Juniper JN0-1331 Exam Practice Questions (P. 2)
- Full Access (65 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
You are creating a security design proposal for an enterprise customer. As part of the design, you are implementing 802.1x authentication on your EX Series devices.
In this scenario, which two statements are correct? (Choose two.)
In this scenario, which two statements are correct? (Choose two.)
- AThe supplicant is the device that prevents the authenticator's access until it is authenticated
- BThe supplicant is the device that is being authenticated
- CThe authenticator is the device that is being authenticated
- DThe authenticator is the device that prevents the supplicant's access until it is authenticated
Correct Answer:
BD
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/802-1x-authentication-switching-devices.html
BD
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/802-1x-authentication-switching-devices.html
send
light_mode
delete
Question #7
You are asked to install a mechanism to protect an ISP network from denial-of-service attacks from a small number of sources.
Which mechanism will satisfy this requirement?
Which mechanism will satisfy this requirement?
- ARTBH
- BUTM
- CSky ATP
- DGeoIP
Correct Answer:
A
Reference:
https://www.juniper.net/documentation/en_US/day-one-books/DO_BGP_FLowspec.pdf
A
Reference:
https://www.juniper.net/documentation/en_US/day-one-books/DO_BGP_FLowspec.pdf
send
light_mode
delete
Question #8
You are responding to an RFP for securing a large enterprise. The RFP requires an onsite security solution which can use logs from third-party sources to prevent threats. The solution should also have the capability to detect and stop zero-day attacks.
Which Juniper Networks solution satisfies this requirement?
Which Juniper Networks solution satisfies this requirement?
- AIDP
- BSky ATP
- CJSA
- DJATP
Correct Answer:
D
Reference:
https://www.juniper.net/uk/en/products-services/security/advanced-threat-prevention/
D
Reference:
https://www.juniper.net/uk/en/products-services/security/advanced-threat-prevention/
send
light_mode
delete
Question #9
You are designing an SDSN security solution for a new campus network. The network will consist of Juniper Networks Policy Enforcer, Juniper Networks switches, third-party switches, and SRX Series devices. The switches and the SRX Series devices will be used as security enforcement points.
Which component supports the SRX Series devices in this scenario?
Which component supports the SRX Series devices in this scenario?
- ASecurity Director
- BRADIUS server
- Ccertificate server
- DDHCP server
Correct Answer:
A
Reference:
https://www.juniper.net/documentation/en_US/release-independent/solutions/topics/concept/sg-006a-sdsn-product-components.html
A
Reference:
https://www.juniper.net/documentation/en_US/release-independent/solutions/topics/concept/sg-006a-sdsn-product-components.html
send
light_mode
delete
Question #10
Your company has outgrown its existing secure enterprise WAN that is configured to use OSPF, AutoVPN, and IKE version 1. You are asked if it is possible to make a design change to improve the WAN performance without purchasing new hardware.
Which two design changes satisfy these requirements? (Choose two.)
Which two design changes satisfy these requirements? (Choose two.)
- AModify the IPsec proposal from AES-128 to AES-256
- BChange the IGP from OSPF to IS-IS
- CMigrate to IKE version 2
- DImplement Auto Discovery VPN
Correct Answer:
BD
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-auto-discovery-vpns.html
BD
Reference:
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-auto-discovery-vpns.html
send
light_mode
delete
All Pages