department lab network. The research department lab network should not be able to reach the Internet. Which three actions satisfy the design requirements? (Choose three.)
A. Use a global permit policy for Internet traffic
B. Use a global deny security policy for the research lab
C. Use separate security zones for each department
D. Use the default deny security policy for the research lab
E. Use a static NAT rule between the internal zones for the research lab
عرض الإجابة
اجابة صحيحة: ACD
السؤال #16
You are designing a new network for your organization with the characteristics shown below. All traffic must pass inspection by a security device. A center-positioned segmentation gateway must provide deep inspection of each packet using 10 Gbps interfaces. Policy enforcement must be centrally managed. Which security model should you choose for your network design?
A. Intrazone Permit
B. trust but verify
C. user-role firewall policies
D. Zero Trust
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: