[Free] 2018(Jan) EnsurePass Braindumps Juniper JN0-1330 Dumps with VCE and PDF 11-20

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Juniper Official New Released JN0-1330
100% Free Download! 100% Pass Guaranteed!

Security Design, Specialist (JNCDS-SEC)

Question No: 11

In the data center, what are two characteristics of access tier VLAN termination at the firewall? (Choose two)

  1. Inter-VLAN traffic can bypass firewall services.

  2. Intra-VLAN traffic is secured through firewall services.

  3. Inter-VLAN traffic is secured through firewall services.

  4. Intra-VLAN traffic can bypass firewall services.

Answer: C,D

Question No: 12

In the ever-changing threat landscape, you are seeking to deploy a dynamic anti-malware solution.

What are three characteristics of the Sky Advanced Threat Prevention public cloud infrastructure? (Choose three.)

  1. Machine-learning algorithms adapt to and identify new malware.

  2. It provides rapid cache lookups to identify known files.

  3. Known malicious files are quickly identified and replicated to the firewall.

  4. It processesall known file types.

  5. It uses dynamic analysis including unique deception techniques.

Answer: A,B,E

Question No: 13

You are asked to implement network segmentation to increase security within your internal network Which three statements are correct in this scenario? (Choose three.)

  1. Analyze the compute resource and provisioning requirements

  2. Determine the appropriate routing protocols tor traffic management

  3. Gain visibility of traffic, users, and assets.

  4. Implement granular controls on traffic, users and assets

  5. Protect communications and resources on both inbound and outbound requests

Answer: C,D,E

Question No: 14

What are two reasons to add Routing Engine protection? (Choose two.)

  1. to ensure that only permitted network nodes and hosts communicate with the WAN infrastructure

  2. to conceal routes by hiding them behind Internet gateways

  3. to ensure that all routing information is encrypted

  4. to protect the infrastructure from DDoS attacks

Answer: A,D

Question No: 15

You are designing a network for a customer who has given you specific requirements for the Internet gateway

-The device must validate BGP peers, and

-Administrators must be able to verify that packet filters on the loopback interfaces are working as expected

What are two features on the internet gateway that address the customer#39;s requirements? (Choose two.)

  1. packet counting and logging

  2. routing protocol authentication

  3. source network address translation

  4. intrusion prevention system

Answer: A,B

Question No: 16

Which two components are required to implement a Contrail service chain? (Choose two )

  1. AppSecure

  2. service policy

  3. Express Path

  4. virtual network

Answer: B,D Explanation:

Servicechaining requires the following configuration components to build trie chain:

  • Service template

  • Virtual networks

  • Service instance

  • Network policy

Question No: 17

Which technology would you use to detect and analyze a denial-of service attack on a service provider network?

  1. Sky Advanced Threat Prevention

  2. route reflector

  3. J-Flow

  4. unified threat management

Answer: C

Question No: 18

Which component of the Juniper NFV solution architecture acts as the VNF manager?

  1. Meta Fabric

  2. Service Control Gateway

  3. Contrail

  4. vSRX

Answer: C

Question No: 19

Click the Exhibit button.

Ensurepass 2018 PDF and VCE

Given the data center topology shown in the exhibit, what are two designs that enable the SRX Series devices to Inspect all traffic between the web server and database server? (Choose two.)


Place the Layer 3 gateways for VLAN 100 and VLAN 200 in the same virtual router in the Junos Fusion configuration Connect this virtual router to a security zone on the SRX5600.

  1. Change the Junos Fusion configuration so that the web server and database server are in the same VLAN.

  2. Place the Layer 3 gateways for VLAN 100 and VLAN 200 on redundant Ethernet interfaces of the SRX5600 and assign these interfaces to different security zones.

  3. Place the Layer 3 gateways for VLAN 100 and VLAN 200 in different virtual routers in the Junos Fusion configuration. Connect the virtual routers to different security zones on the SRX5600.

Answer: C,D

Question No: 20

Your company is establishing a BYOD policy and you are asked to create the appropriate security infrastructure In the policy, Internet access should only be provided to the BYOD wired and wireless devices.

A. 802.11 g

B. 802.1X

  1. guest VLAN

  2. C-VLAN

Answer: B,C

100% Ensurepass Free Download!
Download Free Demo:JN0-1330 Demo PDF
100% Ensurepass Free Guaranteed!
JN0-1330 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.