Q1. Which two statements are true regarding trace options on Junos devices? (Choose two.)
A. You can see the contents of the log file by entering the show log <filename> command.
B. Trace options will send information to your screen automatically.
C. Trace options are limited to one protocol at a time.
D. The file name and a set of flags may be specified when enabling traceoptions.
Answer: A,D
Q2. What is the last usable IP address in the 218.6.0.0/17 network?
A. 218.6.125.254
B. 218.6.126.254
C. 218.6.127.254
D. 218.6.128.254
Answer: C
Q3. You are asked to change the cable on interface ge-0/2/1.
Which statement is correct?
A. The cable is found on slot 2, port 0, and FPC 1.
B. The cable is found on FPC 0, slot 1, and port 2.
C. The cable is found on port 1, slot 0, and FPC 2.
D. The cable is found on slot 2, port 1, and FPC 0.
Answer: D
Q4. When using keyboard shortcuts, which single keystroke combination allows users to erase the entire current command?
A. Ctrl + a
B. Ctrl + e
C. Ctrl + u
D. Ctrl + w
Answer: C
Q5. What is the decimal equivalent of 00000100?
A. 2
B. 4
C. 9
D. 12
Answer: B
Q6. -- Exhibit –
-- Exhibit --
Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted.
Which firewall filter configuration do you use?
A. [edit firewall]
user@router# show
policer LIMIT-MAL-USER {
if-exceeding {
bandwidth-limit 400k;
burst-size-limit 100k;
}
then discard;
}
familyinet {
filter STOP-MAL-USER {
term one {
from {
source-address {
100.100.100.10/32; } destination-address { 200.200.200.0/24; } } thenpolicer LIMIT-MAL-USER; } term two { then accept; } } }
B. [edit firewall]
user@router# show
policer LIMIT-BAD-USER {
if-exceeding {
bandwidth-limit 400k;
burst-size-limit 100k;
}
then discard;
}
familyinet {
filter STOP-MAL-USER {
term one {
from {
source-address {
100.100.100.10/32;
}
destination-address {
200.200.200.0/24;
}
}
thenpolicer LIMIT-MAL-USER;
}
term two {
then accept;
}
}
}
C. [edit firewall]
user@router# show
policer LIMIT-MAL-USER {
if-exceeding {
bandwidth-limit 400k;
burst-size-limit 100k;
}
then discard;
}
familyinet {
filter STOP-MAL-USER {
term one {
from {
source-address {
100.100.100.10/32;
}
destination-address {
200.200.200.0/24;
}
}
thenpolicer LIMIT-MAL-USER;
}
term two {
then reject;
}
}
}
D. [edit firewall]
user@router# show
policer LIMIT-MAL-USER {
if-exceeding {
bandwidth-limit 400k;
burst-size-limit 100k;
}
then discard;
}
familyinet {
filter STOP-MAL-USER {
term one {
from {
source-address {
200.200.200.0/24;
}
destination-address {
100.100.100.10/32;
}
}
thenpolicer LIMIT-MAL-USER;
}
term two {
then accept;
}
Juniper JN0-102 : Practice Test
} }
Answer: A
Q7. -- Exhibit --...
if-exceeding {
bandwidth-limit 1m;
burst-size-limit 3k;
}
then discard;
-- Exhibit --
The configuration in the exhibit is associated with which class of service component?
A. classification
B. policing
C. queuing
D. scheduling
Answer: B
Q8. What information is used by a switch to forward an Ethernet frame to its destination?
A. IP address
B. destination MAC address
C. ARP table entry
D. FCS checksum
Answer: B
Q9. What is the default import routing policy for OSPF? A. Accept all OSPF routes and install them into the inet.3 routing table.
B. Accept all OSPF routes and install them into the inet7.0 routing table.
C. Accept all OSPF routes and install them into the inet4.0 routing table.
D. Accept all OSPF routes and install them into the inet.0 routing table.
Answer: D
Q10. Which statement is true regarding the forwarding plane?
A. The forwarding plane is contained within the Routing Engine (RE).
B. The forwarding plane processes and evaluates exception traffic.
C. The forwarding plane contains the Packet Forwarding Engine (PFE).
D. The forwarding plane is not present on all platforms running the Junos OS.
Answer: C