Juniper JN0-1330 Exam Practice Questions (P. 1)
- Full Access (65 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
Which security solution protects against zero-day attacks?
- ADDoS protection
- Badvanced anti-malware
- Ccontent filtering
- DApplication Layer Gateways
Correct Answer:
B
B
send
light_mode
delete
Question #2
Which three statements about Sky Advanced Threat Prevention are true? (Choose three.)
- ADynamic analysis involves unique deception techniques.
- BMachine-learning algorithms are enabled to adapt to and identify new malware.
- CRapid cache lookups are used to quickly identify known files.
- DFiles are flagged for next-day analysis for certain malware types.
- EIt uses a single, best-in-class antivirus engine.
Correct Answer:
ABC
Sky Advanced Threat Preventions identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:
Rapid cache lookups to identify known files.
Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.
Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape
Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf
ABC
Sky Advanced Threat Preventions identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:
Rapid cache lookups to identify known files.
Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.
Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape
Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf
send
light_mode
delete
Question #3
Your client modifies an event script and needs to update 100 SRX Series devices with this new script. They want to use the refresh-from parameter to refresh the script from a centralized location.
In this scenario, which three protocols would you use to accomplish this task? (Choose three.)
In this scenario, which three protocols would you use to accomplish this task? (Choose three.)
- AHTTP
- BSCP
- CTFTP
- DFTP
- ECIFS
Correct Answer:
ABD
Reference: http://www.juniper.net/documentation/en_US/junos14.1/topics/reference/command-summary/request-system-scripts-refresh-from.html
ABD
Reference: http://www.juniper.net/documentation/en_US/junos14.1/topics/reference/command-summary/request-system-scripts-refresh-from.html
send
light_mode
delete
Question #4
You are asked to implement a new application to share documents with trusted external organizations while minimizing the risk of an attack that would enable access to other enterprise systems.
In this scenario, which two locations would you recommend to deploy the application? (Choose two.)
In this scenario, which two locations would you recommend to deploy the application? (Choose two.)
send
light_mode
delete
Question #5
You are designing a WAN solution for a small service provider. The service provider has asked you to include ways to mitigate potential DDoS attacks against their customers.
Which two solutions should you include in your proposal? (Choose two.)
Which two solutions should you include in your proposal? (Choose two.)
- ABGP flowspec
- Bremote triggered back hole
- Cintrusion prevention system
- Dunified threat management
Correct Answer:
AB
AB
send
light_mode
delete
All Pages