Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Click the Exhibit button.

Referring to the exhibit, if the router forwards traffic destined for 192.168.77.29, which next hop will be used?

A.

10.10.1.2

B.

10.10.11.2

C.

10.10.0.2

D.

10.10.20.2

Full Access
Question # 5

What is the default action for packets not matching a firewall filter?

A.

The packet will be silently discarded.

B.

The packet will be accepted.

C.

The packet will be rejected.

D.

The packet will be ignored.

Full Access
Question # 6

What are three characteristics of Layer 2 switches? (Choose Three)

A.

Layer 2 switches separates multicast domains.

B.

Layer 2 switches separates collision domains.

C.

Layer 2 switches forward traffic addressed to hosts that reside on the same collision domain.

D.

Layer 2 switches forward traffic addressed to hosts that reside on a different collision domain.

E.

Layer 2 switches forward broadcast traffic.

Full Access
Question # 7

Click the Exhibit button,

You are creating a new routing policy on your Junos device. You are currently receiving multiple routes within the 10.10. 10.0/24 subnet from the same upstream BGP neighbor. Your policy should only allow the 10.10. 10.0/24 route and reject all other routes within that /24 range

Referring to the exhibit, which route filter match type would satisfy this requirement?

A.

exact

B.

orlonger

C.

prefix-length-range /24-/32

D.

longer

Full Access
Question # 8

Which protocol is responsible for learning an IPv6 neighbor's IMAC address?

A.

Neighbor Discovery Protocol (NDP)

B.

Media Access Control Security (MACsec)

C.

Address Resolution Protocol (ARP)

D.

Network Address Translation (NAT)

Full Access
Question # 9

A user entered configuration mode and modified the candidate configuration.

In this scenario, what are two results? (Choose two.)

A.

Other users cannot enter configuration mode.

B.

Other users cannot enter configuration mode using the exclusive parameter

C.

Other users cannot log into the device.

D.

Other users cannot enter configuration mode using the private parameter.

Full Access
Question # 10

What is a function of the PFE?

A.

to generate protocol control traffic

B.

to monitor chassis components

C.

to apply stateless firewall filters

D.

to generate forwarding tables

Full Access
Question # 11

Which two routing policy actions are considered policy flow control actions in the Junos OS? (Choose two.)

A.

accept

B.

next hop

C.

next policy

D.

next term

Full Access
Question # 12

Your Junos OS routers use a static route to provide connectivity to the management network. You do not want this static route to be redistributed using a dynamic routing protocol.

In this scenario, which static route configuration parameter will accomplish this task?

A.

A. no-install

B.

B. no-retain

C.

C. no-resolve

D.

D. no-readvertise

Full Access
Question # 13

Click the Exhibit button

Referring to the exhibit, which statement is correct?

A.

Traffic destined to 10.10.102.0/30 will be forwarded to 10.10.101.1.

B.

Traffic destined to 10.10.102.0/30 will be load-balanced across both next hops.

C.

Traffic destined to 10.10.102.0/30 will be silently dropped.

D.

Traffic destined to 10.10.102.0/30 will be forwarded to 10.10.4.2

Full Access
Question # 14

You are asked to determine when a Junos device was booted

Which command would you use to obtain this information?

A.

show system statistics

B.

show system commit

C.

show system information

D.

show system uptime

Full Access
Question # 15

Which two statements describe the functions of the Routing Engine (RE)? (Choose two.)

A.

The RE will apply filters and routing policies when forwarding the packets to their final destination.

B.

The RE will calculate the best network path to each individual subnet based on input from various routing protocols and static routes.

C.

The RE will route or switch packets or frames out of the correct interface as quickly as possible.

D.

The RE will process management traffic to help monitor and manage the network device.

Full Access
Question # 16

Which statement is true about using custom login class permissions?

A.

If you allow and deny the same command, the command is denied.

B.

If you allow and deny the same command, Junos OS will randomly choose the action.

C.

If you allow and deny the same command, the command is allowed.

D.

If you allow and deny the same command, the Junos OS will fail the commit check.

Full Access
Question # 17

Which word starts a command to display the operational status of a Junos device?

A.

put

B.

set

C.

show

D.

get

Full Access
Question # 18

Referring to the exhibit.

what happens when you issue the exit command at the [edit protocols ospf area 0.0.0.51 stub] hierarchy level?

A.

You move one level up to the [edit protocols ospf area 0.0.0.51] hierarchy level.

B.

You exit the configuration mode.

C.

You move to the [edit] hierarchy level.

D.

You move to the most recent higher level of the [edit protocols ospf] hierarchy.

Full Access
Question # 19

Click the Exhibit button.

Referring to the exhibit, what happens when you filter the output of a command using the no-more parameter?

A.

The output is displayed in XML format.

B.

The output is displayed with no page breaks.

C.

The number of lines in the output are displayed.

D.

The last screen of information is displayed.

Full Access
Question # 20

Which command causes the Junos OS to temporarily activate a configuration?

A.

commit and-quite

B.

commit synchronize

C.

commit check

D.

commit confirmed

Full Access
Question # 21

What does the commit check command do?

A.

It validates the syntax of a candidate configuration without actually committing the configuration.

B.

It commits the configuration when a validation check succeeds.

C.

It schedules the commit to a future time.

D.

It adds a comment to the messages log.

Full Access