Passcerty.com » Juniper » JNCIE-SEC » JPR-934

JPR-934 Exam Questions & Answers

Exam Code: JPR-934

Exam Name: Security, Expert (JNCIE-SEC)

Updated: May 13, 2024

Q&As: 61

At Passcerty.com, we pride ourselves on the comprehensive nature of our JPR-934 exam dumps, designed meticulously to encompass all key topics and nuances you might encounter during the real examination. Regular updates are a cornerstone of our service, ensuring that our dedicated users always have their hands on the most recent and relevant Q&A dumps. Behind every meticulously curated question and answer lies the hard work of our seasoned team of experts, who bring years of experience and knowledge into crafting these premium materials. And while we are invested in offering top-notch content, we also believe in empowering our community. As a token of our commitment to your success, we're delighted to offer a substantial portion of our resources for free practice. We invite you to make the most of the following content, and wish you every success in your endeavors.


Download Free Juniper JPR-934 Demo

Experience Passcerty.com exam material in PDF version.
Simply submit your e-mail address below to get started with our PDF real exam demo of your Juniper JPR-934 exam.

Instant download
Latest update demo according to real exam

*Email Address

* Our demo shows only a few questions from your selected exam for evaluating purposes

Free Juniper JPR-934 Dumps

Practice These Free Questions and Answers to Pass the JNCIE-SEC Exam

Questions 1

The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server.

ABC.com contains a Development department. ABC.com contains a domain controller named ABC-SR24 which is also configured as a DNS Server. A ABC.com employee named Clive Wilson works in the Development department. One

morning Clive Wilson complains that he cannot connect to another network server.

During investigation, you notice that nslookup queries sometimes take a long time and sometimes fail altogether.

You suspect that there is a problem with ABC-SR24.

How would you configure monitoring on ABC-SR24 so that you can review individual name resolution queries?

A. Use System Monitor to monitor host resolution queries on ABC-SR24.

B. Use Event Viewer to view the DNS event log on ABC-SR24.

C. Select the Log packets for debugging option on the Debug Logging tab in the DNS server properties on ABC-SR24.

D. Use Network Monitor to capture DNS query packets on ABC-SR24.

Show Answer
Questions 2

You are working as the administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains a DMZ that contains a two-node Network Load Balancing cluster, which

is located in a data centre that is physically impenetrable to unauthorized persons.

The cluster servers run Windows Server Web Edition and host an e-commerce website. The NLB cluster uses a virtual IP address that can be accessed from the Internet.

What can you do to mitigate the cluster's most obvious security vulnerability?

A. Configure the cluster to require IPSec.

B. Configure the network cards to use packet filtering on all inbound traffic to the cluster.

C. Use EFS on the server hard disks.

D. Configure intrusion detection the servers on the DMZ.

E. Configure Mac addressing on the servers in the DMZ.

Show Answer
Questions 3

You are working for an administrator for ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All the servers on the network run Windows Server servers.

You have configured four servers in a network load balancing cluster. You need to enable the cluster in unicast mode although each server only has one network card. After your configuration, the NLB cluster has successfully converged.

You discover that you can optimize the use of the cluster by moving a specific application to each node of the cluster. However for this application to execute, all the nodes of the cluster must be configured by a Network Load Balancing Port

Rule.

When you open Network Load Balancing Manager on one of the NLB nodes, you receive a message saying that Network Load Balancing Manager is unable to see the other nodes in the cluster.

How can you add a port rule to the cluster nodes?

A. By opening Network Load Balancing Manager on a different host.

B. By creating an additional virtual IP address on the cluster.

C. By modifying the Network Connection Properties on every host.

D. By removing each host from the cluster before creating the port rule.

Show Answer
Questions 4

You have recently hired a new junior administrator to assist you in running the network for a medium-sized manufacturing company. You are explaining to your new assistant that AD objects are assigned security descriptors to allow you to implement access control. You tell your assistant that the security descriptor contains several different components. Which of the following are contained in the security descriptor for an object? (Select all that apply.)

A. Discretionary access control list

B. System access control list

C. Dynamic access control list

D. Ownership information

Show Answer
Questions 5

You are setting up a procedure to keep documents exchanged between members of the R and D department secret. They will be sending these documents across the Internet to each other. Which PKI process will you need to employ to achieve this?

A. Confidentiality

B. Non-repudiation

C. Authentication

D. Data Integrity

Show Answer More Questions

Viewing Page 3 of 3 pages. Download PDF or Software version with 61 questions