JN0-102 289Q&S Juniper Networks Certified Internet Associate Junos (JNCIA-Junos) by uEE

The IP address 10.1.1.1 belongs to which class of IP address space?

A. Class A
B. Class B
C. Class C
D. Class D

Answer Clike
For the interface ge-1/2/3.4, what does "ge" represent?

A. SONET/SDH
B. Gigabit Ethernet
C. Aggregated Ethernet
D. GRE

Answer Clike
Which command prompt indicates that you are in operational mode?

A. user@router&
B. user@router#
C. user@router%
D. user@router>

Answer Clike
What is a valid IPv6 address?

A. 00:05:85:23:45:67
B. 127.0.0.1
C. 2001:0db8:3000:2215:0000:0000:aaaa:1111
D. 49.0001.0192.0168.1001.00

Answer Clike
Which simplified IPv6 address is the same as the IP address 2001:0000:1000:0000:0000:cbff:0020:0001/64?

A. 2001::1::cbff:2:0001/64
B. 2001::1000::cbff:20:1/64
C. 2001:0:1000::cbff:20:1/64
D. 2001:0:1:0:0:cbff:2:1/64

Answer Clike
What is the binary equivalent of 242.168.94.124?

A. 11110011 10101000 01011110 01111100
B. 11110010 10101010 01011110 01111100
C. 11110010 10101000 01011110 01111100
D. 11110010 10101000 01010110 01111100

Answer Clike
What is the last usable IP address in the 218.6.0.0/17 network?

A. 218.6.125.254
B. 218.6.126.254
C. 218.6.127.254
D. 218.6.128.254

Answer Clike
What is the network address for the 10.13.147.100/19 host?

A. 10.13.128.0
B. 10.13.147.0
C. 10.13.0.0
D. 10.13.100.0

Answer Clike
What are three benefits of using IPv6? (Choose three.)

A. IPv6 supports a greater level of security by integrating features that were optional add-ons in IPv4.
B. IPv6 reduces administrative overhead using stateless address autoconfiguration for hosts.
C. IPv6 eliminates the need for private to public NAT using a large address pool.
D. IPv6 provides backward compatibility with IPv4 using the Next Header field.
E. IPv6 represents large IP addresses using dotted decimal notation.

Answer Clike
Which statement is correct about the forwarding table?

A. The forwarding table is stored only on the PFE.
B. The forwarding table contains all known routes.
C. The forwarding table is stored on both the RE and PFE.
D. The forwarding table is stored only on the RE.

Answer Clike
Which statement describes exception traffic?

A. Exception traffic must be sent to the PFE for processing.
B. Exception traffic enters one ingress port and is sent out multiple egress ports.
C. Exception traffic is rate-limited on the internal link to prevent DoS attacks.
D. Exception traffic is processed after forwarding traffic when congestion exists.

Answer Clike
What are two benefits of the modular design of the Junos OS? (Choose two.)

A. Each module uses application-specific integrated circuits (ASICs).
B. Each module runs in its own protected memory space.
C. Each module can be individually restarted.
D. Each module is supported across all Junos platforms.

Answer Clike
Which statement describes the PFE?

A. The PFE controls the RE by providing Layer 2 and Layer 3 forwarding tables.
B. The PFE implements advanced services such as policing, stateless firewall filtering, and class of service.
C. The PFE sends traffic to the RE for systematic packet forwarding.
D. The PFE receives hardware and environmental status messages from the RE.

Answer Clike
How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?

A. It sends the traffic through one egress port toward its destination.
B. It sends the traffic through multiple egress ports to all available receivers.
C. It sends the traffic through an internal link to the RE.
D. It sends the traffic to the local system for further processing.

Answer Clike
Which two design goals describe the Junos OS design? (Choose two.)

A. clean separation of security and routing policies
B. clean separation of control and forwarding planes
C. modularization of multiple software processes
D. a single hardware platform for all software applications

Answer Clike
Which two Junos platforms provide stateful firewall functionality? (Choose two.)

A. MX Series
B. EX Series
C. SRX Series
D. QFX Series

Answer Clike
What are two examples of RE exception traffic? (Choose two.)

A. BGP updates that travel through the local router and are destined for a remote router.
B. OSPF hello packets that are sent from a remote router and are destined for the local router.
C. Telnet traffic that is sent from a remote host and is destined for the local router.
D. Telnet traffic that travels through the local router and is destined for a remote end host.

Answer Clike
In the Junos OS, what handles transit traffic?

A. Transit traffic is handled by the RE only.
B. Transit traffic is handled by the PFE only.
C. Transit traffic is handled by both the RE and the PFE.
D. Transit traffic is not handled by the RE or the PFE.

Answer Clike
Which statement describes transit traffic?

A. Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.
B. Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.
C. Any traffic that requires the generation of an ICMP message.
D. Traffic that requires some form of special attention and does not pass through the device.

Answer Clike
What is the central processing component of the forwarding plane?

A. PFE
B. RE
C. Junos OS
D. forwarding table

Answer Clike
Which statement is correct regarding the Junos OS?

A. The same Junos OS image is used on all Junos devices.
B. The Junos OS provides separation between the control and forwarding planes.
C. Each Junos OS image is based on model-specific source code.
D. The Junos OS creates a secondary instance of the kernel to ensure redundancy.

Answer Clike
What are two functions of the RE? (Choose two).

A. to maintain routing tables
B. to forward traffic toward its destination
C. to manage the PFE
D. to implement various services such as policing, stateless firewall filtering, and class of service

Answer Clike
Which statement is correct regarding exception traffic processing?

A. Exception traffic is only handled by the PFE.
B. Exception traffic is rate-limited across the internal link to protect the RE.
C. Exception traffic is not prioritized during times of congestion.
D. Exception traffic is forwarded based on forwarding table entries.

Answer Clike
Which two statements are true about the configure exclusive command? (Choose two.)

A. It allows users to retain all uncommitted changes when exiting exclusive configuration mode.
B. It allows multiple users to edit private copies of the configuration concurrently.
C. It causes the loss of all uncommitted changes when exiting exclusive configuration mode.
D. It excludes other users from editing the configuration.

Answer Clike
Which command will display the active configuration?

A. user@router> show configuration
B. user@router# show
C. user@router> show system configuration
D. user@router> show system commit

Answer Clike
Which three statements are true regarding the candidate configuration? (Choose three.)

A. The candidate configuration is a temporary configuration that might become the active configuration.
B. A candidate configuration is initially populated with the configuration currently active on the system.
C. Changes to the candidate configuration take effect immediately.
D. The candidate configuration becomes the active configuration after a system reboot.
E. The configure private command allows concurrent editing of a candidate configuration by multiple users.

Answer Clike
%Exhibit%[edit] user@router# show | compare [edit protocols ospf area 0.0.0.0]
-interface ge-0/0/0.0 {
-disable;
-} [edit protocols ospf] area 0.0.0.0 { ... }

area 0.0.0.1 {
+
interface ge-0/0/0.0;
+
} %Exhibit%
Referring to the exhibit, what are two differences between the active and candidate configurations? (Choose two.)


A. The ge-0/0/0 interface was added to the candidate configuration.
B. Area 0 was added to the active configuration.
C. Area 1 was added to the candidate configuration.
D. The ge-0/0/0 interface was added to the active configuration.

Answer Clike
Which mode is used to allow only a single person to edit a configuration?

A. configure batch
B. configure private
C. configure exclusive
D. configure dynamic

Answer Clike
Which information would you find using the CLI help function? (Choose two.)

A. message of the day
B. tip of the day
C. explanation for specific system log error messages
D. explanation for specific traceoptions log messages

Answer Clike
Which two statements are true of login classes? (Choose two.)

A. Users can be members of multiple login classes.
B. Login classes define authorization parameters for a user.
C. There are five system-defined login classes.
D. Login class permission flags can be overridden for certain commands.

Answer Clike
Which two statements are true regarding rescue configurations? (Choose two.)

A. Once saved, a rescue configuration is loaded using the rollback 0 command.
B. The rescue configuration must contain the minimal elements necessary to restore network connectivity.
C. A minimal rescue configuration is defined by default.
D. A rescue configuration must include a root password.

Answer Clike
%Exhibit%Amnesiac (ttyu0)
login: %Exhibit%
Which statement is correct about the information shown in the exhibit? G44


A. The factory-default configuration is running on the device.
B. The Junos OS was corrupted and did not boot correctly.
C. The device was recently upgraded to a newer version of the Junos OS.
D. The device's memory has been corrupted and no file system is present after a reboot.

Answer Clike
Which two statements are true regarding the use of NTP clock synchronization? (Choose two.)

A. The Junos OS supports client, server, and symmetric modes of NTP operation.
B. Synchronized time on all network devices makes log messages more useful for troubleshooting.
C. Authentication methods are not supported.
D. The Junos OS must be used as the primary time reference.

Answer Clike
You are asked to change the cable on interface ge-2/1/3. Which statement is correct?

A. The cable is found on FPC 1, slot 3, and port 2.
B. The cable is found on slot 1, port 2, and FPC 3.
C. The cable is found on port 3, FPC 2, and slot 1.
D. The cable is found on FPC 1, slot 2, and port 3.

Answer Clike
You are asked to change the cable on interface fe-4/2/3. Which statement is correct?

A. The cable is found on port 4, FPC 2, and slot 3.
B. The cable is found on slot 2, port 3, and FPC 4.
C. The cable is found on FPC 4, slot 3, and port 2.
D. The cable is found on slot 2, FPC 3, and port 4.

Answer Clike
You are asked to change the cable on interface ge-0/2/1. Which statement is correct?

A. The cable is found on slot 2, port 0, and FPC 1.
B. The cable is found on FPC 0, slot 1, and port 2.
C. The cable is found on port 1, slot 0, and FPC 2.
D. The cable is found on slot 2, port 1, and FPC 0.

Answer Clike
%Exhibit%user@router> show configuration groups { ge-int { interfaces { { unit 0 { familyinet { address 10.10.12.1/24;
} } } }
} } ... interfaces { ge-0/0/1 { unit 0; }
%Exhibit%
Referring to the exhibit, which two actions would you take to only apply the 10.10.12.1/24 address to the ge-0/0/1.0 interface?


A. Apply the ge-int group to the configuration at the [edit] hierarchy.
B. Apply the ge-int group to the configuration at the [edit interfaces ge-0/0/1] hierarchy.
C. Apply the ge-int group to the configuration at the [edit interfaces ge-0/0/1 unit 0] hierarchy.
D. Apply the ge-int group to the configuration at the [edit interfaces] hierarchy.

Answer Clike
Which command is used to restore a Junos device to its default state?

A. load factory-default
B. load override factory-default
C. load replace default
D. load set default

Answer Clike
Which statement is true about logical units?

A. Logical units are similar to VLANs used by other vendors.
B. A logical unit is required for transit interfaces.
C. Frame Relay encapsulation supports one logical unit.
D. Link speed and duplex are configured in the logical unit properties.

Answer Clike
%Exhibit%[edit system syslog] user@router# show host 152.170.10.10 { any warning; } file changes { change-log info; } %Exhibit%
Referring to the exhibit, which two statements are true? (Choose two.)


A. Any warning message will be sent to the 152.170.10.10 host.
B. A warning message will be logged when the 152.170.10.10 host logs in.
C. Changes to the device's internal temperatures will be logged.
D. Changes to the configuration will be logged.

Answer Clike
Which command is used to load the rescue configuration?

A. load override rescue
B. rollback rescue
C. load replace rescue-configuration
D. rollback 49

Answer Clike
%Exhibit%user@router> restart
^ unknown command. %Exhibit%
You are investigating routing problems on a device running the Junos OS. You receive the error shown in the exhibit when you attempt to restart the routing process.
Which statement describes the problem?


A. You have typed an invalid command.
B. You must be in configuration mode to restart the routing process.
C. You do not have permission to restart the routing process.
D. You must wait until close of business to restart the routing process, based on user-defined policy.

Answer Clike
At which command prompt would you issue the set date command?

A. [edit chassis] user@router#
B. [edit] user@router#
C. [edit system] user@router#
D. user@router>

Answer Clike
You must apply the family inet configuration parameter only to Gigabit Ethernet interfaces that are in FPC
2.
Which output applies to this configuration?


A. [edit groups] user@router# show ge-int { interfaces { { unit 0 { familyinet;
} } } }
B. [edit groups]
user@router# show ge-int { interfaces { <*> { unit 0 { familyinet;
} } } }
C. [edit groups] user@router# show ge-int { interfaces { <*-2/*/*> { unit 0 { familyinet;
} } } }
D. [edit groups] user@router# show ge-int { interfaces { { unit 0 { familyinet;
} } } }

Answer Clike
%Exhibit%[edit interfaces ge-0/0/1] user@router# show unit 100 { vlan-id 100; familyinet { address /24;
} }
[edit interfaces ge-0/0/1] user@router# commit check [edit interfaces ge-0/0/1]
'unit 100'
Only unit 0 is valid for this encapsulation error: configuration check-out failed %Exhibit%
Referring to the exhibit, you are unable to commit the configuration for the ge-0/0/1 interface.
What must you do to commit the configuration?


A. You must set the vlan-tagging parameter under the [edit interfaces ge-0/0/1] hierarchy.
B. You must use the rename command to change unit 100 to unit 0.
C. You must set the encapsulation flexible-ethernet-services parameter under the [edit interfaces ge0/0/1] hierarchy.
D. You must set the encapsulation vlan-ccc parameter under the [edit interfaces ge-0/0/1 unit 100] hierarchy.

Answer Clike
%Exhibit%user@router> show system alarms 1 alarms currently active Alarm time Class Description 2013-09-14 23:54:01 UTC Minor Rescue configuration is not set %Exhibit%

Which command will resolve the problem shown in the exhibit?


A. user@router> request system configuration rescue save
B. user@router# request system configuration rescue save
C. user@router> file copy current /config/rescue.conf
D. user@router# file copy current /config/rescue.conf

Answer Clike
Which command displays only the interfaces that are operationally and administratively up?

A. show interfaces terse | match up
B. show interfaces terse | match down
C. show interfaces terse | except up
D. show interfaces terse | except down

Answer Clike
To which directory does the Junos OS write traceoptions files?

A. /var/tmp/
B. /var/
C. /var/log/
D. /var/home//

Answer Clike
Which command gracefully shuts down the Junos OS?

A. request system reboot
B. request system logout
C. request system halt
D. restart gracefully

Answer Clike
Which action does the ping 172.18.1.1 size 5 command perform?

A. It sends only five ping requests to the 172.18.1.1 destination.
B. It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.
C. It sends five rapid ping requests to the 172.18.1.1 destination.
D. It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.

Answer Clike
Which command displays the current temperature of a Junos device's components?

A. show chassis temperature-thresholds
B. show chassis environment
C. show chassis hardware
D. show chassis alarms

Answer Clike
Which command would you use to view interface usage details in real time?

A. show interfaces terse
B. show interfaces extensive
C. monitor interface traffic
D. monitor traffic interface

Answer Clike
What happens when you issue the ping 172.19.102.2 count 5 command?

A. ICMP echo requests are sent to 172.19.102.2 in five-millisecond intervals.
B. ICMP echo requests are sent to 172.19.102.2 until five packets are dropped.
C. ICMP echo requests are sent to 172.19.102.2 five times.
D. ICMP echo requests are sent continuously to 172.19.102.2 for five seconds.

Answer Clike
You are troubleshooting a routing issue and need to check the hop-by-hop path to the 10.10.10.10 destination.
Which three commands would display the path? (Choose three.)


A. user@router# traceroute 10.10.10.10
B. user@router> ping record-route 10.10.10.10
C. user@router>traceroute 10.10.10.10
D. user@router# run traceroute 10.10.10.10
E. user@router# ping record-route 10.10.10.10

Answer Clike
You are asked to free up disk space so you can update your version of the Junos OS. Which two commands display the files that will be removed? (Choose two.)

A. user@router> request system storage cleanup
B. user@router> show system storage
C. user@router> request system storage cleanup dry-run
D. user@router> show system storage detail

Answer Clike
Which two commands are used during the password recovery process? (Choose two.)

A. clear system login
B. boot -s
C. recovery
D. delete system root-authentication

Answer Clike
You receive an alarm that your Junos device is experiencing problems regarding temperature. Which two commands would you use to investigate this problem? (Choose two.)

A. show chassis hardware
B. show chassis temperature-thresholds
C. show chassis pic fpc-slot pic-slot
D. show chassis environment

Answer Clike
Which two statements are true about static routes in the Junos OS? (Choose two.)

A. Static routes are defined at the [edit routing-instances] hierarchy.
B. Static routes must have a next hop defined.
C. Static routes remain in the routing table until you remove them or until they become inactive.
D. Static routes are learned by neighboring devices and added to their routing tables.

Answer Clike
Which two statements are true regarding route preference? (Choose two.)

A. Lower preference values are more preferred than higher preference values.
B. You can modify the default preference values for any of the routing information sources.
C. By default, a static route is more preferred than a RIP route.
D. A static route is always preferred over a direct route.

Answer Clike
Which two statements are true regarding routing tables? (Choose two.)

A. The routing table is populated by the forwarding table.
B. Devices running the Junos OS can accommodate multiple routing tables.
C. Information learned from routing protocols is stored in the routing table.
D. The primary routing table for IPv4 unicast routes is inet.4.

Answer Clike
Which two statements are correct when you use the reject parameter as the next-hop value for a static route? (Choose two.)

A. The packet is dropped and the packet's source is marked with the no-readvertise parameter.
B. The system sends the packet back to the source.
C. The packet is dropped from the network.
D. The system sends an ICMP message back to the source of the packet.

Answer Clike
Which source of routing information is preferred by default?

A. OSPF internal
B. OSPF external
C. IS-IS Level 1
D. IS-IS Level 2

Answer Clike
What are two routing requirements for a device to communicate with another device? (Choose two.)

A. end-to-end communications path
B. hosts on the same Layer 2 broadcast domain
C. hosts on the same Layer 3 broadcast domain
D. routing information on participating Layer 3 devices

Answer Clike
What are three types of routing instances? (Choose three.)

A. VPN
B. virtual-router
C. policy
D. VRF
E. forwarding

Answer Clike
Which two statements describe the forwarding table in the Junos OS? (Choose two.)

A. The forwarding table contains all known routes.
B. The forwarding table stores a subset of information from the routing table.
C. Junos devices use the forwarding table to compare incoming packets against existing entries to determine the next hop.
D. If multiple matches exist, the forwarding table uses the least-specific entry to forward packets toward the destination.

Answer Clike
%Exhibit%[edit routing-options] user@router# show static { route 0.0.0.0/0 { next-hop 10.1.1.1; qualified-next-hop 10.1.1.254 { preference 4;
}
} } %Exhibit%
Assuming both paths shown in the exhibit are available, which statement is correct?


A. Traffic matching the default route will use 10.1.1.1 as the next hop.
B. Traffic matching the default route will use 10.1.1.254 as the next hop.
C. Traffic matching the default route will be load-balanced per packet across both next hops.
D. Traffic matching the default route will be load-balanced per flow across both next hops.

Answer Clike
Which command will silently drop a matching packet?

A. set routing-options static route 10.1.1.1/32 no-retain
B. set routing-options static route 10.1.1.1/32 discard
C. set routing-options static route 10.1.1.1/32 reject
D. set routing-options static route 10.1.1.1/32 passive

Answer Clike
Which command will drop a matching packet and send out a notification message?

A. set routing-options static route 10.1.1.1/32 no-retain
B. set routing-options static route 10.1.1.1/32 discard
C. set routing-options static route 10.1.1.1/32 reject
D. set routing-options static route 10.1.1.1/32 no-install

Answer Clike
Which command will show the best paths that are installed in the PFE?

A. show route
B. show route active-path
C. show route private
D. show route forwarding-table

Answer Clike
Which command displays the egress interfaces selected on the PFE for destination prefixes?

A. show route forwarding-table
B. show route table
C. show route table extensive
D. show pfefwdd

Answer Clike
In which hierarchy are routing policies defined?

A. [edit policy-options]
B. [edit routing-options]
C. [edit forwarding-options]
D. [edit protocols]

Answer Clike
What are two default routing policies on Junos devices? (Choose two.)

A. The BGP import policy accepts all BGP routes.
B. The BGP export policy rejects all active BGP routes.
C. The OSPF import policy accepts all OSPF routes.
D. The OSPF export policy accepts all active OSPF routes.

Answer Clike
Which two statements are correct about firewall filters in the Junos OS? (Choose two.)

A. Firewall filters are stateless.
B. Firewall filters are used to control routing information that is exchanged between devices.
C. Firewall filters are used to control traffic passing through the device.
D. Firewall filters can only be applied to traffic entering the device.

Answer Clike
Which two statements are true regarding routing policy processing? (Choose two.)

A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.
B. Policies are evaluated from right to left as displayed in the Junos OS configuration file.
C. Polices are evaluated based on the order in which they are applied to a routing protocol.
D. Policy processing stops once the last statement in the policy is evaluated.

Answer Clike
What are three firewall filter terminating actions? (Choose three.)

A. accept
B. log
C. reject
D. discard
E. drop

Answer Clike
Which command will apply a policy to redistribute static routes into OSPF?

A. set protocols ospf import static-routes
B. set protocols ospf export static-routes
C. set routing-options static defaults readvertise
D. set routing-options static route 0.0.0.0/0 readvertise

Answer Clike
%Exhibit%[edit firewall family inet filter input-filter] user@router# show term my-policy { from { source-address {
151.43.62.0/24; }
} then { count;
} } term else { then { discard;
} } %Exhibit%
Which two tasks are accomplished by the firewall filter shown in the exhibit? (Choose two.)


A. Traffic matching the my-policy term will be counted and accepted.
B. Traffic matching the my-policy term will be counted and discarded.
C. Traffic not matching the my-policy term will be discarded.
D. Traffic not matching the my-policy term will be accepted.

Answer Clike
%Exhibit%[edit policy-options] user@router# show policy-statement block-routes { term 1 { from { route-filter 172.27.0.0/24 longer;
} then reject;
} term 2 { then accept;
} }
%Exhibit%
You are asked to ensure that your device does not accept any prefixes within the 172.27.0.0/24 network.
You have applied the policy shown in the exhibit, but the 172.27.0.0/24 route is still present on your device.
Which configuration will resolve this problem?


A. [edit policy-options policy-statement block-routes] user@router# set term 1 from route-filter 172.27.0.0/24 orlonger
B. [edit policy-options policy-statement block-routes] user@router# set term 1 from route-filter 172.27.0.0/24 upto /30
C. [edit policy-options policy-statement block-routes] user@router# set term 2 from route-filter 172.27.0.0/24 longer
D. [edit policy-options policy-statement block-routes] user@router# set term 2 from route-filter 172.27.0.0/24 orlonger

Answer Clike
You have configured a firewall filter with a single term matching on packets with a source address in the 10.0.0.0/24 subnet. This term only includes the count action.
Which two statements are true about traffic evaluated by this firewall filter? (Choose two.)


A. Packets outside the 10.0.0.0/24 subnet will be accepted.
B. Packets outside the 10.0.0.0/24 subnet will be rejected.
C. Packets outside the 10.0.0.0/24 subnet will be counted.
D. Packets outside the 10.0.0.0/24 subnet will not be counted.

Answer Clike
You have configured a firewall filter with a single term matching on packets with a source address in the 10.0.0.0/24 subnet. This term only includes the count action.
Which two statements are true about traffic evaluated by this firewall filter? (Choose two.)


A. Packets within the 10.0.0.0/24 subnet will be accepted.
B. Packets within the 10.0.0.0/24 subnet will be rejected.
C. Packets within the 10.0.0.0/24 subnet will be counted.
D. Packets within the 10.0.0.0/24 subnet will not be counted.

Answer Clike
For the interface ge-1/2/3.4, what does the "ge" represent?

A. Gigabit Ethernet
B. SONET/SDH
C. Aggregated Ethernet
D. GRE

Answer Clike
Which CLI mode allows you to make configuration changes?

A. enable mode
B. configuration mode
C. operational mode
D. active mode

Answer Clike
Which command do you use to navigate to [edit interfaces]?

A. cd interfaces
B. dir edit interfaces
C. edit interfaces
D. interfaces

Answer Clike
Which command will display the contents of the forwarding table?

A. show route forwarding-table
B. show forwarding
C. show configuration
D. show interfaces

Answer Clike
Which statement is true regarding the Junos OS?

A. Each process runs in its own protected memory space ensuring that one process cannot directly interfere with another.
B. Processes share memory space but use separate ASICs so that one process cannot directly interfere with another.
C. A central processor called the IP2 Chip dynamically assigns memory as process needs fluctuate.
D. The memory management daemon (mmd) is responsible for allocating new memory for processes as they request it.

Answer Clike
Which statement is true regarding the Junos OS?

A. The Junos kernel is based on the Solaris operating system.
B. The Junos kernel is based on the GNU Zebra operating system.
C. The Junos kernel is completely original and not based on any other operating system.
D. The Junos kernel is based on the FreeBSD UNIX operating system.

Answer Clike
Which statement is true regarding the Junos OS?

A. All platforms running the Junos OS use the same source code base.
B. All platforms running the Junos OS use the same PFE.
C. All platforms running the Junos OS use a hard drive to optimize syslog data storage.
D. All platforms running the Junos OS use a separate process with protected memory space for each routing protocol.

Answer Clike
Which statement is true regarding the Junos OS?

A. All platforms running the Junos OS have identical factory-default configurations.
B. All platforms running the Junos OS use the IP2 processor for longest-match lookup.
C. All platforms running the Junos OS use the same source code base.
D. All platforms running the Junos OS use FXP1 for communication between control and forwarding planes.

Answer Clike
What are two Junos processes? (Choose two.)

A. OSPF SPF daemon (ospfd)
B. SNMP daemon (snmpd)
C. BGP daemon (bgpd)
D. Routing protocols daemon (rpd)

Answer Clike
On which operating system is the Junos OS based?

A. ScreenOS
B. Solaris
C. FreeBSD
D. HP-UX

Answer Clike
What is an advantage of multiple software processes running in the Junos OS?

A. Each process has its own protected memory space.
B. Each process is started manually by the user at boot.
C. All processes are dependent on each other.
D. Multiple processes allow each routing protocol to be independent.

Answer Clike
Which two statements are true regarding the role of the Routing Engine (RE)? (Choose two.)

A. The RE controls and monitors the chassis.
B. The RE manages the Packet Forwarding Engine (PFE).
C. The RE receives a copy of the forwarding table from the forwarding plane.
D. The RE implements class of service (COS).

Answer Clike
Which statement is true regarding the Junos OS?

A. All platforms running the Junos OS separate the functions of learning and flooding.
B. All platforms running the Junos OS separate the functions of control and forwarding.
C. All platforms running the Junos OS separate the functions of routing and bridging.
D. All platforms running the Junos OS separate the functions of management and routing.

Answer Clike
Which statement is true about the forwarding plane?

A. The forwarding plane is the intelligence of the platform.
B. The forwarding plane is based on an X86 architecture.
C. The forwarding plane maintains the routing tables, bridging table, and primary forwarding table.
D. The forwarding plane implements policers, stateless firewall filters, and class of service.

Answer Clike
Which statement is true regarding the forwarding plane?

A. The forwarding plane is contained within the Routing Engine (RE).
B. The forwarding plane processes and evaluates exception traffic.
C. The forwarding plane contains the Packet Forwarding Engine (PFE).
D. The forwarding plane is not present on all platforms running the Junos OS.

Answer Clike
Which statement is true about the forwarding plane?

A. It uses ASICs for increased performance.
B. It is the intelligence of the platform.
C. It maintains the routing tables.
D. It is based on an x86 architecture.

Answer Clike
How do you ping from configuration mode?

A. [edit interfaces] user@router# run ping 1.1.1.1
B. [edit interfaces] user@router# ping 1.1.1.1
C. [edit interfaces] user@router# up ping 1.1.1.1
D. [edit interfaces] user@router# exit ping 1.1.1.1

Answer Clike
Which two commands will successfully create ping traffic? (Choose two.)

A. user@router# ping 10.10.10.1
B. user@router# run ping 10.10.10.1
C. user@router> ping 10.10.10.1
D. user@router> request ping 10.10.10.1

Answer Clike
Which command is used to display all output at once?

A. show interfaces | all
B. show interfaces | no-more
C. show interfaces | hold
D. show interfaces | display-all

Answer Clike
Which CLI command is used to display output one page at a time?

A. user@router> show interfaces | no-more
B. user@router> show interfaces | trim
C. user@router> show interfaces
D. user@router> show interfaces | display

Answer Clike
What information does the help reference command provide?

A. A brief description of commands and their default values
B. The serial number and version number of the device used to open a support case with JTAC
C. A list of all the active hardware alarms on the device
D. A display of the current configuration while in operational mode

Answer Clike
Which two statements apply when a user has entered private configuration mode by typing configure private? (Choose two.)

A. All users have their own active configuration.
B. All users have their own private candidate configuration.
C. When a user commits, all nonconflicting changes made by all users are committed.
D. When a user commits, only the user's own changes are committed.

Answer Clike
What does the command show | compare rollback 1 display?

A. the difference between the current candidate configuration and the candidate configuration from one commit ago
B. the difference between the current active configuration and the current candidate configuration
C. the difference between the current active configuration and the active configuration from one commit ago
D. the difference between the current candidate configuration and the archived configuration from one commit ago

Answer Clike
How do you write the current candidate configuration to the permanent storage media?

A. [edit] user@router# save /var/tmp/current.conf
B. [edit] user@router# write /var/tmp/current.conf
C. [edit] user@router# commit /var/tmp/current.conf
D. [edit] user@router# dump /var/tmp/current.conf

Answer Clike
Which J-Web tab do you use to add licenses to the device?

A. "Configure"
B. "Troubleshoot"
C. "Monitor"
D. "Maintain"

Answer Clike
Which three functions are available under the "Maintain" tab of J-Web? (Choose three.)

A. download and delete log files
B. view real-time statistics of interfaces
C. reboot the system
D. view and add licenses
E. edit security settings

Answer Clike
Which command is used to enable access to J-Web using HTTPS?

A. set system remote-access profile https
B. set services remote-access profile j-web-https
C. set system services web-management https
D. set services web-management j-web-https

Answer Clike
How can you verify that you have correctly configured SSH access to your Junos device?

A. user@router# show system services
B. user@router> show configuration services
C. user@router# show configuration system services
D. user@router# show system login

Answer Clike
What must be configured prior to the first commit after factory defaults are loaded?

A. root authentication
B. default gateway
C. host name
D. management services

Answer Clike
Which two statements are true about the rescue configuration file? (Choose two.)

A. It must include a root password.
B. It is rollback file number 50, and you can recover it by issuing rollback 50.
C. It is created by issuing request system configuration rescue save.
D. It is updated automatically when you commit.

Answer Clike
Which command will save the current active configuration as the rescue configuration?

A. user@router# save | rescue
B. user@router> request system configuration rescue save
C. user@router# save rescue configuration
D. user@router> file save rescue-configuration

Answer Clike
Which command will delete the current rescue configuration?

A. user@router# system delete configuration rescue
B. user@router> request system configuration rescue delete
C. user@router# delete rescue configuration
D. user@router> file delete rescue-configuration

Answer Clike
Which two statements are true about the primary address on an interface? (Choose two.)

A. It is the address used by default as the local address for broadcast and multicast packets sourced locally and sent out of the interface.
B. You use the primary address when you have multiple IP addresses belonging to the same subnet on the same interface.
C. It can be useful for selecting the local address used for packets sent out of unnumbered interfaces when multiple non-127 addresses are configured on the loopback interface.
D. By default, the primary address on an interface is selected as the numerically highest local address configured on the interface.

Answer Clike
What are three physical interface properties? (Choose three.)

A. payload scrambling
B. virtual circuit identifier
C. FCS
D. link speed
E. IP address

Answer Clike
Which two commands may be used when configuring an IP address for a Gigabit Ethernet interface? (Choose two.)

A. set interfaces ge-0/0/0.0 address 10.1.1.1/24
B. set interfaces ge-0/0/0.0 family inet address 10.1.1.1/24
C. set interfaces ge-0/0/0 unit 0 family inet address 10.1.1.1/24
D. set interfaces ge-0/0/0 address 10.1.1.1/24

Answer Clike
You accidentally configured interface so-0/0/0.0 with /32 instead of /30.
Which two solutions could you use to correct this configuration? (Choose two.)


A. [edit interfaces so-0/0/0.0] user@router# replace family inet address /32 with /30
B. [edit interfaces so-0/0/0.0] user@router# rename family inet address /32 to address /30
C. [edit] user@router# replace interface so-0/0/0.0 family inet address /32 with address /30
D. [edit interfaces so-0/0/0.0] user@router# delete family inet address user@router# set family inet address /30

Answer Clike
Which three user authentication methods are supported by the Junos OS? (Choose three.)

A. RADIUS
B. CHAP
C. local user database
D. TACACS+
E. PAP

Answer Clike
Which user authentication method is supported by the Junos OS as a last resort alternative?

A. TACACS+
B. RADIUS
C. local user database
D. enable password

Answer Clike
The authentication order configuration on your M120 includes the settings tacplus and radius (in that order), but does not include the password parameter. You attempt to log in to the device, but the network containing the authentication servers is currently down.
Which statement is true about your login attempt?


A. The login attempt is rejected.
B. The login attempt is automatically accepted after the authentication servers' timeout value is reached, since there are no other authentication methods available.
C. The M120 automatically tries authenticating locally on the device after the authentication servers' timeout value is reached.
D. The M120 automatically tries authenticating locally on the device before using external authentication.

Answer Clike
You have been asked to configure a login class that will permit its users to view and edit the configuration. The class should allow a user to view the entire configuration, but only to edit the interfaces, routing-options, and protocols hierarchies.
Which configuration accomplishes this login class?


A. permissions [ view-configuration clear network view ]; allow-configuration "(interfaces) | (routing-options) | (policy-options) | (protocols)";
B. permissions [ view-configuration clear network view ]; allow-commands "(configure)";
C. permissions [ view-configuration clear network view ]; allow-commands "(configure)"; allow-configuration "(interfaces) | (routing-options) | (protocols)";
D. permissions [ clear network view ]; allow-commands "(configure)"; allow-configuration "(interfaces) | (routing-options) | (protocols)";

Answer Clike
Which two login-class permissions could permit a user to view the system hierarchy of the active configuration? (Choose two.)

A. system permission
B. view-configuration permission
C. network permission
D. super-user permission

Answer Clike
Which login class permission will allow a user to use the telnet utility?

A. network permission
B. maintenance permission
C. supervisor permission
D. shell permission

Answer Clike
Which two statements are true regarding trace options on Junos devices? (Choose two.)

A. You can see the contents of the log file by entering the show log command.
B. Trace options will send information to your screen automatically.
C. Trace options are limited to one protocol at a time.
D. The file name and a set of flags may be specified when enabling traceoptions.

Answer Clike
Which directory does the Junos OS use to store syslog information by default?

A. /var/messages
B. /var/syslog
C. /var/tmp
D. /var/log

Answer Clike
Which statement is true regarding syslog on Junos devices?

A. No logging is enabled by default.
B. By default, the information is stored in a file named events.
C. Only the message severity level must be configured.
D. You can configure the router to send log messages to the console.

Answer Clike
What is the default SNMP permission level on Junos devices?

A. read
B. read-write
C. read-only
D. write

Answer Clike
Which operational mode command can be used to synchronize the local system time with an NTP server?

A. set ntp time 64.32.129.3
B. set clock ntp 64.32.129.3
C. set time 64.32.129.3
D. set date ntp 64.32.129.3

Answer Clike
When configuring more than one archival site, which statement is true?

A. The system will first attempt the transfer using the URL configured last.
B. The system will transfer the configuration to each archival site.
C. The system will not transfer to a secondary site unless the previous site fails.
D. The system will transfer using secure copy protocol (SCP) before attempting FTP.

Answer Clike
When considering the default behavior of Junos platforms, which statement is true about archiving configurations?

A. A system log message is generated, confirming the transfer attempt.
B. The destination filename format can be altered by configuration.
C. The frequency the system archives the configuration cannot be changed.
D. An archive log is created to track transfer attempts, both failed and successful.

Answer Clike
You have been asked to configure your router to send link-related SNMP trap notifications to the network management system (NMS) located at address 172.16.17.1.
Which two commands are required? (Choose two.)


A. set snmp trap-group my-trap-group targets 172.16.17.1
B. set snmp targets 172.16.17.1
C. set snmp trap-group my-trap-group link-status
D. set snmp trap-group my-trap-group categories link

Answer Clike
Which statement is true regarding the Network Time Protocol (NTP) on Junos devices?

A. MD5 authentication is supported by the Junos OS.
B. Server mode is not supported by the Junos OS.
C. The Junos OS can provide a primary time reference.
D. The Junos OS does not support the use of a boot server.

Answer Clike
Which command will allow you to quickly determine the administrative status of all interfaces on a Junos device?

A. show interfaces status
B. show interfaces summary
C. show interfaces terse
D. show interfaces admin

Answer Clike
A network administrator wants to verify the active alarms on interface so-0/0/0.0. Which command displays this information?

A. show interfaces alarms
B. show interfaces terse
C. show alarms extensive
D. show interfaces extensive

Answer Clike
Your network administrator has asked you to view the real-time interface usage on ge-0/0/0. Which command would be used?

A. monitor interface ge-0/0/0
B. traceoptions interface ge-0/0/0
C. debug interface ge-0/0/0
D. monitor usage ge-0/0/0

Answer Clike
Which operational command would you use to quickly verify the state of all interfaces?

A. show interfaces terse
B. show interfaces
C. show configuration interfaces
D. show interface status

Answer Clike
Which command displays the amount of space available on the storage media?

A. show chassis routing-engine
B. show system file-storage
C. file list
D. show system storage

Answer Clike
Which command do you use to display the messages seen during the last system boot?

A. show system boot-messages
B. show chassis messages
C. show file system boot-messages
D. show boot-log messages

Answer Clike
Which command do you use to show active alarms?

A. show hardware state
B. show system alarms
C. show chassis state
D. show services alarms

Answer Clike
Which command do you use as a valid way to view the PICs within a router as well as the PICs' serial numbers?

A. show chassis hardware
B. show chassis interfaces
C. show chassis pic
D. show chassis inventory

Answer Clike
What is a valid option when using the ping command?

A. packet loss
B. packet size
C. CRC
D. TCP port

Answer Clike
You issue the ping interface t1-1/1/0 bypass-routing count 1000 rapid command. Which statement is correct?

A. The count parameter creates a counter that you can view with the show firewall command.
B. The count parameter allows the router to count the number of pings for logging purposes.
C. The count parameter allows the router to pause for 1000 seconds before sending out a ping.
D. The count parameter allows the router to send out 1000 pings and then stop.

Answer Clike
You issue the ping interface t1-1/1/0 1.1.1.1 bypass-routing count 1000 rapid command. Which statement is correct?

A. The bypass-routing parameter is used to test the density on the T1 line.
B. The bypass-routing parameter cannot be used on a T1 interface.
C. The bypass-routing parameter allows you to ping a host through an interface that has no route through it.
D. The bypass-routing parameter allows you to ping a local WAN interface without generating any outbound traffic.

Answer Clike
You issue the command telnet interface ge-1/1/0 10.10.10.1 source 192.168.100.1 bypass-routing. Which statement is correct?

A. The bypass-routing parameter is ignored when using private IP addressing.
B. The telnet session will have the source IP address 10.10.10.1.
C. The telnet session will connect to the neighboring device's interface ge-1/1/0.
D. Return traffic for the telnet session might not arrive at interface ge-1/1/0.

Answer Clike
Which command do you issue to upgrade the current software on Junos devices?

A. request system software replace
B. request system software install
C. request system software add
D. request system software upgrade

Answer Clike
Which two commands allow you to return to a previous version of software on the device? (Choose two.)

A. request system software add
B. request system software downgrade
C. request system software replace
D. request system software rollback

Answer Clike
Which CLI command do you use to determine which files are cleanup candidates?

A. request system storage cleanup candidates
B. request system services storage candidates
C. request system services candidate cleanup
D. request system storage cleanup dry-run

Answer Clike
Which three steps are part of the root password recovery process? (Choose three.)

A. Reboot the device.
B. Run the recovery script.
C. Reset the root password.
D. Reset the user passwords.
E. Load factory-default configuration.

Answer Clike
During a password recovery, what is the next step after configuring the system to boot into single-user mode?

A. Reset the root password.
B. Press the space bar.
C. Type recovery.
D. Press the "Enter" key.

Answer Clike
Which statement is true regarding the password-recovery process?

A. You must have a console connection.
B. You cannot set the console port to an insecure mode.
C. You must press the Enter key so that you can boot into single-user mode.
D. When prompted to enter the full pathname of the shell, you must press the Enter key.

Answer Clike
What is the role of route preference?

A. It is used as a tiebreaker when the same prefix is available through multiple protocols.
B. It is used to determine the preferred path to a given destination.
C. It is used to select the best route between multiple equal-cost paths.
D. It is used to select which routing table to use for forwarding.

Answer Clike
Which two statements are correct regarding default protocol preference values? (Choose two.)

A. OSPF internal routes have a lower preference than static routes.
B. Both direct and local routes have the same preference value.
C. OSPF's preference value is lower than BGP.
D. OSPF has a single preference value for both internal and external routes.

Answer Clike
Which two statements are correct regarding default protocol preference values? (Choose two.)

A. RIP is preferred over OSPF external routes.
B. Direct, local, and static routes have the same preference value.
C. OSPF's preference value is lower than BGP.
D. OSPF has a single preference value for both internal and external routes.

Answer Clike
By default, if equal-cost paths exist for the same destination, which action will the router take?

A. Drop half the traffic.
B. Make a copy of the traffic and send it to both destinations.
C. Load-balance traffic between the available paths.
D. Randomly select one of the available paths to send traffic.

Answer Clike
Which command will display only direct routes?

A. show route
B. show route inet.0 direct
C. show ip route direct
D. show route protocol direct

Answer Clike
What are two reasons why a route might be hidden? (Choose two.)

A. route preference
B. routing loop
C. invalid next hop
D. routing policy

Answer Clike
When attempting to view the OSPF routes in the routing table, you issue the command show route table inet.3 but no OSPF routes are displayed.
What is the problem?


A. The OSPF routes are located in the inet4.0 routing table.
B. The OSPF routes are located in the inet.0 routing table.
C. The OSPF routes are located in the inet.2 routing table.
D. The OSPF routes are located in the inet4.3 routing table.

Answer Clike
By default, what are three valid routing tables? (Choose three.)

A. inet.0
B. inet4.0
C. inet.6
D. inet6.0
E. inet.3

Answer Clike
Which two commands would you use to view OSPF routes? (Choose two.)

A. show ip route ospf
B. show ospf routes
C. show route protocol ospf
D. show route

Answer Clike
Which statement is true about routing tables on a Junos device?

A. They purge any routes not selected as active routes.
B. They exist in two places: the Routing Engine and the Packet Forwarding Engine.
C. They are exclusively designed to handle dynamic routing protocols.
D. They populate the forwarding table.

Answer Clike
Which two statements are true about the forwarding table? (Choose two.)

A. The forwarding table lists each source protocol and preference for each destination.
B. The forwarding table contains only active routes.
C. The forwarding table is used to process transit packets.
D. The forwarding table is stored in compact flash.

Answer Clike
Which statement is true about the forwarding table?

A. The forwarding table is stored in the control plane only.
B. The forwarding table is stored in the control plane and in the forwarding plane.
C. The forwarding table contains both active and inactive routes.
D. The forwarding table can contain only a single next hop per destination.

Answer Clike
Which statement is true about a routing table?

A. It contains routes learned dynamically only.
B. It finds the best path to each destination by using a modified shortest-path-first calculation.
C. It contains only active BGP routes.
D. It contains all accepted routes to all destinations.

Answer Clike
Which statement is true about the routing table?

A. The routing table exists in the control plane only.
B. The routing table exists in the control plane and in the forwarding plane.
C. The routing table contains both active and inactive routes.
D. The routing table is stored on compact flash.

Answer Clike
You have been asked to configure your MX240 with a default route toward your upstream ISP at IP address 192.168.100.1.
Which command successfully completes this task?


A. user@router# set routing-options static route 0.0.0.0/0 next-hop 192.168.100.1
B. user@router# set routing-options default route 0.0.0.0/0 next-hop 192.168.100.1
C. user@router# set forwarding-options static route 0.0.0.0/0 next-hop 192.168.100.1
D. user@router# set protocols default route 0.0.0.0/0 next-hop 192.168.100.1

Answer Clike
Which statement describes an advantage of dynamic routing?

A. Dynamic routing is typically more scalable when compared to static routing.
B. Unlike static routing, dynamic routing requires no initial user configuration.
C. Unlike static routing, dynamic routing provides redundant IP addresses for end-user devices.
D. Dynamic routing provides DNS services along with IP connectivity, whereas static routing does not.

Answer Clike
What is an advantage of dynamic routing?

A. Unlike static routing, dynamic routing provides redundant IP addresses for end-user devices.
B. Unlike static routing, dynamic routing requires no initial user configuration.
C. Dynamic routing can provide increased network availability when compared to static routing.
D. Dynamic routing provides DNS services along with IP connectivity; static routing does not.

Answer Clike
Which statement describes an advantage of dynamic routing?

A. Dynamic routing provides redundant IP addresses for end-user devices, unlike static routing.
B. Dynamic routing requires no initial user configuration, unlike static routing.
C. Dynamic routing provides DNS services along with IP connectivity; static routing does not.
D. Dynamic routing typically requires less time to implement than static routing in a large network.

Answer Clike
What are three examples of dynamic IGPs? (Choose three.)

A. OSPF
B. BGP
C. IS-IS
D. PIM
E. RIP

Answer Clike
Which three statements are true about terms in a policy? (Choose three.)

A. The order of the terms in a policy is irrelevant.
B. The action is specified in a then statement.
C. Terms are optional in a policy.
D. The match condition can be identified with a from statement.
E. A from statement is mandatory in a term.

Answer Clike
Which two statements are true about terms in a routing policy? (Choose two.)

A. A routing policy cannot have more than one term.
B. If a term does not contain a from statement, all routes match.
C. If a term does not contain a from statement, the Junos OS will not commit.
D. A then statement is not mandatory in a term.

Answer Clike
Which statement is true about terms in a policy?

A. A single term can be applied to a protocol or interface, independent of the policy.
B. Once configured, terms within a policy cannot be reordered.
C. The name of a term is limited to five characters.
D. A from statement is optional in a term.

Answer Clike
What is the default import routing policy for OSPF?

A. Accept all OSPF routes and install them into the inet.3 routing table.
B. Accept all OSPF routes and install them into the inet7.0 routing table.
C. Accept all OSPF routes and install them into the inet4.0 routing table.
D. Accept all OSPF routes and install them into the inet.0 routing table.

Answer Clike
By default, which two statements are true about export routing policies? (Choose two.)

A. Export policies can evaluate only active routes.
B. Export policies can evaluate all routes.
C. Export policies can be applied to the forwarding table.
D. Export policies can be applied directly to interfaces

Answer Clike
What is the default export routing policy for EBGP?

A. Accept all active BGP routes.
B. Accept all BGP routes.
C. Accept no routes.
D. Accept all active IGP routes.

Answer Clike
You have received a default route through BGP from your ISP and you want to redistribute it into OSPF. Which method will accomplish this?

A. Apply an export policy to OSPF that exports the default route.
B. Apply an import policy to OSPF that imports the default route.
C. Apply the default-network command to OSPF.
D. Apply the redistribute-igp command to BGP.

Answer Clike
There are three static routes in the routing table that need to be announced to your OSPF peers. Which method is used to accomplish this?

A. Apply an import policy to OSPF that injects the static routes into OSPF.
B. Apply an import policy to the static routes that injects the static routes into OSPF.
C. Apply an export policy to the static routes that injects the static routes into OSPF.
D. Apply an export policy to OSPF that injects the static routes into OSPF.

Answer Clike
What is the default export routing policy for RIP?

A. Accept all local routes.
B. Accept all RIP routes.
C. Accept no routes.
D. Accept all direct routes.

Answer Clike
What is a route filter?

A. a list of prefixes that can be configured in a policy
B. a single prefix that is configured separately, and can be referenced in a policy
C. a list of prefixes that is configured separately and can be referenced in a policy
D. a single prefix that can be configured within a policy

Answer Clike
What are two valid actions for a routing policy? (Choose two.)

A. discard
B. next policy
C. accept
D. ignore

Answer Clike
What are two valid match criteria for a routing policy? (Choose two.)

A. OSPF area ID
B. prefix list
C. port
D. time-to-live (TTL)

Answer Clike
A packet is evaluated against three user-defined terms within a firewall filter and no match is found.
What correctly describes the action the firewall filter will take for this packet?


A. The filter will permit the packet and take no additional action.
B. The filter will reject the packet and send an ICMP message back to the sender.
C. The filter will discard the packet and take no additional action.
D. The filter will permit the packet and write a log entry to the firewall log.

Answer Clike
What are three terminating actions for firewall filters? (Choose three.)

A. reject
B. drop
C. permit
D. accept
E. discard

Answer Clike
Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors? (Choose two.)

A. set protocols rip export demo
B. edit policy-options policy-statement demo set term 1 from protocol static set term 1 then accept
C. edit policy-options policy-statement demo set term 1 from protocol static accept
D. set protocols rip group internal export demo

Answer Clike
Which configuration causes RIP-learned routes to be advertised to other RIP neighbors?

A. set protocol rip no-passive
B. top edit policy-options policy-statement demo set term 1 from protocol rip set term 1 then accept top set protocols rip group internal export demo
C. set protocols rip advertise in-out
D. top edit policy-options policy-statement demo set term 1 from active routes set term 1 then accept top set protocols rip group internal export demo

Answer Clike
You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface. You have decided to use a firewall filter.
How should you apply the firewall filter?


A. as an outbound filter on interface fxp0
B. as an outbound filter on interface lo0
C. as an inbound filter on interface fxp0
D. as an inbound filter on interface lo0

Answer Clike
What are three benefits of class of service? (Choose three.)

A. It can make a slow network faster.
B. It can prioritize latency-sensitive traffic.
C. It can eliminate congestion.
D. It can control congestion.
E. It can allocate bandwidth for different classes of traffic.

Answer Clike
Random early detection (RED) is associated with which class of service component?

A. classification
B. policing
C. queuing
D. scheduling

Answer Clike
What are two purposes of a forwarding class? (Choose two.)

A. to identify traffic that should be dropped
B. to classify traffic
C. to identify traffic that should receive common treatment
D. to assign traffic to output queues

Answer Clike
What represents the binary equivalence of 207?

A. 11001111
B. 11101011
C. 11010111
D. 11010101

Answer Clike
What represents the binary equivalence of 96?

A. 11010100
B. 01100000
C. 11010000
D. 11101010

Answer Clike
What represents the binary equivalence of 148?

A. 10010110
B. 11010010
C. 10011100
D. 10010100

Answer Clike
What is the decimal equivalent of 10101010?

A. 182
B. 180
C. 172
D. 170

Answer Clike
What is a valid multicast MAC address?

A. 00:90:69:9f:ea:46
B. ff:ff:ff:ff:ff:ff
C. 01:00:5e:28:12:95
D. 99:99:99:99:99:99

Answer Clike
Which two statements are true regarding an Ethernet collision domain? (Choose two.)

A. If a switch is used, the collision domain is limited to each device and the switch.
B. If a hub is used, the collision domain is limited to each device and the hub.
C. If a hub is used, the collision domain includes all devices connected to the hub.
D. If a switch is used, the collision domain includes all devices connected to the switch.

Answer Clike
Two devices on an Ethernet segment sent frames at the same time causing a collision.
Which two statements are true? (Choose two.)


A. Both devices stop transmitting, wait a random period of time, verify the wire is idle, and re-transmit.
B. The device with the lowest MAC address is permitted to retransmit first.
C. The device with the lowest MAC address sends a jam signal to notify all other devices of the collision.
D. Both devices send a jam signal to notify all other devices of the collision.

Answer Clike
Which statement is true regarding an Ethernet collision domain?

A. If a router is used, the collision domain includes all devices connected to the router.
B. If a hub is used, the collision domain is limited to each device and the hub.
C. If a switch is used, the collision domain is limited to each device and the switch.
D. If a bridge is used, the collision domain includes all devices connected to the bridge.

Answer Clike
What is the purpose of a network mask?

A. It is used to identify the maximum hop count of a subnetwork.
B. It is used to identify an IP address as either private or public.
C. It is used to identify the network to which an IP address belongs.
D. It is used to identify the total number of bits present in an IP address.

Answer Clike
What is the purpose of a network mask?

A. It is used in conjunction with the wildcard mask to determine the number of hosts on a network.
B. It is used to define which parts of the IP address are allocated to host addresses and network prefixes.
C. It is used to hide subnets from external networks by masking the subnets with NAT.
D. It is used to differentiate a network as a classful network or a classless network.

Answer Clike
Which two statements are true of a network mask? (Choose two.)

A. A subnet mask specifies the portion of an IP address that is in a binary format.
B. A subnet mask specifies the portion of an IP address that is in a decimal format.
C. A subnet mask specifies the portion of an IP address that represents a network prefix.
D. A subnet mask specifies the portion of an IP address that represents network hosts.

Answer Clike
Which two characteristics describe the UDP protocol? (Choose two.)

A. limited error checking
B. defined timers
C. no recovery mechanisms
D. three-way handshake

Answer Clike
What are the usable hosts on the .128.0/19 network?

A. .128.1 through .143.254
B. .128.128 through .134.254
C. .128.0 through .134.254
D. .128.1 through .159.254

Answer Clike
%Exhibit%
interfaces { ge-0/0/8 { unit 0 { family inet { address 192.168.1.1/24;
} }
} ge-0/0/9 { unit 0 { family inet { address 192.168.10.1/24;
} }
} } %Exhibit%Referring to the exhibit, which command would you use to add an additional address to the ge-0/0/9.0 interface?


A. [edit interfaces ge-0/0/9 unit 0] user@router# set family inet address /24
B. [edit interfaces ge-0/0/9 unit 0] user@router# set family inet secondary-address /24
C. [edit interfaces ge-0/0/9 unit 0] user@router# set family inet address /24 secondary
D. [edit interfaces ge-0/0/9 unit 0] user@router# set family inet address-secondary /24

Answer Clike
%Exhibit%
[editsnmp] user@router# show communityCommunityA { authorization read-only; clients {
192.168.1.0/28;
} } trap-groupgroupA { categories { link;
}
targets { 192.168.100.1; 192.168.200.1;
} } %Exhibit%
Referring to the exhibit, what is the purpose of the targets section of the configuration?


A. It defines which devices will be sending traps.
B. It specifies where to send traps.
C. It defines the IP addresses of management systems that can access the device.
D. It specifies which devices can be polled for SNMP data.

Answer Clike
%Exhibit%
traceroute to 10.1.15.2 (10.1.15.2), 30 hops max, 40 byte packets
a. 1 10.1.36.1 (10.1.36.1) 0.651 ms 7.834 ms 0.506 ms b. 2 10.1.23.1 (10.1.23.1) 0.5 ms 0.5 ms 0.5 ms 3 * * * 4 * * * %Exhibit%
Referring to the exhibit, which statement is correct?


A. The packets have exceeded the time-to-live value.
B. There is a loop.
C. The asterisks indicate a response time out.
D. The asterisks indicate that the traceroute is completed.

Answer Clike
%Exhibit%
user@router# run show route /24
inet.0: 142 destinations, 142 routes (141 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
/24 *[OSPF/10] 04:10:20 >to 172.25.213.11 via ge-1/0/1.0 to 172.25.213.23 via ge-1/0/2.0 %Exhibit%
In the exhibit, what does the (>) symbol indicate?


A. There is a software issue with ge-1/0/1.0 interface.
B. There is a hardware issue with ge-1/0/1.0 interface.
C. The next hop of 172.25.213.11 is selected.
D. The next hop of 172.25.213.11 is not resolvable.

Answer Clike
%Exhibit%%Exhibit%
You have been asked to establish reachability between Router 1's and Router 2's loopback addresses as shown in the exhibit.
Which two steps will accomplish this task? (Choose two.)


A. Create a static route on Router 1 to 172.17.28.1 with a next hop of 10.10.10.2.
B. Create a static route on Router 1 to 172.17.28.1 with a next hop of 10.10.10.1.
C. Create a static route on Router 2 to 172.17.25.1 with a next hop of 10.10.10.1.
D. Create a static route on Router 1 to 172.17.25.1 with a next hop of 10.10.10.2.

Answer Clike
%Exhibit%[edit routing-options] user@router# show static { defaults { metric 10; preference 10;
} route 10.10.10.0/24 { next-hop 192.168.100.1; qualified-next-hop 192.168.200.1; preference 6;
} metric 8;
} } %Exhibit%
Given the configuration shown in the exhibit, which statement is correct about traffic matching the route 10.10.10.0/24?


A. It will be forwarded to 192.168.100.1 using a metric of 10.
B. It will be forwarded to 192.168.100.1 using a metric of 8.
C. It will be forwarded to 192.168.200.1 using a metric of 8.
D. It will be forwarded to 192.168.200.1 using a metric of 10.

Answer Clike
%Exhibit%
Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.
Which firewall filter configuration do you use?


A. [edit firewall family inet filter STOP-MAL-USER] user@router# show term one { from { source-address {
200.200.200.0/24; } destination-address { 100.100.100.10/32;
} protocoltcp; destination-port http;
} then accept; } term two { then { reject;
} }
B. [edit firewall family inet filter STOP-MAL-USER] user@router# show term one { from { source-address {
100.100.100.0/24; } destination-address { 200.200.200.1/32;
} protocoltcp; destination-port http;
} then accept; } term two { then { reject;
} }
C. [edit firewall family inet filter STOP-MAL-USER] user@router# show term one { from { source-address {
100.100.100.0/24; } destination-address { 200.200.200.1/32;
} protocoltcp; destination-port http;
} then reject; } term two { then { accept;
} }
D. [edit firewall family inet filter STOP-MAL-USER] user@router# show term one { from { source-address {
200.200.200.0/24; } destination-address { 100.100.100.10/32;
} protocoltcp; destination-port http;
} then reject; } term two { then { accept;
} }

Answer Clike
%Exhibit% %Exhibit%
Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted.
Which firewall filter configuration do you use?


A. [edit firewall] user@router# show policer LIMIT-MAL-USER { if-exceeding { bandwidth-limit 400k; burst-size-limit 100k;
} then discard; } familyinet { filter STOP-MAL-USER { term one { from { source-address {
100.100.100.10/32; } destination-address { 200.200.200.0/24; } } thenpolicer LIMIT-MAL-USER;
} term two { then accept;
} } }
B. [edit firewall] user@router# show policer LIMIT-BAD-USER { if-exceeding { bandwidth-limit 400k; burst-size-limit 100k;
} then discard; } familyinet { filter STOP-MAL-USER { term one { from { source-address {
100.100.100.10/32; } destination-address { 200.200.200.0/24; } } thenpolicer LIMIT-MAL-USER;
} term two { then accept;
} } }
C. [edit firewall] user@router# show policer LIMIT-MAL-USER { if-exceeding { bandwidth-limit 400k; burst-size-limit 100k;
} then discard; } familyinet { filter STOP-MAL-USER { term one { from { source-address {
100.100.100.10/32; } destination-address { 200.200.200.0/24; } } thenpolicer LIMIT-MAL-USER;
} term two { then reject;
} } }
D. [edit firewall] user@router# show policer LIMIT-MAL-USER {
if-exceeding { bandwidth-limit 400k; burst-size-limit 100k;
} then discard; } familyinet { filter STOP-MAL-USER { term one { from { source-address {
200.200.200.0/24; } destination-address { 100.100.100.10/32; } } thenpolicer LIMIT-MAL-USER;
} term two { then accept;
} } }

Answer Clike
What are the usable hosts on the 192.168.1.24/29 network?

A. .24 through .48
B. .24 through .32
C. .25 through .30
D. .35 through .31

Answer Clike
Which two are correct when configuring an IP address for a Fast Ethernet interface? (Choose two.)

A. set interfaces fe-0/0/0 address 10.1.1.1/24
B. set interfaces fe-0/0/0.0 family inet address 10.1.1.1/24
C. set interfaces fe-0/0/0.0 address 10.1.1.1/24
D. set interfaces fe-0/0/0 unit 0 family inet address 10.1.1.1/24

Answer Clike
After factory-defaults have been loaded, which two syslog files will be present in the configuration?

A. system and chassis
B. syslog-messages and NVRAM
C. messages and interactive-commands
D. authorization and events

Answer Clike
Which of the following commands will configure the maximum transmission unit size of a fast Ethernet interface?

A. set interfaces fe-0/0/0 unit 0 ethernet-options mtu 1200
B. set interfaces fe-0/0/0 mtu 1200
C. set interfaces fe-0/0/0 unit 0 mtu 1200
D. set interfaces fe-0/0/0.0 mtu 1200

Answer Clike
What information does the help topic command provide?

A. router's version and serial number to help open a case with JTAC
B. software documentation describing features and configuration tasks within JUNOS
C. a brief description of commands and their default values
D. a verification of the current configuration on the router

Answer Clike