Q1. What is the purpose of a network mask?
A. It is used in conjunction with the wildcard mask to determine the number of hosts on a network.
B. It is used to define which parts of the IP address are allocated to host addresses and network prefixes.
C. It is used to hide subnets from external networks by masking the subnets with NAT.
D. It is used to differentiate a network as a classful network or a classless network.
Answer: B
Q2. Which two statements are true about firewall filter configurations? (Choose two.)
A. Multiple action modifiers can be included in the same term.
B. Only a single action modifier can be included in the same term.
C. If an action modifier exists without a terminating action, matching packets will be accepted.
D. If an action modifier exists without a terminating action, matching packets will be discarded.
Answer: A,C
Q3. -- Exhibit – -- Exhibit --
You have been asked to establish reachability between Router 1's and Router 2's loopback addresses as shown in the exhibit.
Which two steps will accomplish this task? (Choose two.)
A. Create a static route on Router 1 to 172.17.28.1 with a next hop of 10.10.10.2.
B. Create a static route on Router 1 to 172.17.28.1 with a next hop of 10.10.10.1.
C. Create a static route on Router 2 to 172.17.25.1 with a next hop of 10.10.10.1.
D. Create a static route on Router 1 to 172.17.25.1 with a next hop of 10.10.10.2.
Answer: A,C
Q4. Which statement is correct about the forwarding table?
A. The forwarding table is stored only on the PFE.
B. The forwarding table contains all known routes.
C. The forwarding table is stored on both the RE and PFE.
D. The forwarding table is stored only on the RE.
Answer: C
Q5. A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path.
Which two protocol functions allow this type of communication? (Choose two.)
A. packet segmentation
B. serialized checking
C. packet sequencing
D. parallel checking
Answer: A,C
Q6. Which command gracefully shuts down the Junos OS?
A. request system reboot
B. request system logout
C. request system halt
D. restart gracefully
Answer: C
Q7. -- Exhibit --
traceroute to 10.1.15.2 (10.1.15.2), 30 hops max, 40 byte packets
1 10.1.36.1 (10.1.36.1) 0.651 ms 7.834 ms 0.506 ms
2 10.1.23.1 (10.1.23.1) 0.5 ms 0.5 ms 0.5 ms
3 * * *
4 * * *
-- Exhibit --
Referring to the exhibit, which statement is correct?
A. The packets have exceeded the time-to-live value.
B. There is a loop.
C. The asterisks indicate a response time out.
D. The asterisks indicate that the traceroute is completed.
Answer: C
303. -- Exhibit --user@router# run show route /24 inet.0: 142 destinations, 142 routes (141 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
/24 *[OSPF/10] 04:10:20 >to 172.25.213.11 via ge-1/0/1.0 to 172.25.213.23 via ge-1/0/2.0 -- Exhibit --
In the exhibit, what does the (>) symbol indicate?
A. There is a software issue with ge-1/0/1.0 interface.
B. There is a hardware issue with ge-1/0/1.0 interface.
C. The next hop of 172.25.213.11 is selected.
D. The next hop of 172.25.213.11 is not resolvable.
Q8. Which two statements are true about terms in a routing policy? (Choose two.)
A. A routing policy cannot have more than one term.
B. If a term does not contain a from statement, all routes match.
C. If a term does not contain a from statement, the Junos OS will not commit.
D. A then statement is not mandatory in a term.
Answer: B,D
Q9. Which command will delete the current rescue configuration?
A. user@router# system delete configuration rescue
B. user@router> request system configuration rescue delete
C. user@router# delete rescue configuration D. user@router> file delete rescue-configuration
Answer: B
Q10. Which two statements are true regarding the use of NTP clock synchronization? (Choose two.)
A. The Junos OS supports client, server, and symmetric modes of NTP operation.
B. Synchronized time on all network devices makes log messages more useful for troubleshooting.
C. Authentication methods are not supported.
D. The Junos OS must be used as the primary time reference.
Answer: A,B
Q11. What is the purpose of a network mask?
A. It is used to identify the maximum hop count of a subnetwork.
B. It is used to identify an IP address as either private or public.
C. It is used to identify the network to which an IP address belongs.
D. It is used to identify the total number of bits present in an IP address.
Answer: C
Q12. When considering the default behavior of Junos platforms, which statement is true about archiving configurations?
A. A system log message is generated, confirming the transfer attempt.
B. The destination filename format can be altered by configuration.
C. The frequency the system archives the configuration cannot be changed.
D. An archive log is created to track transfer attempts, both failed and successful.
Answer: A
Topic 3, Volume C
Q13. What are two valid actions for a routing policy? (Choose two.)
A. discard
B. next policy
C. accept
D. ignore
Answer: B,C
Q14. What must you type to enter operational mode from the root@% command prompt?
A. exit
B. configure
C. edit
D. cli
Answer: D
Q15. What is a valid multicast MAC address?
A. 00:90:69:9f:ea:46
B. ff:ff:ff:ff:ff:ff
C. 01:00:5e:28:12:95
D. 99:99:99:99:99:99
Answer: C