You are required to design a university network to meet the conditions shown below.
✑ Users connected to the university network should be able to access the Internet and the research department lab network.
✑ The research department lab network should not be able to reach the Internet.
Which three actions satisfy the design requirements? (Choose three.)
Answer : ACD
Click the Exhibit button.
Answer : BC
Which two protocols are supported natively by the Junos automation stack? (Choose two.)
Answer : AB
Which solution centralizes the management of security devices in your data center?
Answer : C
Which solution provides a certificate based on user identity for network access?
Answer : A
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-user-auth-control-network-access.html
You are concerned about users downloading malicious attachments at work while using encrypted Web mail. You want to block these malicious files using your
SRX Series device.
In this scenario, which two features should you use? (Choose two.)
Answer : BC
You are designing an enterprise WAN network that must connect multiple sites. You must provide a design proposal for the security elements needed to encrypt traffic between the remote sites.
Which feature will secure the traffic?
Answer : D
You must design a small branch office firewall solution that provides application usage statistics.
In this scenario, which feature would accomplish this task?
Answer : B
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-tracking.html
You are designing a corporate WAN using SRX Series devices as a combined firewall and router at each site.
Regarding packet-mode and flow-mode operations in this scenario, which statement is true?
Answer : D
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-srx-devices-processing-overview.xml.html
You are asked to include anti-malware features into an existing network design. Traffic from the infected machines must be moved to a quarantined VLAN.
Which product will provide this segregation?
Answer : B
Reference:
https://www.juniper.net/documentation/en_US/release-independent/sky-atp/information-products/pathway-pages/sky-atp-admin-guide.pdf
Policy Enforcer provides which benefit?
Answer : C
Which statement about IPsec tunnels is true?
Answer : C
You work for an ISP that wants to implement remote-triggered black hole (RTBH) filters.
What are three considerations in this scenario? (Choose three.)
Answer : ABC
You are designing a DDoS solution for an ISP using BGP FlowSpec. You want to ensure that BGP FlowSpec does not overwhelm the ISPג€™s edge routers.
Which two requirements should be included in your design? (Choose two.)
Answer : CD
Reference:
https://www.juniper.net/documentation/en_US/day-one-books/DO_BGP_FLowspec.pdf
You are designing an SDSN security solution for a new campus network. The network will consist of Juniper Networks Policy Enforcer, Juniper Networks switches, third-party switches, and SRX Series devices. The switches and the SRX Series devices will be used as security enforcement points. The design must be able to change the VLAN mapping of the switch port of a user that is already authenticated to the network in the event that the end user device becomes compromised.
Which component satisfies this requirement?
Answer : C
Have any questions or issues ? Please dont hesitate to contact us