لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which statement is true regarding the Junos OS?
A. Each process runs in its own protected memory space ensuring that one process cannot directly interfere with another
B. Processes share memory space but use separate ASICs so that one process cannot directly interfere with another
C. A central processor called the IP2 Chip dynamically assigns memory as process needs fluctuate
D. The memory management daemon (mmd) is responsible for allocating new memory for processes as they request it
عرض الإجابة
اجابة صحيحة: D
السؤال #2
By default, what are three valid routing tables? (Choose three.)
A. inet
B. inet4
C. inet
D. inet6
E. inet
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which statement is true regarding the Junos OS?
A. All platforms running the Junos OS use the same source code base
B. All platforms running the Junos OS use the same PFE
C. All platforms running the Junos OS use a hard drive to optimize syslog data storage
D. All platforms running the Junos OS use a separate process with protected memory space for each routing protocol
عرض الإجابة
اجابة صحيحة: A
السؤال #4
You have received a default route through BGP from your ISP and you want to redistribute it into OSPF. Which method will accomplish this? https://www.gratisexam.com/
A.
A. Apply an export policy to OSPF that exports the default route
B. Apply an import policy to OSPF that imports the default route
C. Apply the default-network command to OSPF
D. Apply the redistribute-igp command to BGP
عرض الإجابة
اجابة صحيحة: A
السؤال #5
When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?
A. snoop
B. tcpdump
C. monitor
D. tail
عرض الإجابة
اجابة صحيحة: C
السؤال #6
The authentication order configuration on your M120 includes the settings tacplus and radius (in that order), but does not include the password parameter. You attempt to log in to the device, but the network containing the authentication servers is currently down. Which statement is true about your login attempt?
A. The login attempt is rejected
B. The login attempt is automatically accepted after the authentication servers’ timeout value is reached, since there are no other authentication methods available
C. The M120 automatically tries authenticating locally on the device after the authentication servers’ timeout value is reached
D. The M120 automatically tries authenticating locally on the device before using external authentication
عرض الإجابة
اجابة صحيحة: ACD
السؤال #7
A packet is evaluated against three user-defined terms within a firewall filter and no match is found. What correctly describes the action the firewall filter will take for this packet?
A. The filter will permit the packet and take no additional action
B. The filter will reject the packet and send an ICMP message back to the sender
C. The filter will discard the packet and take no additional action
D. The filter will permit the packet and write a log entry to the firewall log
عرض الإجابة
اجابة صحيحة: A
السؤال #8
-- Exhibit -- [edit policy-options] user@router# show policy- statement block-routes { term 1 { from { route-filter 172.27.0.0/24 longer; } then reject; } term 2 { then accept; } } -- Exhibit -- You are asked to ensure that your device does not accept any prefixes within the 172.27.0.0/24 network. You have applied the policy shown in the exhibit, but the 172.27.0.0/24 route is still present on your device. Which configuration will resolve this problem?
A. [edit policy-options policy-statement block-routes] user@router# set term 1 from route-filter 172
B. [edit policy-options policy-statement block-routes] user@router# set term 1 from route-filter 172
C. [edit policy-options policy-statement block-routes] user@router# set term 2 from route-filter 172
D. [edit policy-options policy-statement block-routes] user@router# set term 2 from route-filter 172
عرض الإجابة
اجابة صحيحة: AC
السؤال #9
Which class-of-service component allows you to define the bandwidth allocated to different traffic types?
A. classification
B. rewrite marking
C. scheduling https://www
D. queuing
عرض الإجابة
اجابة صحيحة: ACD
السؤال #10
Which two statements are true about terms in a routing policy? (Choose two.)
A. A routing policy cannot have more than one term
B. If a term does not contain a from statement, all routes match
C. If a term does not contain a from statement, the Junos OS will not commit
A.
D. A then statement is not mandatory in a term
عرض الإجابة
اجابة صحيحة: A
السؤال #11
-- Exhibit -policy-options { policy-statement example-pol { term 1 { from { protocol static; route-filter 10.1.0.0/16 exact; } then { preference 6; accept; } } term 2 { from { protocol static; route-filter 10.1.1.0/24 longer; } then { preference 7; accept; } } term 3 { from { protocol static; route-filter 10.1.0.0/16 upto /24; } then { preference 8; accept; } } term 4 { then accept; } } } -- Exhibit -- Referring to the exhibit, if the static route with prefix 10.1.1.0/24 is evaluated against the routing pol
A. The preference will be 6
B. The preference will be 7
C. The preference will be 8
D. The preference will be the default for static routes
عرض الإجابة
اجابة صحيحة: B
السؤال #12
You have been asked to configure a login class that will permit its users to view and edit the configuration. The class should allow a user to view the entire configuration, but only to edit the interfaces, routing-options, and protocols hierarchies. Which configuration accomplishes this login class?
A. permissions [ view-configuration clear network view ]; allow- configuration "(interfaces) | (routing-options) | (policy-options) | (protocols)";
B. permissions [ view-configuration clear network view ]; allow- commands "(configure)";
C. permissions [ view-configuration clear network view ]; allow- commands "(configure)"; allow-configuration "(interfaces) | (routing-options) | (protocols)";
D. permissions [ clear network view ];allow-commands "(configure)"; allow-configuration "(interfaces) | (routing-options) | (protocols)";
عرض الإجابة
اجابة صحيحة: BC
السؤال #13
Which two statements about subnet masks are true? (Choose two.) https://www.gratisexam.com/
A. If a bit is turned on (1), the corresponding bit in the IP address is used for the host portion
B. If a bit is turned off (0), the corresponding bit in the IP address is used for the host portion
C. If a bit is turned on (1), the corresponding bit in the IP address is used for the network prefix
D. If a bit is turned off (0), the corresponding bit in the IP address is used for the network prefix
عرض الإجابة
اجابة صحيحة: AC
السؤال #14
What represents the binary equivalence of 148?
A. 10010110 https://www
B. 11010010
C. 10011100
D. 10010100
عرض الإجابة
اجابة صحيحة: D
السؤال #15
Using the command, user@router# load override latest.conf, where in the file system will the latest.conf be located?
A. /var/home/user/
B. /var/config/saved/
C. /var/tmp/
D. /config/
عرض الإجابة
اجابة صحيحة: D
السؤال #16
Which of the following commands will configure the maximum transmission unit size of a fast Ethernet interface?
A. set interfaces fe-0/0/0 unit 0 ethernet-options mtu 1200
B. set interfaces fe-0/0/0 mtu 1200
C. set interfaces fe-0/0/0 unit 0 mtu 1200
D. set interfaces fe-0/0/0
عرض الإجابة
اجابة صحيحة: AC
السؤال #17
Which login class permission will allow a user to use the telnet utility?
A. network permission
B. maintenance permission
C. supervisor permission
D. shell permission
عرض الإجابة
اجابة صحيحة: ACD
السؤال #18
-- Exhibit -firewall { filter select-telnet { term 1 { from { source-address { 10.0.0.0/8; } } then log; } term 2 { from { protocoltcp; port telnet; } then { syslog; reject; } } term 3 { from { source-address { 10.1.1.1/32; } protocoltcp; port telnet; } then { sample; accept; } } } } -- Exhibit -- A Telnet session is initiated from host 10.1.1.1. What will happen when it is processed by the firewall filter shown in the exhibit?
A. The packet will be accepted and logged
B. The packet will be discarded and logged
C. The packet will be rejected and a syslog message generated
D. The packet will be accepted and sampled
عرض الإجابة
اجابة صحيحة: C
السؤال #19
You have been asked to configure your router to send link-related SNMP trap notifications to the network management system (NMS) located at address 172.16.17.1. Which two commands are required? (Choose two.)
A. set snmp trap-group my-trap-group targets 172
B. set snmp targets 172
C. set snmp trap-group my-trap-group link-status
D. set snmp trap-group my-trap-group categories link
عرض الإجابة
اجابة صحيحة: AD
السؤال #20
After factory-defaults have been loaded, which two syslog files will be present in the configuration? https://www.gratisexam.com/
A. system and chassis
B. syslog-messages and NVRAM
C. messages and interactive-commands
D. authorization and events
عرض الإجابة
اجابة صحيحة: CD
السؤال #21
How do you save the current candidate configuration in the set format to permanent storage media?
A. [edit]user@router# show | set | save /var/tmp/current
B. [edit]user@router# show | compare set | save /var/tmp/current
C. [edit]user@router# save /var/tmp/current
D. [edit]user@router# show | display set | save /var/tmp/current
عرض الإجابة
اجابة صحيحة: C
السؤال #22
What is the default SNMP permission level on Junos devices?
A. read
B. read-write
C. read-only
D. write
عرض الإجابة
اجابة صحيحة: C
السؤال #23
Which two login-class permissions could permit a user to view the system hierarchy of the active configuration? (Choose two.)
A. system permission
B. view-configuration permission
C. network permission
D. super-user permission
عرض الإجابة
اجابة صحيحة: BD
السؤال #24
Which command do you use as a valid way to view the PICs within a router as well as the PICs' serial numbers?.
A. show chassis hardware
B. show chassis interfaces
C. show chassis pic
D. show chassis inventory
عرض الإجابة
اجابة صحيحة: C
السؤال #25
You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use? (Choose two.)
A. PPP
B. UDP
C. TCP https://www
D. ICMP
عرض الإجابة
اجابة صحيحة: C
السؤال #26
What represents the decimal equivalence of 11100101?
A. 5
B. 93 https://www
C. 177
D. 229
عرض الإجابة
اجابة صحيحة: D
السؤال #27
Which three user authentication methods are supported by the Junos OS? (Choose three.)
A. RADIUS
B. CHAP
C. local user database
D. TACACS+
E. PAP
عرض الإجابة
اجابة صحيحة: B
السؤال #28
Which protocol creates a complete database of the network topology prior to calculating the optimal route? BGP
B. PIM
C. OSPF
D. RIP
عرض الإجابة
اجابة صحيحة: CD
السؤال #29
You accidentally configured interface so-0/0/0.0 with /32 instead of /30. Which two solutions could you use to correct this configuration? (Choose two.)
A. [edit interfaces so-0/0/0
B. [edit interfaces so-0/0/0
C. [edit]user@router# replace interface so-0/0/0
D. [edit interfaces so-0/0/0
عرض الإجابة
اجابة صحيحة: B
السؤال #30
Which operational mode command can be used to synchronize the local system time with an NTP server?
A. set ntp time 64
B. set clock ntp 64
C. set time 64
D. set date ntp 64
عرض الإجابة
اجابة صحيحة: C
السؤال #31
Which route filter match type only matches prefixes greater than the defined prefix?
A. exact
B. upto
C. longer
D. orlonger
عرض الإجابة
اجابة صحيحة: AC
السؤال #32
Which statement is true regarding an Ethernet collision domain?
A. If a router is used, the collision domain includes all devices connected to the router
B. If a hub is used, the collision domain is limited to each device and the hub
C. If a switch is used, the collision domain is limited to each device and the switch
D. If a bridge is used, the collision domain includes all devices connected to the bridge
عرض الإجابة
اجابة صحيحة: B
السؤال #33
What are the usable hosts on the 192.168.1.24/29 network?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: C
السؤال #34
By default, which two statements are true about export routing policies? (Choose two.) Export policies can evaluate only active routes.
B. Export policies can evaluate all routes
C. Export policies can be applied to the forwarding table
D. Export policies can be applied directly to interfaces
عرض الإجابة
اجابة صحيحة: C
السؤال #35
What are three examples of dynamic IGPs? (Choose three.) OSPF
B. BGP
C. IS-IS
D. PIM
E. RIP
عرض الإجابة
اجابة صحيحة: A
السؤال #36
Which two fields are found in an Ethernet frame header? (Choose two.)
A. TTL
B. flags https://www
C. checksum
D. type
عرض الإجابة
اجابة صحيحة: C
السؤال #37
Which two statements are correct about Layer 2 broadcast frames? (Choose two.)
A. Layer 2 broadcast frames are processed by all devices on the same VLAN
B. Layer 2 broadcast frames are discarded by routers that connect to multiple VLANs
C. Layer 2 broadcast frames are relayed by routers to all connected VLANs
D. Layer 2 broadcast frames are relayed by switches to devices on the same VLAN
عرض الإجابة
اجابة صحيحة: B
السؤال #38
Your network administrator has asked you to view the real-time interface usage on ge-0/0/0. Which command would be used?
A. monitor interface ge-0/0/0
B. traceoptions interface ge-0/0/0
C. debug interface ge-0/0/0
D. monitor usage ge-0/0/0
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: