Which two statements are correct about establishing a chassis cluster with IPv6? (Choose two.)
A. Only an active/passive cluster can be deployed.
B. Dual-stacked interface addresses are allowed.
C. IPsec site-to-site VPNs over IPv6 are supported.
D. IPv6 address book entries can be used.
Which two statements are correct regarding reth interfaces? (Choose two.)
A. Child interfaces must be in the same slot on both nodes
B. Child interfaces do not need to be in the same slot on both nodes.
C. Child interfaces must be the same Ethernet interface type.
D. Child interfaces can be a mixture of Ethernet interface types.
You are deploying a branch site which connects to two hub locations over an IPsec VPN. The branch SRX Series device should send all traffic to the first hub unless it is unreachable and should then direct traffic to the second hub. You must use static routes to send traffic towards the hub site.
Which two technologies should you use to fail over from a primary to a secondary tunnel in less than 60 seconds? (Choose two.)
A. dead peer detection
B. VPN monitoring
C. floating static routes
D. IP monitoring
Which two statements are correct about IPsec security associations? (Choose two.)
A. established during IKE Phase 1 negotiations
B. security associations are unidirectional
C. established during IKE Phase 2 negotiations
D. security associations are bidirectional
You are asked to establish an IPsec VPN between two sites. The remote device has been preconfigured.
Which two parameters must be identical to the remote device's parameters when designing the local IKE proposal? (Choose two.)
A. security protocol
B. Diffie-Hellman group
C. encryption algorithm
D. Perfect Forward Secrecy keys
A security association is uniquely identified by which two values? (Choose two.)
A. security parameter index value
B. security association ID
C. tunnel source address
D. security protocol
Which three Diffie-Hellman groups are supported during IKE Phase 1 by the Junos OS? (Choose three.)
A. 1
B. 2
C. 3
D. 4
E. 5
You are asked to implement the hashing algorithm that uses the most bits in the calculation on your Junos
security device.
Which algorithm should you use?
A. SHA-512
B. SHA-256
C. MD5-Plus
D. MD5
You are asked to establish an IPsec VPN to a remote device whose IP address is dynamically assigned by the ISP.
Which IKE Phase 1 mode must you use?
A. passive
B. aggressive
C. main
D. quick
Which two are negotiated during Phase 2 of an IPsec VPN tunnel establishment? (Choose two.)
A. security protocol
B. VPN monitor interval
C. UDP port number
D. proxy IDs
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Juniper exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JN0-332 exam preparations and Juniper certification application, do not hesitate to visit our Vcedump.com to find your solutions here.