Juniper JN0-1330 Exam Practice Questions (P. 3)
- Full Access (65 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
You are designing a Log Director deployment that must be able to handle 6,500 sustained events per second.
What is the minimum deployment scenario?
What is the minimum deployment scenario?
- Athree Log Collector VMs and one Log Concentrator VM
- Btwo Log Collector VMs and one Log Concentrator VM
- Cone Log Collector VM
- Dfour Log Collector VMs and one Log Concentrator VM
Correct Answer:
B
Reference:
https://www.juniper.net/techpubs/en_US/junos-space15.2/topics/concept/junos-space-log-collector-understanding.html
B
Reference:
https://www.juniper.net/techpubs/en_US/junos-space15.2/topics/concept/junos-space-log-collector-understanding.html
send
light_mode
delete
Question #12
Which two components are required to implement a Contrail service chain? (Choose two.)
- AAppSecure
- Bservice policy
- CExpress Path
- Dvirtual network
Correct Answer:
BD
Service chaining requires the following configuration components to build the chain:
Service template
Virtual networks
Service instance
Network policy
Reference: http://www.juniper.net/techpubs/en_US/vsrx15.1x49/information-products/pathway-pages/security-vsrx-contrail-quickstart-pwp.pdf
BD
Service chaining requires the following configuration components to build the chain:
Service template
Virtual networks
Service instance
Network policy
Reference: http://www.juniper.net/techpubs/en_US/vsrx15.1x49/information-products/pathway-pages/security-vsrx-contrail-quickstart-pwp.pdf
send
light_mode
delete
Question #13
You must implement access control lists to protect the control plane of a service providers core devices.
What are two ways to accomplish this task? (Choose two.)
What are two ways to accomplish this task? (Choose two.)
- AImplement access control lists to filter RFC 1918 IP addresses from reaching the control plane.
- BImplement access control lists to permit only internal management networks to reach the control plane.
- CImplement access control lists to drop all IP packets that are fragments.
- DImplement access control lists to protect the control plane against unauthorized user credentials.
Correct Answer:
BC
BC
send
light_mode
delete
Question #14
What is the maximum number of SRX Series devices in a chassis cluster?
send
light_mode
delete
Question #15
Due to changes in security requirements you must place a firewall between an existing Web server farm and a database server farm residing in the same subnet.
In this scenario, why would you choose transparent mode as your operating mode?
In this scenario, why would you choose transparent mode as your operating mode?
- ATransparent mode does not require zones to be configured.
- BTransparent mode can be implemented with no changes to the current IP addresses.
- CTransparent mode policies can be enforced based on MAC address ranges.
- DTransparent mode allows only IP packets to pass through the security policies.
Correct Answer:
B
B
send
light_mode
delete
All Pages
