لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is the purpose of a network mask?
A. It is used to identify the maximum hop count of a subnetwork
B. It is used to identify an IP address as either private or public
C. It is used to identify the network to which an IP address belongs
D. It is used to identify the total number of bits present in an IP address
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Which two characteristics describe the UDP protocol? (Choose two.)
A. limited error checking
B. defined timers
C. no recovery mechanisms
D. three-way handshake
عرض الإجابة
اجابة صحيحة: AC
السؤال #3
When attempting to view the OSPF routes in the routing table, you issue the command show route table inet.3 but no OSPF routes are displayed. What is the problem?
A. The OSPF routes are located in the inet4
B. The OSPF routes are located in the inet
C. The OSPF routes are located in the inet
D. The OSPF routes are located in the inet4
عرض الإجابة
اجابة صحيحة: B
السؤال #4
What is the default export routing policy for RIP?
A. Accept all local routes
B. Accept all RIP routes
C. Accept no routes
D. Accept all direct routes
عرض الإجابة
اجابة صحيحة: C
السؤال #5
By default, which two statements are true about export routing policies? (Choose two.)
A. Export policies can evaluate only active routes
B. Export policies can evaluate all routes
C. Export policies can be applied to the forwarding table
D. Export policies can be applied directly to interfaces
عرض الإجابة
اجابة صحيحة: AC
السؤال #6
Click the exhibit button. Which statement is correct regarding the configuration shown in the exhibit?
A. When the ospf-trace file has created five files, it will stop logging additional information
B. When the ospf-trace file reaches the 64 KB file size, it is renamed and begins a new file
C. Timestamp information will not be included for each line of ospf-trace output
D. The ospf-trace file will automatically replace any existing trace file with the same name
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which process is responsible for controlling all interfaces on a Junos device?
A. rpd
B. chassisd
C. mgd
D. dcd
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?
A. [edit firewall]user@router# showpolicer LIMIT-MAL-USER {if-exceeding {bandwidth-limit 400k;burstsize-limit 100k;}then discard;}familyinet {filter STOP-MAL-USER {term one {from {source-address {100
B. [edit firewall]user@router# showpolicer LIMIT-BAD-USER {if-exceeding {bandwidth-limit 400k;burstsize-limit 100k;}then discard;}familyinet {filter STOP-MAL-USER {term one {from {source-address {100
C. [edit firewall]user@router# showpolicer LIMIT-MAL-USER {if-exceeding {bandwidth-limit 400k;burstsize-limit 100k;}then discard;}familyinet {filter STOP-MAL-USER {term one {from {source-address {100
D. [edit firewall]user@router# showpolicer LIMIT-MAL-USER {if-exceeding {bandwidth-limit 400k;burstsize-limit 100k;}then discard;}familyinet {filter STOP-MAL-USER {term one {from {source-address {200
عرض الإجابة
اجابة صحيحة: A
السؤال #9
-- Exhibit -user@router> show route protocol static inet.0: 12 destinations, 12 routes (12 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both 192.168.1.128/27 *[Static/5] 00:03:13 >to 10.20.106.10 via fe-0/0/5.1 192.168.1.144/29 *[Static/5] 00:03:13 >to 10.20.14.131 via ge-0/0/0.0 192.168.1.192/27 *[Static/5] 00:03:13 >to 10.18.1.1 via ge-0/0/1.0 192.168.1.128/28 *[Static/5] 00:01:06 >to 10.20.14.130 via ge-0/0/0.0 -- Exhibit -Given the routing entries shown in the exhibit, which next
A. 10
B. 10
C. 10
D. 10
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?
A. [edit firewall family inet filter STOP-MAL-USER]user@router# showterm one {from {source-address {200
B. [edit firewall family inet filter STOP-MAL-USER]user@router# showterm one {from {source-address {100
C. [edit firewall family inet filter STOP-MAL-USER]user@router# showterm one {from {source-address {100
D. [edit firewall family inet filter STOP-MAL-USER]user@router# showterm one {from {source-address {200
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Your network administrator has asked you to view the real-time interface usage on ge- 0/0/0. Which command would be used?
A. monitor interface ge-0/0/0
B. traceoptions interface ge-0/0/0
C. debug interface ge-0/0/0
D. monitor usage ge-0/0/0
عرض الإجابة
اجابة صحيحة: A
السؤال #12
What represents the decimal equivalence of 11100101?
A. 5
B. 93
C. 177
D. 229
عرض الإجابة
اجابة صحيحة: D
السؤال #13
Which command configures an address of 192.168.1.1 with a mask of 255.255.255.0 on interface ge0/0/0?
A. set ip interface ge-0/0/0 address 192
B. set ip interface ge-0/0/0 address 192
C. set interface ge-0/0/0 ip4 address 192
D. set interfaces ge-0/0/0 unit 0 family inet address 192
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which protocol creates a complete database of the network topology prior to calculating the optimal route?
A. BGP
B. PIM
C. OSPF
D. RIP
عرض الإجابة
اجابة صحيحة: C
السؤال #15
What is the purpose of a network mask?
A. It is used in conjunction with the wildcard mask to determine the number of hosts on a network
B. It is used to define which parts of the IP address are allocated to host addresses and network prefixes
C. It is used to hide subnets from external networks by masking the subnets with NAT
D. It is used to differentiate a network as a classful network or a classless network
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which three protocols are connectionless? (Choose three.)
A. DNS
B. TFTP
C. ICMP
D. SSH
E. Telnet
عرض الإجابة
اجابة صحيحة: ABC
السؤال #17
Two devices on an Ethernet segment sent frames at the same time causing a collision. Which two statements are true? (Choose two.)
A. Both devices stop transmitting, wait a random period of time, verify the wire is idle, and re-transmit
B. The device with the lowest MAC address is permitted to retransmit first
C. The device with the lowest MAC address sends a jam signal to notify all other devices of the collision
D. Both devices send a jam signal to notify all other devices of the collision
عرض الإجابة
اجابة صحيحة: AD
السؤال #18
Which CIDR notation is the equivalent of the subnet mask of 255.255.192.0?
A. /18
B. /19
C. /17
D. /20
عرض الإجابة
اجابة صحيحة: A
السؤال #19
Which two commands would you use to view OSPF routes? (Choose two.)
A. show ip route ospf
B. show ospf routes
C. show route protocol ospf
D. show route
عرض الإجابة
اجابة صحيحة: CD
السؤال #20
What are three physical interface properties? (Choose three.)
A. payload scrambling
B. virtual circuit identifier
C. FCS
D. link speed
E. IP address
عرض الإجابة
اجابة صحيحة: ACD
السؤال #21
Which configuration causes RIP-learned routes to be advertised to other RIP neighbors?
A. set protocol rip no-passive
B. top edit policy-options policy-statement demoset term 1 from protocol ripset term 1 then accepttop set protocols rip group internal export demo
C. set protocols rip advertise in-out
D. top edit policy-options policy-statement demoset term 1 from active routesset term 1 then accepttop set protocols rip group internal export demo
عرض الإجابة
اجابة صحيحة: B
السؤال #22
Which IP protocol number is assigned to TCP?
A. 17
B. 4
C. 18
D. 6
عرض الإجابة
اجابة صحيحة: D
السؤال #23
By default, what are three valid routing tables? (Choose three.)
A. inet
B. inet4
C. inet
D. inet6
E. inet
عرض الإجابة
اجابة صحيحة: ADE
السؤال #24
Using the command, user@router# load override latest.conf, where in the file system will the latest.conf be located?
A. /var/home/user/
B. /var/config/saved/
C. /var/tmp/
D. /config/
عرض الإجابة
اجابة صحيحة: A
السؤال #25
Which statement is true when using the allow command and deny command attributes when creating user permissions?
A. If you allow and deny the same commands, the Junos OS will fail the commit check
B. If you allow and deny the same commands, the allow command permissions take precedence over the deny command permissions
C. If you specify a regular expression for allow and deny with two variants of a command, both will be ignored
D. The all login class permission bits take precedence over allow and deny when a user issues the rollback command
عرض الإجابة
اجابة صحيحة: B
السؤال #26
What does the command show | compare rollback 1 display?
A. the difference between the current candidate configuration and the candidate configuration from one commit ago
B. the difference between the current active configuration and the current candidate configuration
C. the difference between the current active configuration and the active configuration from one commit ago
D. the difference between the current candidate configuration and the archived configuration from one commit ago
عرض الإجابة
اجابة صحيحة: D
السؤال #27
What are three acceptable modifiers to a terminating action of a firewall filter? (Choose three.)
A. Policer
B. Count
C. Syslog
D. Log
E. Discard
عرض الإجابة
اجابة صحيحة: ABD
السؤال #28
When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?
A. snoop
B. tcpdump
C. monitor
D. tail
عرض الإجابة
اجابة صحيحة: B
السؤال #29
Which two fields are found in an Ethernet frame header? (Choose two.)
A. TTL
B. flags
C. checksum
D. type
عرض الإجابة
اجابة صحيحة: CD
السؤال #30
You have configured a firewall filter with a single term matching on packets with a source address in the 10.0.0.0/24 subnet. This term only includes the count action. Which two statements are true about traffic evaluated by this firewall filter? (Choose two.)
A. Packets within the 10
B. Packets within the 10
C. Packets within the 10
D. Packets within the 10
عرض الإجابة
اجابة صحيحة: AC
السؤال #31
What are two protocols that the Junos OS uses to archive configuration files remotely? (Choose two.)
A. SCP
B. HTTP
C. SFTP
D. FTP
عرض الإجابة
اجابة صحيحة: AD
السؤال #32
Which two statements describe the RE on Junos OS devices? (Choose two.)
A. The RE is considered the control plane
B. The RE forwards traffic based on its local copy of the forwarding table
C. The RE provides hardware status messages for the PFE
D. The RE maintains the routing tables
عرض الإجابة
اجابة صحيحة: AD
السؤال #33
Which three statements describe the Transmission Control Protocol (TCP)? (Choose three.)
A. TCP is a transport layer protocol
B. TCP is faster than the User Datagram Protocol (UDP)
C. TCP provides delivery notification and error-checking mechanisms
D. TCP uses a best-effort delivery approach
E. TCP application examples include HTTP and SMTP
عرض الإجابة
اجابة صحيحة: ACE
السؤال #34
What information would you find using the CLI help command?
A. message of the day
B. an explanation for specific system log error messages
C. hyperlinks for remediation actions
D. a URL for accessing the technical documentation
عرض الإجابة
اجابة صحيحة: B
السؤال #35
Click the Exhibit button. Which operational mode command in Junos OS produces the output shown in the exhibit?
A. show system users
B. show system connections
C. show system commit
D. show system reboot
عرض الإجابة
اجابة صحيحة: C
السؤال #36
Which two statements describe IPv4 default behavior for BGP? Choose Two
A. All Active BGP routes are exported to configured EBGP neighbors
B. All BGP routes are exported to configured EBGP neighbors
C. All BGP routes are imported into the inet
D. All BGP routes are imported into the inet4
عرض الإجابة
اجابة صحيحة: AC
السؤال #37
Which two statements about firewall filters are correct? (Choose two.)
A. Firewall filters can match Layer 7 parameters
B. Firewall filters are stateless
C. Firewall filters are stateful
D. Firewall filters can match Layer 4 parameters
عرض الإجابة
اجابة صحيحة: BD
السؤال #38
Which two statements describe PFE functions are true?
A. The PFE implements rate limiting using policers
B. The PFE stores the master copy of the layer 2 and layer 3 forwarding tables
C. The PFE provides access to the CLI and Jweb
D. The PFE stores a local copy of the layer 2 and layer 3 forwarding tables
عرض الإجابة
اجابة صحيحة: AD
السؤال #39
What is the purpose of the load merge command?
A. to add or delete variables from the configuration based on the contents of a specified path file
B. to completely overwrite the current configuration with the configuration you load
C. to combine the current configuration with the configuration you load
D. to look for a replace tag in the configuration you load
عرض الإجابة
اجابة صحيحة: C
السؤال #40
You are asked to configure your device running Junos OS to automatically archive your configuration upon commit. In this scenario, which two methods are supported by the Junos OS? (Choose two.)
A. SCP
B. RCP
C. FTP
D. HTTP
عرض الإجابة
اجابة صحيحة: AB
السؤال #41
Referring to the exhibit, what is the expected behavior for login attempts from users that receive a reject form from both the RADIUS and TACACS+ servers?
A. Users are prompted for a local authentication password
B. Users are not prompted for a local authentication password
C. Users are prompted for the root authentication password
D. Users are granted limited access to the device using a guest account
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: