Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Juniper JN0-540 Exam - Cheat-Test.com

Free JN0-540 Sample Questions:

1. Which method of detection does IDP Sensor use to detect a network scan or portscan?
A. DOS Detection
B. Traffic Anomaly
C. Protocol Anomaly
D. Backdoor Detection
Answer: B

2. Which IDP Sensor is recommended to support onboard Management Server?
A. IDP-10
B. IDP-100
C. IDP-500
D. IDP-1000
Answer: B

3. Which three columns can be seen in the Application view of Profiler? (Choose three.)
A. Protocol
B. Context and Context Value
C. Source and Destination IPs
D. Date First Seen and Last Seen
Answer: BCD

4. Which two statements about disk management on the IDP Sensor are true?
A. IDP Management Server can be configured to send disk space alerts.
B. If the IDP Sensor disk is full, the IDP Sensor will not store any additional logs or packet captures.
C. If the IDP Sensor disk is full IDP Sensor starts oldest log entries first, and packet captures second.
D. If the IDP Management Server disk is full, the oldest packet captures are purged first, and the log messages are purged second.
Answer: AD

5. What is a Close Server action?
A. issues a TCP Reset to the server only
B. drops all packets from the attacker's IP
C. drops any packet matching this src/dst/protocol
D. drops only the specific packet matching the attack pattern
Answer: A

6. Which three statements are true about custom reports? (Choose three.)
A. Log filters can be applied to custom reports.
B. You can export custom reports to pdf format.
C. All custom reports are stored on per user basis.
D. Creating reports using indexed columns is significantly faster.
Answer: ACD

7. What are two drawbacks of an IDS system blocking an IP address? (Choose two.)
A. works only on TCP traffic
B. might not block the attacker until the attack has already taken place
C. need to know the sequence number of the attacker's IP Header to successfully block the IP address
D. might lead to denial-of-service situation where attacker can intentionally block valid users from accessing a network
Answer: BD

8. Which layers of the OSI Model does IDP look into when inspecting a packet?
A. Layers 2-7
B. Layers 3-7
C. Layer 7 only
D. Layers 2-4 only
Answer: A

9. What are two limitations of traditional IDS systems? (Choose two.)
A. do not detect internal attacks
B. do not use signatures for known attacks
C. do not operate inline so they cannot effectively block all attacks
D. frequently have false positives due to less accurate packet signatures
Answer: CD

10. What are the limitations of using TCP Reset to block connections in an IDS? (Choose three.)
A. only works on TCP traffic
B. does not reset the connection until the attack has already taken place
C. must know the correct packet size to successfully reset a connection
D. resets all connections from a certain source-IP, which could lead to denial-of-service
Answer: ABD

11. What are three functions of the IDP Management Server? (Choose three.)
A. blocks attacks
B. stores Security Policies and Attack Objects
C. consolidates logs from the various IDP Sensors in a network
D. receives and manages connections from IDP User Interfaces
Answer: BCD

12. What is the function of the IDP User Interface?
A. It stores Security Policies and Attack Objects
B. It supplements the Command-Line Interface on the Sensor, but is not required.
C. It downloads logs from various Sensors and displays them to the administrator.
D. It provides an interface for the administrator to view Logs/Reports and define Security Policies.
Answer: D

13. Which statements are true about the IDP Management Server? (Choose two.)
A. One IDP Management Server can manage multiple IDP Sensors.
B. Each IDP Sensor must have its own Management Server component.
C. The IDP Management Server process can be run on a IDP Sensor for evaluation purposes.
D. Supported operating systems for IDP Management Server are Windows 2000, BSD UNIX, and Linux.
Answer: AC

14. Which three functions can the IDP Sensor perform? (Choose three.)
A. performs attack detection and prevention
B. collects and presents logs to the IDP User Interface
C. forwards logs and status messages to the IDP Management Server
D. store logs locally when the IDP Management Server is unreachable
Answer: ACD

15. Which two attack detection methods are unique to Juniper NetScreenIDP? (Choose two.)
A. Protocol Anomaly
B. Packet Signatures
C. Statefull Signatures
D. Backdoor Detection
Answer: CD

16. Which method of detection does IDP Sensor use to detect attacks against a fake system on the network?
A. Network Honeypot
B. Spoofing Detection
C. Stateful Signatures
D. Backdoor Detection
Answer: A

17. What is a buffer overflow attack?
A. a misconfigured application that has a known security hole
B. an attack that overflows a server with many connections until it crashes
C. an attack that takes advantage of a backdoor within a vulnerable application
D. an attack which injects just the right amount of data into a vulnerable application, causing the application to execute the malicious code that was injected
Answer: D

18. Which two statements are true about Trojans? (Choose two.)
A. They are executables that infect only executable programs.
B. They are programs often used to gather information about a host.
C. They can secretly permit access to an infected computer from an outside host.
D. They are programs that target only webservers by overwhelming them with traffic.
Answer: BC

19. What best describes Reconnaissance attacks?
A. transmission of TCP SYN requests from a spoofed IP address
B. transmission of ping packets of certain size to crash a remote host
C. unauthorized discovery and mapping of systems, services, or vulnerabilities
D. disabling or corrupting networks, systems, or services with the intent to deny the service to intended users
Answer: C

20. Which three best describe denial-of-service attacks? (Choose three.)
A. transmission of ping packets of a certain size to crash a remote host
B. the unauthorized discovery and mapping of systems, services, or vulnerabilities
C. transmission of TCP SYN requests from a spoofed IP address to exhaust the resources of a victim
D. disabling or corrupting networks, systems, or services with the intent to deny the service to intended users
Answer: ACD

21. Which method of detection does IDP Sensor use to detect a known buffer overflow against a specific server?
A. Protocol Anomaly
B. Network Honeypot
C. Stateful Signatures
D. Backdoor Detection
Answer: A

22. Which method of detection does IDP Sensor use to detect an invalid IP address entering an external interface?
A. DOS Detection
B. Layer2 Detection
C. Spoofing Detection
D. Backdoor Detection
Answer: C

23. Which method of detection does IDP Sensor use to detect rootkits or Trojans present on internal systems?
A. Protocol Anomaly
B. Network Honeypot
C. Stateful Signatures
D. Backdoor Detection
Answer: D

24. Which two statements are true as they relate to a sniffer mode IDP Sensor deployment? (Choose two.)
A. An IP address must be assigned to the sniffer interface.
B. It does not affect the performance or availability of the network.
C. It provides passive monitoring only with limited attack prevention.
D. IDP Sensor cannot be managed by the IDP Management Server in Sniffer mode.
Answer: BC

25. You can remotely administer the IDP Sensor through _____. (Choose two.)
A. an SSH Console
B. a Telnet Console
C. the WebUI ACM over HTTP
D. the WebUI ACM over HTTPS
Answer: AD

26. Which IDP Sensors support High-Availability? (Choose three.)
A. IDP-10
B. NetScreen IDP-100
C. NetScreen IDP-500
D. NetScreen IDP-1000
Answer: BCD

27. Which IDP Sensors support the NetScreen IDP bypass unit? (Choose two.)
A. IDP-10
B. IDP-100
C. IDP-500
D. IDP-1000
Answer: AB

28. Which three actions must be taken prior to deploying an IDP Sensor in a network? (Choose three.)
A. A Security Policy must be configured for this IDP Sensor.
B. An IP address must be defined on all forwarding interfaces.
C. The IDP Sensor object must be configured in the IDP Management Server.
D. IDP Sensor must be configured with the ACM and assigned a Management IP address.
Answer: ACD


© 2014 Cheat-Test.com, All Rights Reserved