DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Online Juniper JN0-102 Mock Tests & Study Materials, Juniper JNCIA-Junos Certification | SPOTO

Welcome to SPOTO's hub for Online Juniper JN0-102 Mock Tests & Study Materials, tailored to help you achieve the Juniper JNCIA-Junos Certification. Our extensive resources include practice tests, free tests, online exam questions, sample questions, exam dumps, exam questions and answers, mock exams, and comprehensive exam materials. Specifically designed for networking professionals with beginner-intermediate knowledge, the JNCIA-Junos certification evaluates your understanding of the core functionality of the Juniper Networks Junos OS. Whether you're aiming to reinforce key concepts, practice with real exam scenarios, or simply enhance your knowledge base, our latest practice tests are designed to help you succeed and pass the certification exam confidently. Trust SPOTO to provide you with the essential tools and expert resources necessary for your certification success.

Take other online exams

Question #1
The authentication order configuration on your M120 includes the settings tacplus and radius (in that order), but does not include the password parameter. You attempt to log in to the device, but the network containing the authentication servers is currently down. Which statement is true about your login attempt?
A. The login attempt is rejected
B. The login attempt is automatically accepted after the authentication servers’ timeout value is reached, since there are no other authentication methods available
C. The M120 automatically tries authenticating locally on the device after the authentication servers’ timeout value is reached
D. The M120 automatically tries authenticating locally on the device before using external authentication
View answer
Correct Answer: C
Question #2
-- Exhibit – -- Exhibit -- Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?
A. [edit firewall family inet filter STOP-MAL-USER] user@router# show term one { from { source-address { 200
B. [edit firewall family inet filter STOP-MAL-USER] user@router# show term one { from { source- address { 100
C. [edit firewall family inet filter STOP-MAL-USER] user@router# show term one { from { source- address { 100
D. [edit firewall family inet filter STOP-MAL-USER] user@router# show term one { from { source-address { 200
View answer
Correct Answer: D
Question #3
You are configuring a new BGP neighbor and want to view the configuration of interface ge-0/0/0.42. Which command do you use to achieve this result?
A. [edit protocols bgp group external] user@router# set interfaces ge-0/0/0
B. [edit protocols bgp group external] user@router# edit show interfaces ge-0/0/0
C. [edit protocols bgp group external] user@router# top show interfaces ge-0/0/0
D. [edit protocols bgp group external] user@router# show interfaces ge-0/0/0
View answer
Correct Answer: C
Question #4
What are three valid match criteria in a firewall filter applied to a Layer 3 interface? (Choose three.)
A. IP address
B. MAC address
C. protocol
D. port
E. session ID
View answer
Correct Answer: ACD
Question #5
-- Exhibit -- [edit policy-options] user@router# show policy- statementpolicyABC { term A { from { protocol rip; route-filter 192.168.1.0/24 longer; } then accept; } } [edit protocols ospf] user@router# show exportpolicyABC; area 0.0.0.0 { interface ge-0/0/0.0; interface lo0.0; } -- Exhibit -- Referring to the exhibit, which two statements are true? (Choose two.)
A. The route 192
B. The route 192
C. OSPF routes will be exported into RIP
D. RIP routes will be exported into OSPF
View answer
Correct Answer: AD
Question #6
Which two statements are correct about Layer 2 broadcast frames? (Choose two.)
A. Layer 2 broadcast frames are processed by all devices on the same VLAN
B. Layer 2 broadcast frames are discarded by routers that connect to multiple VLANs
C. Layer 2 broadcast frames are relayed by routers to all connected VLANs
D. Layer 2 broadcast frames are relayed by switches to devices on the same VLAN
View answer
Correct Answer: AD
Question #7
You have been allocated a /22 network. How many usable hosts are available?
A. 510
B. 512
C. 1022
D. 1024
View answer
Correct Answer: C
Question #8
-- Exhibit -- interfaces { ge-0/0/8 { unit 0 { family inet { address 192.168.1.1/24; } } } ge-0/0/9 { unit 0 { family inet { address 192.168.10. 1/24; } } } } -- Exhibit -- Referring to the exhibit, which command would you use to add an additional address to the ge-0/0/9.0 interface?
A. [edit interfaces ge-0/0/9 unit 0] user@router# set family inet address /24
B. [edit interfaces ge-0/0/9 unit 0] user@router# set family inet secondary-address /24
C. [edit interfaces ge-0/0/9 unit 0] user@router# set family inet address /24 secondary
D. [edit interfaces ge-0/0/9 unit 0] user@router# set family inet address- secondary /24
View answer
Correct Answer: A
Question #9
What represents the decimal equivalence of 01101110?
A. 90
B. 96
C. 110
D. 118
View answer
Correct Answer: C
Question #10
You configured an interface with an IP address and committed the change. You then committed a change that added an exception in a firewall filter to allow this network through the filter. You realize that this work was done on the wrong router. How do you undo all these changes?
A. rollback 2
B. rollback 1
C. rollback 0
D. rollback 3
View answer
Correct Answer: A
Question #11
What are the usable hosts on the .128.0/19 network?
A.
B.
C.
D.
View answer
Correct Answer: D
Question #12
Which two statements are correct regarding default protocol preference values? (Choose two.)
A. RIP is preferred over OSPF external routes
B. Direct, local, and static routes have the same preference value
C. OSPF's preference value is lower than BGP
D. OSPF has a single preference value for both internal and external routes
View answer
Correct Answer: AC
Question #13
How do you write the current candidate configuration to the permanent storage media?
A. [edit] user@router# save /var/tmp/current
B. [edit] user@router# write /var/tmp/current
C. [edit] user@router# commit /var/tmp/current
D. [edit] user@router# dump /var/tmp/current
View answer
Correct Answer: A
Question #14
Which configuration causes RIP-learned routes to be advertised to other RIP neighbors?
A. set protocol rip no-passive
B. top edit policy-options policy-statement demoset term 1 from protocol rip set term 1 then accept top set protocols rip group internal export demo
C. set protocols rip advertise in-out
D. top edit policy-options policy-statement demo set term 1 from active routes set term 1 then accept top set protocols rip group internal export demo
View answer
Correct Answer: B
Question #15
How can you verify that you have correctly configured SSH access to your Junos device?
A. user@router# show system services
B. user@router> show configuration services
C. user@router# show configuration system services
D. user@router# show system login
View answer
Correct Answer: A
Question #16
Which three SONET network elements are used for troubleshooting? (Choose three.)
A. line
B. path
C. circuit
D. section
E. segment
View answer
Correct Answer: ABD
Question #17
You issue the command telnet interface ge-1/1/0 10.10.10.1 source 192.168.100.1 bypass-routing. Which statement is correct?
A. The bypass-routing parameter is ignored when using private IP addressing
B. The telnet session will have the source IP address 10
C. The telnet session will connect to the neighboring device’s interface ge-1/1/0
D. Return traffic for the telnet session might not arrive at interface ge-1/1/0
View answer
Correct Answer: D
Question #18
You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts. Which network mask do you use?
A. /26
B. /27
C. /28
D. /29
View answer
Correct Answer: C
Question #19
What information does the help topic command provide?
A. router's version and serial number to help open a case with JTAC
B. software documentation describing features and configuration tasks within JUNOS
C. a brief description of commands and their default values
D. a verification of the current configuration on the router
View answer
Correct Answer: B
Question #20
Which two statements about subnet masks are true? (Choose two.)
A. If a bit is turned on (1), the corresponding bit in the IP address is used for the host portion
B. If a bit is turned off (0), the corresponding bit in the IP address is used for the host portion
C. If a bit is turned on (1), the corresponding bit in the IP address is used for the network prefix
D. If a bit is turned off (0), the corresponding bit in the IP address is used for the network prefix
View answer
Correct Answer: BC
Question #21
Which statement describes an advantage of dynamic routing?
A. Dynamic routing is typically more scalable when compared to static routing
B. Unlike static routing, dynamic routing requires no initial user configuration
C. Unlike static routing, dynamic routing provides redundant IP addresses for end-user devices
D. Dynamic routing provides DNS services along with IP connectivity, whereas static routing does not
View answer
Correct Answer: A
Question #22
-- Exhibit – -- Exhibit -- Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?
A. [edit firewall] user@router# show policer LIMIT-MAL- USER { if-exceeding { bandwidth- limit 400k; burst-size-limit 100k; } then discard; } familyinet { filter STOP- MAL-USER { term one { from { source-address { 100
B. [edit firewall] user@router# show policer LIMIT-BAD- USER { if-exceeding { bandwidth-limit 400k; burst-size-limit 100k; } then discard; } familyinet { filter STOP- MAL-USER { term one { from { source-address { 100
C. [edit firewall] user@router# show policer LIMIT-MAL- USER { if-exceeding { bandwidth-limit 400k; burst-size-limit 100k; } then discard; } familyinet { filter STOP- MAL-USER { term one { from { source-address { 100
D. [edit firewall] user@router# show policer LIMIT-MAL- USER { if-exceeding { bandwidth-limit 400k; burst-size-limit 100k; } then discard; } familyinet { filter STOP- MAL-USER { term one { from { source-address { 200
View answer
Correct Answer: A
Question #23
Which application would be suited for UDP traffic?
A. Web browsing
B. downloading a program
C. streaming television shows
D. on-line shopping
View answer
Correct Answer: C
Question #24
What is the default protocol preference for OSPF internal routes?
A. 10
B. 15
C. 150
D. 160
View answer
Correct Answer: A
Question #25
Which two statements accurately describe a broadcast domain? (Choose two.)
A. Broadcast domains require that the participating devices connect to common switches or hubs
B. Broadcast domains consist of devices reachable by frames addressed to the Layer 2 broadcast address
C. Broadcast domains require a gateway device such as a router
D. Broadcast domains consist of devices that reside on the same VLAN
View answer
Correct Answer: BD
Question #26
-- Exhibit -- [edit interfaces] user@router# show ... lo0 { unit 0 { familyine t { filter { input protect-loopback; } address 192.168.100.1/32; } } } -- Exhibit -- Given the configuration shown in the exhibit, what is the function of the protect-loopback filter?
A. to protect the Routing Engine
B. to protect all interfaces on the device
C. to protect the Packet Forwarding Engine
D. to protect the management interface
View answer
Correct Answer: A
Question #27
Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors? (Choose two.)
A. set protocols rip export demo
B. edit policy-options policy-statement demoset term 1 from protocol static set term 1 then accept
C. edit policy-options policy-statement demoset term 1 from protocol static accept
D. set protocols rip group internal export demo
View answer
Correct Answer: BD
Question #28
Two devices on an Ethernet segment sent frames at the same time causing a collision. Which two statements are true? (Choose two.)
A. Both devices stop transmitting, wait a random period of time, verify the wire is idle, and re-transmit
B. The device with the lowest MAC address is permitted to retransmit first
C. The device with the lowest MAC address sends a jam signal to notify all other devices of the collision
D. Both devices send a jam signal to notify all other devices of the collision
View answer
Correct Answer: AD
Question #29
-- Exhibit -- [edit routing-options] user@router# show static { defaults { metric 10; preference 10; } route 10.10.10.0/24 { next-hop 192.168.100.1; qualified-next- hop 192.168.200.1; preference 6; } metric 8; } } -- Exhibit -- Given the configuration shown in the exhibit, which statement is correct about traffic matching the route 10.10.10.0/24?
A. It will be forwarded to 192
B. It will be forwarded to 192
C. It will be forwarded to 192
D. It will be forwarded to 192
View answer
Correct Answer: C
Question #30
Which three functions are available under the "Maintain" tab of J-Web? (Choose three.)
A. download and delete log files
B. view real-time statistics of interfaces
C. reboot the system
D. view and add licenses
E. edit security settings
View answer
Correct Answer: ACD
Question #31
-- Exhibit -- user@router> show configuration firewall familyinet { filter demo { term example { from { source-address { 100.100.100.0/24; } destination-address { 200.200.200.0/24; } } then { reject; } } term testing { from { source- address { 10.10.10.0/28; } destination-address { 200.200.200.0/24; } } then sample; } term results { from { address { 200.200.200.0/24; } } then accept; } term final { thenpolicer LAPD; } } } -- Exhibit -- Given the configuration shown in the exhibit, what will happen to traffi
A. The traffic will be rejected
B. The traffic will be dropped
C. The traffic will be forwarded
D. The traffic will be policed
View answer
Correct Answer: C
Question #32
You are at the top of the hierarchy and must configure OSPF on interface so-0/0/0 unit 100. Which two achieve this result? (Choose two.)
A. set protocolssetospf area 0 set interface so-0/0/0
B. set protocols ospf area 0 interface so- 0/0/0
C. edit protocols ospf interface so- 0/0/0
View answer
Correct Answer: BD
Question #33
Which two statements are true of a network mask? (Choose two.)
A. A subnet mask specifies the portion of an IP address that is in a binary format
B. A subnet mask specifies the portion of an IP address that is in a decimal format
C. A subnet mask specifies the portion of an IP address that represents a network prefix
D. A subnet mask specifies the portion of an IP address that represents network hosts
View answer
Correct Answer: CD
Question #34
Which two statements are true about the forwarding table? (Choose two.)
A. The forwarding table lists each source protocol and preference for each destination
B. The forwarding table contains only active routes
C. The forwarding table is used to process transit packets
D. The forwarding table is stored in compact flash
View answer
Correct Answer: BC
Question #35
Which class-of-service component allows you to define the bandwidth allocated to different traffic types?
A. classification
B. rewrite marking
C. scheduling
D. queuing
View answer
Correct Answer: C
Question #36
-- Exhibit -- user@router> show route inet.0: 9 destinations, 9 routes (9 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both 10.10.10.91/32 *[Direct/0] 00:09:40 >via lo0.0 10.10.10.92/32 *[OSPF/10] 00:01:50, metric 1 >to 172.16.1.2 via ge-0/0/2.0 100.100.1.0/24 *[Static/5] 00:01:50 Reject 172.16.1.0/24 *[Direct/0] 00:06:09 >via ge-0/0/2.0 172.16.1.1/32 *[Local/0] 00:06:09 Local via ge-0/0/2.0 192.168.0.0/16 *[Aggregate/130] 00:00:06 Reject 192.168.0.0/17 *[Aggregate/130] 00:00:06 >to
A. 192
B. 192
C. 192
D. 192
View answer
Correct Answer: D
Question #37
You have been asked to configure a login class that will permit its users to view and edit the configuration. The class should allow a user to view the entire configuration, but only to edit the interfaces, routing-options, and protocols hierarchies. Which configuration accomplishes this login class?
A. permissions [ view-configuration clear network view ]; allow-configuration "(interfaces) | (routing-options) | (policy-options) | (protocols)";
B. permissions [ view-configuration clear network view ]; allow-commands "(configure)";
C. permissions [ view-configuration clear network view ]; allow- commands "(configure)"; allow-configuration "(interfaces) | (routing-options) | (protocols)";
D. permissions [ clear network view ]; allow- commands "(configure)"; allow-configuration "(interfaces) | (routing- options) | (protocols)";
View answer
Correct Answer: C
Question #38
Which two protocols use UDP as a transport protocol by default? (Choose two.)
A. Telnet
B. ICMP
C. DHCP
D. RIP
View answer
Correct Answer: CD
Question #39
-- Exhibit -- user@router# run show interfaces terse Interface Admin Link Proto Local fe-0/0/0 up up fe-0/0/0.0 up upinet 10.0.39.2/24 iso mpls fe-0/0/1 up up fe-0/0/1.0 up upinet 10.0.18.2/24 fe-0/0/1.5 down up inet 10.0.19.2/24 -- Exhibit -- An administrator is unable to ping any address on the 10.0.19.0/24 subnet. To identify the problem, the administrator uses the command shown in the exhibit. Which step should be taken to solve the problem?
A. Check the physical cable
B. Issue the command activate interfaces fe-0/0/1
C. Issue the command delete interfaces fe-0/0/1
D. Reconfigure the IP address
View answer
Correct Answer: C
Question #40
-- Exhibit -- ... if-exceeding { bandwidth- limit 1m; burst-size-limit 3k; } then discard; - - Exhibit -- The configuration in the exhibit is associated with which class of service component?
A. classification
B. policing
C. queuing
D. scheduling
View answer
Correct Answer: B
Question #41
You have been asked to use a 23-bit network mask to segment the network block 209.18.12.0. How many usable host addresses will there be per subnet?
A. 510
B. 1022C
D. 8190
View answer
Correct Answer: A
Question #42
Which command do you use as a valid way to view the PICs within a router as well as the PICs' serial numbers?
A. show chassis hardware
B. show chassis interfaces
C. show chassis pic
D. show chassis inventory
View answer
Correct Answer: A
Question #43
There are three static routes in the routing table that need to be announced to your OSPF peers. Which method is used to accomplish this?
A. Apply an import policy to OSPF that injects the static routes into OSPF
B. Apply an import policy to the static routes that injects the static routes into OSPF
C. Apply an export policy to the static routes that injects the static routes into OSPF
D. Apply an export policy to OSPF that injects the static routes into OSPF
View answer
Correct Answer: D
Question #44
-- Exhibit – -- Exhibit -- You have been asked to establish reachability between Router 1's and Router 2's loopback addresses as shown in the exhibit. Which two steps will accomplish this task? (Choose two.)
A. Create a static route on Router 1 to 172
B. Create a static route on Router 1 to 172
C. Create a static route on Router 2 to 172
D. Create a static route on Router 1 to 172
View answer
Correct Answer: AC
Question #45
What is the default export routing policy for RIP?
A. Accept all local routes
B. Accept all RIP routes
C. Accept no routes
D. Accept all direct routes
View answer
Correct Answer: C
Question #46
-- Exhibit -- user@router> show route inet.0: 9 destinations, 9 routes (9 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both 10.10.10.91/32 *[Direct/0] 00:09:40 >via lo0.0 10.10.10.92/32 *[OSPF/10] 00:01:50, metric 1 >to 172.16.1.2 via ge-0/0/2.0 100.100.1.0/24 *[Static/5] 00:01:50 Reject 172.16.1.0/24 *[Direct/0] 00:06:09 >via ge-0/0/2.0 172.16.1.1/32 *[Local/0] 00:06:09 Local via ge-0/0/2.0 192.168.0.0/16 *[Aggregate/130] 00:00:06 Reject 192.168.0.0/17 *[Aggregate/130] 00:00:06 >to
A. 192
B. 192
C. 192
D. 192
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: