Sunteți pe pagina 1din 14

Results

You got 43 of 55 correct

With regard to the Junos software architecture, which two of the following are
found on all Junos devices? (Choose two.)

Selected Answer

 multiple software daemons


 separation of control and forwarding

Correct

 multiple software daemons


 separation of control and forwarding

What are two Junos processes? (Choose two.)

Selected Answer

 routing protocols process


 Packet Forwarding Engine process

Correct

 routing protocols process


 Packet Forwarding Engine process

The Junos software kernel is based on which operating system?

Selected Answer

 FreeBSD

Correct

 FreeBSD

Which two statements are correct regarding the internal link between the control
plane and forwarding plane? (Choose two.)

Selected Answer
 The internal link rate limits exception traffic to protect the Routing Engine against denial-
of-service attacks.
 The internal link has a built-in rate limiter that is not configurable.

Correct

 The internal link rate limits exception traffic to protect the Routing Engine against denial-
of-service attacks.
 The internal link has a built-in rate limiter that is not configurable.

What are three examples of exception traffic? (Choose three.)

Selected Answer

 SNMP traffic destined to the Junos device


 Packets with special IP options fields
 OSPF protocol updates

Correct

 SNMP traffic destined to the Junos device


 Packets with special IP options fields
 OSPF protocol updates

Which part of the Junos architecture handles ICMP time-to-live (TTL) expired
messages?

Selected Answer

 forwarding plane

Correct

 forwarding plane

What are two functions of the Packet Forwarding Engine? (Choose two.)

Selected Answer

 to implement policing, firewall filtering, and class of service (CoS)


 to forward packets based on the forwarding table

Correct

 to implement policing, firewall filtering, and class of service (CoS)


 to forward packets based on the forwarding table

When a non-root user connects to a Junos device and successfully enters a


username and password, they are immediately placed at which level?

Selected Answer

 operational mode

Correct

 operational mode

In which Junos mode are users allowed to monitor and troubleshoot software,
network connectivity, and hardware?

Selected Answer

 operational

Correct

 operational

In which mode can you configure a device running Junos?

Selected Answer

 configuration

Correct

 configuration

Which Junos mode should you use to view the status of interfaces on a router?

Selected Answer

 operational

Correct

 operational

Which statement about the Junos CLI is true?


Selected Answer

 Automatic word completion can be disabled in operational mode.

Correct

 Automatic word completion can be disabled in operational mode.

What information does the help reference command provide? (Choose three.)

Selected Answer

 an example of how to configure the technology to which the command is related


 command default parameters and allowed value ranges
 command syntax

Correct

 command default parameters and allowed value ranges


 command syntax
 the configuration level at which the command can be entered

The auto-complete feature in the Junos CLI is triggered by which methods?

Selected Answer

 pressing the Tab key for both variable and command completion and the Spacebar for
command completion

Correct

 pressing the Tab key for both variable and command completion and the Spacebar for
command completion

What information does the help topic command provide?

Selected Answer

 a brief description of commands and their default values

Correct

 software documentation describing features and configuration tasks within the Junos OS
Which character in the Junos software CLI allows you to filter and manipulate
command output?

Selected Answer

 pipe character

Correct

 pipe character

When you first log in to a router, how does the router indicate that factory
defaults are being used?

Selected Answer

 The router's host name is Amnesiac.

Correct

 The router's host name is Amnesiac.

Which configuration command can you use to reset a Junos device to factory
defaults?

Selected Answer

 load factory-default

Correct

 load factory-default

After factory-defaults have been loaded, which two syslog files will be present in
the configuration?

Selected Answer

 messages and interactive-commands

Correct

 messages and interactive-commands


Which three configuration elements are considered part of the initial
configuration? (Choose three.)

Selected Answer

 hostname
 management access interface
 root password

Correct

 hostname
 management access interface
 root password

What are two valid initial configuration methods supported on Junos devices?
(Choose two)

Selected Answer

 CLI
 J-Web

Correct

 CLI
 J-Web

Which command would correctly define a Junos device’s hostname?

Selected Answer

 user@host# set system host-name <name>

Correct

 user@host# set system host-name <name>

Which Junos CLI operational command will gracefully shut down a router?

Selected Answer

 request system halt

Correct
 request system halt

Which command correctly sets a Junos device’s date and time?

Selected Answer

 user@host> set system time 199708290900.00

Correct

 user@host> set date 199708290900.00

Which two statements are true about the rescue configuration file? (Choose two.)

Selected Answer

 You can load it by entering rollback rescue.


 You need to create it using the command request system configuration rescue save.

Correct

 You can load it by entering rollback rescue.


 You need to create it using the command request system configuration rescue save.

Which two statements are true about login classes in the Junos OS? (Choose
two.)

Selected Answer

 A different login class must be configured for each user.


 Each login class is associated with one or more permissions flags.

Correct

 Each login class is associated with one or more permissions flags.


 Individual commands can be explicitly allowed or denied.

Which operational command allows you to quickly verify the state of all physical
and logical interfaces?

Selected Answer

 show interfaces terse

Correct
 show interfaces terse

The monitor traffic command closely resembles which UNIX-based utility?

Selected Answer

 tcpdump

Correct

 tcpdump

Which two statements are correct about the disable command and the deactivate
commands? (Choose two.)

Selected Answer

 If the interface is deactivated, the interface configuration is ignored during commit.


 If the interface is disabled, the logical unit will administratively shut down.

Correct

 If the interface is deactivated, the interface configuration is ignored during commit.


 If the interface is disabled, the logical unit will administratively shut down.

In Ethernet networks, duplex mismatches will lower performance. Which error


statistics can be seen if a duplex mismatch is present?

Selected Answer

 collisions on the half-duplex side; framing errors on the full-duplex side

Correct

 collisions on the half-duplex side; framing errors on the full-duplex side

When a local loopback is activated on a PPP serial link, which of the following
indicates that the local interface is good?

Selected Answer

 A ping to the local address succeeds.

Correct
 The interface shows a flag indicating that a loop is detected.

Which operational command would you enter to see a concise display of which
interfaces are up and which are down?

Selected Answer

 show interfaces terse

Correct

 show interfaces terse

Which operational command is a valid way to view the status of an interface?

Selected Answer

 show interfaces fe-0/0/0 extensive

Correct

 show interfaces fe-0/0/0 extensive

Which operational command is used to view status messages sent to a file named
test as they are sent?

Selected Answer

 monitor start test

Correct

 monitor start test

In which routing table would you find an OSPFv2 route?

Selected Answer

 inet.0

Correct

 inet.0

Which routing table is used for all IPv4 unicast forwarding?


Selected Answer

 inet.0

Correct

 inet.0

By default, which routing table is used to store unicast IPv4 routes?

Selected Answer

 inet.0

Correct

 inet.0

Which two statements are correct about routing tables in a Junos device?
(Choose two.)

Selected Answer

 There are separate tables for IPv4 and IPv6 called inet.0 and inet6.0, respectively.
 All running protocols can populate the routing tables at the same time.

Correct

 There are separate tables for IPv4 and IPv6 called inet.0 and inet6.0, respectively.
 All running protocols can populate the routing tables at the same time.

Which type of routes are held in inet.0?

Selected Answer

 IPv4 unicast routes

Correct

 IPv4 unicast routes

What is the role of route preference?

Selected Answer
 It is used to select the best route between multiple equal cost paths.

Correct

 It is used to determine which route should become active.

What is a characteristic of route preference?

Selected Answer

 A lower preference is better than a higher preference.

Correct

 A lower preference is better than a higher preference.

Which operational command displays the routing table?

Selected Answer

 show route

Correct

 show route

Which operational command allows viewing of only OSPF routes?

Selected Answer

 show route protocol ospf

Correct

 show route protocol ospf

Which statement is true about a forwarding table?

Selected Answer

 It stores a subset of information from the routing table.

Correct

 It stores a subset of information from the routing table.


Which statement is correct about a routing policy term?

Selected Answer

 A term must contain a "from" statement.

Correct

 A term acts like "if" and "then" statements.

Your Junos device has a routing policy with three terms. The first term of the
policy does not contain a terminating action. What happens to the routes after
they have been evaluated by the first term?

Selected Answer

 The routes are evaluated by the second term in the policy.

Correct

 The routes are evaluated by the second term in the policy.

Which statement is true about import and export routing policies?

Selected Answer

 Import policies concern routes received and determine which routes get put into the
routing table.

Correct

 Import policies concern routes received and determine which routes get put into the
routing table.

Your routing table contains four static routes, which you need to redistribute to
your OSPF peers. Which method would accomplish this task?

Selected Answer

 Apply an import policy to OSPF, which will import the static routes into OSPF.

Correct

 Apply an export policy to OSPF, which will export the static routes to your OSPF
neighbors.
Which three of the following are considered match criteria in a policy? (Choose
three.)

Selected Answer

 next-term
 prefix-list
 AS path

Correct

 prefix-list
 AS path
 protocol ospf

Which two of the following are considered match criteria in a policy? (Choose
two.)

Selected Answer

 community
 AS path

Correct

 community
 AS path

Which of the following is a valid match criteria for a firewall filter?

Selected Answer

 from protocol tcp

Correct

 from protocol tcp

Which two policy actions are considered flow control actions? (Choose two.)

Selected Answer

 next policy

Correct
 next policy
 next term

What is a valid action for a firewall filter?

Selected Answer

 then allow

Correct

 then count

What are three terminating actions for a firewall filter? (Choose three.)

Selected Answer

 log
 discard
 accept

Correct

 reject
 discard
 accept

What are two functions of the Routing Engine? (Choose two.)

Selected Answer

 to build the Layer 2 and Layer 3 forwarding tables


 to build OSPF and IS-IS adjacencies

Correct

 to build the Layer 2 and Layer 3 forwarding tables


 to build OSPF and IS-IS adjacencies

S-ar putea să vă placă și