Q1. Which statement is true about a routing table?
A. It contains routes learned dynamically only.
B. It finds the best path to each destination by using a modified shortest-path-first calculation.
C. It contains only active BGP routes.
D. It contains all accepted routes to all destinations.
Answer: D
Q2. Which command is used to enable access to J-Web using HTTPS?
A. set system remote-access profile https
B. set services remote-access profile j-web-https
C. set system services web-management https
D. set services web-management j-web-https
Answer: C
Q3. How can you verify that you have correctly configured SSH access to your Junos device?
A. user@router# show system services
B. user@router> show configuration services
C. user@router# show configuration system services
D. user@router# show system login
Answer: A
Q4. Which two statements are true of login classes? (Choose two.)
A. Users can be members of multiple login classes.
B. Login classes define authorization parameters for a user.
C. There are five system-defined login classes.
D. Login class permission flags can be overridden for certain commands.
Answer: B,D
Q5. What are two valid match criteria for a routing policy? (Choose two.)
A. OSPF area ID
B. prefix list
C. port
D. time-to-live (TTL)
Answer: A,B
Q6. You have been allocated a /22 network.
How many usable hosts are available?
A. 510
B. 512
C. 1022
D. 1024
Answer: C
Q7. Which two commands would you use to discard a candidate configuration? (Choose two.)
A. rollback
B. delete
C. delete 0
D. rollback 0
Answer: A,D
Q8. Which statement is correct regarding the Junos OS?
A. The same Junos OS image is used on all Junos devices.
B. The Junos OS provides separation between the control and forwarding planes.
C. Each Junos OS image is based on model-specific source code.
D. The Junos OS creates a secondary instance of the kernel to ensure redundancy.
Answer: B
Q9. Which two characteristics describe the UDP protocol? (Choose two.)
A. limited error checking
B. defined timers
C. no recovery mechanisms
D. three-way handshake
Answer: A,C
Q10. Which three steps are part of the root password recovery process? (Choose three.)
A. Reboot the device.
B. Run the recovery script.
C. Reset the root password.
D. Reset the user passwords.
E. Load factory-default configuration.
Answer: A,B,C