لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which statement is correct about logical units on Juniper Router interfaces? Logical units are used only when a Layer 2 identifier is present such as a VLAN.
B. A logical unit of 0 is required when using a frame-relay DLCI
C. A logical unit is always required
D. Logical units are not required unless ATM or 802
عرض الإجابة
اجابة صحيحة: AC
السؤال #2
Which command is a valid way to view the status of an interface?
A. > show interfaces fe-0/0/0 extensive
B. > show interfaces fe-0/0/0 status
C. > show interfaces fe-0/0/0 health-info
D. > show interfaces fe-0/0/0 verbose
عرض الإجابة
اجابة صحيحة: AD
السؤال #3
Which three SONET network elements are used for troubleshooting? (Choose three.) line
B. path
C. circuit
D. section
E. segment
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Click the exhibit button. Which statement is correct regarding the configuration shown in the exhibit?
A. When the ospf-trace file has created five files, it will stop logging additional information
B. When the ospf-trace file reaches the 64 KB file size, it is renamed and begins a new file
C. Timestamp information will not be included for each line of ospf-trace output
D. The ospf-trace file will automatically replace any existing trace file with the same name
عرض الإجابة
اجابة صحيحة: B
السؤال #5
-- Exhibit – -- Exhibit -- Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?
A. [edit firewall] user@router# show policer LIMIT-MAL-USER { if-exceeding { bandwidth-limit 400k; burst-size-limit 100k; } then discard; } familyinet { filter STOP-MAL-USER { term one { from { source-address { 100
B. [edit firewall] user@router# show policer LIMIT-BAD-USER { if-exceeding { bandwidth-limit 400k; burst-size-limit 100k; } then discard; } familyinet { filter STOP-MAL-USER { term one { from { source-address { 100
C. [edit firewall] user@router# show policer LIMIT-MAL-USER { if-exceeding { bandwidth-limit 400k; burst-size-limit 100k; } then discard; } familyinet { filter STOP-MAL-USER { term one { from { source-address { 100
D. [edit firewall] user@router# show policer LIMIT-MAL-USER { if-exceeding { bandwidth-limit 400k; burst-size-limit 100k; } then discard; } familyinet { filter STOP-MAL-USER { term one { from { source-address { 200
عرض الإجابة
اجابة صحيحة: BCD
السؤال #6
-- Exhibit -- [edit firewall family inet filter COS-CLASSIFIER] user@router# show term MANAGER { from { source-address { 192.168.200.0/25; } destination-address { 100.100.100.1/32; } } then { forwarding-class expedited-forwarding; accept; } } term ALL-OTHER-TRAFFIC { then accept; } [edit interfaces ge-0/0/1] user@router# show unit 0 { familyinet { filter { input COS-CLASSIFIER; } address 192.168.200.1/24; } } -- Exhibit -- Referring to the exhibit, which type of classifier is being used in this CoS configur
A. behavior aggregate
B. policer
C. multifield
D. forwarding policy
عرض الإجابة
اجابة صحيحة: B
السؤال #7
-- Exhibit -- [edit interfaces] user@router# show ... lo0 { unit 0 { familyinet { filter { input protect-loopback; } address 192.168.100.1/32; } } } -- Exhibit -- Given the configuration shown in the exhibit, what is the function of the protect-loopback filter?
A. to protect the Routing Engine
B. to protect all interfaces on the device
C. to protect the Packet Forwarding Engine
D. to protect the management interface
عرض الإجابة
اجابة صحيحة: AC
السؤال #8
What is the default firewall filter behavior when a term is matched but no terminating action is specified?
A. An implicit deny and the filter evaluation continues to the next term
B. An implicit accept and the filter evaluation continues to the next term
C. An implicit accept and the filter evaluation terminates
D. An implicit deny and the filter evaluation terminates
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which application would be suited for UDP traffic?
A. Web browsing
B. downloading a program
C. streaming television shows
D. on-line shopping
عرض الإجابة
اجابة صحيحة: C
السؤال #10
Click the Exhibit button. You are asked to create a firewall filter to count IPv6 packets that arrive with a no next header value. As shown in the exhibit, you have created and applied the count-no-header firewall filter to the ge-0/0/0 interface. The commit operation fails. What is causing this problem?
A. The firewall term does not include inet6 in the from statement
B. IPv6 interfaces do not support firewall filters
C. The filter name must be different than the counter name
D. The firewall family is not correct
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Click the Exhibit button. Referring to the exhibit, what happens when ping packets are sent to the management interface address of the local router?
A. The ping packets are silently discarded
B. The ping packets are accepted
C. An ICMP redirect messages is returned
D. An ICMP error message is returned
عرض الإجابة
اجابة صحيحة: C
السؤال #12
What are three Application Layer protocols? (Choose three.)
A. FTP
B. HTTP
C. TCP
D. ATME
عرض الإجابة
اجابة صحيحة: D
السؤال #13
After issuing the show interfaces terse command, you notice that the status of one interface is "up down". What does this indicate?
A. Layer 1 on the interface is up but Layer 2 is down
B. Layer 2 on the interface is up but Layer 3 has not been configured
C. The interface is administratively up but the link status is down
D. The interface is up but has been administratively turned off
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which statement is true about PFEs?
A. A PFE receives hardware status messages from the RE
B. A PFE receives microcode updates from the RE
C. A PFE receives environmental status messages from the RE
D. A PFE receives layer 4 forwarding table updates from the RE
عرض الإجابة
اجابة صحيحة: C
السؤال #15
You must archive log messages for an extended period of time for audit and troubleshooting purposes. Which syslog setting should you configure on the Junos device in this scenario?
A. severity
B. facility
C. host
D. console
عرض الإجابة
اجابة صحيحة: A
السؤال #16
The marketing team needs access to a server on a subnet 172.0.46.0/24. The next-hop router is 10.0.4.2/30. A static route on their gateway has been configured to accomplish the task. You want to keep the static route from being redistributed into dynamic routing protocols. Which command will satisfy this requirement?
A. Set routing-options static route 172
B. Set routing-options static route 172
C. Set routing-options static route 172
D. Set routing-options static route 172
عرض الإجابة
اجابة صحيحة: BC
السؤال #17
-- Exhibit -- ... if-exceeding { bandwidth-limit 1m; burst-size-limit 3k; } then discard; -- Exhibit -- The configuration in the exhibit is associated with which class of service component?
A. classification
B. policing
C. queuing
D. scheduling
عرض الإجابة
اجابة صحيحة: CD
السؤال #18
What does the "3" in Junos version 14.2R3.2 represent?
A. A service build number
B. A single-threaded version of the Junos OS
C. A major release numberD
عرض الإجابة
اجابة صحيحة: B
السؤال #19
Which command would correctly define a router's host-name?
A. # set ip host-name
B. > set ip host-name
C. # set system host-name D
عرض الإجابة
اجابة صحيحة: D
السؤال #20
You have configuration groups applied on your router. Which command would you use to see all components of the interface hierarchy?
A. show configuration interfaces | display inheritance
B. show configuration interfaces | display changed
C. show configuration interfaces | display set
D. show configuration interfaces | display detail
عرض الإجابة
اجابة صحيحة: D
السؤال #21
The PFE receives which two tables from the RE? (Choose two.)
A. Layer 2 forwarding table
B. Layer 4 forwarding table
C. Layer 3 forwarding table
D. Layer 5 forwarding table
عرض الإجابة
اجابة صحيحة: D
السؤال #22
-- Exhibit – -- Exhibit -- Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?
A. [edit firewall family inet filter STOP-MAL-USER] user@router# show term one { from { source-address { 200
B. [edit firewall family inet filter STOP-MAL-USER] user@router# show term one { from { source-address { 100
C. [edit firewall family inet filter STOP-MAL-USER] user@router# show term one { from { source-address { 100
D. [edit firewall family inet filter STOP-MAL-USER] user@router# show term one { from { source-address { 200
عرض الإجابة
اجابة صحيحة: AC

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: