jno-101 Flashcards
(141 cards)
QUESTION NO: 1 Which login class permission will allow a user to use the telnet utility? A. network permission B. maintenance permission C. supervisor permission D. shell permission
A
QUESTION NO: 3 Which command do you use to go from the shell prompt to the CLI prompt? A. run cli B. cli C. start cli D. edit
B
QUESTION NO: 4 When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed? A. snoop B. tcpdump C. monitor D. tail
C
QUESTION NO: 5
What is the default import routing policy for OSPF?
A. Accept all OSPF routes and install them into the inet 3 routing table.
B. Accept all OSPF routes and install them into the inet7.0 routing table
C. Accept all OSPF routes and install them into the inet4.0 routing table
D. Accept all OSPF routes and install them into the inet.0 routing table.
D
QUESTION NO: 6 Which three user authentication methods are supported by the Junos OS? (Choose three.) A. RADIUS B. CHAP C. local user database D. TACACS+ E. PAP
A,C,D
QUESTION NO: 7 What represents the binary equivalence of 207? A. 11001111 B. 11101011 C. 11010111 D. 11010101
A
QUESTION NO: 8 What must be configured prior to the first commit after factory defaults are loaded? A. root authentication B. default gateway C. hostname D. management services
A
QUESTION NO: 9 Which account is used to access a Junos device in factory-default configuration? A. root B. admin C. juniper D. user
A
QUESTION NO: 10
You need to control SSH. HTTP, and Telnet access to an MX240 router through any interface. You
have decided to use a firewall filter. How should you apply the firewall filter?
A. as an outbound filter on interface fxp0
B. as an outbound filter on interface lo0
C. as an inbound filter on interface fxp0
D. as an inbound filter on interface lo0
D
QUESTION NO: 11
YOU issue the ping interface tl-1/1/0 1.1.1.1 bypass-routing count 1000 rapid command.
Which statement is correct?
A. The bypass-routing parameter is used to test the density on the TI line.
B. The bypass-routing parameter cannot be used on a T1 interface.
C. The bypass-routing parameter allows you to ping a host through an interface that has no route
through it.
D. The bypass-routing parameter allows you to ping a local WAN interface without generating any
outbound traffic
C
QUESTION NO: 12
Which two statements are true about the forwarding table? (Choose two.)
A. The forwarding table lists each source protocol and preference for each destination.
B. The forwarding table contains only active routes.
C. The forwarding table is used to process transit packets.
D. The forwarding table is stored in compact flash
B,C
QUESTION NO: 13 Which three protocols use UDP as a transport protocol by default? (Choose three.) A. HTTP B. TFTP C. DNS D. SNMP E. SMTP
B,C,D
QUESTION NO: 15 What is the default protocol preference for OSPF internal routes? A. 10 B. 15 C. 150 D. 160
A
QUESTION NO: 16
You are at the top of the hierarchy and must configure OSPF on interface so-0/0/0 unit 100. Which two
achieve this result? (Choose two )
A. set protocols set ospf area 0 set interface so-0/0/0.100
B. set protocols ospf area 0 interface so-0/0/0.100
C. edit protocols ospf interface so-0/0/0.100
D. edit protocols ospf area 0 set interface so-0/0/0.100
B,D
QUESTION NO: 18
You have been asked to create a static route with a next hop that is not directly connected to the router.
Which configuration parameter enables the static route to accomplish this scenario?
A. resolve
B. indirect
C. next-hop
D. recursive
A
QUESTION NO: 19
Which two statements are true about the rescue configuration file? (Choose two)
A. It must include a root password.
B. It is roll back file number 50, and you can recover it by issuing rollback 50.
C. It is created by issuing request system configuration rescue save.
D. It is updated automatically when you commit
A,C
QUESTION NO: 20 What are two valid match criteria for a routing policy? (Choose two.) A. OSPF area ID B. prefix list C. port D. time-to-live (TTL)
A,C
QUESTION NO: 22
What is the purpose of a network mask?
A. It is used to identify the maximum hop count of a subnetwork
B. It is used to identify an IP address as either private or public.
C. It is used to identify the network to which an IP address belongs.
D. It is used to identify the total number of bits present in an IP address
C
QUESTION NO: 24 Which command displays the amount of space available on the storage media? A. show chassis routing-engine B. show system file-storage C. file list D. show system storage
D
QUESTION NO: 25
Which statement is true regarding the Junos OS?
A. The Junos kernel is based on the Solaris operating system.
B. The Junos kernel is based on the GNU Zebra operating system.
C. The Junos kernel is completely original and not based on any other operating system
D. The Junos kernel is based on the FreeBSD UNIX operating system
D
QUESTION NO: 26 Which two login-class permissions could permit a user to view the system hierarchy of the active configuration? (Choose two.) A. system permission B. view-configuration permission C. network permission D. super-user permission
A,D
QUESTION NO: 27 What are two reasons why a route might be hidden? (Choose two.) A. route preference B. routing loop C. invalid next hop D. routing policy
C,D
QUESTION NO: 28
What is an advantage of multiple software processes running in the Junos OS?
A. Each process has its own protected memory space.
B. Each process is started manually by the user at boot.
C. All processes are dependent on each other.
D. Multiple processes allow each routing protocol to be independent
A
QUESTION NO: 29
Which two statements accurately describe a broadcast domain? (Choose two.)
A. Broadcast domains require that the participating devices connect to common switches or hubs.
B. Broadcast domains consist of devices reachable by frames addressed to the Layer 2 broadcast
address
C. Broadcast domains require a gateway device such as a router.
D. Broadcast domains consist of devices that reside on the same VLAN
B,D