What are three functions of the IDP Management Server? (Choose three.)
A. blocks attacks
B. stores Security Policies and Attack Objects
C. consolidates logs from the various IDP Sensors in a network
D. receives and manages connections from IDP User Interfaces
Which two statements are true about Trojans? (Choose two.)
A. They are executables that infect only executable programs.
B. They are programs often used to gather information about a host.
C. They can secretly permit access to an infected computer from an outside host.
D. They are programs that target onlywebservers by overwhelming them with traffic.
Which method of detection does IDP Sensor use to detect a network scan or portscan?
A. DOS Detection
B. Traffic Anomaly
C. Protocol Anomaly
D. Backdoor Detection
Which method of detection does IDP Sensor use to detect rootkits or Trojans present on internal systems?
A. Protocol Anomaly
B. NetworkHoneypot
C. Stateful Signatures
D. Backdoor Detection
Which method of detection does IDP Sensor use to detect attacks against a fake system on the network?
A. NetworkHoneypot
B. Spoofing Detection
C. Stateful Signatures
D. Backdoor Detection
What are two limitations of traditional IDS systems? (Choose two.)
A. do not detect internal attacks
B. do not use signatures for known attacks
C. do not operate inline so they cannot effectively block all attacks
D. frequentlyhave false positives due to less accurate packet signatures
Which statement is true about exporting reports?
A. Reports must be exported manually into PDF format.
B. Reports must be exported manually into HTML format.
C. Reports can be exported automatically into PDF format.
D. Reports can be exported automatically into HTML format.
Which layers of the OSI Model does IDP look into when inspecting a packet?
A. Layers 2-7
B. Layers 3-7
C. Layer 7 only
D. Layers 2-4 only
Which columns are available for creating time-based report?
A. Time
B. Attack Object
C. Source and Destination Address
D. Columns options are not available.
Which statement is true about the NetScreen IDP Closed Loop Investigation (CLI)?
A. CLI describes the IDP Sensor command line utilities.
B. CLI provides easy navigation between Log Viewer and Log Investigator.
C. CLI provides easy navigation between Log Investigator, Log Viewer, Profiler information and quick reports.
D. CLI provides easy navigation between Log Investigator, Log Viewer, Profiler information and pre-defined reports.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Juniper exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JN0-541 exam preparations and Juniper certification application, do not hesitate to visit our Vcedump.com to find your solutions here.