Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Juniper JN0-332 Exam -

Free JN0-332 Sample Questions:

1. To verify that traffic is being processed by the correct security poli cy, which CLI command displays the policy name and the specific traffic processed by the policy?
A. show security flow session
B. show security utm content-filtering statistics
C. show security policies
D. show security status
Answer: A

2. Which three match criteria must each security po licy include? (Choose three.)
A. source address
B. source port
C. destination address
D. destination port
E. application
Answer: A,C,E

3. What does a zone contain?
A. routers
B. interfaces
C. routing tables
D. NAT addresses
Answer: B

4. Which two steps are performed when configuring a zone? (Choose two.)
A. Define a policy for the zone.
B. Assign logical interfaces to the zone.
C. Assign physical interfaces to the zone.
D. Define the zone as a security or functional zone.
Answer: B,D

5. What are the two types of zones you can configure? (Choose two.)
A. system
B. trusted
C. functional
D. security
Answer: C,D

6. What is the purpose of configuring the host-inbound-traffic command on a zone?
A. to allow inbound Web authentication
B. to allow all outbound traffic on the untrust zone
C. to allow all inbound traffic on the untrust zone
D. to allow specified traffic that terminates on the device
Answer: D

7. Which two zones can you add interfaces? (Choose tw o.)
A. system
B. security
C. functional
D. user
Answer: B,C

8. Which statement is true about a logical interface?
A. A logical interface can belong to multiple zones.
B. A logical interface can belong to multiple routing instances.
C. A logical interface can belong to only one routing instance.
D. All logical interfaces in a routing instance must belong to a single zone.
Answer: C

9. What is the purpose of a zone in the Junos OS?
A. A zone defines a group of security devices with a common manag ement.
B. A zone defines the geographic region in which the security device is deployed.
C. A zone defines a group of network segments with similar security requirements.
D. A zone defines a group of network segments with similar class -of-service requirements.
Answer: C

10. Which two security policy actions are valid? (Choose two.)
A. deny
B. discard
C. reject
D. close
Answer: A,C

11. Where do you configure SCREEN options?
A. zones on which an attack might arrive
B. zones you want to protect from attack
C. interfaces on which an attack might arrive
D. interfaces you want to protect from attack
Answer: A

12. What are two types of network reconnaissance attacks? (Choose two.)
A. IP address sweep
B. SYN flood
C. port scanning
D. SNMP polling request
Answer: A,C

13. Which three IP option fields can an attacker exploit to cause problems in a network? (Choose three.)
A. loose source routing
B. timestamp
C. time-to-live
D. record route
Answer: A,B,E

14. You want to configure a security policy that allows traffic to a particular host. Which step must you perform before committing a configuration with the policy?
A. Define a static route to the host.
B. Ensure that the router can ping the host.
C. Define an address book entry for the host.
D. Ensure that the router has an ARP entry for the host.
Answer: C

15. After a security policy is applied, which CLI command output will display the policy index number?
A. show security policy-id
B. show security flow session summary
C. show security monitoring
D. show security policies
Answer: D

© 2014, All Rights Reserved