JN0-102 Premium Bundle

JN0-102 Premium Bundle

Junos, Associate (JNCIA-Junos) Certification Exam

4.5 
(36255 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Juniper JN0-102 Free Practice Questions

Q1. Which command will display only direct routes? 

A. show route 

B. show route inet.0 direct 

C. show ip route direct 

D. show route protocol direct 

Answer:

231. What are two reasons why a route might be hidden? (Choose two.) 

A. route preference 

B. routing loop 

C. invalid next hop 

D. routing policy 

Q2. Which account is used to access a Junos device in factory-default configuration? 

A. root 

B. admin 

C. juniper 

D. user 

Answer:

Q3. Which configuration causes RIP-learned routes to be advertised to other RIP neighbors? 

A. set protocol rip no-passive 

B. top edit policy-options policy-statement demo set term 1 from protocol rip set term 1 then accept top set protocols rip group internal export demo 

C. set protocols rip advertise in-out 

D. top edit policy-options policy-statement demo set term 1 from active routes set term 1 then accept top set protocols rip group internal export demo 

Answer:

Q4. Which two statements are correct when you use the reject parameter as the next-hop value for a static route? (Choose two.) 

A. The packet is dropped and the packet's source is marked with the no-readvertise parameter. 

B. The system sends the packet back to the source. 

C. The packet is dropped from the network. 

D. The system sends an ICMP message back to the source of the packet. 

Answer: C,D 

Q5. Your network administrator has asked you to view the real-time interface usage on ge-0/0/0. 

Which command would be used? 

A. monitor interface ge-0/0/0 

B. traceoptions interface ge-0/0/0 

C. debug interface ge-0/0/0 

D. monitor usage ge-0/0/0 

Answer:

Q6. Which statement is correct about policies in the Junos OS? 

A. Export policies are used to filter routes from the RE forwarding table to the PFE forwarding table. 

B. Export policies are used to filter routes destined for the routing table. 

C. Export policies are used to filter routes being sent to neighboring devices. 

D. Export policies are used to filter traffic leaving the device. 

Answer:

Q7. Which two protocols use UDP as a transport protocol by default? (Choose two.) 

A. Telnet 

B. ICMP 

C. DHCP D. RIP 

Answer: C,D 

Q8. Which two statements are true about the forwarding table? (Choose two.) 

A. The forwarding table lists each source protocol and preference for each destination. 

B. The forwarding table contains only active routes. 

C. The forwarding table is used to process transit packets. 

D. The forwarding table is stored in compact flash. 

Answer: B,C 

Q9. -- Exhibit – 

-- Exhibit --

Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. 

Which firewall filter configuration do you use? 

A. [edit firewall] 

user@router# show 

policer LIMIT-MAL-USER { 

if-exceeding { 

bandwidth-limit 400k; 

burst-size-limit 100k; 

then discard; 

familyinet { 

filter STOP-MAL-USER { 

term one { 

from { 

source-address { 

100.100.100.10/32; } destination-address { 200.200.200.0/24; } } thenpolicer LIMIT-MAL-USER; } term two { then accept; } } } 

B. [edit firewall] 

user@router# show 

policer LIMIT-BAD-USER { 

if-exceeding { 

bandwidth-limit 400k; 

burst-size-limit 100k; 

then discard; 

familyinet { 

filter STOP-MAL-USER { 

term one { 

from { 

source-address { 

100.100.100.10/32; 

destination-address { 

200.200.200.0/24; 

thenpolicer LIMIT-MAL-USER; 

term two { 

then accept; 

C. [edit firewall] 

user@router# show 

policer LIMIT-MAL-USER { 

if-exceeding { 

bandwidth-limit 400k; 

burst-size-limit 100k; 

then discard; 

familyinet { 

filter STOP-MAL-USER { 

term one { 

from { 

source-address { 

100.100.100.10/32; 

destination-address { 

200.200.200.0/24; 

thenpolicer LIMIT-MAL-USER; 

term two { 

then reject; 

D. [edit firewall] 

user@router# show 

policer LIMIT-MAL-USER { 

if-exceeding { 

bandwidth-limit 400k; 

burst-size-limit 100k; 

then discard; 

familyinet { 

filter STOP-MAL-USER { 

term one { 

from { 

source-address { 

200.200.200.0/24; 

destination-address { 

100.100.100.10/32; 

thenpolicer LIMIT-MAL-USER; 

term two { 

then accept; 

Juniper JN0-102 : Practice Test 

} } 

Answer:

Q10. Which command will save the current active configuration as the rescue configuration? 

A. user@router# save | rescue 

B. user@router> request system configuration rescue save 

C. user@router# save rescue configuration 

D. user@router> file save rescue-configuration 

Answer:

Q11. Which two statements are true regarding route preference? (Choose two.) 

A. Lower preference values are more preferred than higher preference values. 

B. You can modify the default preference values for any of the routing information sources. 

C. By default, a static route is more preferred than a RIP route. 

D. A static route is always preferred over a direct route. 

Answer: A,C 

Q12. What information does the help reference command provide? 

A. A brief description of commands and their default values 

B. The serial number and version number of the device used to open a support case with JTAC 

C. A list of all the active hardware alarms on the device 

D. A display of the current configuration while in operational mode 

Answer:

Q13. Which three steps are part of the root password recovery process? (Choose three.) 

A. Reboot the device. 

B. Run the recovery script. 

C. Reset the root password. 

D. Reset the user passwords. 

E. Load factory-default configuration. 

Answer: A,B,C 

Q14. Which two commands would you use to discard a candidate configuration? (Choose two.) 

A. rollback 

B. delete 

C. delete 0 

D. rollback 0 

Answer: A,D 

Q15. By default, which two statements are true about export routing policies? (Choose two.) 

A. Export policies can evaluate only active routes. 

B. Export policies can evaluate all routes. 

C. Export policies can be applied to the forwarding table. 

D. Export policies can be applied directly to interfaces 

Answer: A,C 

START JN0-102 EXAM