Search Header Logo

Juniper Security

Authored by Resa Padila Putri

Instructional Technology, Computers

1st - 2nd Grade

Used 3+ times

Juniper Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

65 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which statement is correct regarding the interface configuration shown in the exhibit?

The interface MTU has been increased.

The IP address has an invalid subnet mask.

The IP address is assigned to unit 0.

The interface is assigned to the trust zone by default

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

The Sky ATP premium or basic-Threat Feed license is needed for which two features? (Choose two.)

Outbound protection

C&C feeds

Executable inspection

Custom feeds

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which statement is correct about IKE?

IKE phase 1 is used to establish the data path

IKE phase 1 only support aggressive mode.

IKE phase 1 negotiates a secure channel between gateways.

IKE phase 1 establishes the tunnel between devices

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which two segments describes IPsec VPNs? (Choose two.)

IPsec VPN traffic is always authenticated.

IPsec VPN traffic is always encrypted.

IPsec VPNs use security to secure traffic over a public network between two remote sites.

IPsec VPNs are dedicated physical connections between two private networks.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Users on the network are restricted from accessing Facebook, however, a recent examination of the logs show that users are accessing Facebook.

Referring to the exhibit, Why is this problem happening?

Global rules are honored before zone-based rules.

The internet-Access rule has a higher precedence value

The internet-Access rule is listed first

Zone-based rules are honored before global rules

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

You have created a zones-based security policy that permits traffic to a specific webserver for the marketing team. Other groups in the company are not permitted to access the webserver. When marketing users attempt to access the server they are unable to do so.

What are two reasons for this access failure? (Choose two.)

You failed to change the source zone to include any source zone.

You failed to position the policy after the policy that denies access to the webserver.

You failed to commit the policy change.

You failed to position the policy before the policy that denies access the webserver

7.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which two match conditions would be used in both static NAT and destination NAT rule sets? (Choose two.)

Destination zone

Destination address

Source interface

Source zone

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?