Black Friday Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

JN0-637 Sample Questions Answers

Questions 4

A user reports that a specific application is not working properly. This application makes

multiple connection to the server and must have the same address every time from a pool and this behavior needs to be changed.

What would solve this problem?

Options:

A.

Use STUN.

B.

Use DNS doctoring.

C.

Use the address-persistent parameter.

D.

Use the persistent-nat parameter.

Buy Now
Questions 5

The exhibit shows part of the flow session logs.

Which two statements are true in this scenario? (Choose two.)

Options:

A.

The existing session is found in the table, and the fast path process begins.

B.

This packet arrives on interface ge-0/0/4.0.

C.

Junos captures a TCP packet from source address 172.20.101.10 destined to 10.0.1.129.

D.

Destination NAT occurs.

Buy Now
Questions 6

Which two statements are true regarding NAT64? (Choose two.)

Options:

A.

An SRX Series device should be in flow-based forwarding mode for IPv4.

B.

An SRX Series device should be in packet-based forwarding mode for IPv4.

C.

An SRX Series device should be in packet-based forwarding mode for IPv6.

D.

An SRX Series device should be in flow-based forwarding mode for IPv6.

Buy Now
Questions 7

You need to generate a certificate for a PKI-based site-to-site VPN. The peer is expecting to

user your domain name vpn.juniper.net.

Which two configuration elements are required when you generate your certificate request? (Chose two,)

Options:

A.

ip-address 10.100.0.5

B.

subject CN=vpn.juniper.net

C.

email admin@juniper.net

D.

domain-name vpn.juniper.net

Buy Now
Questions 8

A customer wants to be able to initiate a return connection to an internal host from a specific

Server.

Which NAT feature would you use in this scenario?

Options:

A.

target-host

B.

any-remote-host

C.

port-overloading

D.

target-server

Buy Now
Questions 9

Click the Exhibit button.

Referring to the exhibit. SRX-1 and SRX-3 have to be connected using EBGP. The BGP configuration on SRX-1 and SRX-3 is verified and correct.

Which configuration on SRX-2 would establish an EBGP connection successfully between SRX-1 and SRX-3?

Options:

A.

The host-inbound-traffic statements do not allow EBGP traffic to traverse SRX-2.

B.

The security policy to allow SRX-1 and SRX-3 to communicate on TCP port 79 should be configured.

C.

The security policy to allow SRX-1 and SRX-3 to communicate on TCP port 169 should be configured.

D.

The security policy to allow SRX-1 and SRX-3 to communicate on TCP port 179 should be configured.

Buy Now
Questions 10

Referring to the exhibit,

which three statements about the multinode HA environment are true? (Choose three.)

Options:

A.

Two services redundancy groups are available.

B.

IP monitoring has failed for the services redundancy group.

C.

Node 1 will host services redundancy group 1 unless it is unavailable.

D.

Session state is synchronized on both nodes.

E.

Node 2 will process transit traffic that it receives for services redundancy group 1.

Buy Now
Questions 11

Exhibit:

Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

You cannot secure intra-VLAN traffic with a security policy on this device.

B.

You can secure inter-VLAN traffic with a security policy on this device.

C.

The device can pass Layer 2 and Layer 3 traffic at the same time.

D.

The device cannot pass Layer 2 and Layer 3 traffic at the same time.

Buy Now
Questions 12

Which two statements are true about the procedures the Junos security device uses when handling traffic destined for the device itself? (Choose two.)

Options:

A.

If the received packet is addressed to the ingress interface, then the device first performs a security policy evaluation for the junos-host zone.

B.

If the received packet is destined for an interface other than the ingress interface, then the device performs a security policy evaluation for the junos-host zone.

C.

If the received packet is addressed to the ingress interface, then the device first examines the host-inbound-traffic configuration for the ingress interface and zone.

D.

If the received packet is destined for an interface other than the ingress interface, then the device performs a security policy evaluation based on the ingress and egress zone.

Buy Now
Questions 13

Exhibit:

You are having problems configuring advanced policy-based routing.

What should you do to solve the problem?

Options:

A.

Apply a policy to the APBR RIB group to only allow the exact routes you need.

B.

Change the routing instance to a forwarding instance.

C.

Change the routing instance to a virtual router instance.

D.

Remove the default static route from the main instance configuration.

Buy Now
Questions 14

You are using ADVPN to deploy a hub-and-spoke VPN to connect your enterprise sites.

Which two statements are true in this scenario? (Choose two.)

Options:

A.

ADVPN creates a full-mesh topology.

B.

IBGP routing is required.

C.

OSPF routing is required.

D.

Certificate-based authentication is required.

Buy Now
Questions 15

You are setting up multinode HA for redundancy.

Which two statements are correct in this scenario? (Choose two.)

Options:

A.

Dynamic routing is active on one device at a time.

B.

Dynamic routing is active on both devices.

C.

Physical connections are used for the control and fabric links.

D.

ICL links require Layer 3 connectivity between peers.

Buy Now
Questions 16

Referring to the exhibit, you are assigned the tenantSYS1 user credentials on an SRX series

device.

In this scenario, which two statements are correct? (Choose two.)

Options:

A.

When you log in to the device, you will be located at the operational mode of the main system hierarchy.

B.

When you log in to the device, you will be located at the operational mode of the Tenant.SY51 logical system hierarchy.

C.

When you log in to the device, you will be permitted to view only the routing tables for the Tenant SYS1 logical system.

D.

When you log in to the device, you will be permitted to view all routing tables available on the on an SYS1 Series device.

Buy Now
Questions 17

Exhibit:

Your company uses SRX Series devices to establish an IPsec VPN that connects Site-1 and the HQ networks. You want VoIP traffic to receive priority over data traffic when it is forwarded across the VPN.

Which three actions should you perform in this scenario? (Choose three.)

Options:

A.

Enable next-hop tunnel binding.

B.

Create a firewall filter that identifies VoIP traffic and associates it with the correct forwarding class.

C.

Configure CoS forwarding classes and scheduling parameters.

D.

Enable the copy-outer-dscp parameter so that DSCP header values are copied to the tunneled packets.

E.

Enable the multi-sa parameter to enable two separate IPsec SAs for the VoIP and data traffic.

Buy Now
Questions 18

Referring to the exhibit,

which statement about TLS 1.2 traffic is correct?

Options:

A.

TLS 1.2 traffic will be sent to routing instance R1 but not forwarded to the next hop.

B.

TLS 1.2 traffic will be sent to routing instance R1 and forwarded to next hop 10.1.0.1.

C.

TLS 1.2 traffic will be sent to routing instance R2 but not forwarded to the next hop.

D.

TLS 1.2 traffic will be sent to routing instance R2 and forwarded to next hop 10.2.0.1.

Buy Now
Questions 19

Referring to the exhibit,

which two statements are correct about the NAT configuration? (Choose two.)

Options:

A.

Both the internal and the external host can initiate a session after the initial translation.

B.

Only a specific host can initiate a session to the reflexive address after the initial session.

C.

Any external host will be able to initiate a session to the reflexive address.

D.

The original destination port is used for the source port for the session.

Buy Now
Questions 20

You want to bypass IDP for traffic destined to social media sites using APBR, but it is not working and IDP is dropping the session.

What are two reasons for this problem? (Choose two.)

Options:

A.

The session did not properly reclassify midstream to the correct APBR rule.

B.

IDP disable is not configured on the APBR rule.

C.

The application services bypass is not configured on the APBR rule.

D.

The APBR rule does a match on the first packet.

Buy Now
Questions 21

Exhibit:

Referring to the flow logs exhibit, which two statements are correct? (Choose two.)

Options:

A.

The packet is dropped by the default security policy.

B.

The packet is dropped by a configured security policy.

C.

The data shown requires a traceoptions flag of host-traffic.

D.

The data shown requires a traceoptions flag of basic-datapath.

Buy Now
Questions 22

You have an initial setup of ADVPN with two spokes and a hub. A host at partner Spoke-1 is sending traffic to a host at partner Spoke-2.

In this scenario, which statement is true?

Options:

A.

Spoke-1 will establish a VPN to Spoke-2 when this is first deployed, so traffic will be sent immediately to Spoke-2.

B.

Spoke-1 will send the traffic through the hub and not use a direct VPN to Spoke-2.

C.

Spoke-1 will establish the tunnel to Spoke-2 before sending any of the host traffic.

D.

Spoke-1 will send the traffic destined to Spoke-2 through the hub until the VPN is established between the spokes.

Buy Now
Questions 23

Referring to the exhibit, which two statements are true ?

Options:

A.

Every VPN packet that the SRX receives from the VPN peer is outside the ESP sequence window

B.

The SRX is sending traffic into the tunnel and out toward the VPN peer.

C.

The SRX is not sending any packets to the VPN peer.

D.

The SRX is not receiving any packets from the VPN peer.

Buy Now
Questions 24

You are asked to see if your persistent NAT binding table is exhausted.

Which show command would you use to accomplish this task?

Options:

A.

show security nat source persistent-nat-table summary

B.

show security nat source summary

C.

show security nat source pool all

D.

show security nat source persistent-nat-table all

Buy Now
Questions 25

How does an SRX Series device examine exception traffic?

Options:

A.

The device examines the host-inbound traffic for the ingress interface and zone.

B.

The device examines the host-outbound traffic for the ingress interface and zone.

C.

The device examines the host-inbound traffic for the egress interface and zone.

D.

The device examines the host-outbound traffic for the egress interface and zone.

Buy Now
Questions 26

You are using AutoVPN to deploy a hub-and-spoke VPN to connect your enterprise sites.

In this scenario, which two statements are true? (Choose two.)

Options:

A.

New spoke sites can be added without explicit configuration on the hub.

B.

Direct spoke-to-spoke tunnels can be established automatically.

C.

All spoke-to-spoke IPsec communication will pass through the hub.

D.

AutoVPN requires OSPF over IPsec to discover and add new spokes.

Buy Now
Questions 27

You are deploying OSPF over IPsec with an SRX Series device and third-party device using GRE.

Which two statements are correct? (Choose two.)

Options:

A.

The GRE interface should use lo0 as endpoints.

B.

The OSPF protocol must be enabled under the VPN zone.

C.

Overlapping addresses are allowed between remote networks.

D.

The GRE interface must be configured under the OSPF protocol.

Buy Now
Questions 28

You are asked to select a product offered by Juniper Networks that can collect and assimilate data from all probes and determine the optimal links for different applications to maximize the full potential of AppQoE.

Which product provides this capability?

Options:

A.

Security Director

B.

Network Director

C.

Mist

D.

Security Director Insights

Buy Now
Questions 29

Exhibit:

You have deployed a pair of SRX series devices in a multimode HA environment. You need to enable IPsec encryption on the interchassis link.

Referring to the exhibit, which three steps are required to enable ICL encryption? (Choose three.)

Options:

A.

Install the Junos IKE package on both nodes.

B.

Enable OSPF for both interchassis link interfaces and tum on the dynamic-neighbors parameter.

C.

Configure a VPN profile for the HA traffic and apply to both nodes.

D.

Enable HA link encryption in the IPsec profile on both nodes.

E.

Enable HA link encryption in the IKE profile on both nodes,

Buy Now
Questions 30

Exhibit:

Referring to the exhibit, which technology would you use to provide communication between

IPv4 host1 and ipv4 internal host

Options:

A.

DS-Lite

B.

NAT444

C.

NAT46

D.

full cone NAT

Buy Now
Questions 31

Referring to the exhibit,

which two statements are correct about the NAT configuration? (Choose two.)

Options:

A.

Both the internal and the external host can initiate a session after the initial translation.

B.

Only a specific host can initiate a session to the reflexive address after the initial session.

C.

Any external host will be able to initiate a session to the reflexive address.

D.

The original destination port is used for the source port for the session.

Buy Now
Questions 32

Click the Exhibit button.

Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

This device is the backup node for SRG1.

B.

The ge-0/0/3.0 and ge-0/0/4.0 interfaces are not active and will not respond to ARP requests to the virtual IP MAC address.

C.

This device is the active node for SRG1.

D.

The ge-0/0/3.0 and ge-0/0/4.0 interfaces are active and will respond to ARP requests to the virtual IP MAC address.

Buy Now
Questions 33

You are deploying threat remediation to endpoints connected through third-party devices.

In this scenario, which three statements are correct? (Choose three.)

Options:

A.

All third-party switches must support AAA/RADIUS and Dynamic Authorization Extensions to the RADIUS protocol.

B.

The connector uses an API to gather endpoint MAC address information from the RADIUS server.

C.

All third-party switches in the specified network are automatically mapped and registered with the RADIUS server.

D.

The connector queries the RADIUS server for the infected host endpoint details and initiates a change of authorization (CoA) for the infected host.

E.

The RADIUS server sends Status-Server messages to update infected host information to the connector.

Buy Now
Questions 34

You want to create a connection for communication between tenant systems without using physical revenue ports on the SRX Series device.

What are two ways to accomplish this task? (Choose two.)

Options:

A.

Use an external router.

B.

Use an interconnect VPLS switch.

C.

Use a secure wire.

D.

Use a point-to-point logical tunnel.

Buy Now
Exam Code: JN0-637
Exam Name: Security, Professional (JNCIP-SEC)
Last Update: Nov 17, 2024
Questions: 115
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now JN0-637