当前分类: JN0-100
问题:多选题Which two statements about subnet masks are true?()AIf a bit is turned on (1), the corresponding bit in the IP address is used for the host portion.BIf a bit is turned off (0), the corresponding bit in the IP address is used for the host portion.CIf a ...
查看答案
问题:单选题A router has been configured with the authentication order settings shown below: [edit] user@host# show system authentication-order authentication-order [radius tacplus password]; The router also has a local database that contains the user lab with pas...
问题:多选题What are two valid initial configuration methods supported on Juniper routers?()ACLIBJ-WebCJUNOScopeDPCMCIA flash card...
问题:多选题Which two statements regarding JUNOS architecture are correct?()AThe Routing Engine handles all exception traffic.BThe Routing Engine synchronizes the route table with the PFECThe Routing Engine is hot-pluggable.DThe Routing Engine controls the PFE...
问题:多选题Which three statements are true regarding the Network Time Protocol (NTP) in JUNOS platforms?()AMD5 authentication is supported.BA client always synchronizes to a server even when the difference between the server clock and the local clock differs by a...
问题:多选题Which two media types support asynchronous transfer mode?()AT3BSONETCGigabit-EthernetDEIA/TIA-232 serial...
问题:单选题The auto-complete feature in the JUNOS CLI is triggered by which method?()A space bar for both command and variable completionB space bar for command completion;tab key for variable completionC space bar for variable completion;tab key for command comp...
问题:单选题Rewrite rules are used in which CoS scenario?()A When a single device is configured to provide differentiated services.B When multiple devices in a network are configured to use CoS to provide differentiated services.C When a device is used to connect ...
问题:单选题Which major J-Web menu should you use to upgrade the JUNOS soft ware on the router?()A MonitorB MaintainC DiagnoseD Configuration...
问题:单选题What information does the help topic command provide?()A router’s version and serial number to help open a case with JTACB software documentation describing features and configuration tasks within JUNOSC a brief description of commands and their defaul...
问题:单选题When is the BA Classifier engaged for identifying the forwarding class of traffic in a Juniper router?()A after a packet is identified by a multifield classifierB after the traffic passes though a shaperC prior to ingress policing of trafficD while the...
问题:单选题In which routing table would you find an OSPF V2 route?()A ipv4-unicastB inet.0C inet.4D inet.ipv4...
问题:单选题The interface ge-0/2/3 is located in which flexible PIC concentrator slot?()A 0B 2C 3D 4...
问题:多选题Which three statements describe the User Datagram Protocol (UDP)?()AUDP provides delivery notification and error checking mechanisms.BUDP is faster than the Transmission Control Protocol (TCP).CUDP application examples include DNS and VoIP.DUDP is an a...
问题:单选题If the PFE does not have a route to the destination address of a packet, which action will be taken?()A The PFE floods the packet out of all interfaces.B The PFE drops the packet and sends a destination unreachable notification back to source device.C ...
问题:单选题In which mode are users allowed to configure the device, including interfaces, protocols, user access, and system hardware properties?()A priviledged modeB configuration modeC monitoring modeD operational mode...
问题:单选题Which application would be suited for UDP traffic?()A Web browsingB downloading a programC streaming television showsD on-line shopping...
问题:单选题Which command allows viewing of only OSPF routes?()A show ip ospf routeB show ip route protocol ospfC show route protocol ospfD show ospf table...
问题:单选题Which statement is true about the internal link between the Routing Engine and the Packet-Forwarding Engine?()A It is only used for exception traffic.B It is an FE link called fxp2.C It is rate-limited to avoid DDOS attacks.D It is only used to send th...