최신 JN0-231 무료덤프 - Juniper Security, Associate (JNCIA-SEC)
Your company is adding IP cameras to your facility to increase physical security. You are asked to help protect these loT devices from becoming zombies in a DDoS attack.
Which Juniper ATP feature should you configure to accomplish this task?
Which Juniper ATP feature should you configure to accomplish this task?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
You want to implement user-based enforcement of security policies without the requirement of certificates and supplicant software.
Which security feature should you implement in this scenario?
Which security feature should you implement in this scenario?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which two traffic types are considered exception traffic and require some form of special handling by the PFE? (Choose two.)
정답: A,C
Which two statements are correct about global policies? (Choose two.)
정답: C,D
설명: (DumpTOP 회원만 볼 수 있음)
Which statement is correct about packet mode processing?
정답: A
Click the Exhibit button.

What is the purpose of the host-inbound-traffic configuration shown in the exhibit?

What is the purpose of the host-inbound-traffic configuration shown in the exhibit?
정답: B
You have configured a UTM feature profile.
Which two additional configuration steps are required for your UTM feature profile to take effect? (Choose two.)
Which two additional configuration steps are required for your UTM feature profile to take effect? (Choose two.)
정답: B,D
설명: (DumpTOP 회원만 볼 수 있음)
Click the Exhibit button.

Referring to the exhibit, a user is placed in which hierarchy when the exit command is run?
A)
[edit security policies from-zone trust to-zone dmz]
user@vSRX-1#
B)
[edit]
user@vSRX-1#
C)
[edit security policies]
user@vSRX-1#
D)
user@vSRX-1>

Referring to the exhibit, a user is placed in which hierarchy when the exit command is run?
A)
[edit security policies from-zone trust to-zone dmz]
user@vSRX-1#
B)
[edit]
user@vSRX-1#
C)
[edit security policies]
user@vSRX-1#
D)
user@vSRX-1>
정답: D
Which two statements are correct about IKE security associations? (Choose two.)
정답: B,C
You want to block executable files ("exe) from being downloaded onto your network.
Which UTM feature would you use in this scenario?
Which UTM feature would you use in this scenario?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)