You are designing a data center security solution for a customer. The customer asks that you provide a DDoS solution. Several IPsec tunnels will be terminated at the data center gateway.
Which type of security is your customer asking you to implement?
A. segmentation
B. intra-data center policy enforcement
C. perimeter protection
D. compliance
Policy Enforcer provides which benefit?
A. log management
B. command and control protection
C. centralized management of security devices
D. IPsec encryption
What is the maximum number of SRX Series devices in a chassis cluster?
A. 2
B. 3
C. 4
D. 5
You want to deploy a VPN that will connect branch locations to the main office. You will eventually add additional branch locations to the topology, and you must avoid additional configuration on the hub when those sites are added.
In this scenario, which VPN solution would you recommend?
A. Site-to-Site VPN
B. Hub-and-Spoke VPN
C. AutoVPN
D. Group VPN
Which statement is correct about service chaining?
A. Service chaining uses IPsec to connect together two or more VMs
B. Service chaining evaluates traffic by using multiple security features on the same instance
C. Service chaining redirects traffic back through the same device for additional processing
D. Service chaining combines multiple VNF instances together in the data flow
Which two features are used to stop IP spoofing in and out of your network? (Choose two.)
A. GeoIP
B. firewall filters
C. unicast reverse path forwarding
D. IPS
You are deploying Security Director with the logging and reporting functionality for VMs that use SSDs. You expect to have approximately 20,000 events per second of logging in your network.
In this scenario, what is the minimum number of logging and reporting devices that should be used?
A. 2
B. 4
C. 1
D. 3
You are asked to install a mechanism to protect an ISP network from denial-of-service attacks from a small number of sources.
Which mechanism will satisfy this requirement?
A. RTBH
B. UTM
C. Sky ATP
D. GeoIP
Which solution centralizes the management of security devices in your data center?
A. Juniper Networks Secure Analytics
B. J-Web
C. Junos Space Security Director
D. Junos CLI
You are concerned about users downloading malicious attachments at work while using encrypted Web mail. You want to block these malicious files using your SRX Series device.
In this scenario, which two features should you use? (Choose two.)
A. SSL reverse proxy
B. SSL forward proxy
C. Sky ATP SMTP scanning
D. Sky ATP HTTP scanning
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Juniper exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JN0-1331 exam preparations and Juniper certification application, do not hesitate to visit our Vcedump.com to find your solutions here.