Juniper Security Design Specialist (JNCDS-SEC) Dumps Latest For Good Learning

Effective Juniper JN0-334 JNCDS-SEC dumps can be used as learning materials to reap good learning results. Most test takers are eager to get the latest JN0-334 questions and answers from the Juniper JN0-334 JNCDS-SEC Dumps file in order to prepare for the Security Design Specialist (JNCDS-SEC) exam. passitdump.com Juniper JN0-334 JNCDS-SEC dumps have been updated with the latest JNCDS-SEC questions and answers to help you learn better on the exam.

Free sample questions of JN0-1332 JNCDS-SEC free dumps are provided here. All the following questions are from the latest real JNCDS-SEC dumps.

Question 1:

You are asked to deploy a security solution in your data center that ensures all traffic flows through the SRX Series devices.

Which firewall deployment method meets this requirement?

A. one-arm

B. two-arm

C. transparent

D. inline

Correct Answer: D

Reference: https://www.juniper.net/us/en/local/pdf/implementation-guides/8010046-en.pdf


Question 2:

You are asked to include anti-malware features into an existing network design. Traffic from the infected machines must be moved to a quarantined VLAN.

Which product will provide this segregation?

A. screens

B. Sky ATP

C. unified threat management

D. Software Defined Secure Network

Correct Answer: B

Reference: https://www.juniper.net/documentation/en_US/release-independent/sky-atp/informationproducts/pathway-pages/sky-atp-admin-guide.pdf


Question 3:

You are designing a data center security architecture. The design requires automated scaling of security services according to real-time traffic flows.

Which two design components will accomplish this task? (Choose two.)

A. telemetry with an SDN controller

B. JFlow traffic monitoring with event scripts

C. VNF security devices deployed on x86 servers

D. VRF segmentation on high-capacity physical security appliances

Correct Answer: BC

Reference: https://www.juniper.net/documentation/en_US/learn-about/LearnAbout_NFV.pdf


Question 4:

You are designing a new campus Internet access service that implements dynamic NAT for customer IP addressing. The customer requires services that allow peer-to-peer networking and online gaming.

In this scenario, what will accomplish this task?

A. EVPN over IPsec

B. one-to-one NAT

C. stacked VLAN tagging

D. endpoint independent mapping

Correct Answer: C


Question 5:

You are designing an Internet security gateway (ISG) for your company and are considering a centralized versus a distributed model for ISGs.

Which two statements are correct in this scenario? (Choose two.)

A. Distributed ISGs typically have less latency compared to centralized ISGs

B. Distributed ISGs reduce bandwidth for end users

C. Distributed ISGs typically require extra bandwidth for management

D. Distributed ISGs are harder to manage compared to centralized ISGs

Correct Answer: AD


Question 6:

You are concerned about users downloading malicious attachments at work while using encrypted Web mail. You want to block these malicious files using your SRX Series device.

In this scenario, which two features should you use? (Choose two.)

A. SSL reverse proxy

B. SSL forward proxy

C. Sky ATP SMTP scanning

D. Sky ATP HTTP scanning

Correct Answer: BC


Question 7:

Which solution centralizes the management of security devices in your data center?

A. Juniper Networks Secure Analytics

B. J-Web

C. Junos Space Security Director

D. Junos CLI

Correct Answer: C


Question 8:

You are deploying Security Director with the logging and reporting functionality for VMs that use SSDs. You expect to have approximately 20,000 events per second of logging in your network.

In this scenario, what is the minimum number of logging and reporting devices that should be used?

A. 2

B. 4

C. 1

D. 3

Correct Answer: C

Reference: https://www.juniper.net/documentation/en_US/junos-space17.1/topics/task/multi-task/junosspace-sd-log-collector-installing.html


Question 9:

You are asked to install a mechanism to protect an ISP network from denial-of-service attacks from a small number of sources.

Which mechanism will satisfy this requirement?

A. RTBH

B. UTM

C. Sky ATP

D. GeoIP

Correct Answer: A

Reference: https://www.juniper.net/documentation/en_US/day-one-books/DO_BGP_FLowspec.pdf


Question 10:

Which statement is correct about service chaining?

A. Service chaining uses IPsec to connect together two or more VMs

B. Service chaining evaluates traffic by using multiple security features on the same instance

C. Service chaining redirects traffic back through the same device for additional processing

D. Service chaining combines multiple VNF instances together in the data flow

Correct Answer: D


Question 11:

Which two features are used to stop IP spoofing in and out of your network? (Choose two.)

A. GeoIP

B. firewall filters

C. unicast reverse path forwarding

D. IPS

Correct Answer: CD

Reference: https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-attackerevasion-technique.html


Question 12:

You want to deploy a VPN that will connect branch locations to the main office. You will eventually add additional branch locations to the topology, and you must avoid additional configuration on the hub when those sites are added.

In this scenario, which VPN solution would you recommend?

A. Site-to-Site VPN

B. Hub-and-Spoke VPN

C. AutoVPN

D. Group VPN

Correct Answer: C

Reference: https://www.juniper.net/assets/us/en/local/pdf/solutionbriefs/3510477-en.pdf


Question 13:

Policy Enforcer provides which benefit?

A. log management

B. command and control protection

C. centralized management of security devices

D. IPsec encryption

Correct Answer: C


Question 14:

What is the maximum number of SRX Series devices in a chassis cluster?

A. 2

B. 3

C. 4

D. 5

Correct Answer: A

Reference: https://www.oreilly.com/library/view/juniper-srx-series/9781449339029/ch07.html


Question 15:

You are designing a DDoS solution for an ISP using BGP FlowSpec. You want to ensure that BGP FlowSpec does not overwhelm the ISP\’s edge routers.

Which two requirements should be included in your design? (Choose two.)

A. Specify a maximum number BGP FlowSpec prefixes per neighbor

B. Implement a route policy to limit advertised routes to /24 subnets

C. Implement a route policy to limit advertised routes to any public IP space

D. Specify a maximum number of BGP FlowSpec prefixes per device

Correct Answer: CD

Reference: https://www.juniper.net/documentation/en_US/day-one-books/DO_BGP_FLowspec.pdf