Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

JN0-636 Questions and Answers

Question # 6

Which two log format types are supported by the JATP appliance? (Choose two.)

A.

YAML

B.

XML

C.

CSV

D.

YANG

Full Access
Question # 7

You are asked to detect domain generation algorithms

Which two steps will accomplish this goal on an SRX Series firewall? (Choose two.)

A.

Define an advanced-anti-malware policy under [edit services].

B.

Attach the security-metadata-streaming policy to a security

C.

Define a security-metadata-streaming policy under [edit

D.

Attach the advanced-anti-malware policy to a security policy.

Full Access
Question # 8

Exhibit

You are validating bidirectional traffic flows through your IPsec tunnel. The 4546 session represents traffic being sourced from the remote end of the IPsec tunnel. The 4547 session represents traffic that is sourced from the local network destined to the remote network.

Which statement is correct regarding the output shown in the exhibit?

A.

The remote gateway address for the IPsec tunnel is 10.20.20.2

B.

The session information indicates that the IPsec tunnel has not been established

C.

The local gateway address for the IPsec tunnel is 10.20.20.2

D.

NAT is being used to change the source address of outgoing packets

Full Access
Question # 9

you must create a secure fabric in your company’s network

In this Scenario, Which three statements are correct? (Choose Three)

A.

MX Series device associated with tenants can belong to only one site

B.

A switch must be assigned to the site to enforce an infected host policy within the network

C.

SRX Series devices can belong to multiple sites

D.

SRX Series devices can belong to only one site

E.

Switches and connectors cannot be added to the same site

Full Access
Question # 10

You configured a chassis cluster for high availability on an SRX Series device and enrolled this HA cluster with the Juniper ATP Cloud. Which two statements are correct in this scenario? (Choose two.)

A.

You must use different license keys on both cluster nodes.

B.

When enrolling your devices, you only need to enroll one node.

C.

You must set up your HA cluster after enrolling your devices with Juniper ATP Cloud

D.

You must use the same license key on both cluster nodes.

Full Access
Question # 11

Your Source NAT implementation uses an address pool that contains multiple IPv4 addresses Your users report that when they establish more than one session with an external application, they are prompted to authenticate multiple times External hosts must not be able to establish sessions with internal network hosts

What will solve this problem?

A.

Disable PAT.

B.

Enable destination NAT.

C.

Enable persistent NAT

D.

Enable address persistence.

Full Access
Question # 12

Exhibit

You are asked to establish an IBGP peering between the SRX Series device and the router, but the session is not being established. In the security flow trace on the SRX device, packet drops are observed as shown in the exhibit.

What is the correct action to solve the problem on the SRX device?

A.

Create a firewall filter to accept the BGP traffic

B.

Configure destination NAT for BGP traffic.

C.

Add BGP to the Allowed host-inbound-traffic for the interface

D.

Modify the security policy to allow the BGP traffic.

Full Access
Question # 13

Exhibit

Referring to the exhibit, which two statements are true about the CAK status for the CAK named "FFFP"? (Choose two.)

A.

CAK is not used for encryption and decryption of the MACsec session.

B.

SAK is successfully generated using this key.

C.

CAK is used for encryption and decryption of the MACsec session.

D.

SAK is not generated using this key.

Full Access
Question # 14

In Juniper ATP Cloud, what are two different actions available in a threat prevention policy to deal with an infected host? (Choose two.)

A.

Send a custom message

B.

Close the connection.

C.

Drop the connection silently.

D.

Quarantine the host.

Full Access
Question # 15

You issue the command shown in the exhibit.

Which policy will be active for the identified traffic?

A.

Policy p4

B.

Policy p7

C.

Policy p1

D.

Policy p12

Full Access
Question # 16

Which method does an SRX Series device in transparent mode use to learn about unknown devices in a network?

A.

LLDP-MED

B.

IGMP snooping

C.

RSTP

D.

packet flooding

Full Access
Question # 17

Exhibit

Which two statements are correct about the output shown in the exhibit? (Choose two.)

A.

The packet is silently discarded.

B.

The packet is part of an existing session.

C.

The packet is part of a new session.

D.

The packet is explicitly rejected.

Full Access
Question # 18

You opened a support ticket with JTAC for your Juniper ATP appliance. JTAC asks you to set up access to the device

using the reverse SSH connection.Which three setting must be configured to satisfy this request? (Choose three.)

A.

Enable JTAC remote access

B.

Create a temporary root account.

C.

Enable a JATP support account.

D.

Create a temporary admin account.

E.

Enable remote support.

Full Access
Question # 19

You want to configure a threat prevention policy.

Which three profiles are configurable in this scenario? (Choose three.)

A.

device profile

B.

SSL proxy profile

C.

infected host profile

D.

C&C profile

E.

malware profile

Full Access
Question # 20

You have a webserver and a DNS server residing in the same internal DMZ subnet. The public Static NAT addresses for

the servers are in the same subnet as the SRX Series devices internet-facing interface. You implement DNS doctoring to

ensure remote users can access the webserver.Which two statements are true in this scenario? (Choose two.)

A.

The DNS doctoring ALG is not enabled by default.

B.

The Proxy ARP feature must be configured.

C.

The DNS doctoring ALG is enabled by default.

D.

The DNS CNAME record is translated.

Full Access
Question # 21

Exhibit

Which two statements are correct about the output shown in the exhibit? (Choose two.)

A.

The packet is processed as host inbound traffic.

B.

The packet matches the default security policy.

C.

The packet matches a configured security policy.

D.

The packet is processed in the first path packet flow.

Full Access
Question # 22

Exhibit.

Referring to the exhibit, which two statements are true? (Choose two.)

A.

The c-1 TSYS has a reservation for the security flow resource.

B.

The c-1 TSYS can use security flow resources up to the system maximum.

C.

The c-1 TSYS cannot use any security flow resources.

D.

The c-1 TSYS has no reservation for the security flow resource.

Full Access
Question # 23

Exhibit

You have recently configured Adaptive Threat Profiling and notice 20 IP address entries in the monitoring section of the Juniper ATP Cloud portal that do not match the number of entries locally on the SRX Series device, as shown in the exhibit.

What is the correct action to solve this problem on the SRX device?

A.

You must configure the DAE in a security policy on the SRX device.

B.

Refresh the feed in ATP Cloud.

C.

Force a manual download of the Proxy__Nodes feed.

D.

Flush the DNS cache on the SRX device.

Full Access
Question # 24

Which three type of peer devices are supported for Cos-Based IPsec VPN?

A.

High-end SRX Series device

B.

cSRX

C.

vSRX

D.

Branch-end SRX Series devics

Full Access
Question # 25

You are configuring transparent mode on an SRX Series device. You must permit IP-based traffic only, and BPDUs must be restricted to the VLANs from which they originate.

Which configuration accomplishes these objectives?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 26

According to the log shown in the exhibit, you notice the IPsec session is not establishing.

What is the reason for this behavior?

A.

Mismatched proxy ID

B.

Mismatched peer ID

C.

Mismatched preshared key

D.

Incorrect peer address.

Full Access
Question # 27

A company wants to par??on their physical SRX series firewall into multiple logical units and assign

each unit (tenant) to a department within the organization. You are the primary administrator of firewall

and a colleague is the administrator for one of the departments.

Which two statements are correct about your colleague? (Choose two)

A.

The colleague can configure the resources allocated and routing protocols

B.

The colleague can access and view the resources of the tenant system.

C.

The colleague can create and assign logical interfaces to the tenant system

D.

The colleague can modify the number of allocated resources for the tenant system

Full Access
Question # 28

You must setup a Ddos solution for your ISP. The solution must be agile and not block legitimate traffic.

Which two products will accomplish this task? (Choose two.)

A.

Contrail Insights

B.

MX Series device

C.

Corero Smartwall TDD

D.

SRX Series device

Full Access
Question # 29

What is the purpose of the Switch Microservice of Policy Enforcer?

A.

to isolate infected hosts

B.

to enroll SRX Series devices with Juniper ATP Cloud

C.

to inspect traffic for malware

D.

to synchronize security policies to SRX Series devices

Full Access
Question # 30

Exhibit

You are not able to ping the default gateway of 192.168 100 1 (or your network that is located on your SRX Series firewall.

Referring to the exhibit, which two commands would correct the configuration of your SRX Series device? (Choose two.)

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 31

You want to enroll an SRX Series device with Juniper ATP Appliance. There is a firewall device in the path between the devices. In this scenario, which port should be opened in the firewall device?

A.

8080

B.

443

C.

80

D.

22

Full Access
Question # 32

You want to enable inter-tenant communica?on with tenant system.

In this Scenario, Which two solutions will accomplish this task?

A.

interconnect EVPN switch

B.

interconnect VPLS switch

C.

external router

D.

logical tunnel interface

Full Access
Question # 33

You are asked to configure a security policy on the SRX Series device. After committing the policy, you receive the “Policy is out of sync between RE and PFE .” error.

Which command would be used to solve the problem?

A.

request security polices resync

B.

request service-deployment

C.

request security polices check

D.

restart security-intelligence

Full Access
Question # 34

You are not able to activate the SSH honeypot on the all-in-one Juniper ATP appliance.

What would be a cause of this problem?

A.

The collector must have a minimum of two interfaces.

B.

The collector must have a minimum of three interfaces.

C.

The collector must have a minimum of five interfaces.

D.

The collector must have a minimum of four interfaces.

Full Access