JN0-635 Jncip Sec
JN0-635 Jncip Sec
JNCIP SEC
Q1. How does secure wire mode differ from transparent mode?
In secure wire mode security policy cannot be used to secure intra vlan traffic
In secure wire mode no switching lookup takes place to forward traffic
In secure wire mode Traffic can be modified using source nat
In secure wire mode IRB interfaces can be configured to route inter vlan traffic
Ans: B
Q2. You are trying to get a SSH honeypot setup on a Juniper ATP appliance collector. The collector is running with hardware
with two physical interfaces and two physical CPU cores. The honeypot feature is not working
Ans: C
Q3. A user is unable to reach a necessary resource. You discover the path through the srx series device includes several
security features. The traffic is not being evaluated by any security policy
In this scenario, which two components within the flow module would affect the traffic? (Choose two.)
Services ALG
Source Nat.
Destination Nat
Route lookup
Ans: C,D
Ans: C
Q5. Your SRX series device does not see the SYN packet
The device will forward the subsequent packets and the session will not be established
The device will Drop the subsequent packets and the session will be established
The device will forward the subsequent packets and the session will be established
The device will Drop the subsequent packets and the session will not be established
Ans: D
Q6. You have set up security director with policy enforcer and have configured 12 third-party feeds and sky atp feed. You are
also injecting 16 feeds using the available open api. You want to add another compatible feed using open api, but policy
enforcer is not receiving the new feed
You cannot add more than 16 feeds though the available open api
You must wait 48 hours for the feed to update
You have reached the maximum limit of 29 total feeds
You cannot add more than 16 feeds with the available open api
Ans: C
Q7. An administrator want to implement persistent NAT for an internal resource so that external hosts are able to initiate
communications to the resource, with the internal resource having previously sent packets to the external host
Ans: D
Which two statement are true shown in the exhibit? Choose two
Ans: A,C
Q9 Click the exhibit button
Referring to the exhibit which IPS deployment mode is running on the SRX5800 device?
Ans: C
Ans: C
You must create a dynamic address entry with the IP filter category and the ipfilter_office365 value.
You must create a dynamic address entry with the C&C category and the cc_offic365 value.
You must apply the dynamic address entry in a security policy.
You must apply the dynamic address entry in a security intelligence policy.
Ans: A,C
https://www.juniper.net/documentation/en_US/release-independent/sky-atp/topics/concept/sky-atp-integrated-feeds.html
Q12. Which Junos security feature is used for signature-based attack prevention?
RADIUS
AppQoS
IPS
PIM
Ans: C
Policy p4
Policy p7
Policy p1
Policy p12
Ans: B
https://www.juniper.net/documentation/en_US/junos/topics/reference/command-summary/show-security-match-
policies.html
Q14. Click the Exhibit button.
A user report trouble when using SSH to a server outside your organization. The traffic traverses an SRX Series device that is
performing NAT and apply security policies. Referring to the exhibit, which configuration will allow you to see the
bidirectional flow through the SRX Series device?
Ans: C
https://learning.oreilly.com/library/view/junos-security/9781449381721/ch04.html
Q15. Which two statement are true about ADVPN members? (Choose two.)
Ans: C,D
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-auto-discovery-vpns.html
You have designed the firewall filter shown in the exhibit to limit SSH control traffic to yours SRX Series device without
affecting other traffic.
Ans: C,D
https://www.juniper.net/documentation//en_US/junos/topics/concept/firewall-filter-ex-series-evaluation-understanding.html
Q17. You have noticed a high number of TCP-based attacks directed toward your primary edge device. You are asked to
configure the IDP feature on your SRX Series device to block this attack.
Which two IDP attack objects would you configure to solve this problem? (Choose two.)
Network
Signature
Protocol anomaly
host
Ans: B,C
Q18. Which two log format types are supported by the JATP appliance? (Choose two.)
YAML
XML
CSV
YANG
Ans: B,C
https://www.juniper.net/documentation/en_US/release-independent/jatp/topics/topic-map/jatp-custom-log-ingestion.html
You have recently committed the IPS policy shown in the exbibit. When evaluating the expected behavior, you notice that
you have a session that matches all the rules in your IPS policy.
In this scenario, which action would be taken?
no-action
Ignore-connection
close-client-and-server
drop packet
Ans: A
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-idp-policy-rules-and-rulebases.html
Referring the exhibit, which action should you take to solve the problem?
[edit interfaces]
root@vSRX-1# delete st0.0 multipoint
[edit interfaces]
user@hub-1# delete ipsec vpn advpn-vpn traffic-selector
[edit security]
user@hub-1# set ike gateway advpn-gateway advpn suggester disable
[edit security]
user@hub-1# delete ike gateway advpn-gateway advpn partner
Ans: B
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-traffic-selectors-in-route-based-vpns.html
Q21. You are asked to set up notifications if one of your collector traffic feeds drops below 100 kbps.
Which two configuration parameters must be set to accomplish this task? (Choose two.)
Ans: C,D
https://kb.juniper.net/InfoCenter/index?page=content&id=KB32605&actp=RSS
Referring to the exhibit, which three type of traffic would be examined by the IPS policy between Switch-1 and Switch-2?
(Choose three.)
LLDP
ARP
TCP
UDP
ICMP
Ans: C,D,E
Referring to the exhibit, which two statement are true? (Choose two.)
Ans: A,D
https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/macsec.html
Q24. You have a remote access VPN where the remote users are using the NCP client. The remote users can access the
internal corporate resources as intended; however, traffic that is destined to all other internet sites is going through the
remote access VPN. You want to ensure that only traffic that is destined to the internal corporate resources use the remote
access VPN.
Which two actions should you take to accomplish this task? (choose two.)
Ans: A,B
https://forums.juniper.net/t5/SRX-Services-Gateway/Split-tunnelling-in-remote-access-vpn/m-p/456513#M52226
Q25. Your organization has multiple Active Directory domain to control user access. You must ensure that security polices are
passing traffic based upon the user’s access rights.
What would you use to assist your SRX series devices to accomplish this task?
JIMS
Junos Space
JSA
JATP Appliance
Ans: A
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-user-auth-configure-jims.html
Mismatched proxy ID
Mismatched peer ID
Mismatched preshared key
Incorrect peer address.
Ans: B
https://www.juniper.net/documentation/en_US/release-independent/nce/topics/example/policy-based-vpn-using-j-series-srx-
series-device-configuring.html
Ans: C
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-chassis-cluster-macsec.html
https://www.juniper.net/documentation/en_US/junos/topics/reference/command-summary/show-chassis-cluster-
interfaces.html
Q28. Malware that is detonated by the JATP sandbox must be able to communicate with the internet without being able to
harm your local network resources.
Ans: A
https://www.juniper.net/documentation/en_US/release-independent/jatp/topics/topic-map/jatp-getting-started.html#id-
monitoring-port-eth1
Q29. Click the Exhibit button.
Referring to the exhibit, which two statements are true? (Choose two.)
Ans: A,C
Q30. You are asked to secure your network against TOR network traffic.
Which two Juniper products would accomplish this task? (Choose two.)
Ans: A,C
Q31. You are asked to configure an IPsec VPN between two SRX Series devices that allows for processing of CoS on the
intermediate routers.
OpenVPN
Remote Access VPN
Policy-based VPN
Route-based VPN
Ans: D
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-route-based-ipsec-vpns.html
Q32. You opened a support ticket with JTAC for your Juniper ATP appliance. JTAC asks you to set up access to the device
using the reverse SSH connection.
Which three setting must be configured to satisfy this request? (Choose three.)
Ans: C,D,E
https://kb.juniper.net/InfoCenter/index?page=content&id=TN326&cat=&actp=LIST&showDraft=false
Q33. Which interface family is required for Layer 2 transparent mode on SRX Series devices?
LLDP
Ethernet switching
inet
VPLS
Ans: B
Given the command output shown in the exhibit, which two statements are true? (Choose two.)
Traffic matching this session has been received since the session was established.
Network address translation is applied to this session.
The host 10.10.101.10 is directly connected to interface ge-0/0/4.0
The host 172.31.15.1 is directly connected to interface ge-0/0/3.0
Ans: A,C
Q35. The monitor traffic interface command is being used to capture the packets destined to and the from the
SRX Series device.
In this scenario, which two statements related to the feature are true? (Choose two.)
Ans: A,D
https://forums.juniper.net/t5/Ethernet-Switching/monitor-traffic-interface/td-p/462528
Q36. You are asked to configure an SRX Series device to bypass all security features for IP traffic from the engineering depart.
Which firewall filter will accomplish this task?
}
destination-prefix-list {
eng-subnet;
}
}
then accept;
}
term 2 {
then packet-mode;
}
Ans: D
https://kb.juniper.net/InfoCenter/index?page=content&id=KB26757
Q37. In a Juniper ATP Appliance, what would be a reason for the mitigation rule to be in the failed-remove state?
The Juniper ATP appliance was not able to communicate with the SRX Series device.
The Juniper ATP appliance was not able to obtain the config lock.
The Juniper ATP appliance received a commit error message from the SRX Series device.
The Juniper ATP appliance received an unknown error message from the SRX Series device.
Ans: B
https://www.juniper.net/documentation/en_US/release-independent/jatp/topics/topic-map/jatp-mitigation-and-
reporting.html
Q38. You are asked to configure a new SRX Series CPE device at a remote office. The device must participate in forwarding
MPLS and IPsec traffic.
Which two statement are true regarding this implementation? (Choose two.)
Ans: A,D
No traffic
All traffic except traffic sourced from address 192.168.0.0/16
All traffic
Only traffic sourced from address 192.168.0.0/16
Ans: C
Q40. You are configuring transparent mode on an SRX Series device. You must permit IP-based traffic only, and BPDUs must
be restricted to the VLANs from which they originate.
bridge {
block-non-ip-all;
bypass-non-ip-unicast;
no-packet-flooding;
}
bridge {
block-non-ip-all;
bypass-non-ip-unicast;
bpdu-vlan-flooding;
}
bridge {
bypass-non-ip-unicast;
bpdu-vlan-flooding;
}
bridge {
block-non-ip-all;
bpdu-vlan-flooding;
}
Ans: D
You have configured an ADVPN that is operational. However, OSPF will not establish correctly across the ADVPN tunnels.
Referring to the exhibit, which two commands will solve the problem? (Choose two.)
Ans: A,B
Q42. You have a webserver and a DNS server residing in the same internal DMZ subnet. The public Static NAT addresses for
the servers are in the same subnet as the SRX Series devices internet-facing interface. You implement DNS doctoring to
ensure remote users can access the webserver.
Which two statements are true in this scenario? (Choose two.)
Ans: B,C
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-dns-algs.html
https://kb.juniper.net/InfoCenter/index?page=content&id=KB21785&actp=METADATA
Referring to the exhibit, which two statements are true? (Choose two.)
You can secure intra-VLAN traffic with a security policy on this device.
You can secure inter-VLAN traffic with a security policy on this device.
The device can pass Layer 2 and Layer 3 traffic at the same time.
The device cannot pass Layer 2 and Layer 3 traffic at the same time.
Ans: B,C
Q44. You are not able to activate the SSH honeypot on the all-in-one Juniper ATP appliance.
Ans: D
https://www.juniper.net/documentation/en_US/release-independent/jatp/topics/task/configuration/jatp-traffic-collector-
setting-ssh-honeypot-detection.html
Ans: A,B
Q46. You must implement an IPsec VPN on an SRX Series device using PKI certificates for authentication. As part of the
implementation, you are required to ensure that the certificate submission, renewal, and retrieval processes are handled
automatically from the certificate authority.
Ans: B
Certificate Renewal
The renewal of certificates is much the same as initial certificate enrollment except you are just replacing an old certificate
(about to expire) on the VPN device with a new certificate. As with the initial certificate request, only manual renewal is
supported. SCEP can be used to re-enroll local certificates automatically before they expire. Refer to Appendix D for more
details.
Referring to the exhibit, which two statements are true? (Choose two.)
Juniper Networks will not investigate false positives generated by this custom feed.
The custom infected hosts feed will not overwrite the Sky ATP infected host’s feed.
The custom infected hosts feed will overwrite the Sky ATP infected host’s feed.
Juniper Networks will investigate false positives generated by this custom feed.
Ans: A,C
https://www.juniper.net/documentation/en_US/junos-space18.1/policy-enforcer/topics/task/configuration/junos-space-policy-
enforcer-custom-feeds-infected-host-configure.html
Q48. Click the exhibit button.
Referring to the exhibit, which two statements are true? (Choose two.)
The JATP appliance cannot download the security feeds from the GSS servers.
The SRX Series device is not enrolled but can communicate with the JATP appliance.
The SRX Series device cannot download the security feeds from the JATP appliance.
The SRX Series device is enrolled and communicating with a JATP appliance.
Ans: A,D
Q49. You are asked to merge the corporate network with the network from a recently acquired company. Both networks use
the same private IPv4 address space (172.25.126.0/24). An SRX Series device serves as the gateway for each network.
Which solution allows you to merge the two networks without modifying the current address assignments?
Persistent NAT
NAT64
Source NAT
Double NAT
Ans: D
Q50. You are asked to configure a security policy on the SRX Series device. After committing the policy, you receive the
“Policy is out of sync between RE and PFE <SPU-name(s)>.” error.
Ans: A
https://kb.juniper.net/InfoCenter/index?page=content&id=KB30443&cat=SRX_SERIES&actp=LIST
[edit interfaces]
user@srx# delete st0.0 multipoint
Ans: B,D
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-auto-discovery-vpns.html
Q52. In which two ways are tenant systems different from logical systems? (Choose two.)
Ans: A,B
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/tenant-systems-overview.html
Q53. You are connecting two remote sites to your corporate headquarters site; you must ensure that all traffic is secured and
only uses a single Phase 2 SA for both sites.
An IPsec group VPN with the corporate firewall acting as the hub device.
Full mesh IPsec VPNs with tunnels between all sites.
A hub-and-spoke IPsec VPN with the corporate firewall acting as the hub device.
A full mesh Layer 3 VPN with the corporate firewall acting as the hub device.
Ans: A
https://www.juniper.net/us/en/local/pdf/app-notes/3500202-en.pdf
Which configuring the SRX345, you review the MACsec connection between devices and note that it is not working.
Referring to the exhibit, which action would you use to identify problem?
Verify that the interface between the two devices is up and not experiencing errors.
Verify that the formatting settings are correct between the devices and that the software supports the version of
MACsec in use.
Verify that the connectivity association key and the connectivity association key name match on both devices.
Verify that the transmission path is not replicating packets or correcting frame check sequence error packets.
Ans: C
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/troubleshooting-macsec-psk-hitless-rollover.html
Persistent NAT
NAT64
DS-Lite
NAT46
Ans: D
https://kb.juniper.net/InfoCenter/index?page=content&id=KB33559&actp=METADATA
Referring to the exhibit, what is the maximum number of zones that are able to be created within all logical systems?
74
34
17
40
Ans: D
You have the NAT rule, shown in the exhibit, applied to allow communication across an IPsec tunnel between your two sites
with identical networks.
Which statement is correct in this scenario?
The NAT rule with translate the source and destination addresses.
The NAT rule will only translate two addresses at a time.
The NAT rule in applied to the N/A routing instance.
10 packets have been processed by the NAT rule.
Ans: A
Q58. Which three type of peer devices are supported for Cos-Based IPsec VPN?
High-end SRX Series device
cSRX
vSRX
Branch-end SRX Series devics
Ans: A,C,D
Q59. The IKE policy and proposal are configured properly on both devices as shown in the exhibit.
gateway ike_gtw-branch {
ike-policy ike-policy-branch;
dynamic hostname branch.abc.com;
external-inteface ge-0/0/0;
local-address 203.0.113.1;
}
Which configuration snippet will complete the IKE configuration on the branch SRX series device?
Ans: C
Q60. Which three role or protocol are required when configuring an ADVPN? (choose three)
BGP
OSPF
shortcut suggester
shortcut partner
IKEv1
Ans: B,C,D
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-auto-discovery-vpns.html
Q61. When attempting to enroll an SRX Series device to JATP, you received the error shown in the exhibit.
https://kb.juniper.net/InfoCenter/index?page=content&id=KB33979&cat=JATP_SERIES&actp=LIST
Q62. A user trying to reach a company’s website, but the connection errors out. The security policies are configured correctly.
Ans: D
Q63. What are two important function of the Juniper Networks ATP appliance solution? (Choose two.).
Statistics
Analysis
Detection
Filtration
Ans: B,C
https://www.juniper.net/us/en/products-services/security/advanced-threat-prevention/
Q64. You have configured tenant systems on your SRX Series devices.
Referring to the exhibit, which two actions should you take to facilitate inter-TSYS communication?
Connect each TSYS with the interconnect switch by configuring INET configured logical interfaces in.
Connect each TSYS with the interconnect switch by configuration Ethernet VPLS
Place logical tunnel interfaces in a virtual router routing instance in the
Place the logical tunnel interface in a VPLS routing instance in the interconnect
Ans: B,D
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/tenant-systems-overview.html
Q65. Branch 1 and branch 2 have an active VPN tunnel configured but internal host cannot communicate.
Referring to the exhibit, which type of configuration should be applied to solve the problem?
Ans: C
Q66. You have configured three logical tunnel interfaces in a tenant system on the SRX series devices….
Ans: B
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/logical-systems-overview.html
Q67. Which two modes are supported Juniper Skey ATP? (Choose two)
tap mode
private mode
global mode
secure wire mode
Ans: A,D
https://www.juniper.net/documentation/en_US/release-independent/sky-atp/topics/concept/sky-atp-about.html
Q68. Click the Exhibit button. Variation replay protect was off and encryption was on
Referring to the exhibit, which two statement are true? (Choose two.)
Ans: A,C
https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/macsec.html
Persistent NAT
NAT64
DS-Lite
NAT46
Ans: B
Q70. Click the exhibit button
The exhibit shows a snippet of a security flow trace. A user cannot open an ssh session to a server
Ans: C
Q71. You must troubleshoot ongoing problems with IPsec tunnels and security policy processing. Your network consists of
SRX340s and SRX5600s. In this scenario, which two statements are true? (Choose two.)
You must enable data plane logging on the SRX5600 devices to generate security policy logs.
IPsec logs are written to the kmd log file by default
IKE logs are written to the messages log file by default
You must enable data plane logging on the SRX340 devices to generate security policy logs.
Ans: a,b
SRX series devices will block traffic based on this third-party feed.
Events based on this third-party feed will affect a host’s threat score.
Events based on this third-party feed will not affect a host’s threat score.
SRX series devices will not block traffic based on this third-party feed.
Ans: A,C
Ans: A
Q74. You correctly configured a security policy to deny certain traffic, but logs reveal that traffic is still allowed.
You specific traceoption flag will help you troubleshoot this problem.
rules
routing-packet
lookup
configuration
Ans: C
https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/security-edit-traceoptions-
policies.html
Referring to the exhibit, which three topologies are supported by Policy Enforcer? (Choose three.)
Topology 1
Topology 5
Topology 2
Topology 3
Topology 4
Ans: A,D,E
https://www.juniper.net/documentation/en_US/junos-space17.2/policy-enforcer/topics/concept/policy-enforcer-deployment-
supported-topologies.html
Q76. You configured a security policy permitting traffic from the trust zone to the DMZ zone, inserted the new policy at the
top of the list, and successfully committed it to the SRX series device, Upon monitoring you notice that the hit count does not
increase on the newly configured policy.
In this scenario, which two commands would help you to identify the problem? (Choose two.)
Ans: A,D
https://www.juniper.net/documentation/en_US/junos/topics/reference/command-summary/show-security-match-
policies.html#jd0e611
https://www.juniper.net/documentation/en_US/junos/topics/reference/command-summary/show-security-shadow-policies-
logical-system.html
A site-to-site IPsec VPN must be used to secure traffic between the two sites.
The IKE identity on the new site gateway device must use the hostname option; and
Internet traffic from each site should exit through its local internet connection.
The configuration shown in the exhibit has been applied to the new sites SRX, but the secure tunnel is not working.
In this scenario, what configuration change is needed for the tunnel to come up?
Ans: A
The c-1 TSYS has a reservation for the security flow resource.
The c-1 TSYS can use security flow resources up to the system maximum.
The c-1 TSYS cannot use any security flow resources.
The c-1 TSYS has no reservation for the security flow resource.
Ans: C,D
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-profile-logical-system.html
Ans: B
Referring to the exhibit, which two statements should you add to the configuration to accomplish this task? (Choose two.)
Ans: A,C
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-improving-ipsec-vpn-traffic-performance.html
https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/ipsec-performance-
acceleration-edit-flow.html
Q81. You are asked to implement the session cache feature on an SRX5400
In th scenario, what information does a session cache entry record (choose two)
Ans: A,C
Referring to the exhibit which change must be made to correct the configuration?
Ans: B
Ans: A
Q84. Which two VPN features are supported with cos-based ipsec vpns? (choose two)
IKEv2
Dead peer detection
IKEV1
VPN monitoring
Ans: A,B
Q85. You have configured static nat for webserver in your dmz. Both internal and external users can reach the webserver
using the IP address. However only internal users can reach the webserver using DNS name when external users attempt to
reach using DNS name an error message received.
Ans: B
Q86. You have download and initiated the installation of the application package for the JATP applicance on an SRX1500. You
must confirm that the installation of the application package has completed successfully
In this scenario which command would you use to accomplish this task?
Ans: D
Ans: B