JN0-231-Full-File.pdf
Q: 1
You want to prevent other users from modifying or discarding your changes while you are also
editing the configuration file.
In this scenario, which command would accomplish this task?
Options
Q: 2
Which IPsec protocol is used to encrypt the data payload?
Options
Q: 3
Which two criteria should a zone-based security policy include? (Choose two.)
Options
Q: 4
Which two services does Juniper Connected Security provide? (Choose two.)
Options
Q: 5
Which two statements are correct about functional zones? (Choose two.)
Options
Q: 6
Which two components are configured for host inbound traffic? (Choose two.)
Options
Q: 7
Screens on an SRX Series device protect against which two types of threats? (Choose two.)
Options
Q: 8
You are monitoring an SRX Series device that has the factory-default configuration applied.
In this scenario, where are log messages sent by default?
Options
Q: 9
Which statement about NAT is correct?
Options
Q: 10
What is the order of the first path packet processing when a packet enters a device?
Options
Question 1 of 10