Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

JN0-334 Questions and Answers

Note! Following JN0-334 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is JN0-335

JN0-334 Questions and Answers

Question # 6

Click the Exhibit button.

You have configured the scheduler shown in the exhibit to prevent users from accessing certain websites from 1:00 PM to 3:00 PM Monday through Friday. This policy will remain in place until further notice. When testing the policy, you determine that the websites are still accessible during the restricted times.

In this scenario, which two actions should you perform to solve the problem? (Choose two.)

A.

Add the saturday exclude parameter and the sunday exclude parameter to ensure weekends are

excluded from the schedule.

B.

Use the 13:00 parameter and the 15:00 parameter when specifying the time.

C.

Use the start-date parameter to specify the date for each Monday and use the stop-date parameter to specify the date for each Friday.

D.

Use the PM parameter when specifying the time in the schedule.

Full Access
Question # 7

What are two elements of a custom IDP/IPS attack object? (Choose two.)

A.

the attack signature

B.

the severity of the attack

C.

the destination zone

D.

the exempt rulebase

Full Access
Question # 8

Which two statements describe superflows in Juniper Secure Analytics? (Choose two.)

A.

JSA only supports Type A and Type C superflows.

B.

Superflows can negatively impact licensing limitations.

C.

Disk space usage is reduced on the JSA device.

D.

Superflows combine many flows into a single flow.

Full Access
Question # 9

Which solution should you use if you want to detect known attacks using signature-based methods?

A.

SSL proxy

B.

JIMS

C.

IPS

D.

ALGs

Full Access
Question # 10

You are asked to convert two standalone SRX Series devices to a chassis cluster deployment. You must ensure that your IPsec tunnels will be compatibla with the new deployment.

In this scenario, which two interfaces should be used when binding your tunnel endpoints? (Choose two.)

A.

pp0

B.

reth

C.

lo0

D.

ge

Full Access
Question # 11

You must fine tune an IPS security policy to eliminate false positives. You want to create exemptions to the normal traffic examination for specific traffic.

Which two parameters are required to accomplish this task? (Choose two.)

A.

source IP address

B.

destination IP address

C.

destination port

D.

source port

Full Access
Question # 12

Click the Exhibit button.

Which two statements are true about the configuration shown in the exhibit? (Choose two.)

A.

The session is removed from the session table after 10 seconds of inactivity.

B.

The session is removed from the session table after 10 milliseconds of inactivity.

C.

Aggressive aging is triggered if the session table reaches 95% capacity.

D.

Aggressive aging is triggered if the session table reaches 80% capacity.

Full Access
Question # 13

What information does JIMS collect from domain event log sources? (Choose two.)

A.

For user login events, JIMS collects the username and group membership information.

B.

For device login events. JIMS collects the devide IP address and operating system version.

C.

For device login events, JIMS collects the device IP address and machine name information.

D.

For user login events, JIMS collects the login source IP address and username information.

Full Access