Which statement is true when express AV detects a virus in a TCP session?
A. A TCP RST is sent and the session is restarted.
B. The TCP connection is closed gracefully and the data content is dropped.
C. TCP traffic is allowed and an SNMP trap is sent.
D. AV scanning is restarted.
Which statement describes the behavior of a security policy?
A. The implicit default security policy permits all traffic.
B. Traffic destined to the device itself always requires a security policy.
C. Traffic destined to the device's incoming interface does not require a security policy.
D. The factory-default configuration permits all traffic from all interfaces.
Which statement is true about interfaces, zones, and routing-instance relationships?
A. All interfaces in a zone must belong to the same routing instance.
B. All interfaces in a routing instance must belong to the same zone.
C. All interfaces in a zone must be in inet.0.
D. Each interface in a VR must belong to a unique security zone.
What do you use to group interfaces with similar security requirements?
A. zones
B. policies
C. address book
D. NAT configuration
Which two statements are true for both express antivirus and full file-based antivirus? (Choose two.)
A. Signature updates of the pattern database are obtained from Symantec.
B. Intelligent prescreening functionality is identical in both express antivirus and full antivirus.
C. Both express antivirus and full file-based antivirus use the same scan engines.
D. The database pattern server is available through both HTTP and HTTPS.
What are two valid match conditions for source NAT? (Choose two.)
A. port range
B. source port
C. source address
D. destination address
Which two configuration elements are required for a policy-based VPN? (Choose two.)
A. IKE gateway
B. secure tunnel interface
C. security policy to permit the IKE traffic
D. security policy referencing the IPsec VPN tunnel
How does the antivirus feature operate once the antivirus license has expired?
A. Any traffic matching a UTM policy will be dropped.
B. Any traffic matching a UTM policy will be permitted.
C. Any traffic matching a UTM policy will be correctly evaluated with the existing set of antivirus signatures.
D. Any traffic matching a UTM policy will be permitted with a log message of no inspection.
Which two traffic types trigger pass-through firewall user authentication? (Choose two.)
A. SSH
B. ICMP
C. Telnet
D. FTP
What is the purpose of an address book?
A. It holds security policies for particular hosts.
B. It holds statistics about traffic to and from particular hosts.
C. It defines the hosts in a zone so they can be referenced by policies.
D. It maps hostnames to IP addresses to serve as a backup to DNS resolution.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Juniper exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JN0-332 exam preparations and Juniper certification application, do not hesitate to visit our Vcedump.com to find your solutions here.