Juniper jn0-231 practice test

security, associate (jncia-sec)

Last exam update: Dec 13 ,2025
Page 1 out of 7. Viewing questions 1-10 out of 66

Question 1

You are assigned a project to configure SRX Series devices to allow connections to your webservers. The webservers have a private IP address, and the packets must use NAT to be accessible from the Internet. The webservers must use the same address for both connections from the Internet and communication with update servers.
Which NAT type must be used to complete this project?

  • A. source NAT
  • B. destination NAT
  • C. static NAT
  • D. hairpin NAT
Mark Question:
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which two components are part of a security zone? (Choose two.)

  • A. inet.0
  • B. fxp0
  • C. address book
  • D. ge-0/0/0.0
Mark Question:
Answer:

bd

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

You want to enable the minimum Juniper ATP services on a branch SRX Series device.
In this scenario, what are two requirements to accomplish this task? (Choose two.)

  • A. Install a basic Juniper ATP license on the branch device.
  • B. Configure the juniper-atp user account on the branch device.
  • C. Register for a Juniper ATP account on https://sky.junipersecurity.net.
  • D. Execute the Juniper ATP script on the branch device.
Mark Question:
Answer:

ac

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

You want to implement user-based enforcement of security policies without the requirement of certificates and supplicant software.

Which security feature should you implement in this scenario?

  • A. integrated user firewall
  • B. screens
  • C. 802.1X
  • D. Juniper ATP
Mark Question:
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Which two components are configured for host inbound traffic? (Choose two.)

  • A. zone
  • B. logical interface
  • C. physical interface
  • D. routing instance
Mark Question:
Answer:

ab

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which two UTM features should be used for tracking productivity and corporate user behavior? (Choose two.)

  • A. the content filtering UTM feature
  • B. the antivirus UTM feature
  • C. the Web filtering UTM feature
  • D. the antispam UTM feature
Mark Question:
Answer:

ac

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which two statements are correct about screens? (Choose two.)

  • A. Screens process inbound packets.
  • B. Screens are processed on the routing engine.
  • C. Screens process outbound packets.
  • D. Screens are processed on the flow module.
Mark Question:
Answer:

ad

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which statement about global NAT address persistence is correct?

  • A. The same IP address from a source NAT pool will be assigned for all sessions from a given host.
  • B. The same IP address from a source NAT pool is not guaranteed to be assigned for all sessions from a given host.
  • C. The same IP address from a destination NAT pool will be assigned for all sessions for a given host.
  • D. The same IP address from a destination NAT pool is not guaranteed to be assigned for all sessions for a given host.
Mark Question:
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which two services does Juniper Connected Security provide? (Choose two.)

  • A. protection against zero-day threats
  • B. IPsec VPNs
  • C. Layer 2 VPN tunnels
  • D. inline malware blocking
Mark Question:
Answer:

ad

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Screens on an SRX Series device protect against which two types of threats? (Choose two.)

  • A. IP spoofing
  • B. ICMP flooding
  • C. zero-day outbreaks
  • D. malicious e-mail attachments
Mark Question:
Answer:

ab

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2