Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

JN0-637 Questions and Answers

Question # 6

Exhibit:

In which mode is the SRX Series device?

A.

Packet

B.

Ethernet switching

C.

Mixed

D.

Transparent

Full Access
Question # 7

Click the Exhibit button.

You have configured a CoS-based VPN that is not functioning correctly.

Referring to the exhibit, which action will solve the problem?

A.

You must change the loss priorities of the forwarding classes to low.

B.

You must change the code point for the DB-data forwarding class to 10000.

C.

You must use inet precedence instead of DSCP.

D.

You must delete one forwarding class.

Full Access
Question # 8

The SRX series device is performing static NAT. you want to ensure that host A can reach the

internal webserver www.juniper.net using domain name.

Referring to the exhibit, which two Junos features are required to accomplish this task? (Choose two.)

A.

DNS doctoring

B.

proxy ARP

C.

persistent NAT

D.

STUN

Full Access
Question # 9

You want to bypass IDP for traffic destined to social media sites using APBR, but it is not working and IDP is dropping the session.

What are two reasons for this problem? (Choose two.)

A.

The session did not properly reclassify midstream to the correct APBR rule.

B.

IDP disable is not configured on the APBR rule.

C.

The application services bypass is not configured on the APBR rule.

D.

The APBR rule does a match on the first packet.

Full Access
Question # 10

Your IPsec tunnel is configured with multiple security associations (SAs). Your SRX Series device supports the CoS-based IPsec VPNs with multiple IPsec SAs feature. You are asked to configure CoS for this tunnel.

Which two statements are true in this scenario? (Choose two.)

A.

The local and remote gateways do not need the forwarding classes to be defined in the same order.

B.

A maximum of four forwarding classes can be configured for a VPN with the multi-sa forwarding-classes statement.

C.

The local and remote gateways must have the forwarding classes defined in the same order.

D.

A maximum of eight forwarding classes can be configured for a VPN with the multi-sa forwarding-classes statement.

Full Access
Question # 11

You are asked to configure tenant systems.

Which two statements are true in this scenario? (Choose two.)

A.

A tenant system can have only one administrator.

B.

After successful configuration, the changes are merged into the primary database for each tenant system.

C.

Tenant systems have their own configuration database.

D.

You can commit multiple tenant systems at a time.

Full Access
Question # 12

How does an SRX Series device examine exception traffic?

A.

The device examines the host-inbound traffic for the ingress interface and zone.

B.

The device examines the host-outbound traffic for the ingress interface and zone.

C.

The device examines the host-inbound traffic for the egress interface and zone.

D.

The device examines the host-outbound traffic for the egress interface and zone.

Full Access
Question # 13

Which two statements are correct about the ICL in an active/active mode multinode HA environment? (Choose two.)

A.

The ICL is strictly a Layer 2 interface.

B.

The ICL uses a separate routing instance to communicate with remote multinode HA peers.

C.

The ICL traffic can be encrypted.

D.

The ICL is the local device management interface in a multinode HA environment.

Full Access
Question # 14

You Implement persistent NAT to allow any device on the external side of the firewall to

initiate traffic.

Referring to the exhibit, which statement is correct?

A.

The target-host parameter should be used instead of the any-remote-host parameter.

B.

The port-overloading parameter needs to be turned off in the NAT source interface configuration

C.

The target-host-port parameter should be used instead of the any-remote-host parameter

D.

The any-remote-host parameter does not support interface-based NAT and needs an IP pod to work.

Full Access
Question # 15

You are using ADVPN to deploy a hub-and-spoke VPN to connect your enterprise sites.

Which two statements are true in this scenario? (Choose two.)

A.

ADVPN creates a full-mesh topology.

B.

IBGP routing is required.

C.

OSPF routing is required.

D.

Certificate-based authentication is required.

Full Access
Question # 16

Exhibit:

Referring to the exhibit, which technology would you use to provide communication between

IPv4 host1 and ipv4 internal host

A.

DS-Lite

B.

NAT444

C.

NAT46

D.

full cone NAT

Full Access
Question # 17

Which two statements are true about the procedures the Junos security device uses when handling traffic destined for the device itself? (Choose two.)

A.

If the received packet is addressed to the ingress interface, then the device first performs a security policy evaluation for the junos-host zone.

B.

If the received packet is destined for an interface other than the ingress interface, then the device performs a security policy evaluation for the junos-host zone.

C.

If the received packet is addressed to the ingress interface, then the device first examines the host-inbound-traffic configuration for the ingress interface and zone.

D.

If the received packet is destined for an interface other than the ingress interface, then the device performs a security policy evaluation based on the ingress and egress zone.

Full Access
Question # 18

You have deployed automated threat mitigation using Security Director with Policy Enforcer, Juniper ATP Cloud, SRX Series devices, Forescout, and third-party switches.

In this scenario, which device is responsible for communicating directly to the third-party switches when infected hosts need to be blocked?

A.

Forescout

B.

Policy Enforcer

C.

Juniper ATP Cloud

D.

SRX Series device

Full Access
Question # 19

You want to bypass IDP for traffic destined to social media sites using APBR, but it is not working and IDP is dropping the session.

What are two reasons for this problem? (Choose two.)

A.

IDP disable is not configured on the APBR rule.

B.

The application services bypass is not configured on the APBR rule.

C.

The APBR rule does a match on the first packet.

D.

The session did not properly reclassify midstream to the correct APBR rule.

Full Access
Question # 20

You are configuring an interconnect logical system that is configured as a VPLS switch to allow two logical systems to communicate.

Which two parameters are required when configuring the logical tunnel interfaces? (Choose two.)

A.

Encapsulation ethernet must be used.

B.

The virtual tunnel interfaces should only be configured with two logical unit pairs per logical system interconnect.

C.

The logical tunnel interfaces should be configured with two logical unit pairs per logical system interconnect.

D.

Encapsulation ethernet-vpls must be used.

Full Access
Question # 21

Which two statements are true regarding NAT64? (Choose two.)

A.

An SRX Series device should be in flow-based forwarding mode for IPv4.

B.

An SRX Series device should be in packet-based forwarding mode for IPv4.

C.

An SRX Series device should be in packet-based forwarding mode for IPv6.

D.

An SRX Series device should be in flow-based forwarding mode for IPv6.

Full Access
Question # 22

Which two statements about transparent mode and Ethernet switching mode on an SRX series

device are correct.

A.

In Ethernet switching mode, Layer 2 interfaces must be placed in a security zone.

B.

In Ethernet switching mode, IRB interfaces must be placed in a security zone.

C.

In transparent mode, Layer 2 interfaces must be placed in a security zone.

D.

In transparent mode, IRB interfaces must be placed in a security zone.

Full Access
Question # 23

Which two statements are correct about mixed mode? (Choose two.)

A.

Layer 2 and Layer 3 interfaces can use the same security zone.

B.

IRB interfaces can be used to route traffic.

C.

Layer 2 and Layer 3 interfaces can use separate security zones.

D.

IRB interfaces cannot be used to route traffic.

Full Access
Question # 24

You are configuring advanced policy-based routing. You have created a static route with next

hop of an interface in your inet.0 routing table

Referring to the exhibit, what should be changed to solve this issue?

A.

You should change the routing instance type to virtual-router.

B.

You should move the static route configuration to the main routing instance.

C.

You should move the inet. o table before the routing instance table in your rib-groups configuration.

D.

You should delete the interface-routes configuration under the routing-options hierarchy.

Full Access
Question # 25

Exhibit:

You have deployed an SRX Series device as shown in the exhibit. The devices in the Local zone have recently been added, but their SRX interfaces have not been configured. You must configure the SRX to meet the following requirements:

    Devices in the 10.1.1.0/24 network can communicate with other devices in the same network but not with other networks or the SRX.

    You must be able to apply security policies to traffic flows between devices in the Local zone.

Which three configuration elements will be required as part of your configuration? (Choose three.)

A.

set security zones security-zone Local interfaces ge-0/0/1.0

B.

set interfaces ge-0/0/1 unit 0 family ethernet-switching vlan-members 10

C.

set protocols l2-learning global-mode switching

D.

set protocols l2-learning global-mode transparent-bridge

E.

set security zones security-zone Local interfaces irb.10

Full Access
Question # 26

You want to create a connection for communication between tenant systems without using physical revenue ports on the SRX Series device.

What are two ways to accomplish this task? (Choose two.)

A.

Use an external router.

B.

Use an interconnect VPLS switch.

C.

Use a secure wire.

D.

Use a point-to-point logical tunnel.

Full Access
Question # 27

You are asked to create multiple virtual routers using a single SRX Series device. You must ensure that each virtual router maintains a unique copy of the routing protocol daemon (RPD) process.

Which solution will accomplish this task?

A.

Secure wire

B.

Tenant system

C.

Transparent mode

D.

Logical system

Full Access
Question # 28

You are asked to establish a hub-and-spoke IPsec VPN using an SRX Series device as the hub. All of the spoke devices are third-party devices.

Which statement is correct in this scenario?

A.

You must ensure that you are using aggressive mode when incorporating third-party devices as your spokes.

B.

You must statically configure the next-hop tunnel binding table entries for each of the third-party spoke devices.

C.

You must create a policy-based VPN on the hub device when peering with third-party devices.

D.

You must always peer using loopback addresses when using non-Junos devices as your spokes.

Full Access
Question # 29

You have cloud deployments in Azure, AWS, and your private cloud. You have deployed

multicloud using security director with policy enforcer to. Which three statements are true in this scenario? (Choose three.)

A.

You can run Juniper ATP scans only on traffic from your private cloud.

B.

You can run Juniper ATP scans for all three domains.

C.

You must secure the policies individually by domain.

D.

The Policy Enforcer is able to flag infected hosts in all three domains.

E.

You can simultaneously manage the security policies in all three domains.

Full Access
Question # 30

Exhibit:

Host A shown in the exhibit is attempting to reach the Web1 webserver, but the connection is failing. Troubleshooting reveals that when Host A attempts to resolve the domain name of the server (web.acme.com), the request is resolved to the private address of the server rather than its public IP.

Which feature would you configure on the SRX Series device to solve this issue?

A.

Persistent NAT

B.

Double NAT

C.

DNS doctoring

D.

STUN protocol

Full Access
Question # 31

Exhibit:

Referring to the flow logs exhibit, which two statements are correct? (Choose two.)

A.

The packet is dropped by the default security policy.

B.

The packet is dropped by a configured security policy.

C.

The data shown requires a traceoptions flag of host-traffic.

D.

The data shown requires a traceoptions flag of basic-datapath.

Full Access
Question # 32

Which two statements are true when setting up an SRX Series device to operate in mixed mode? (Choose two.)

A.

A physical interface can be configured to be both a Layer 2 and a Layer 3 interface at the same time.

B.

User logical systems support Layer 2 traffic processing.

C.

The SRX must be rebooted after configuring at least one Layer 3 and one Layer 2 interface.

D.

Packets from Layer 2 interfaces are switched within the same bridge domain.

Full Access
Question # 33

You have deployed two SRX Series devices in an active/passive multimode HA scenario.

In this scenario, which two statements are correct? (Choose two.)

A.

Services redundancy group 1 (SRG1) is used for services that do not have a control plane state.

B.

Services redundancy group 0 (SRG0) is used for services that have a control plane state.

C.

Services redundancy group 0 (SRG0) is used for services that do not have a control plane state.

D.

Services redundancy group 1 (SRG1) is used for services that have a control plane state.

Full Access
Question # 34

In a multinode HA environment, which service must be configured to synchronize between nodes?

A.

Advanced policy-based routing

B.

PKI certificates

C.

IPsec VPN

D.

IDP

Full Access