لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is the behavior of an SRX series device when UDP and TCP is rejected by a security policy actions? (choose two)
A. The reject action drops UDP packets and sends an ICMP message to the source
B. The reject actions drops TCP packets and sends an ICMP message to the source
C. The reject action drops UDP packets and does not send ant message to the source
D. The reject action drops TCP packets and send an RST message to the source
عرض الإجابة
اجابة صحيحة: AD
السؤال #2
Host-inbound-traffic is configured on the DMZ zone and the ge-0/0/9.0 interface attached to that zone. Referring to the exhibit, which to types of management traffic would be performed on the SRX Series device? (Choose two.)
A. HTTPS
B. SSH
C. Finger
D. HTTP
عرض الإجابة
اجابة صحيحة: BD
السؤال #3
Which two statements are true regarding zone-based security policies? (Choose two.)
A. Zone-based policies must reference a source address in the match criteria
B. Zone-based policies must reference a URL category in the match criteria
C. Zone-based policies must reference a destination address in the match criteria
D. Zone-based policies must reference a dynamic application in the match criteria
عرض الإجابة
اجابة صحيحة: AC
السؤال #4
Which two statements about security policy processing on SRX series devices are true? (choose two)
A. Zone-Based security policies are processed before global policies
B. Traffic matching a global policy cannot be processed against a firewall filter
C. Zone-Based security policies are processed after global policies
D. Traffic matching a zone-based policy is not processed against global polices
عرض الإجابة
اجابة صحيحة: AC
السؤال #5
Click the Exhibit button Which two user roles shown in the exhibit are available be defaults? (choose two)
A. Operator
B. Jtac
C. Super-user
D. Admin
عرض الإجابة
اجابة صحيحة: AC
السؤال #6
What does IPsec use to negotiate encryption algorithms?
A. TLS
B. AH
C. ESP
D. IKE
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which two actions are performed on an incoming packet matching an existing session? (Choose two.)
A. Zone processing
B. Security policy evolution
C. Service ALG processing
D. Screens processing
عرض الإجابة
اجابة صحيحة: CD
السؤال #8
What is a characteristic of the Junos enhanced Web filtering solution ?
A. The SRX series device intercepts HTTP and HTTPS request and send the source IP address to the on-premises Websense server
B. The Websense cloud resolves the categorized URLs to IP addresses by performing a DNS reverse loockup
C. The Websense cloud categorize the URLs and also provide site reputation information
D. Junos Enhanced Web filtering allows the SRX series device to categorize URLs using an on- premises websense server
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Your company has been assigned one public IP address. You want to enable internet traffic to reach multiple servers in your DMZ that are configured with private address. In this scenario, which type of NAT would be used to accomplish this tasks?
A. Static NAT
B. Destination NAT
C. Source NAT
D. NAT without PAT
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which Statement is correct about Sky ATP?
A. The local Sky ATP platform downloads the latest threat from managed site
B. Sky ATP can provide live threat feeds to SRX series devices
C. Sky ATP is a local hardware-based security threat analyzer that performs multiple tasks
D. Sky ATP relies on the SRX series device to open and analyze suspect file attachments
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Click the Exhibit button.You have configured source NAT using an address pool as shown in the exhibit. Traffic is reaching the 203.0.113.6 server but return traffic is not being received by the SRX Series device.Which feature must be configured to allow return traffic to be accepted by the SRX Series device?
A. roxy ARP
B. estination NAT
C. ort forwarding
D. everse static NAT
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Which zone is considered a functional zone?
A. Trust
B. Junos host
C. Null
D. Management
عرض الإجابة
اجابة صحيحة: D
السؤال #13
You verify that the SSH service is configured correctly on your SRX Series device, yet administrators attempting to connect through a revenue port are not able to connect. In this scenario, what must be configured to solve this problem?
A. A security policy allowing SSH traffic
B. A host-inbound-traffic setting on the incoming zone
C. An MTU value target than the default value
D. A screen on the internal interface
عرض الإجابة
اجابة صحيحة: B
السؤال #14
What must you do first to use the Monitor/Events workspace in the j-Web interface?
A. You must enable stream mode security logging on the SRX Series device
B. You must enable event mode security logging on the SRX Series device
C. You must enable security logging that uses the SD-Syslog format
D. You must enable security logging that uses the TLS transport mode
عرض الإجابة
اجابة صحيحة: B
السؤال #15
What is the correct order of processing when configuring NAT rules and security policies?
A. Policy lookup > source NAT > static NAT > destination NAT
B. Source NAT > static NAT > destination NAT > policy lookup
C. Static NAT > destination NAT> policy lookup > source NAT
D. Destination NAT > policy lookup > source NAT > static NAT
عرض الإجابة
اجابة صحيحة: C
السؤال #16
You configure and applied several global policies and some of the policies have overlapping match criteria.
A. In this scenario, how are these global policies applies?
B. The first matched policy is the only policy applied
C. The most restrictive that matches is applied
D. The least restrictive policy that matches is applied
عرض الإجابة
اجابة صحيحة: A
السؤال #17
Which actions would be applied for the pre-ID default policy unified policies?
A. Redirect the session
B. Reject the session
C. Log the session
D. Silently drop the session
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Which two statements are correct about functional zones? (Choose two.)
A. A functional zone uses security policies to enforce rules for transit traffic
B. Traffic received on the management interface in the functional zone cannot transit out other interface
C. Functional zones separate groups of users based on their function
D. A function is used for special purpose, such as management interface
عرض الإجابة
اجابة صحيحة: BD
السؤال #19
When configuring IPsec VPNs, setting a hash algorithm solves which security concern?
A. Encryption
B. Integrity
C. Availability
D. Redundancy
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: