JN0-231 Exam QuestionsBrowse all questions from this exam

JN0-231 Exam - Question 1


Which two criteria should a zone-based security policy include? (Choose two.)

Show Answer
Correct Answer:

Two essential criteria for a zone-based security policy are zone context and an action. The zone context defines the scope within which the rules are applied, specifying the movement of traffic between security zones. An action dictates what is to be done with the traffic that matches the defined criteria, such as allowing or blocking it. These components ensure that traffic is appropriately managed and secure as it traverses the network.

Discussion

12 comments
Sign in to comment
Bubu3kOptions: CD
Nov 17, 2022

I think it should be the zone context (from zone to zone) and an action

mohdema
Nov 28, 2022

I think it’s src and dst https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/topic-map/security-policy-configuration.html

mohdema
Nov 28, 2022

In a Junos OS stateful firewall, the security policies enforce rules for transit traffic, in terms of what traffic can pass through the firewall, and the actions that need to take place on traffic as it passes through the firewall. From the perspective of security policies, the traffic enters one security zone and exits another security zone. This combination of a from-zone and to-zone is called a context. Each context contains an ordered list of policies. Each policy is processed in the order that it is defined within a context.

mohdemaOptions: AB
Nov 28, 2022

A security policy is a set of statements that controls traffic from a specified source to a specified destination using a specified service. A policy permits, denies, or tunnels specified types of traffic unidirectionally between two points. Each policy consists of: A unique name for the policy. A from-zone and a to-zone, for example: user@host# set security policies from-zone untrust to-zone untrust A set of match criteria defining the conditions that must be satisfied to apply the policy rule. The match criteria are based on a source IP address, destination IP address, and applications. The user identity firewall provides greater granularity by including an additional tuple, source-identity, as part of the policy statement. A set of actions to be performed in case of a match—permit, deny, or reject. Accounting and auditing elements—counting, logging, or structured system logging. ~~~~Action is not a match criteria https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/topic-map/security-policy-configuration.html

RbrahmiOptions: CD
Feb 24, 2023

CD are the correct answers

bigmokeyOptions: CD
Jan 10, 2023

no mention of port, does have application Security Policy Structure + Name + Context + From-zone & to-zone + Rules + Match criteria + Source address + Destination address + Application + Identity (user-based firewall) + Action

fosi130
May 8, 2023

CD is the answer

Taweke
Jun 28, 2023

no need source port and destination port but use application

Engg_flintOptions: CD
Oct 17, 2023

C and D

JaredMOptions: CD
Feb 18, 2024

Ports not required in zone based policies

longanghiOptions: CD
Mar 8, 2024

CD is correct

westh4m1234Options: CD
Mar 15, 2024

YEP CD

quraitulainOptions: CD
Apr 4, 2024

C D is the answer