Cause all that matters here is passing the Juniper JN0-633 exam. Cause all that you need is a high score of JN0-633 Security, Professional (JNCIP-SEC) exam. The only one thing you need to do is downloading Ucertify JN0-633 exam study guides now. We will not let you down with our money-back guarantee.
Q91. You have recently deployed a dynamic VPN. Some remote users are complaining that they
cannot authenticate through the SRX device at the corporate network. The SRX device serves as the tunnel endpoint for the dynamic VPN.What are two reasons for this problem? (Choose two.)
A. The supported number of users has been exceeded for the applied license.
B. The users are connecting to the portal using Windows Vista.
C. The SRX device does not have the required user account definitions.
D. The SRX device does not have the required access profile definitions.
Answer: A,D
Explanation:
Reference :https://www.juniper.net/techpubs/en_US/junos12.1/information-products/topic-collections/syslog-messages/index.html?jd0e28566.html http://kb.juniper.net/InfoCenter/index?page=content&id=KB16477
Q92. You recently implemented application firewall rules on an SRX device to act upon encrypted traffic. However, the encrypted traffic is not being correctly identified.
Which two actions will help the SRX device correctly identify the encrypted traffic? (Choose two.)
A. Enable heuristics to detect the encrypted traffic.
B. Disable the application system cache.
C. Use the junos:UNSPECIFIED-ENCRYPTED application signature.
D. Use the junos:SPECIFIED-ENCRYPTED application signature.
Answer: A,C
Explanation: Reference:http://www.juniper.net/techpubs/en_US/junos12.1x44/topics/concept/encrypted-p2p-heuristics-detection.html
Q93. Which statement is true regarding dual-stack lite?
A. The softwire is an IPv4 tunnel over an IPv6 network.
B. The softwire initiator (SI) encapsulates IPv6 packets in IPv4.
C. The softwire concentrator (SC) decapsulates softwire packets.
D. SRX devices support the softwire concentrator and softwire initiator functionality.
Answer: C
Explanation: Reference:http://www.juniper.net/techpubs/en_US/junos/topics/concept/ipv6-ds-lite- overview.html
Q94. Which statement is true regarding destination NAT?
A. Destination NAT changes the content of the source IP address field.
B. Destination NAT changes the content of the destination IP address field.
C. Destination NAT matches on the destination IP address and changes the source IP address.
D. Destination NAT matches on the destination IP address and changes the source port.
Answer: B
Q95. Click the Exhibit button.
-- Exhibit–
-- Exhibit --
Host traffic is traversing through an IPsec tunnel. Users are complaining of intermittent issues with their connection.
Referring to the exhibit, what is the problem?
A. The tunnel is down due to a configuration change.
B. The do-not-fragment bit is copied to the tunnel header.
C. The MSS option on the SYN packet is set to 1300.
D. The TCP SYN check option is disabled for tunnel traffic.
Answer: B
Q96. You are asked to troubleshoot ongoing problems with IPsec tunnels and security policy processing. Your network consists of SRX240s and SRX5600s.
Regarding this scenario, which two statements are true? (Choose two.)
A. You must enable data plane logging on the SRX240 devices to generate security policy logs.
B. You must enable data plane logging on the SRX5600 devices to generate security policy logs.
C. IKE logs are written to the kmd log file by default.
D. IPsec logs are written to the kmd log file by default.
Answer: B,D
Explanation: Reference: http://kb.juniper.net/InfoCenter/index?page=content&id=KB16506
http://www.google.co.in/url?sa=t&rct=j&q=IKE%20logs%20are%20written%20to%20the%20kmd%20log%20file%20by%20default&source=web&cd=2&ved=0CC8QFjAB&url=http%3A%2F%2Fwww.juniper.net%2Fus%2Fen%2Flocal%2Fpdf%2Fapp-notes%2F3500175-en.pdf&ei=SNHzUZntEcaPrQfnpICYDQ&usg=AFQjCNGb-rMrVcm6cqqBLWDif54CaCTrrw
Q97. You want to implement persistent NAT for an internal resource so that external hosts are able to initiate communications to the resource, without the internal resource having previously sent packets to the external hosts.Which configuration setting will accomplish this goal?
A. persistent-nat permit target-host
B. persistent-nat permit any-remote-host
C. persistent-nat permit target-host-port
D. address-persistent
Answer: B
Explanation:
Reference :http://www.juniper.net/techpubs/software/junos-security/junos-security96/junos-security-swconfig-security/understand-persistent-nat-section.html
Q98. You have a group IPsec VPN established with a single key server and five client devices. Regarding this scenario, which statement is correct?
A. There is one unique Phase 1 security association and five unique Phase 2 security associations used for this group.
B. There is one unique Phase 1 security association and one unique Phase 2 security association used for this group.
C. There are five unique Phase 1 security associations and five unique Phase 2 security associations used for this group.
D. There are five unique Phase 1 security associations and one unique Phase 2 security association used for this group.
Answer: D
Explanation:
Reference :http://www.thomas-krenn.com/redx/tools/mb_download.php/mid.x6d7672335147784949386f3d/Manual_Confi guring_Group_VPN_Juniper_SRX.pdf
Q99. You have just created a few hundred application firewall rules on an SRX device and applied them to the appropriate firewall polices. However, you are concerned that the SRX device might become overwhelmed with the increased processing required to process traffic through the application firewall rules.
Which three actions will help reduce the amount of processing required by the application firewall rules? (Choose three.)
A. Use stateless firewall filtering to block the unwanted traffic.
B. Implement AppQoS to drop the unwanted traffic.
C. Implement screen options to block the unwanted traffic.
D. Implement IPS to drop the unwanted traffic.
E. Use security policies to block the unwanted traffic.
Answer: A,C,E
Explanation:
IPS and AppDoS are the most powerful, and thus, the least efficient method of dropping traffic on the SRX, because IPS and AppDoS tend to take up the most processing cycles.
Reference :http://answers.oreilly.com/topic/2036-how-to-protect-your-network-with-security-tools-for-junos/
Q100. Click the Exhibit button.
[edit protocols ospf area 0.0.0.0]
user@host# run show security ike security-associations Index State Initiator cookie Responder cookie Mode Remote Address
3289542 UP 48d928408940de28 e418fc7702fe483b Main
172.31.50.1
3289543 UP eb45940484082b14 428086b100427326 Main 10.10.50.1
[edit protocols ospf area 0.0.0.0]
user@host# run show security ipsec; security-associations Total active tunnels: 2
ID Algorithm SPI Life:sec/kb Mon lsys Port Gateway
<131073 ESP:des/ shal 6d40899b 1360/ unlim - root 500 10.10.50.1
>131073 ESP:des/ shal 5a89400e 1360/ unlim - root 500 10.10.50.1
<131074 ESP:des/ shal c04046f 1359/ unlim - root 500 172.31.50.1
>131074 ESP:des/ shal 5508946c 1359/ unlim - root 500 172.31.50.1
[edit protocols ospf area 0.0.0.0] user@host# run show ospf neighbor
Address Interface State ID Pri Dead 10.40.60.1 st0.0 Init 10.30.50.1 128 35
10.40.60.2 st0.0 Full 10.30.50.1 128 31
[edit protocols ospf area 0.0.0.0] user@host# show
interface st0.0;
You have already configured a hub-and-spoke VPN with one hub device and two spoke devices. However, the hub device has one neighbor in the Init state and one neighbor in the Full state.
What would you do to resolve this problem?
A. Configure the st0.0 interface under OSPF as a nonbroadcast multiple access interface.
B. Configure the st0.0 interface under OSPF as a point-to-multipoint interface.
C. Configure the st0.0 interface under OSPF as a point-to-point interface.
D. Configure the st0.0 interface under OSPF as an unnumbered interface.
Answer: B