Juniper JN0-334 Security, Specialist (JNCIS-SEC) Online Training
Juniper JN0-334 Online Training
The questions for JN0-334 were last updated at Dec 25,2024.
- Exam Code: JN0-334
- Exam Name: Security, Specialist (JNCIS-SEC)
- Certification Provider: Juniper
- Latest update: Dec 25,2024
Which two statements describe SSL proxy on SRX Series devices? (Choose two.)
- A . SSL proxy supports TLS version 1.2.
- B . Client-protection is also known as reverse proxy.
- C . SSL proxy is supported when enabled within logical systems.
- D . SSL proxy relies on Active Directory to provide secure communication.
A,C
Explanation:
Reference: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-user-auth-ssl-tls.html
How many nodes are configurable in a chassis cluster using SRX Series devices?
- A . 2
- B . 4
- C . 6
- D . 8
Which statement is true about high availability (HA) chassis clusters for the SRX Series device?
- A . Cluster nodes require an upgrade to HA compliant Routing Engines.
- B . Cluster nodes must be connected through a Layer 2 switch.
- C . There can be active/passive or active/active clusters.
- D . HA clusters must use NAT to prevent overlapping subnets between the nodes.
Which default protocol and port are used for JIMS to SRX client communication?
- A . WMI over TCP; port 389
- B . ADSI over TCP; port 389
- C . HTTPS over TCP: port 443
- D . RPC over TCP, port 135
C
Explanation:
Reference: https://www.juniper.net/documentation/en_US/jims/topics/task/configuration/jims-certificate-configuring.html#:~:text=By%20default%2C%20the%20HTTPS%20port%20is%20443.&text=The%20JIMS%20server%20communicates%20with,Firewall%20to%20allow%20this%20communication
You must ensure that all encrypted traffic passing through your SRX device uses strong protocols and ciphers.
Which feature should you implement to satisfy this requirement?
- A . SSL proxy
- B . AppSecure
- C . JIMS
- D . JATP
You are configuring a client-protection SSL proxy profile.
Which statement is correct in this scenario?
- A . A server certificate is not used but a root certificate authority is used.
- B . A server certificate and root certificate authority are not used.
- C . A server certificate is used but a root certificate authority is not used.
- D . A server certificate and a root certificate authority are both used.
Which two statements describe JSA? (Choose two.)
- A . Security Director must be used to view third-party events rom JSA flow collectors.
- B . JSA supports events and flows from Junos devices, including third-party devices.
- C . JSA events must be manually imported into Security Directory using an SSH connection.
- D . JSA can be used as a log node with Security Director or as a standalone solution.
Which statement about the control link in a chassis cluster is correct?
- A . A cluster can have redundant control links.
- B . Recovering from a control link failure requires a reboot.
- C . The control link heartbeats contain the configuration file of the nodes.
- D . The control messages sent over the link are encrypted by default.
A
Explanation:
Reference: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-chassis-cluster-dual-control-links.html
Which solution should you use if you want to detect known attacks using signature-based methods?
- A . SSL proxy
- B . JIMS
- C . IPS
- D . ALGs
Which two solutions provide a sandboxing feature for finding zero-day malware threats? (Choose two.)
- A . Sky ATP
- B . UTM
- C . JATP
- D . IPS