You configured your system authentication order using the set authentication-order tacplus radius password command.
Which statement is correct in this scenario?
AA rejection by TACACS+ will prevent a login and bypass the other two authentication methods.
BThe password authentication will only be used if the TACACS+ and RADIUS servers fail to respond.
CAll authentication methods are used with the most restrictive permission set used.
DThe password authentication method is evaluated if the TACACS+ and RADIUS servers respond with a reject message.
Click the Exhibit button.
Referring to the exhibit, where are the configuration backup files stored?
AFiles are stored to the SCP site and the FTP site in a round-robin manner.
BFiles are stored to the SCP site and the FTP site simultaneously.
CFiles are stored to any site as selected by Junos internally.
DFiles are stored to the SCP site but if the transfer fails, then to the FTP site.
You have just increased the MTU size of interface ge-0/0/0 and committed the configuration.
Which command would help you identify the applied MTU change?
Amonitor traffic interface ge-0/0/0
Bshow interfaces ge-0/0/0
Cshow interfaces ge-0/0/0 terse
Dmonitor interface ge-0/0/0
Click the Exhibit button.
Referring the exhibit, what does the highlighted number indicate?
Ahop count is 5
Bcost is 5
Cmetric is 5
Droute preference is 5
Question 6
Routing Fundamentals
0
Question 7
Junos OS Fundamentals
Question 8
Junos OS Fundamentals
Question 9
Routing Fundamentals
Question 10
Networking Fundamentals
Question 11
Networking Fundamentals
Question 12
Junos OS Fundamentals
Question 13
Configuration Basics
Question 14
Junos OS Fundamentals
Question 15
Routing Fundamentals
Question 16
Junos OS Fundamentals
Question 17
Networking Fundamentals
Question 18
Configuration Basics
Question 19
Networking Fundamentals
Question 20
Operational Monitoring and Maintenance
Question 21
Configuration Basics
Question 22
Operational Monitoring and Maintenance
Question 23
Configuration Basics
Question 24
Routing Fundamentals
Question 25
Configuration Basics
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Which process in the Junos OS is responsible for maintaining routing protocols and tables?
Amgd
Bchassisd
Cdcd
Drpd
How many login classes are assignable to a user account?
A2
B1
C4
D3
You have completed the initial configuration of your new Junos device. You want to be able to load this configuration at a later time.
Which action enables you to perform this task?
AEnter the request system reboot command.
BEnter the load factory-default command.
CEnter the request system configuration rescue save command.
DEnter the request system zeroize command.
Click the Exhibit button.
Referring to the exhibit, OSPF has three export policies that match different static route prefixes. The 10.10.10.0/24 static route does not match any terms in the policy1 routing policy.
What happens next in this scenario?
AThe static route is rejected by the default routing policy.
BThe static route is rejected by the policy1 routing policy.
CThe static route is evaluated by the policy2 routing policy.
DThe static route is evaluated by the policy3 routing policy.
Which two statements are correct regarding Layer 2 network switches? (Choose two.)
ASwitches flood broadcast traffic.
BSwitches are susceptible to traffic loops.
CSwitches do not learn MAC addresses.
DSwitches create a single collision domain.
Which protocol is responsible for learning an IPv4 neighbor's MAC address?
ANeighbor Discovery Protocol (NDP)
BAddress Resolution Protocol (ARP)
CMedia Access Control Security (MACsec)
DNetwork Address Translation (NAT)
Which two statements are correct about firewall filters? (Choose two.)
A"Discard" is the default action of packets that are not explicitly allowed.
BThere can be only one firewall filter.
CThere can be multiple firewall filters.
D"Accept" is the default action of packets that are not explicitly allowed.
Click the Exhibit button.
How is traffic, sourced from 10.0.0.0/8, treated by the firewall filter shown in the exhibit?
Alogged with no further action
Blogged and accepted
Clogged and rejected
Dlogged and discarded
Which Junos OS component is responsible for maintaining the forwarding table?
APacket Forwarding Engine
Bchassis control daemon
CRouting Engine
Dmanagement daemon
Which two statements about route preference in Junos are correct? (Choose two.)
ABoth direct and static routes have the same preference.
BBoth direct and local routes have the same preference.
CBoth OSPF internal and OSPF AS external routes have the same preference.
DBoth EBGP and IBGP routes have the same preference.
Which two actions happen when multiple users issue the configure exclusive command to enter configuration mode on a Junos device? (Choose two.)
AOther users can enter configuration mode.
BThe candidate configuration is locked.
COther users cannot enter configuration mode.
DThe candidate configuration is unlocked.
Which two statements are correct about MAC addresses? (Choose two.)
ASwitches use the Address Resolution Protocol table to assign MAC addresses to network interface cards in the forwarding frame.
BSwitches use the destination MAC address to identify the next-hop destination and to change the destination MAC address in the frame.
CThe source and destination MAC addresses always remains static to the final destination.
DThe MAC address identifies the physical hardware.
Which two statements are true about the candidate configuration? (Choose two.)
AYou can discard changes before committing them.
BYou can deploy multiple changes at the same time.
CMultiple users cannot modify the same candidate configuration.
DCandidate configuration changes are automatically applied.
What are two attributes of the UDP protocol? (Choose two.)
AUDP is best effort.
BUDP is always slower than TCP.
CUDP is connectionless.
DUDP is more reliable than TCP.
You are trying to diagnose packet loss at interface ge-0/0/3.
In this scenario, which command would help you view error statistics in real time?
Amonitor interface ge-0/0/3
Bshow interface ge-0/0/3
Cshow interface terse
Dmonitor interface traffic
Click the Exhibit button.
You are unable to remotely access your Juniper device using the CLI.
Referring to the exhibit, which command would you add to the existing configuration to enable remote CLI access?
Aset system services ssh
Bload factory-default
Cset system login idle-timeout 20
Dset system root-authentication plain-text-password
You issue the monitor traffic interface ge-0/0/0 command.
What will this command accomplish?
AIt displays a packet capture on interface ge-0/0/0.
BIt displays the MTU and MAC address for ge-0/0/0.
CIt displays real-time statistics for interface ge-0/0/0.
DIt displays an operational summary of ge-0/0/0.
What are two methods for navigating to configuration mode from an operational mode prompt? (Choose two.)
AUse the quit command.
BUse the configure command.
CUse the exit command.
DUse the edit command.
Click the Exhibit button.
Referring to the exhibit, which routing configuration is required for these two users to access the remote server?
AUsers and the server require a default gateway.
BTrunk ports must be enabled on the switch.
CA routing protocol must be enabled on the router.
DUsers must connect directly to the router.
Which two fields are you required to enter when you create a new user account? (Choose two.)