Q1. What information does the help reference command provide?
A. A brief description of commands and their default values
B. The serial number and version number of the device used to open a support case with JTAC
C. A list of all the active hardware alarms on the device
D. A display of the current configuration while in operational mode
Answer: A
Q2. You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover.
Which routing protocol should you use in this scenario?
A. OSPF
B. RIP
C. BGP
D. static
Answer: A
Q3. How many host addresses are available in the /28 network?
A. 6
B. 14
C. 28
D. 30
Answer: B
Q4. You are modifying the default route preference under the [edit protocols] hierarchy.
In which two routing information sources can you change the default preference value? (Choose two.)
A. local
B. OSPF
C. direct
D. BGP
Answer: B,D
Q5. -- Exhibit --[editsnmp]
user@router# show
communityCommunityA {
authorization read-only;
clients {
192.168.1.0/28;
}
}
trap-groupgroupA {
categories {
link;
}
targets {
192.168.100.1;
192.168.200.1;
}
}
-- Exhibit --
Referring to the exhibit, what is the purpose of the targets section of the configuration?
A. It defines which devices will be sending traps.
B. It specifies where to send traps.
C. It defines the IP addresses of management systems that can access the device.
D. It specifies which devices can be polled for SNMP data.
Answer: B
Q6. -- Exhibit --
[edit policy-options]
user@router# show
policy-statementpolicyABC {
term A {
from {
protocol rip;
route-filter 192.168.1.0/24 longer;
}
then accept;
}
}
[edit protocols ospf]
user@router# show
exportpolicyABC;
area 0.0.0.0 {
interface ge-0/0/0.0;
interface lo0.0;
}
-- Exhibit --
Referring to the exhibit, which two statements are true? (Choose two.)
A. The route 192.168.1.0/25 is accepted.
B. The route 192.168.2.0/24 is accepted.
C. OSPF routes will be exported into RIP.
D. RIP routes will be exported into OSPF.
Answer: A,D
Q7. Which two external authentication methods are supported by the Junos OS for user authentication? (Choose two.)
A. RADIUS
B. KERBEROS
C. IPsec
D. TACACS+
Answer: A,D
Q8. What happens when you issue the ping 172.19.102.2 count 5 command?
A. ICMP echo requests are sent to 172.19.102.2 in five-millisecond intervals.
B. ICMP echo requests are sent to 172.19.102.2 until five packets are dropped.
C. ICMP echo requests are sent to 172.19.102.2 five times.
D. ICMP echo requests are sent continuously to 172.19.102.2 for five seconds.
Answer: C
Q9. Which statement describes an advantage of dynamic routing?
A. Dynamic routing provides redundant IP addresses for end-user devices, unlike static routing.
B. Dynamic routing requires no initial user configuration, unlike static routing.
C. Dynamic routing provides DNS services along with IP connectivity; static routing does not.
D. Dynamic routing typically requires less time to implement than static routing in a large network.
Answer: D
Q10. Which command do you use to identify the meaning of a syslog message?
A. help log messages
B. man log messages
C. man syslog
D. help syslog
Answer: D
Q11. You have been asked to configure a login class that will permit its users to view and edit the configuration. The class should allow a user to view the entire configuration, but only to edit the interfaces, routing-options, and protocols hierarchies.
Which configuration accomplishes this login class?
A. permissions [ view-configuration clear network view ];
allow-configuration "(interfaces) | (routing-options) | (policy-options) | (protocols)";
B. permissions [ view-configuration clear network view ];
allow-commands "(configure)";
C. permissions [ view-configuration clear network view ];
allow-commands "(configure)";
allow-configuration "(interfaces) | (routing-options) | (protocols)";
D. permissions [ clear network view ];
allow-commands "(configure)";
allow-configuration "(interfaces) | (routing-options) | (protocols)";
Answer: C
Q12. -- Exhibit –
-- Exhibit --
Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted.
Which firewall filter configuration do you use?
A. [edit firewall]
user@router# show
policer LIMIT-MAL-USER {
if-exceeding {
bandwidth-limit 400k;
burst-size-limit 100k;
}
then discard;
}
familyinet {
filter STOP-MAL-USER {
term one {
from {
source-address {
100.100.100.10/32; } destination-address { 200.200.200.0/24; } } thenpolicer LIMIT-MAL-USER; } term two { then accept; } } }
B. [edit firewall]
user@router# show
policer LIMIT-BAD-USER {
if-exceeding {
bandwidth-limit 400k;
burst-size-limit 100k;
}
then discard;
}
familyinet {
filter STOP-MAL-USER {
term one {
from {
source-address {
100.100.100.10/32;
}
destination-address {
200.200.200.0/24;
}
}
thenpolicer LIMIT-MAL-USER;
}
term two {
then accept;
}
}
}
C. [edit firewall]
user@router# show
policer LIMIT-MAL-USER {
if-exceeding {
bandwidth-limit 400k;
burst-size-limit 100k;
}
then discard;
}
familyinet {
filter STOP-MAL-USER {
term one {
from {
source-address {
100.100.100.10/32;
}
destination-address {
200.200.200.0/24;
}
}
thenpolicer LIMIT-MAL-USER;
}
term two {
then reject;
}
}
}
D. [edit firewall]
user@router# show
policer LIMIT-MAL-USER {
if-exceeding {
bandwidth-limit 400k;
burst-size-limit 100k;
}
then discard;
}
familyinet {
filter STOP-MAL-USER {
term one {
from {
source-address {
200.200.200.0/24;
}
destination-address {
100.100.100.10/32;
}
}
thenpolicer LIMIT-MAL-USER;
}
term two {
then accept;
}
Juniper JN0-102 : Practice Test
} }
Answer: A
Q13. You must apply the family inet configuration parameter only to Gigabit Ethernet interfaces that are in FPC 2.
Which output applies to this configuration?
A. [edit groups]
user@router# show
ge-int {
interfaces {
<ge-*> {
unit 0 {
familyinet;
}
}
}
}
B. [edit groups]
user@router# show
ge-int {
interfaces {
<*> {
unit 0 {
familyinet;
}
}
}
}
C. [edit groups]
user@router# show
ge-int {
interfaces {
<*-2/*/*> {
unit 0 {
familyinet;
} } } }
D. [edit groups]
user@router# show
ge-int {
interfaces {
<ge-2/*> {
unit 0 {
familyinet;
}
}
}
}
Answer: D
Q14. Which statement is true regarding the Junos OS?
A. Each process runs in its own protected memory space ensuring that one process cannot directly interfere with another.
B. Processes share memory space but use separate ASICs so that one process cannot directly interfere with another.
C. A central processor called the IP2 Chip dynamically assigns memory as process needs fluctuate.
D. The memory management daemon (mmd) is responsible for allocating new memory for processes as they request it.
Answer: A
Q15. -- Exhibit --
user@router> restart
^
unknown command.
-- Exhibit --
You are investigating routing problems on a device running the Junos OS. You receive the error shown in the exhibit when you attempt to restart the routing process.
Which statement describes the problem?
A. You have typed an invalid command.
B. You must be in configuration mode to restart the routing process.
C. You do not have permission to restart the routing process.
D. You must wait until close of business to restart the routing process, based on user-defined policy.
Answer: C