Free Juniper JN0-636 Exam Actual Questions

The questions for JN0-636 were last updated On Jan 1, 2025

Question No. 1

SRX Series device enrollment with Policy Enforcer fails To debug further, the user issues the following command show configuration services security---intelligence url

https : //cloudfeeds . argon . juniperaecurity . net/api/manifeat. xml

and receives the following output:

What is the problem in this scenario?

Show Answer Hide Answer
Question No. 2

You are asked to determine if the 203.0.113.5 IP address has been added to the third-party security feed, DS hield, from Juniper Seclnte1. You have an SRX Series device that is using Seclnte1 feeds from Juniper ATP Cloud

Which command will return this information?

Show Answer Hide Answer
Correct Answer: A

The command 'show security dynamic-address category-name DS hield' will show the IP addresses that are part of the DS hield category. By filtering the output of this command with the 'match 203.0.113.5' command, you can determine if the IP address 203.0.113.5 is part of the DS hield feed. This command will check the feeds that are configured on SRX Series device and are associated to juniper ATP Cloud.


Question No. 3

Exhibit

Referring to the exhibit, which two statements are true about the CAK status for the CAK named "FFFP"? (Choose two.)

Show Answer Hide Answer
Correct Answer: A, D

The exhibit shows the output of the show security mka sessions summary command on an SRX Series device. This command displays the status of the MACsec Key Agreement (MKA) sessions on the device. In the output, we can see that there are two CAKs configured for the interface ge-0/0/1 - FFFF and EEEE. The CAK named FFFF has the type preceding and the status live. The CAK named EEEE has the type fallback and the status active.

The two statements that are true about the CAK status for the CAK named FFFF are:

CAK is not used for encryption and decryption of the MACsec session. This is because the CAK is only used for authentication and key exchange between the MACsec peers. The CAK is not used for encrypting or decrypting the MACsec traffic. The encryption and decryption of the MACsec session is done by the Secure Association Key (SAK), which is derived from the CAK using the MKA protocol.

SAK is not generated using this key. This is because the CAK named FFFF has the type preceding, which means that it is a legacy key that is used for backward compatibility with older MACsec devices. The preceding key is not used for generating the SAK, but only for authenticating the MACsec peers. The SAK is generated using the active key, which is the CAK named EEEE in this case.


Question No. 4

Exhibit

An administrator wants to configure an SRX Series device to log binary security events for tenant systems.

Referring to the exhibit, which statement would complete the configuration?

Show Answer Hide Answer
Question No. 5

Which two modes are supported on Juniper ATP Cloud? (Choose two.)

Show Answer Hide Answer
Correct Answer: B, D

According to the Juniper documentation, Juniper ATP Cloud supports the following modes:

Layer 3 mode: In this mode, the SRX Series device acts as a Layer 3 gateway and routes traffic between different subnets. The SRX Series device performs NAT and security policy enforcement on the traffic and sends a copy of the traffic to Juniper ATP Cloud for analysis.This mode is suitable for networks that have multiple subnets and require NAT and firewall functions1

Transparent mode: In this mode, the SRX Series device acts as a Layer 2 bridge and forwards traffic between the same subnet. The SRX Series device does not perform NAT or security policy enforcement on the traffic, but sends a copy of the traffic to Juniper ATP Cloud for analysis.This mode is suitable for networks that have a single subnet and do not require NAT or firewall functions1

The other two modes, global mode and private mode, are not supported by Juniper ATP Cloud. Global mode is a configuration option for Juniper ATP Appliance, which is an on-premises solution that provides threat detection and prevention.Private mode is a configuration option for Juniper ATP Private Cloud, which is a cloud-based solution that provides threat detection and prevention within a private network23


1:Juniper Advanced Threat Prevention Cloud | ATP Cloud | Juniper Networks2:Juniper Advanced Threat Prevention Appliance | ATP Appliance | Juniper Networks3: [Juniper Advanced Threat Prevention Private Cloud | ATP Private Cloud | Juniper Networks]