JN0-1330 Dumps | A client wants to deploy a vSRX chassis cluster

Question: 20

A client wants to deploy a vSRX chassis cluster across two existing ESXi hosts without changing the external switch configuration. Which two actions must you perform to meet this requirement? (Choose two.)

A. Use a distributed virtual switch.
B. Use an overlay network to transport cluster heartbeats over Layer 3.
C. Configure private VLANs on the virtual switch for the control and fabric links.
D. Use a standard virtual switch.

Answer: A,C

JN0-1330 Dumps | Your company is establishing a BYOD policy and

Question: 19

Your company is establishing a BYOD policy and you are asked to create the appropriate security infrastructure. In the policy, Internet access should only be provided to the BYOD wired and wireless devices. Which two security features meet these requirements? (Choose two.)

A. 802.11g
B. 802.1X
C. guest VLAN
D. C-VLAN

Answer: B,C

JN0-1330 Dumps | Spotlight Secure provides

Question: 18

Spotlight Secure provides which benefit?

A. log management
B. botnet protection
C. centralized management of security devices
D. IPsec encryption

Answer: C

JN0-1330 Exam Dumps | Which statements about IPsec…

Questions: 16

Which statements about IPsec tunnels is true?

A. They are used to provide in-depth packet inspection for traffic leaving your network.
B. They are used to prevent routing loops in a Layer 2 environment.
C. They are used to secure and encrypt traffic between tunnel endpoints.
D. They are used to combine multiple interfaces into a single bundle.

Answer: C

JN0-1330 Exam Dumps | Which three actions are part…

Questions: 14

Which three actions are part of an in-depth network defense strategy? (Choose three.)

A. providing data modeling
B. auditing for suspicious events
C. providing security awareness training
D. providing least privileged network access
E. installing multiple antivirus solutions on desktop computers

Answer: BCD

JN0-1330 Exam Dumps | You are asked to provide…

Questions: 13

You are asked to provide a design proposal for a campus network. As part of the design, the customer requires that all end user devices must be authenticated before being granted access to their Layer 2 network. Which feature meets this requirement?

A. IPsec
B. 802.1X
C. NAT
D. ALGs

Answer: B