Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

JN0-232 Questions and Answers

Question # 6

Click the Exhibit button.

Referring to the exhibit, which two statements are correct? (Choose two.)

A.

This security policy uses a non-default inactivity timeout.

B.

This security policy is the second security policy in the list.

C.

This security policy permits HTTPS traffic.

D.

This security policy is a zone-based security policy.

Full Access
Question # 7

You want to show the effectiveness of your SRX Series Firewall content filter.

Which operational mode command would you use in this scenario?

A.

show security utm anti-spam status

B.

show security utm anti-virus status

C.

show security web filtering status

D.

show security utm content-filtering statistics

Full Access
Question # 8

You want to enable NextGen Web Filtering in SRX Series devices.

In this scenario, which two actions will accomplish this task? (Choose two.)

A.

Generate a CA-signed certificate.

B.

Generate a self-signed certificate.

C.

Configure an SSL initiation profile.

D.

Configure an SSL proxy profile.

Full Access
Question # 9

Which UI enables you to manage, monitor, and maintain multiple firewalls using a single interface?

A.

Juniper Secure Analytics

B.

Security Director

C.

Juniper Identity Management Service

D.

Secure Connect

Full Access
Question # 10

Which two statements describe what Port Address Translation (PAT) does? (Choose two.)

A.

It maps an external IP address to an internal IP address.

B.

It enables multiple external clients to initiate a connection with multiple internal devices.

C.

It enables multiple internal devices to share a single external IP address.

D.

It maps an internal IP address to an external IP address and port number.

Full Access
Question # 11

You are asked to enable trace options to debug the packet flow.

In this scenario, which flag would you configure at the [edit security flow traceoptions] hierarchy?

A.

packet-dump

B.

general

C.

state

D.

basic-datapath

Full Access
Question # 12

When a new traffic flow enters an SRX Series device, in which order are these processes performed?

A.

screens → security policies → zones → routes

B.

screens → routes → zones → security policies

C.

routes → zones → screens → security policies

D.

screens → zones → security policies → routes

Full Access
Question # 13

Which two statements are correct about unified security policies on SRX Series Firewalls? (Choose two.)

A.

Unified security policies match applications before processing policy statements.

B.

Unified security policies can be zone-based or global.

C.

Unified security policies use the application identification (AppID) engine.

D.

Unified security policies with multiple matches use the most restrictive match.

Full Access
Question # 14

You want to verify the effectiveness of Web filtering on the SRX Series Firewall.

How would you accomplish this task?

A.

by installing a local NGWF server

B.

by checking the file extensions of blocked content

C.

by examining the content filtering policies

D.

by attempting to access permitted or blocked URLs

Full Access
Question # 15

Which two statements about the host-inbound-traffic parameter in a zone configuration are correct? (Choose two.)

A.

Deleting the host-inbound-traffic parameter blocks console access to the firewall.

B.

Deleting the host-inbound-traffic parameter blocks SSH access to the firewall.

C.

The host-inbound-traffic parameter is implicitly configured in the management zone.

D.

The host-inbound-traffic parameter is explicitly configured in a security zone.

Full Access
Question # 16

What is transit traffic in the Junos OS?

A.

It is traffic that is processed solely through the forwarding plane.

B.

It is traffic that is rate-limited to prevent denial-of-service attacks.

C.

It is traffic that is processed by the control plane.

D.

It is traffic that requires special handling by the Routing Engine.

Full Access
Question # 17

When does screening occur in the flow module?

A.

before session lookup

B.

during policy lookup

C.

during route lookup

D.

after session lookup

Full Access
Question # 18

You are troubleshooting first path traffic not passing through an SRX Series Firewall. You have determined that the traffic is ingressing and egressing the correct interfaces using a route lookup.

In this scenario, what is the next step in troubleshooting why the device may be dropping the traffic?

A.

Verify that the interfaces are in the correct security zones.

B.

Verify the routing protocol being used.

C.

Verify that source NAT is occurring.

D.

Verify that the correct ALG is being used.

Full Access
Question # 19

You are asked to create a security policy that controls traffic allowed to pass between the Internet and private security zones. You must ensure that this policy is evaluated before all other policy types on your SRX Series device.

In this scenario, which type of security policy should you create?

A.

routing policy

B.

default policy

C.

zone policy

D.

global policy

Full Access