Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam JN0-231 All Questions

View all questions & answers for the JN0-231 exam

Exam JN0-231 topic 1 question 1 discussion

Actual exam question from Juniper's JN0-231
Question #: 1
Topic #: 1
[All JN0-231 Questions]

Which two criteria should a zone-based security policy include? (Choose two.)

  • A. a source port
  • B. a destination port
  • C. zone context
  • D. an action
Show Suggested Answer Hide Answer
Suggested Answer: CD 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
gpt_test
2 months, 2 weeks ago
Selected Answer: CD
C. zone context and D. an action Explanation: Zone context: A zone-based security policy defines rules based on zones, which group interfaces with similar security requirements. The policy needs to specify the source and destination zones to determine the flow of traffic between them. Action: Every security policy includes an action to specify what should happen when the traffic matches the policy. Actions typically include allow, deny, or log. Other options: Source port and destination port: While these can be part of a policy, they are not required criteria for a zone-based security policy. The primary elements of such a policy are zones and the action to take.
upvoted 1 times
...
quraitulain
7 months, 3 weeks ago
C D is the answer
upvoted 1 times
...
westh4m1234
8 months, 2 weeks ago
YEP CD
upvoted 1 times
...
longanghi
8 months, 3 weeks ago
Selected Answer: CD
CD is correct
upvoted 1 times
...
JaredM
9 months, 1 week ago
Selected Answer: CD
Ports not required in zone based policies
upvoted 1 times
...
Engg_flint
1 year, 1 month ago
C and D
upvoted 1 times
...
Taweke
1 year, 5 months ago
no need source port and destination port but use application
upvoted 1 times
...
fosi130
1 year, 6 months ago
CD is the answer
upvoted 1 times
...
Rbrahmi
1 year, 9 months ago
Selected Answer: CD
CD are the correct answers
upvoted 2 times
...
bigmokey
1 year, 10 months ago
Selected Answer: CD
no mention of port, does have application Security Policy Structure + Name + Context + From-zone & to-zone + Rules + Match criteria + Source address + Destination address + Application + Identity (user-based firewall) + Action
upvoted 1 times
...
mohdema
1 year, 12 months ago
Selected Answer: AB
A security policy is a set of statements that controls traffic from a specified source to a specified destination using a specified service. A policy permits, denies, or tunnels specified types of traffic unidirectionally between two points. Each policy consists of: A unique name for the policy. A from-zone and a to-zone, for example: user@host# set security policies from-zone untrust to-zone untrust A set of match criteria defining the conditions that must be satisfied to apply the policy rule. The match criteria are based on a source IP address, destination IP address, and applications. The user identity firewall provides greater granularity by including an additional tuple, source-identity, as part of the policy statement. A set of actions to be performed in case of a match—permit, deny, or reject. Accounting and auditing elements—counting, logging, or structured system logging. ~~~~Action is not a match criteria https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/topic-map/security-policy-configuration.html
upvoted 2 times
...
mohdema
1 year, 12 months ago
In a Junos OS stateful firewall, the security policies enforce rules for transit traffic, in terms of what traffic can pass through the firewall, and the actions that need to take place on traffic as it passes through the firewall. From the perspective of security policies, the traffic enters one security zone and exits another security zone. This combination of a from-zone and to-zone is called a context. Each context contains an ordered list of policies. Each policy is processed in the order that it is defined within a context.
upvoted 2 times
...
Bubu3k
2 years ago
Selected Answer: CD
I think it should be the zone context (from zone to zone) and an action
upvoted 3 times
mohdema
1 year, 12 months ago
I think it’s src and dst https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/topic-map/security-policy-configuration.html
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...