You are on page 1of 11

QUESTION 1

Which major J-Web menu should you use to upgrade the JUNOS software on the router?
A. Monitor
B. Maintain
C. Diagnose
D. Configuration
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
How many IP addresses can be configured in a given interface?
A. one primary and one secondary IP address
B. one IP address
C. as many IP addresses as you want
D. one primary and multiple secondary IP addresses
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
On a Juniper router, what is the default file used for syslog messages?
A. system
B. errors
C. security
D. messages
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
Which command is a valid way to view the status of an interface?
A. > show interfaces fe-0/0/0 extensive
B. > show interfaces fe-0/0/0 status
C. > show interfaces fe-0/0/0 health-info
D. > show interfaces fe-0/0/0 verboseCorrect Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
Which statement is correct about the validate option when upgrading JUNOS software?
A. It will check the MD5 checksum of the install package.
B. It will check if the device meets the memory requirements for the install package.
C. It will check the compatibility of the configuration with the install package.
D. It will check if the device meets the storage requirement for the install package.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
Click the Exhibit button.
The routing policy shown in the exhibit has been applied as an export policy under protocols OSPF. The static
route for destination 10.1.1.0/24 is not being advertised as it was expected.
[edit policy-options policy-statement accept-10]
lab@London# show term 1 {
from protocol static;
then reject;
}
term 2 {
from {
protocol static;
route-filter 10.1.1.0/24 exact;
}
then accept;
}
How can the configuration be corrected to allow the route to be advertised?
A. rename term 2 to term 1
B. rename term 1 to term 3
C. insert term 1 after term 2
Correct Answer: C
Explanation
Explanation/Reference:
QUESTION 14
You are at the system level. Which two would allow you to see the protocol's level candidate configuration?
(Choose two.)A. exit configuration-mode <enter>
show protocols
B. exit configuration-mode <enter>
show configuration protocols
C. top <enter>
show protocols
D. top show protocols
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
You enter configuration mode with the configure command. You need to abort the changes that you have made
and start again with a fresh copy of the active configuration.
Which command should you use?
A. rollback 0
B. load active
C. reset config
D. clear candidate config
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
You have just issued the command commit confirmed and your network continues to be operational with no
further changes required. You issue a commit and-quit. A short time later, users start complaining about
network problems. Which commands (in order) need to be entered to resolve this issue?
A. >commit confirmed
B. >configure
#rollback 1
#commit
C. >configure
#commit confirmed and-quit
D. >configure
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
Which command would allow you to compare two files stored on your router?A. user@host> file show filename1 compare filename2
B. user@host> file compare files filename1 filename2
C. user@host> compare files filename1 filename 2
D. user@host> compare filename1 filename2
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
Which services must be enabled on a router to access JWEB?
A. web-management{
http;
B. remote-access profile{
http;
C. remote-access profile{
web-gui;
D. web-management{
web-gui;
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
How can you reset your router or switch to factory defaults?
A. reset configuration
B. load factory-default
C. load override default
D. > request rescue-configuration save current
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
Which two statements are true regarding interface properties? (Choose two.)
A. MTU and speed must be configured under each unit.
B. Physical parameters such as MTU, duplex mode, and speed are configured under the interface name.
C. IP and IPv6 addresses are configured under a unit-number.
D. DLCI numbers, VPI/VCI values, and VLAN tags are physical parameters.
Correct Answer: BC
Section: (none)
ExplanationExplanation/Reference:
QUESTION 28
Which CLI command displays packet and byte counts for an interface in real-time?
A. monitor traffic
B. show interfaces
C. monitor interface
D. show traffic counts
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
Which CLI command displays error statistics for an interface in real-time?
A. monitor traffic
B. show interfaces
C. monitor interface
D. show interfaces extensive
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
What is used to segment larger networks into smaller networks?
A. supernet masks
B. subnet masks
C. wildcard masks
D. route filtering
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
Click the Exhibit button. user@host> show route protocol static inet.0: 12 destinations, 12 routes (12 active, 0
holddown, 0 hidden) + = Active Route, - = Last Active, * = Both
192.168.2.128/27 *[Static/5] 00:03:13
> to 172.20.106.10 via fe-0/0/5.106
192.168.2.192/26 *[Static/5] 00:03:13
> to 10.210.14.131 via ge-0/0/0.0
192.168.2.192/27 *[Static/5] 00:03:13> to 172.18.1.1 via ge-0/0/1.0
192.168.2.224/28 *[Static/5] 00:01:06
> to 10.210.14.130 via ge-0/0/0.0
Using the route table shown in the exhibit, what will be the next-hop IP address used for a destination IP
address of 192.168.2.239? (Assume the only routes to this destination are static routes.)
A. 10.210.14.130
B. 172.18.1.1
C. 10.210.14.131
D. 172.20.106.10
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
Click the Exhibit button.
Given the routing entries shown in the exhibit, which next-hop IP address will be used for the destination IP
address 192.168.2.158? (Assume only static routes are available for the destination.) user@host> show route
protocol static
inet.0: 12 destinations, 12 routes (12 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both
C. Unit numbers must match the DLCI or VCI numbers configured on the interface.
D. Unit 0 is the only value allowed on interfaces running HDLC, PPP, or for Ethernet interfaces not doing
VLAN-tagging.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
Which two are correct when configuring an IP address for a Fast Ethernet interface? (Choose two.)
A. set interfaces fe-0/0/0 address 10.1.1.1/24
B. set interfaces fe-0/0/0.0 family inet address 10.1.1.1/24
C. set interfaces fe-0/0/0.0 address 10.1.1.1/24
D. set interfaces fe-0/0/0 unit 0 family inet address 10.1.1.1/24
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 40
The interface ge-0/2/3 is located in which flexible PIC concentrator slot?
A. 0
B. 2
C. 3
D. 4
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:QUESTION 41
Which two are valid configurations of an interface? (Choose two.) A. [edit interfaces] lo0 {
unit 0 {
family inet {
address 192.168.20.1/32;
}
}
}
A. [edit interfaces]
lo0 {
unit 0 {
family inet {
address 192.168.20.1/24;
}
}
}
B. [edit interfaces]
fe-0/0/0 {
unit 0 {
family inet {
address 10.1.20.1/32;
}
}
}
C. [edit interfaces]
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
Which logical unit number must be configured on an interface using PPP encapsulation?
A. unit 0
B. unit 1
C. unit 100
D. unit 255
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 43
Which statement is true about configuring a back-to-back connection frame-relay on Juniper Routers?
A. Both DTE and DCE will send keep-alives by default so no special configuration is required.
B. The circuit is negotiated automatically so no special configuration is required.
C. All equipment is by default DTE, one side should be set to DCE.D. All equipment is by default DCE, one side should be set to DTE.
Section: (none)
Explanation
Explanation/Reference:
QUESTION 49
How are the commands a user is allowed to enter defined in JUNOS?
A. Permissions are configured individually for each user.
B. Users are associated with user classes, and each class defines the permissions for entering commands.
C. There are four default classes with different permissions and you can only use these four.
D. Permissions are associated with each user ID.Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 50
Which two statements about login classes correctly define their usage within the JUNOS software? (Choose
two.)
A. A different login class must be configured for each user.
B. Individual commands can be explicitly allowed or denied.
C. A user must be assigned to one of the default login classes.
D. Each login class is associated with one or more permissions flags.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 51
What is the primary syslog file?
A. /var/syslog-file
B. /var/syslog
C. /var/log/messages
D. /log-file
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 52
What is the default local location for syslog and trace files?
A. /log
B. /home/log
C. /var/log
D. /etc/log
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53
You delete a trace options file and later notice that no new entries are being written to this file. What wouldallow the entries to be written to
the file again?
A. Issue a commit of the current configuration.
B. Issue a commit full of the current configuration. C. Issue a commit all of the current configuration.
C. Issue a commit confirmed of the current configuration.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 54
Which three statements are true regarding the Network Time Protocol (NTP) in JUNOS platforms? (Choose
three.)
A. MD5 authentication is supported.
B. A client always synchronizes to a server even when the difference between the server clock and the local
clock differs by a large amount.
C. JUNOS software can provide a primary time reference.
D. The boot-server configuration allows a router to synchronize its clock when it boots up, regardless of the
offset between the NTP clock source and its internal clock.
E. It is useful to correlate timestamps on log files and other events for troubleshooting and forensics.
Correct Answer: ADE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 55
What is the maximum difference between a NTP server's clock and the system clock for synchronization to be
successful?
A. LOS
B. REI
C. BIP-B3
D. RDI
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 63
To troubleshoot interface problems, you can use both the disable command and the deactivate command.
Which two statements are correct?
A. If the interface is disabled, the logical unit will administratively shutdown.
B. If the interface is deactivated, the physical interface will administratively shutdown.
C. If the interface is deactivated, the interface configuration is ignored during commit.
D. If the interface is disabled, the logical unit configuration is ignored during commit.
Correct Answer: BC
Section: (none)Explanation
Explanation/Reference:
QUESTION 64
In Ethernet networks, duplex mismatches will lower performance. Which error statistics can be seen if a duplex
mismatch is present?
A. collisions on the full-duplex side; runts on the half-duplex side
B. collisions on the full-duplex side; collisions on the half-duplex side
C. collisions on the half-duplex side; framing errors on the full-duplex side
D. collisions on the half-duplex side; giants on the full-duplex side
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 65
When using the monitor traffic command to view traffic arriving on an interface, which command would save
the data collected to a file on the router?
A. monitor traffic interface fe-0/0/0.0 save <file>
B. monitor traffic interface fe-0/0/0.0 | write <file>
C. monitor traffic interface fe-0/0/0.0 write-file <file>
D. monitor traffic interface fe-0/0/0.0 | collect <file>
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 66
Which command would you type to see a concise display of which interfaces are up and which are down?
A. show interfaces brief
B. show interfaces status
C. show ip interface brief
D. show interfaces terse
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 67
When troubleshooting ATM, which command would allow you to test reachability from one side of an ATM
cloud to the other?A. ping atm vci 0.100 interface at-0/1/0 end-to-end
B. ping atm vci 0.100 interface at-0/1/0 circuit
C. ping atm vci 0.100 interface at-0/1/0 far-end
D. ping atm vci 0.100 interface at-0/1/0 final-hop
Correct Answer: A

QUESTION 68
Which three SONET network elements are used for troubleshooting? (Choose three.)
A. line
B. path
C. circuit
D. section
E. segment
Correct Answer: ABD
Section: (none)
Explanation
Explanation/Reference:
A. debug packet interface-name
B. show interface extensive
C. traceoptions interface-name
D. monitor traffic interface interface-name
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 77
The monitor traffic command provides access to which utility?
A. tcpdump
B. telnet
C. traceroute
D. netstat
Correct Answer: A
Section: (none)Explanation
Explanation/Reference:
QUESTION 78
Which two statements regarding traceroute on JUNOS devices are correct? (Choose two.)
A. Traceroute transmits ICMP echo-request packets.
B. Traceroute transmits UDP packets.
C. Traceroute receives ICMP echo-reply packets.
D. Traceroute receives ICMP port-unreachable packets.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 79
If you want to test if fragmentation is causing problems on the network, which two ping command options are
useful? (Choose two.)
A. ttl
B. size
C. rapid
D. do-not-fragment
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 80
Which command would initiate a loopback on a Gigabit Ethernet interface ge-0/0/0?
A. # set interfaces ge-0/0/0 unit 0 loopback
B. # set interfaces ge-0/0/0 gigether-options loopback
C. > set interfaces ge-0/0/0 loopback
D. > loopback ge-0/0/0
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 81
When a local loopback is activated on a PPP serial link, what indicates that the local interface is good?
A. A ping to the local address succeeds.B. A ping to the remote address succeeds.
C. A ping to the remote address received a 'TTL expired' message.
D. The interface shows a flag indicating that a loop is detected.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 82
Which two loopback types are supported for serial interfaces on Juniper devices? (Choose two.)
A. Local
B. Far End
C. Remote
D. Bidirectional
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 83
How is a loopback cleared on interface ge-0/0/0?
A. Issue the operational command clear interfaces ge-0/0/0 loopback local.
C. IP version 4 unicast routes
D. IP version 6 and IP version 4 routes
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 91
Which two statements are correct regarding default protocol preference values? (Choose two.)
A. OSPF has a single preference value for both internal and external routes.
B. RIP is preferred over OSPF external routes.
C. Direct, local, and static routes have the same preference value.
D. OSPF's preference value is lower than BGP (both IBGP and EBGP).
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 92
What is the role of route preference?
A. It is used to determine which route should become active.B. It is used to select which routing table to use for forwarding.
C. It is used to determine what routes to accept into the routing table.
D. It is used to select the best route between multiple equal cost paths.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 93
What is the default protocol preference for OSPF external routes?
A. 10
B. 15
C. 150
D. 160
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 94
What is the default protocol preference for BGP EBGP routes?
A. 10
B. 100
C. 170
D. 175
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 95
When you display the routing table by entering the show route command, what does the
* indicate?
A. The route is a direct route.
B. The route was selected as active.
C. The route is a default route.
D. The route was learned using a dynamic routing protocol.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:QUESTION 96
Which command allows viewing of only OSPF routes?
A. show ip ospf route
B. show ip route protocol ospf
C. show route protocol ospf
D. show ospf table
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 97
Which two statements are true of the forwarding table? (Choose two.)
A. The forwarding table is stored in the control plane only.
B. The forwarding table contains both active and inactive routes.
C. The forwarding table is stored in the control plane and the forwarding plane.
B. Export policies concern routes received and determine which routes get put into the routing table.
C. Export policies are applied before the routing table.
D. Import polices are applied after the routing table.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 105
Your routing table contains four static routes which you need to redistribute to your OSPF peers. Which method
would accomplish this?
A. Apply an import policy to OSPF; this will import the static routes into OSPF.
B. Apply an export policy to protocol "static"; this will export the routes to other protocols.
C. Apply an import policy to the forwarding table; this will import the routes, allowing them to be forwarded to
OSPF neighbors.
D. Apply an export policy to OSPF; this will export the static routes to your OSPF neighbors.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 106
Which three are considered match criteria in a policy? (Choose three.)
A. prefix-list
B. protocol ospf
C. next-term
D. AS path
E. prefix-termCorrect Answer: ABD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 107
What is a vaild match criteria for a firewall filter?
A. from protocol tcp
B. from url
C. from community
D. from acl
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 108
Which two policy actions are considered flow control actions? (Choose two.)
A. reject
B. community add
C. next term
D. next policy
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 109
What is a vaild action for a firewall filter?
A. then drop
B. then count
C. then allow
D. then community add
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 110
What happens when a route does not match any user configured policies?A. The route is rejected.
B. The route is accepted.
C. The route is given a lower priority.
D. The route is sent to the default policy.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 111
Click the Exhibit button.
A. Advertise only locally originated routes.
B. Accept all BGP routes and import into inet.0.
C. Advertise all active BGP routes.
D. Advertise only EBGP routes.Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 116
Click the Exhibit button. term 1 { from {
source-address {
0.0.0.0/0;
}
destination-address {
10.1.0.0/16;
}
}
then {
log;
reject;
}
}
term 2 {
from {
destination-address {
10.1.1.0/24;
}
}
then accept;
}
term 3 {
from {
source-address {
20.2.0.0/16;
}
destination-address {
10.1.0.0/16;
10.1.1.1/32 except;
}
}
}
}
Given the firewall filter shown the exhibit, a packet has a source IP address of 20.2.2.1 and a destination
address of 10.1.1.1.
How can the packet be changed to discard and count it?
A. rename term 4 to term 1B. rename term 1 to term 5
B. rename term 1 to term 5
C. insert term 4 before term 1
D. insert term 4 before term 3
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 117
What is the last CoS process performed prior to a packet leaving a router?
A. Rewrite Marker
B. Multifield Classifier
C. Policing
D. BA Classifier
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 118
When is the BA Classifier engaged for identifying the forwarding class of traffic in a Juniper router?
A. after a packet is identified by a multifield classifier
B. after the traffic passes though a shaper
C. prior to ingress policing of traffic
D. while the packet is stored in the switching fabric of the router
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 126
Which two fields are found in an Ethernet frame? (Choose two.)
A. Version
B. TTL
C. Checksum
D. Flags
E. Data
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 127Which two statements about subnet masks are true? (Choose two.)
A. If a bit is turned on (1), the corresponding bit in the IP address is used for the host portion.
B. If a bit is turned off (0), the corresponding bit in the IP address is used for the host portion.
C. If a bit is turned on (1), the corresponding bit in the IP address is used for the network prefix.
D. If a bit is turned off (0), the corresponding bit in the IP address is used for the network prefix.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 128
Which two protocols are connection-oriented? (Choose two.)
A. Ethernet
B. PPP
C. TCP
D. UDP
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 129
Which three steps are part of the PPP CHAP 3-way handshake? (Choose three.)
A. The caller sends a challenge to the authenticator.
B. The authenticator sends a challenge to the caller.
C. The caller encrypts the challenge using a secret.
D. The caller sends a success message to the authenticator.
E. The authenticator encrypts the challenge using a secret.
Correct Answer: BCE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 130
You have been asked to use a 30 bit subnet mask to segment the following network block: 108.12.5.0. How
many useable subnetworks and usable hosts could be created?
A. 32 networks with 8 hosts
B. 62 networks with 2 hosts
C. 30 networks with 16 hosts
D. 32 networks with 14 hosts
Correct Answer: B

You might also like