Juniper Networks Certified Internet Specialist – SEC Certification

Courses:   JSEC, JUTM
Exams:   JNO-332
Certification:   JNCIS-SEC

 

Target Audience

Designed for experienced networking professionals with intermediate knowledge of the Juniper Networks Junos software for SRX Series devices, this written exam verifies the candidate’s understanding of security technologies and related platform configuration and troubleshooting skills.

Detailed Exam Objective

Zones

  • Demonstrate knowledge of the configuration, operation and troubleshooting of zonesIdentify the relationship between zones assignments, interfaces, and routing instances
  • List and identify the steps necessary to configure zones
  • Compare and contrast device’s behavior when handling transit packets -versus packets destined to the device.
  • Demonstrate understanding of configuration precedence
  • Describe the traffic behavior based on a sample zone configuration

SCREEN Options

  • Demonstrate knowledge of the configuration and operation of SCREENsConfigure SCREENs with necessary parameters based on threats
  • Compare and contrast reconnaissance, DoS, and suspicious packets attacks

Security Policies

  • Describe the purpose, configuration and operation of a security policy
  • Define the purpose of security policy configuration components
  • Demonstrate understanding of the default security policty
  • Based on policy configurations, describe the impact of security policy changes on sessions in progress
  • Describe the purpose of an address book
  • Based on policy configurations, compare and contrast scheduled and non-scheduled policies
  • Demonstrate understanding of security policy monitoring

NAT

  • Demonstrate knowledge of the configuration and operation of NATDescribe support of NAT and different NAT types
  • Identify NAT scenarios requiring Proxy-ARP configurations
  • Identify types of NAT used, based on various NAT configurations and outputs

IPSec VPNs

  • Describe the operation of secure VPNsCompare and contrast symmetric and asymmetric key encryption
  • Describe the DH key exchange process
  • Describe IPSec VPN setup, encapsulation and configuration
  • List specifics of Security Associations
  • Describe the IKE phases functionality and purpose
  • Compare and contrast policy-based and route-based IPSec implementations
  • Configure route-based and policy-based IPSec VPNs

HA Clustering

  • Describe HA functionality, configuration and operation
  • Identify chassis cluster interfaces and their functions
  • Configure redundancy groups

Intro to IDP

  • Describe IDP concepts and configuration
  • Identify IDP components
  • Identify IDP policy match conditions
  • Identify IDP policy actions
  • Describe the procedure for updating the attack database

Firewall User Authentication Overview

  • Describe firewall user authentication, concepts, and configuration
  • Compare and contrast types of firewall user authentication
  • Configure access profiles
  • Configure client groups
  • Describe the behavior when using external authentication servers

Demonstrate understanding of firewall user authentication monitoring Introduction to UTM

  • Describe the configuration of UTM policies and enforcement of licenses
  • Identify UTM components
  • Explain how each major feature addresses the challenges of the branch office

Anti-Spam Filtering

  • Describe the purpose, configuration and operation of anti-spam filtering
  • Define anti-spam filtering terminology and components
  • Describe the anti-spam filtering process
  • Configure anti-spam filtering using the CLI
  • Demonstrate understanding of anti-spam monitoring

Anti-Virus Protection

  • Identify the differences between the two types of anti-virus protection
  • Describe anti-virus purpose, configuration and operation
  • Describe the anit-virus protection process
  • Configure anti-virus protection using the CLI
  • Demonstrate understanding of anti-virus monitoring

Content Filtering

  • Describe the purpose, configuration and operation of content filtering
  • Degine content filtering terminology and parameters
  • Configure content filtering using the CLI
  • Demonstrate understanding of content filter monitoring

Web Filtering

  • Describe the purpose, configuration and operation of Web filtering
  • Define Web filtering terminology and parameters
  • Describe the Web filtering process
  • Configure Web filtering using the CLI
  • Demonstrate understanding of Web filter monitoring
  • Identify the differences between the three types of Web filtering

Exam Length

90 minutes

Exam Type

75 multiple-choice questions