Juniper JN0-335 Exam (page: 1)
Juniper Security, Specialist (JNCIS-SEC)
Updated on: 25-Sep-2025

Viewing Page 1 of 21

Regarding static attack object groups, which two statements are true? (Choose two.)

  1. Matching attack objects are automatically added to a custom group.
  2. Group membership automatically changes when Juniper updates the IPS signature database.
  3. Group membership does not automatically change when Juniper updates the IPS signature database.
  4. You must manually add matching attack objects to a custom group.

Answer(s): B,C

Explanation:

static attack object groups are predefined groups of attack objects that are included in Juniper's IPS signature database. These groups do not change automatically when Juniper updates the database.



You are deploying a new SRX Series device and you need to log denied traffic. In this scenario, which two policy parameters are required to accomplish this task? (Choose two.)

  1. session-init
  2. session-close
  3. deny
  4. count

Answer(s): B,C

Explanation:

you need to create a global firewall rulebase that matches RT_FLOW_SESSION_DENY events. To do this, you need to specify two policy parameters: deny and session-close.



You are asked to reduce the load that the JIMS server places on your Which action should you take in this situation?

  1. Connect JIMS to the RADIUS server
  2. Connect JIMS to the domain Exchange server
  3. Connect JIMS to the domain SQL server.
  4. Connect JIMS to another SRX Series device.

Answer(s): D

Explanation:

JIMS server is a Juniper Identity Management Service that collects user identity information from different authentication sources for SRX Series devices. It can connect to SRX Series devices and CSO platform in your network.

JIMS server is a service that protects corporate resources by authenticating and restricting user access based on roles. It connects to SRX Series devices and CSO platform to provide identity information for firewall policies. To reduce the load that JIMS server places on your network, you should connect JIMS to another SRX Series device. This way, you can distribute the identity information among multiple SRX Series devices and reduce network traffic.



Which two statements about unified security policies are correct? (Choose two.)

  1. Unified security policies require an advanced feature license.
  2. Unified security policies are evaluated after global security policies.
  3. Traffic can initially match multiple unified security policies.
  4. APPID results are used to determine the final security policy

Answer(s): C,D

Explanation:

unified security policies are security policies that enable you to use dynamic applications as match conditions along with existing 5-tuple or 6-tuple matching conditions. They simplify application- based security policy management at Layer 7 and provide greater control and extensibility to manage dynamic applications traffic3



Exhibit



Referring to the exhibit, which two statements describe the type of proxy used? (Choose two.)

  1. forward proxy
  2. client protection proxy
  3. server protection proxy
  4. reverse proxy

Answer(s): B,C

Explanation:

B) Client protection proxy: This statement is correct because a forward proxy can also be called a client protection proxy since it protects the user's identity and computer information from the web server.
C) Server protection proxy: This statement is correct because a reverse proxy can also be called a server protection proxy since it protects the web server's identity and location from the user.



Viewing Page 1 of 21



Share your comments for Juniper JN0-335 exam with other users:

labuschanka 11/16/2023 6:06:00 PM

i gave the microsoft azure az-500 tests and prepared from this site as it has latest mock tests available which helped me evaluate my performance and score 919/1000
Anonymous


Marianne 10/22/2023 11:57:00 PM

i cannot see the button to go to the questions
Anonymous


sushant 6/28/2023 4:52:00 AM

good questions
EUROPEAN UNION


A\MAM 6/27/2023 5:17:00 PM

q-6 ans-b correct. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-cli-quick-start/use-the-cli/commit-configuration-changes
UNITED STATES


unanimous 12/15/2023 6:38:00 AM

very nice very nice
Anonymous


akminocha 9/28/2023 10:36:00 AM

please help us with 1z0-1107-2 dumps
INDIA


Jefi 9/4/2023 8:15:00 AM

please upload the practice questions
Anonymous


Thembelani 5/30/2023 2:45:00 AM

need this dumps
Anonymous


Abduraimov 4/19/2023 12:43:00 AM

preparing for this exam is overwhelming. you cannot pass without the help of these exam dumps.
UNITED KINGDOM


Puneeth 10/5/2023 2:06:00 AM

new to this site but i feel it is good
EUROPEAN UNION


Ashok Kumar 1/2/2024 6:53:00 AM

the correct answer to q8 is b. explanation since the mule app has a dependency, it is necessary to include project modules and dependencies to make sure the app will run successfully on the runtime on any other machine. source code of the component that the mule app is dependent of does not need to be included in the exported jar file, because the source code is not being used while executing an app. compiled code is being used instead.
Anonymous


Merry 7/30/2023 6:57:00 AM

good questions
Anonymous


VoiceofMidnight 12/17/2023 4:07:00 PM

Delayed the exam until December 29th.
UNITED STATES


Umar Ali 8/29/2023 2:59:00 PM

A and D are True
Anonymous


vel 8/28/2023 9:17:09 AM

good one with explanation
Anonymous


Gurdeep 1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.
CANADA