لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
BY default, revenue interface are placed into which system-defined security zone on an SRX series device?
A. Trust
B. Null
C. Junos-trust
D. untrust
عرض الإجابة
اجابة صحيحة: AC
السؤال #2
Which security feature is applied to traffic on an SRX Series device when the device is running n packet mode?
A. Sky ATP
B. ALGs
C. Firewall filters
D. Unified policies
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Users in your network are downloading files with file extensions that you consider to be unsafe for your network. You must prevent files with specific file extensions from entering your network. Which UTM feature should be enabled on an SRX Series device to accomplish this task?
A. content filtering
B. antispam
C. Web filtering
D. URL filtering
عرض الإجابة
اجابة صحيحة: BD
السؤال #4
Which two statements are correct about security zones? (Choose two.)
A. Security zones use address books to link usernames to IP addresses
B. Security zones use a stateful firewall to provide secure network connections
C. Security zones use packet filters to prevent communication between management ports
D. Security zones use security policies that enforce rules for the transit traffic
عرض الإجابة
اجابة صحيحة: AB
السؤال #5
Your company uses SRX Series devices to secure the edge of the network. You are asked to protect the company from ransomware attacks. Which solution will satisfy this requirement?
A. screens
B. unified security policies
C. AppSecure
D. Sky ATP
عرض الإجابة
اجابة صحيحة: A
السؤال #6
You configured and applied several global policies and some of the policies have overlapping match criteria. In this scenario, how are these global policies applied?
A. The most restrictive policy that matches is applied
B. The last matched policy is the only policy applied
C. The least restrictive policy that matches is applied
D. The first matched policy is the only policy applied
عرض الإجابة
اجابة صحيحة: B
السؤال #7
You want to configure your SRX Series device so that employees configured with IP addresses on the 172.16.0.0/16 subnet can access the Internet. The device has been allocated a single public IP address. In this scenario, which NAT mode should you enable?
A. static NAT
B. destination NAT
C. source NAT
D. NAT-T
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Click the Exhibit button. Users should not have access to Facebook, however, a recent examination of the security logs show that users are accessing Facebook. Referring to the exhibit, what should you do to solve this problem?
A. Change the source address for the Block-Facebook-Access rule to the prefix of the users
B. Change the Block-Facebook-Access rule from a zone policy to a global policy
C. Move the Block-Facebook-Access rule before the Internet-Access rule
D. Change the Internet-Access rule from a zone policy to a global policy
عرض الإجابة
اجابة صحيحة: AB
السؤال #9
What is the behavior of an SRX Series device when UDP and TCP traffic is rejected by a security policy action? (Choose two.)
A. The reject action drops UDP packets and sends an ICMP message to the source
B. The reject action drops TCP packets and sends an RST message to the source
C. The reject action drops TCP packets and sends an ICMP message to the source
D. The reject action drops UDP packets and does not send any message to the source
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Your company has been assigned one public IP address. You want to enable Internet traffic to reach multiple servers in your DMZ that are configured with private IP addresses. In this scenario, which type of NAT would be used to accomplish this task?
A. source NAT
B. destination NAT
C. NAT without PAT
D. static NAT
عرض الإجابة
اجابة صحيحة: AD
السؤال #11
Click the Exhibit button. Referring to the exhibit, which type of NAT is being performed?
A. source NAT without PAT
B. destination NAT without PAT
C. source NAT with PAT
D. destination NAT with PAT
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Users on the network are restricted from accessing Facebook, however, a recent examination of the logs show that users are accessing Facebook. Referring to the exhibit, Why is this problem happening?
A. Global rules are honored before zone-based rules
B. The internet-Access rule has a higher precedence value
C. The internet-Access rule is listed first
D. Zone-based rules are honored before global rules
عرض الإجابة
اجابة صحيحة: AC
السؤال #13
What is a characteristic of the Junos Enhanced Web filtering solution?
A. Junos Enhanced Web filtering allows the SRX Series device to categorize URLs using an on-premises Websense server
B. The SRX Series device intercepts HTTP and HTTPS requests and sends the source IP address to the on-premises Websense server
C. The Websense Cloud categorizes the URLs and also provides site reputation information
D. The Websense Cloud resolves the categorized URLs to IP addresses by performing a DNS reverse lookup
عرض الإجابة
اجابة صحيحة: B
السؤال #14
You verify that the SSH service is configured correctly on your SRX Series device, yet administrators attempting to connect through a revenue port are not able to connect. In this scenario, what must be configured to solve this problem?
A. a host-inbound-traffic setting on the incoming zone
B. an MTU value larger than the default value
C. a screen on the internal interface
D. a security policy allowing SSH traffic
عرض الإجابة
اجابة صحيحة: D
السؤال #15
Which statement describes stateless firewalls on SRX Series devices?
A. Each packet is analyzed based on source zone
B. Each packet is analyzed based on Application Layer security
C. Each packet is analyzed as part of a session
D. Each packet is analyzed by firewall filters
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Click the Exhibit button. You have configured antispam to allow e-mails from example.com; however, reviewing the logs you see that jcart@example.com is blocked. Referring to the exhibit, what are two ways to solve this problem? (Choose two.)
A. Add jcart@example
B. Verify connectivity with the SBL server
C. Delete jcart@example
D. Delete jcart@example
عرض الإجابة
اجابة صحيحة: A
السؤال #17
Click the Exhibit button. Referring to the exhibit, which type of NAT is performed by the SRX Series device?
A. source NAT with PAT
B. source NAT without PAT
C. destination NAT with PAT
D. destination NAT without PAT
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Click the Exhibit button. Which two user roles shown in the exhibit are available by default? (Choose two.)
A. super-user
B. operator
C. jtac
D. admin
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Which two actions are performed on an incoming packet matching an existing session? (Choose two.)
A. security policy evaluation
B. service ALG processing
C. screens processing
D. zones processing
عرض الإجابة
اجابة صحيحة: C
السؤال #20
You have created a zone-based security policy that permits traffic to a specific webserver for the marketing team. Other groups in the company are not permitted to access the webserver. When marketing users attempt to access the server they are unable to do so. What are two reasons for this access failure? (Choose two.)
A. You failed to position the policy before the policy that denies access to the webserver
B. You failed to position the policy after the policy that denies access to the webserver
C. You failed to commit the policy change
D. You failed to change the source zone to include any source zone
عرض الإجابة
اجابة صحيحة: C
السؤال #21
Which two statements are correct about functional zones? (Choose two.)
A. A functional zone uses security policies to enforce rules for transit traffic
B. Traffic received on the management interface in the functional zone cannot transit out other interface
C. Functional zones separate groups of users based on their function
D. A function is used for special purpose, such as management interface
عرض الإجابة
اجابة صحيحة: D
السؤال #22
You are designing a new security policy on an SRX Series device. You must block an application silently and log all occurrences of the application access attempts. In this scenario, which two actions must be enabled in the security policy? (Choose two.)
A. Log the session initiations
B. Enable a reject action
C. Log the session closures
D. Enable a deny action
عرض الإجابة
اجابة صحيحة: AB
السؤال #23
Click the Exhibit button. You have configured source NAT using an address pool as shown in the exhibit. Traffic is reaching the 203.0.113.6 server but return traffic is not being received by the SRX Series device. Which feature must be configured to allow return traffic to be accepted by the SRX Series device?
A. proxy ARP
B. destination NAT
C. port forwarding
D. reverse static NAT
عرض الإجابة
اجابة صحيحة: C
السؤال #24
Click the Exhibit button. You are configuring an IPsec VPN for the network shown in the exhibit. Which feature must be enabled for the VPN to establish successfully?
A. Main mode must be configured on the IKE gateway
B. Main mode must be configured on the IPsec VPN
C. Aggressive mode must be configured on the IPsec VPN
D. Aggressive mode must be configured on the IKE gateway
عرض الإجابة
اجابة صحيحة: A
السؤال #25
Which two notifications are available when the antivirus engine detects and infected file? (Choose two.)
A. e-mail notifications
B. SNMP notifications
C. SMS notifications
D. Protocol-only notification
عرض الإجابة
اجابة صحيحة: BD
السؤال #26
Which two private cloud solution support vSRX devices? (Choose two.)
A. Microsoft Azure
B. Amazon Web Services (AWS)
C. VMware Web Services (AWS)
D. VMware NSX
E. Contrail Cloud
عرض الإجابة
اجابة صحيحة: D
السؤال #27
Click the Exhibit button. Users on the network are restricted from accessing Facebook, however, a recent examination of the logs show that users are accessing Facebook. Referring to the exhibit, why is this problem happening?
A. The Internet-Access rule is listed first
B. Zone-based rules are honored before global rules
C. Global rules are honored before zone-based rules
D. The Internet-Access rule has a higher precedence value
عرض الإجابة
اجابة صحيحة: D
السؤال #28
Which two statements are true about UTM on an SRX340? (Choose two.)
A. A default UTM policy is created
B. No default profile is created
C. No default UTM policy is created
D. A default UTM profile is created
عرض الإجابة
اجابة صحيحة: A
السؤال #29
Which statement is correct about Junos security zones?
A. User-defined security zones must contain at least one interface
B. Logical interfaces are added to user-defined security zones
C. Security policies are referenced within a user-defined security zone
D. User-defined security zones must contain the key word “zone”
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: