Q1. You are asked to free up disk space so you can update your version of the Junos OS.
Which two commands display the files that will be removed? (Choose two.)
A. user@router> request system storage cleanup
B. user@router> show system storage
C. user@router> request system storage cleanup dry-run
D. user@router> show system storage detail
Answer: A,C
Q2. You are asked to change the cable on interface fe-4/2/3.
Which statement is correct?
A. The cable is found on port 4, FPC 2, and slot 3.
B. The cable is found on slot 2, port 3, and FPC 4.
C. The cable is found on FPC 4, slot 3, and port 2.
D. The cable is found on slot 2, FPC 3, and port 4.
Answer: B
Q3. Which command do you use to go from the shell prompt to the CLI prompt?
A. run cli
B. cli
C. start cli
D. edit
Answer: B
Q4. At which command prompt would you issue the set date <date> command?
A. [edit chassis] user@router#
B. [edit] user@router# Juniper JN0-102 : Practice Test
C. [edit system] user@router#
D. user@router>
Answer: D
Q5. How do you save the current candidate configuration in the set format to permanent storage media?
A. [edit]
user@router# show | set | save /var/tmp/current.conf
B. [edit]
user@router# show | compare set | save /var/tmp/current.conf
C. [edit]
user@router# save /var/tmp/current.conf | display set
D. [edit]
user@router# show | display set | save /var/tmp/current.conf
Answer: D
Q6. -- Exhibit --inet.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
172.23.10.0/24 *[Direct/0] 21:59:56 >via ge-0/0/6.0 172.23.10.100/32 *[Local/0] 22:00:10 Local via ge-0/0/6.0 172.23.12.0/24 *[Static/5] 00:01:36 >to 172.23.10.1 via ge-0/0/6.0 172.23.15.0/24 *[Static/5] 00:01:36 >to 172.23.10.1 via ge-0/0/6.0 -- Exhibit --
Users are unable to access resources in the 172.23.14.0/24 subnet.
Referring to the exhibit, which two actions would solve this problem? (Choose two.)
A. Configure a separate routing instance.
B. Configure a default static route.
C. Configure a static route to 172.23.14.0/24.
D. Configure the existing routes to resolve the indirect next hop.
Answer: B,C
Q7. What is the default SNMP permission level on Junos devices?
A. read
B. read-write
C. read-only
D. write
Answer: C
Q8. In the MAC address 00: : :9f:eA. , what represents the Organizationally Unique Identifier (OUI)?
A. :9f:eA.
B. 00: : :9f
C. 9f:eA.
D. 00: :
Answer: D
Q9. What is the decimal equivalent of 00000100?
A. 2
B. 4
C. 9
D. 12
Answer: B
Q10. What is the purpose of a network mask?
A. It is used to identify the maximum hop count of a subnetwork.
B. It is used to identify an IP address as either private or public.
C. It is used to identify the network to which an IP address belongs.
D. It is used to identify the total number of bits present in an IP address.
Answer: C
Q11. Which mode is used to allow only a single person to edit a configuration?
A. configure batch
B. configure private
C. configure exclusive
D. configure dynamic
Answer: C
Q12. Which two statements are true regarding routing policy processing? (Choose two.)
A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.
B. Policies are evaluated from right to left as displayed in the Junos OS configuration file.
C. Polices are evaluated based on the order in which they are applied to a routing protocol.
D. Policy processing stops once the last statement in the policy is evaluated.
Answer: A,C
Q13. The authentication order configuration on your M120 includes the settings tacplus and radius (in that order), but does not include the password parameter. You attempt to log in to the device, but the network containing the authentication servers is currently down.
Which statement is true about your login attempt?
A. The login attempt is rejected.
B. The login attempt is automatically accepted after the authentication servers’ timeout
value is reached, since there are no other authentication methods available.
C. The M120 automatically tries authenticating locally on the device after the authentication servers’ timeout value is reached.
D. The M120 automatically tries authenticating locally on the device before using external authentication.
Answer: C
Q14. -- Exhibit – -- Exhibit --
Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.
Which firewall filter configuration do you use?
A. [edit firewall family inet filter STOP-MAL-USER]
user@router# show
term one {
from {
source-address {
200.200.200.0/24;
}
destination-address {
100.100.100.10/32;
}
protocoltcp;
destination-port http;
}
then accept;
}
term two {
then {
reject;
}
}
B. [edit firewall family inet filter STOP-MAL-USER]
user@router# show
term one {
from {
source-address {
100.100.100.0/24;
}
destination-address {
200.200.200.1/32;
}
protocoltcp;
destination-port http;
}
then accept;
}
term two {
then {
reject;
}
}
C. [edit firewall family inet filter STOP-MAL-USER]
user@router# show
term one {
from {
source-address {
100.100.100.0/24;
}
destination-address {
200.200.200.1/32;
}
protocoltcp;
destination-port http;
}
then reject;
}
term two {
then {
accept;
}
}
D. [edit firewall family inet filter STOP-MAL-USER]
user@router# show
term one {
from {
source-address {
200.200.200.0/24;
}
destination-address {
100.100.100.10/32;
}
protocoltcp;
destination-port http;
}
then reject;
}
term two {
then {
accept;
}
}
Answer: D
Q15. Which statement describes an advantage of dynamic routing?
A. Dynamic routing is typically more scalable when compared to static routing.
B. Unlike static routing, dynamic routing requires no initial user configuration.
C. Unlike static routing, dynamic routing provides redundant IP addresses for end-user devices.
D. Dynamic routing provides DNS services along with IP connectivity, whereas static routing does not.
Answer: A