[Free] 2018(Jan) EnsurePass Examcollection Juniper JN0-332 Dumps with VCE and PDF Download 271-280

Ensurepass.com : Ensure you pass the IT Exams 2018 Jan Juniper Official New Released JN0-332
100% Free Download! 100% Pass Guaranteed!

Juniper Networks Certified Internet Specialist, SEC (JNCIS-SEC)

Question No: 271 – (Topic 3)

Which high availability feature is supported only on Junos security platforms?

  1. Virtual Chassis

  2. VRRP

  3. chassis clustering

  4. graceful restart

Answer: C Explanation:

The Junos OS achieves high availability on Junos security platforms using chassis clustering.Chassis clustering providesnetwork node redundancy by grouping two like devices into a cluster. The two nodes back each other up with one node acting asthe primary and the other as the secondary node, ensuring the stateful failover of processes and services in the event of systemor hardware failure. A control link between services processing cards (SPCs) or revenue ports and an Ethernet data link between revenue ports connect two like devices. Junos security platforms must be the same model, and all SPCs, network processing cards (NPCs), and input/output cards (IOCs) on high-end platforms must have the same slot placement and hardware revision.

The chassis clustering feature in the Junos OS is built on the high availability methodology of JuniperNetworks M Series and T Series platforms and the TX Matrix platform, including

multichassis clustering, active-passive Routing Engines (REs) , active-active Packet Forwarding Engines (PFEs), and graceful RE switchover capability.

Question No: 272 – (Topic 3)

Which statement is true regarding redundancy groups?

  1. The preempt option determines the primary and secondary roles for redundancy group 0 during a failure and recovery scenario.

  2. When priority settings are equal and the members participating in a cluster are initialized at the same time, the primary role for redundancy group 0 is assigned to node 1.

  3. The primary role can be shared for redundancy group 0 when the active-active option is enabled.

  4. Redundancy group 0 manages the control plane failover between the nodes of a cluster.

Answer: D

Question No: 273 – (Topic 3)

Users can define policy to control traffic flow between which two components? (Choose two.)

  1. from a zone to the device itself

  2. from a zone to the same zone

  3. from a zone to a different zone

  4. from one interface to another interface

Answer: B,C

Question No: 274 – (Topic 3)

Which three elements are contained in a session-close log message? (Choose three.)

  1. source IP address

  2. DSCP value

  3. number of packets transferred

  4. policy name

  5. MAC address

Answer: A,C,D

Question No: 275 – (Topic 3)

Which two statements are true about pool-based destination NAT? (Choose two.)

  1. It also supports PAT.

  2. PAT is not supported.

  3. It allows the use of an address pool.

  4. It requires you to configure an address in the junos-global zone.

Answer: A,C

Question No: 276 – (Topic 3)

Regarding zone types, which statement is true?

  1. You cannot assign an interface to a functional zone.

  2. You can specifiy a functional zone in a security policy.

  3. Security zones must have a scheduler applied.

  4. You can use a security zone for traffic destined for the device itself.

Answer: D

Question No: 277 – (Topic 3)

Click the Exhibit button.

Ensurepass 2018 PDF and VCE

Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?

  1. DNS traffic is denied.

  2. Telnet traffic is denied.

  3. SMTP traffic is denied.

  4. Ping traffic is permitted.

Answer: B

Question No: 278 – (Topic 3)

What is the purpose of a zone in JUNOS Software?

  1. A zone defines a group of security devices with a common management.

  2. A zone defines the geographic region in which the security device is deployed.

  3. A zone defines a group of network segments with similar security requirements.

  4. A zone defines a group of network segments with similar class-of-service requirements.

Answer: C

Question No: 279 – (Topic 3)

Which two commands can be used to monitor firewall user authentication? (Choose two.)

  1. show access firewall-authentication

  2. show security firewall-authentication users

  3. show security audit log

  4. show security firewall-authentication history

Answer: B,D

Question No: 280 – (Topic 3)

Which two statements are true for both express antivirus and full file-based antivirus? (Choose two.)

  1. Signature updates of the pattern database are obtained from Symantec.

  2. Intelligent prescreening functionality is identical in both express antivirus and full antivirus.

  3. Both express antivirus and full file-based antivirus use the same scan engines.

  4. The database pattern server is available through both HTTP and HTTPS.

Answer: B,D

100% Ensurepass Free Download!
Download Free Demo:JN0-332 Demo PDF
100% Ensurepass Free Guaranteed!
JN0-332 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.