Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
 

Juniper JN0-1330 Exam Actual Questions

The questions for JN0-1330 were last updated on Nov. 20, 2024.
  • Viewing page 1 out of 17 pages.
  • Viewing questions 1-4 out of 65 questions

Topic 1 - Single Topic

Question #1 Topic 1

Which security solution protects against zero-day attacks?

  • A. DDoS protection
  • B. advanced anti-malware
  • C. content filtering
  • D. Application Layer Gateways
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #2 Topic 1

Which three statements about Sky Advanced Threat Prevention are true? (Choose three.)

  • A. Dynamic analysis involves unique deception techniques.
  • B. Machine-learning algorithms are enabled to adapt to and identify new malware.
  • C. Rapid cache lookups are used to quickly identify known files.
  • D. Files are flagged for next-day analysis for certain malware types.
  • E. It uses a single, best-in-class antivirus engine.
Reveal Solution Hide Solution   Discussion  

Correct Answer: ABC 🗳️
Sky Advanced Threat Preventions identification technology uses a variety of techniques to quickly identify a threat and prevent an impending attack. These methods include:
Rapid cache lookups to identify known files.
Dynamic analysis that involves unique deception techniques applied in a sandbox to trick malware into activating and self-identifying.
Additionally, machine-learning algorithms enable Sky Advanced Threat Prevention to adapt to and identify new malware in an ever-changing threat landscape
Reference: http://www.juniper.net/techpubs/en_US/release-independent/sky-atp/information-products/topic-collections/sky-atp-release-notes-d50.pdf

Question #3 Topic 1

Your client modifies an event script and needs to update 100 SRX Series devices with this new script. They want to use the refresh-from parameter to refresh the script from a centralized location.
In this scenario, which three protocols would you use to accomplish this task? (Choose three.)

  • A. HTTP
  • B. SCP
  • C. TFTP
  • D. FTP
  • E. CIFS
Reveal Solution Hide Solution   Discussion  

Correct Answer: ABD 🗳️
Reference: http://www.juniper.net/documentation/en_US/junos14.1/topics/reference/command-summary/request-system-scripts-refresh-from.html

Question #4 Topic 1

You are asked to implement a new application to share documents with trusted external organizations while minimizing the risk of an attack that would enable access to other enterprise systems.
In this scenario, which two locations would you recommend to deploy the application? (Choose two.)

  • A. public cloud
  • B. management VLAN
  • C. enterprise LAN
  • D. enterprise DMZ
Reveal Solution Hide Solution   Discussion  

Correct Answer: AD 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...