Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which two statements are correct about MAC addresses? (Choose two.)

A.

Switches use the Address Resolution Protocol table to assign MAC addresses to network interface cards in the forwarding frame.

B.

The source and destination MAC addresses always remains static to the final destination.

C.

The MAC address identifies the physical hardware.

D.

Switches use the destination MAC address to identify the next-hop destination and to change the destination MAC address in the frame.

Full Access
Question # 5

Which two statements are correct regarding Layer 2 network switches? (Choose two.)

A.

Switches create a single collision domain.

B.

Switches are susceptible to traffic loops.

C.

Switches flood broadcast traffic.

D.

Switches do not learn MAC addresses.

Full Access
Question # 6

Which Junos feature limits the amount of exception traffic that is sent from the PFE to the RE?

A.

scheduler

B.

policer

C.

CoS markings

D.

routing policy

Full Access
Question # 7

What does the user@router> clear log ospf-trace command accomplish?

A.

Logging data into ospf-trace is stopped.

B.

Trace parameters are removed from the OSPF protocol configuration.

C.

Data in the ospf-trace file is removed and logging continues.

D.

The ospf-trace file is deleted.

Full Access
Question # 8

Exhibit

policy-options { policy-statement Load-Balance-Policy { term Load-Balance { then { load-balance per-flow; accept;

}

}

}

}

routing-options {

router-id 192.168.100.11; autonomous-system 65201; forwarding-table {

export Load-Balance-Policy;

Referring to the exhibit, which two statements are correct? (Choose two.)

A.

The policy enables equal cost load balancing in the forwarding table.

B.

The policy must be applied under the protocols hierarchy.

C.

The policy enables per-packet load balancing.

D.

The policy enables flow-based load balancing.

Full Access
Question # 9

What are two methods for navigating to configuration mode from an operational mode prompt? (Choose two.)

A.

Use the edit command.

B.

Use the quit command.

C.

Use the exit command.

D.

Use the configure command.

Full Access
Question # 10

Click the Exhibit button.

Referring to the exhibit, what should be configured on R1 to advertise a default static route into OSPF?

A.

a firewall filter

B.

a routing policy

C.

a loopback interface

D.

a management interface

Full Access
Question # 11

Click the Exhibit button.

Referring to the exhibit, OSPF has three export policies that match different static route prefixes. The 10.10.10.0/24 static route does not match any terms in the policyl routing policy.

What happens next in this scenario?

A.

Thestaticrouteisevaluated by the poiicy3 routing policy.

B.

Thestaticrouteisevaluated by the poiicy2 routing policy.

C.

Thestaticrouteisrejected by the default routing policy.

D.

Thestaticrouteisrejected by the policyl routing policy.

Full Access
Question # 12

Which character is used to filter the command output in the Junos CLI?

A.

|

B.

>

C.

<

D.

?

Full Access
Question # 13

What are two attributes of the UDP protocol? (Choose two.)

A.

UDP is more reliable than TCP.

B.

UDP is always slower than TCP.

C.

UDP is best effort.

D.

UDP is connectionless.

Full Access
Question # 14

Which three benefits occur when operating an interior gateway protocol (IGP) in an autonomous system (AS)? (Choose three.)

A.

IGPs automatically distribute static routing information.

B.

IGPs determine the optimal paths for data transmission.

C.

IGPs learn prefixes in the global Internet's routing table.

D.

IGPs react very fast to network change.

E.

IGPs learn everything about the subnets and best paths within your network.

Full Access
Question # 15

You configured your system authentication order using the set authentication-order tacplus radius password command.

Which statement is correct in this scenario?

A.

A rejection by TACACS+ will prevent a login and bypass the other two authentication methods.

B.

The password authentication will only be used if the TACACS+ and RADIUS servers fail to respond.

C.

All authentication methods are used with the most restrictive permission set used.

D.

The password authentication method is evaluated if the TACACS+ and RADIUS servers respond with a reject message.

Full Access
Question # 16

Exhibit

[edit]

user@routerl set interfaces ge-0/1/2 unit 0 family inet address 172.16.101.1/24 [edit]

user@router# commit check

configuration check succeeds

[edit]

user@router#

You need to configure interface ge-0/1/2 with an IP address of 172.16.100.1/24. You have accidentally entered 172.16.101.1/24 as shown in the exhibit.

Which command should you issue to solve the problem?

A.

(edit] user@router# rollback 1

B.

[edit] user@router# rollback 2

C.

[edit] userOrouter# rollback 0

D.

[edit] user@routeri rollback rescue

Full Access
Question # 17

Exhibit

user@router> show route 192.168.100.2

inet.O: 15 destinations, 17 routes (15 active, 0 holddown, 0 hidden) Limit/Threshold: 1048576/1048576 destinations

+ = Active Route, - = Last Active, * = Both 192.168.100.2/32*[OSPF/IO] 00:14:29, metric 1

> to 172.16.1.6 via ge-0/0/1.0 [BGP/170] 00:06:49, localpref 100

AS path: 65102 I, validation-state: unverified > to 172.16.1.6 via ge-0/0/1.0

Referring to the exhibit, which statement is correct?

A.

The BGP path is the only active route.

B.

The BGP route is preferred over the OSPF route.

C.

The OSPF path is the only active route.

D.

/ Traffic is load-balanced across two routes.

Full Access
Question # 18

Which two common routing policy actions affect the flow of policy evaluation? (Choose two.)

A.

next policy

B.

community

C.

next term

D.

next hop

Full Access
Question # 19

Click the Exhibit button.

Referring the exhibit, what does the highlighted number indicate?

A.

route preference is 5

B.

hop count is 5

C.

cost is 5

D.

metric is 5

Full Access
Question # 20

Which protocol is responsible for learning an IPv4 neighbor's MAC address?

A.

Address Resolution Protocol (ARP)

B.

Network Address Translation (NAT)

C.

Media Access Control Security (MACsec)

D.

Neighbor Discovery Protocol (NDP)

Full Access
Question # 21

Which two statements apply to the Routing Engine functions? (Choose two.)

A.

It responds to ping and traceroute commands.

B.

It maintains the routing tables.

C.

It does not process routing updates.

D.

It processes the transit traffic.

Full Access
Question # 22

Which two statements are correct about Junos traceoptions? (Choose two.)

A.

Traceoptions cannot be enabled in a production environment.

B.

Traceoptions are enabled through configuration.

C.

Traceoptions are enabled by default.

D.

Traceoption output, by default, is stored in /var/iog/.

Full Access
Question # 23

What are two link-state routing protocols? (Choose two.)

A.

RIP

B.

BGP

C.

OSPF

D.

IS-IS

Full Access
Question # 24

Which two statements are correct about a Routing Engine? (Choose two.)

A.

It processes CoS marked traffic.

B.

It forwards transit traffic.

C.

It processes management traffic.

D.

It maintains routing tables.

Full Access
Question # 25

You issue the telnet 10.10.10.1 source 192.168.100.1 command.

Which two statements are correct in this scenario? (Choose two.)

A.

The telnet session will have a source address of 10.10.10.1.

B.

The telnet session will have a destination address of 192.168.100.1.

C.

The telnet session will have a destination address of 10.10.10.1.

D.

The telnet session will have a source address of 192.168.100.1.

Full Access
Question # 26

Which command displays all IPv6 routes in the default routing instance?

A.

showroute table inet.0

B.

showroute table inet6.1

C.

showroute table inet.l

D.

showroute table inet6.0

Full Access
Question # 27

What is the maximum number of rollback configuration files that the Junos OS will store?

A.

65

B.

50

C.

25

D.

19

Full Access
Question # 28

Which service does RADIUS provide?

A.

routing

B.

authentication

C.

DNS resolution

D.

time synchronization

Full Access
Question # 29

You want to redeploy a Junos device by clearing the existing configuration and resetting it to factory defaults.

In this scenario, which command would help to accomplish this task?

A.

show system storage

B.

request systemstorage cleanup

C.

request systemstorage cleanup dry-run

D.

request systemzeroize media

Full Access