Q1. You have configured a firewall filter with a single term matching on packets with a source address in the 10.0.0.0/24 subnet. This term only includes the count action.
Which two statements are true about traffic evaluated by this firewall filter? (Choose two.)
A. Packets outside the 10.0.0.0/24 subnet will be accepted.
B. Packets outside the 10.0.0.0/24 subnet will be rejected.
C. Packets outside the 10.0.0.0/24 subnet will be counted.
D. Packets outside the 10.0.0.0/24 subnet will not be counted.
Answer: B,D
Q2. Which two statements are true regarding trace options on Junos devices? (Choose two.)
A. You can see the contents of the log file by entering the show log <filename> command.
B. Trace options will send information to your screen automatically.
C. Trace options are limited to one protocol at a time.
D. The file name and a set of flags may be specified when enabling traceoptions.
Answer: A,D
Q3. Which command will display the contents of the forwarding table?
A. show route forwarding-table
B. show forwarding
C. show configuration
D. show interfaces
Answer: A
Q4. Which two statements are true of a network mask? (Choose two.)
A. A subnet mask specifies the portion of an IP address that is in a binary format.
B. A subnet mask specifies the portion of an IP address that is in a decimal format.
C. A subnet mask specifies the portion of an IP address that represents a network prefix.
D. A subnet mask specifies the portion of an IP address that represents network hosts.
Answer: C,D
Q5. -- Exhibit --[edit policy-options]
user@router# show
policy-statement block-routes {
term 1 {
from {
route-filter 172.27.0.0/24 longer;
}
then reject;
}
term 2 {
then accept;
}
}
-- Exhibit --
You are asked to ensure that your device does not accept any prefixes within the 172.27.0.0/24 network. You have applied the policy shown in the exhibit, but the 172.27.0.0/24 route is still present on your device.
Which configuration will resolve this problem?
A. [edit policy-options policy-statement block-routes]
B. user@router# set term 1 from route-filter 172.27.0.0/24 orlonger [edit policy-options policy-statement block-routes]
C. user@router# set term 1 from route-filter 172.27.0.0/24 upto /30 [edit policy-options policy-statement block-routes]
D. user@router# set term 2 from route-filter 172.27.0.0/24 longer [edit policy-options policy-statement block-routes]
E. user@router# set term 2 from route-filter 172.27.0.0/24 orlonger
Answer: A
Q6. Which two fields are found in an Ethernet frame header? (Choose two.)
A. TTL
B. flags
C. checksum
D. type
Answer: C,D
Q7. Which statement is true about the forwarding plane?
A. It uses ASICs for increased performance.
B. It is the intelligence of the platform.
C. It maintains the routing tables.
D. It is based on an x86 architecture.
Answer: A
Q8. When using keyboard shortcuts, which single keystroke combination allows users to erase the entire current command?
A. Ctrl + a
B. Ctrl + e
C. Ctrl + u
D. Ctrl + w
Answer: C
Q9. Which statement is true about the forwarding plane?
A. The forwarding plane is the intelligence of the platform.
B. The forwarding plane is based on an X86 architecture.
C. The forwarding plane maintains the routing tables, bridging table, and primary forwarding table.
D. The forwarding plane implements policers, stateless firewall filters, and class of service.
Answer: D
Q10. To which directory does the Junos OS write traceoptions files?
A. /var/tmp/
B. /var/
C. /var/log/
D. /var/home/<username>/
Answer: C
Q11. Which command will display only direct routes?
A. show route
B. show route inet.0 direct
C. show ip route direct
D. show route protocol direct
Answer: D
231. What are two reasons why a route might be hidden? (Choose two.)
A. route preference
B. routing loop
C. invalid next hop
D. routing policy
Q12. For the interface ge-1/2/3.4, what does "ge" represent?
A. SONET/SDH
B. Gigabit Ethernet
C. Aggregated Ethernet
D. GRE
Answer: B
Q13. During a password recovery, what is the next step after configuring the system to boot into single-user mode?
A. Reset the root password.
B. Press the space bar.
C. Type recovery.
D. Press the "Enter" key.
Answer: C
Q14. How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?
A. It sends the traffic through one egress port toward its destination.
B. It sends the traffic through multiple egress ports to all available receivers.
C. It sends the traffic through an internal link to the RE.
D. It sends the traffic to the local system for further processing.
Answer: A
Q15. What is the binary equivalent of 242.168.94.124?
A. 11110011 10101000 01011110 01111100
B. 11110010 10101010 01011110 01111100
C. 11110010 10101000 01011110 01111100
D. 11110010 10101000 01010110 01111100
Answer: C