JN0-335 Online Practice Questions

Home / Juniper / JN0-335

Latest JN0-335 Exam Practice Questions

The practice questions for JN0-335 exam was last updated on 2025-06-03 .

Viewing page 1 out of 7 pages.

Viewing questions 1 out of 35 questions.

Question#1

Exhibit



You just finished setting up your command-and-control (C&C) category with Juniper ATP Cloud. You notice that all of the feeds have zero objects in them.
Which statement is correct in this scenario?

A. The security intelligence policy must be configured; on a unified security policy
B. Use the commit full command to start the download.
C. No action is required, the feeds take a few minutes to download.
D. Set the maximum C&C entries within the Juniper ATP Cloud GU

Explanation:
According to the Juniper Networks JNCIS-SEC Study Guide, when you set up your command-and-control (C&C) category with Juniper ATP Cloud, all of the feeds will initially have zero objects in them. This is normal, as it can take a few minutes for the feeds to download. No action is required in this scenario and you will notice the feeds start to populate with objects once the download is complete.

Question#2

When a security policy is deleted, which statement is correct about the default behavior of active sessions allowed by that policy?

A. The active sessions allowed by the policy will be dropped.
B. The active sessions allowed by the policy will be marked as a legacy flow and will continue to be forwarded.
C. The active sessions allowed by the policy will be reevaluated by the cached
D. The active sessions allowed by the policy will continue

Explanation:
When a security policy is deleted, the existing sessions that were previously allowed by that policy are not immediately dropped; instead, they are typically treated as legacy flows. This means they are allowed to continue until they naturally end or until the session timeout is reached. This behavior ensures that deleting a policy does not abruptly disrupt ongoing traffic flows that were previously authorized by that policy. This approach helps in avoiding unintended service disruptions, especially in production environments where active connections may be critical to operations.

Question#3

After JSA receives external events and flows, which two steps occur? (Choose two.)

A. After formatting the data, the data is stored in an asset database.
B. Before formatting the data, the data is analyzed for relevant information.
C. Before the information is filtered, the information is formatted
D. After the information is filtered, JSA responds with active measures

Explanation:
When JSA (Juniper Secure Analytics) receives external events and flows, the typical processing steps are:
Option C. Before the information is filtered, the information is formatted.
Data formatting is an initial step in the process where raw data from events and flows is converted into a standard format that can be more easily processed and analyzed by JSA.
Option A. After formatting the data, the data is stored in an asset database.
Once the data is formatted, it is stored in an asset database. This database acts as a repository for all the formatted data, enabling JSA to perform further analysis, correlation, and eventually, to maintain a comprehensive view of the network assets and activities.
These steps are part of JSA’s comprehensive approach to security event management, which involves collecting, normalizing, and analyzing data to identify potential security threats and vulnerabilities efficiently.

Question#4

You are asked to find systems running applications that increase the risks on your network. You must ensure these systems are processed through IPS and Juniper ATP Cloud for malware and virus protection.
Which Juniper Networks solution will accomplish this task?

A. JIMS
B. Encrypted Traffic Insights
C. UTM
D. Adaptive Threat Profiling

Explanation:
Adaptive Threat Profiling (ATP) is a Juniper Networks solution that enables organizations to detect malicious activity on their networks and process it through IPS and Juniper ATP Cloud for malware and virus protection. ATP is powered by Juniper’s advanced Machine Learning and Artificial Intelligence (AI) capabilities, allowing it to detect and block malicious activity in real-time. ATP is integrated with Juniper’s Unified Threat Management (UTM) and Encrypted Traffic Insights (ETI) solutions, providing an end-to-end network protection solution.

Question#5

How does Juniper ATP Cloud protect a network from zero-day threats?

A. It uses a cache lookup.
B. It uses antivirus software.
C. It uses dynamic analysis.
D. It uses known virus signatures.

Explanation:
Juniper ATP Cloud is a cloud-based service that provides advanced threat prevention and detection for your network. It integrates with SRX Series firewalls and MX Series routers to analyze files and network traffic for signs of malicious activity. Juniper ATP Cloud protects a network from zero-day threats by using dynamic analysis, which is a method of executing files in a sandbox environment and observing their behavior and network interactions. Dynamic analysis can uncover unknown malware that may evade static analysis or signature-based detection methods.
Reference: = Juniper Advanced Threat Prevention - Juniper Networks, Juniper Advanced Threat Prevention Datasheet, Juniper Advanced Threat Prevention | NetworkScreen.com

Exam Code: JN0-335Q & A: 63 Q&AsUpdated:  2025-06-03

 Get All JN0-335 Q&As