Pass4itsure > Juniper > JNCIA > JN0-541 > JN0-541 Online Practice Questions and Answers

JN0-541 Online Practice Questions and Answers

Questions 4

You want Enterprise Security Profiler (ESP) to capture layer 7 data of packets traversing the network. Which two steps must you perform? (Choose two.)

A. Configure ESP to enable application profiling, and select the contexts to profile.

B. Under the Violation Viewer tab, create a permitted object, select that object, and then click Apply.

C. Start or restart the profiler process.

D. Create a filter in the ESP to show only tracked hosts.

Buy Now
Questions 5

You implement Traffic Anomaly detection and you find numerous alerts of port scans from your security auditing team that you want to ignore. You create an address book entry for the security audit team specifying the IP addresses of those machines. What should you do next?

A. Create a rule at the top of the Traffic Anomaly rule base to ignore traffic from security audit team, and make this a terminal rule.

B. Create a rule at the top of the Traffic Anomalyrulebase to ignore traffic from security audit team.

C. Create a rule at the top of the IDPrulebase to ignore traffic from security audit team, and make this a terminal rule.

D. Create an exempt rule for the security audit team in the Exemptrulebase to ignore Traffic Anomalies.

Buy Now
Questions 6

In which three situations would you create a compound attack object? (Choose three.)

A. When the pattern "@@@@@@@@" and context "ftp-get-filename" completely define the attack.

B. When attack objects must occur in a particular order.

C. When one of the attack objects is a protocol anomaly.

D. When the pattern needs to be defined using a stream 256 context.

E. You have at least two attack objects that define a single attack.

Buy Now
Questions 7

Which interface does IDP use to communicate with Security Manager?

A. eth0

B. console port

C. eth1

D. HA port

Buy Now
Questions 8

Which layers of the OSI Model does IDP look into when inspecting a packet?

A. Layers 2-7

B. Layers 3-7

C. Layer 7 only

D. Layers 2-4 only

Buy Now
Questions 9

Which method of detection does IDP Sensor use to detect attacks against a fake system on the network?

A. NetworkHoneypot

B. Spoofing Detection

C. Stateful Signatures

D. Backdoor Detection

Buy Now
Questions 10

Which method of detection does IDP Sensor use to detect rootkits or Trojans present on internal systems?

A. Protocol Anomaly

B. NetworkHoneypot

C. Stateful Signatures

D. Backdoor Detection

Buy Now
Questions 11

Which command verifies the IDP Management Server process?

A. service MgtSvr status

B. server mgtSvr status

C. servicemgtServer status

D. service management status

Buy Now
Questions 12

Which three functions can the IDP Sensor perform? (Choose three.)

A. performs attack detection and prevention

B. forwards logs and status messages to the IDP Management Server

C. collects and presents logs to the IDP User Interface

D. store logs locally when the IDP Management Server is unreachable

Buy Now
Questions 13

Which command is used to verify the license installed on the IDP Sensor?

A. scio lic list

B. sctop lic list

C. sctop -l

D. get license

Buy Now
Exam Code: JN0-541
Exam Name: IDP, Associate(JNCIA-IDP)
Last Update: Nov 28, 2024
Questions: 120
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99