问题:单选题The interface ge-0/2/3 is located in which flexible PIC concentrator slot?()A 0B 2C 3D 4
查看答案
问题:多选题Which two statements regarding JUNOS architecture are correct?()AThe Routing Engine handles all exception traffic.BThe Routing Engine synchronizes the route table with the PFECThe Routing Engine is hot-pluggable.DThe Routing Engine controls the PFE
问题:单选题When is the BA Classifier engaged for identifying the forwarding class of traffic in a Juniper router?()A after a packet is identified by a multifield classifierB after the traffic passes though a shaperC prior to ingress policing of trafficD while the packet is stored in the switching fabric of the router
问题:单选题Which operational command allows a user to view the exhaust temperatures of a Juniper device?()A show chassis stateB file list alarmC show chassis alarmsD show chassis environment
问题:多选题Which two statements regarding traceroute on JUNOS devices are correct?()ATraceroute transmits ICMP echo-request packets.BTraceroute transmits UDP packets.CTraceroute receives ICMP echo-reply packets.DTraceroute receives ICMP port-unreachable packets.
问题:单选题Which statement is correct about the validate option when upgrading JUNOS software?()A It will check the MD5 checksum of the install package.B It will check if the device meets the memory requirements for the install package.C It will check the compatibility of the configuration with the install package.D It will check if the device meets the storage requirement for the install package.
问题:单选题Which application would be suited for UDP traffic?()A Web browsingB downloading a programC streaming television showsD on-line shopping
问题:多选题With which two does a scheduler map associate? ()ASchedulerBBA ClassifierCQueuesDInterface
问题:单选题You have been asked to use a 30 bit subnet mask to segment the following network block: 108.12.5.0. How many useable subnetworks and usable hosts could be created?()A 32 networks with 8 hostsB 62 networks with 2 hostsC 30 networks with 16 hostsD 32 networks with 14 hosts
问题:多选题Which three statements describe the Transmission Control Protocol (TCP)?()ATCP is a transport layer protocol.BTCP is faster than the User Datagram Protocol (UDP).CTCP provides delivery notification and error checking mechanisms.DTCP uses a best effort delivery approach.ETCP application examples include HTTP and SMTP.
问题:单选题In which routing table would you find an OSPF V2 route?()A ipv4-unicastB inet.0C inet.4D inet.ipv4
问题:单选题Which command allows viewing of only OSPF routes?()A show ip ospf routeB show ip route protocol ospfC show route protocol ospfD show ospf table
问题:多选题Which two media types support asynchronous transfer mode?()AT3BSONETCGigabit-EthernetDEIA/TIA-232 serial
问题:多选题Which three steps are considered part of the initial configuration?()ASNMPBhostnameCroot passwordDuser passwordEmanagement access interface
问题:多选题Which two statements about subnet masks are true?()AIf a bit is turned on (1), the corresponding bit in the IP address is used for the host portion.BIf a bit is turned off (0), the corresponding bit in the IP address is used for the host portion.CIf a bit is turned on (1), the corresponding bit in the IP address is used for the network prefix.DIf a bit is turned off (0), the corresponding bit in the IP address is used for the network prefix.
问题:单选题What are the contents of a scheduler?()A A scheduler contains parameters that describe how a queue should be serviced.B A scheduler contains traffic that is ready to be transmitted.C A scheduler contains forwarding classes that allow traffic to be forwarded.D A scheduler contains a map between the classification of a packet and its forwarding class.
问题:单选题Rewrite rules are used in which CoS scenario?()A When a single device is configured to provide differentiated services.B When multiple devices in a network are configured to use CoS to provide differentiated services.C When a device is used to connect to another autonomous system.D When CoS is used to classifiy traffic as low priority.
问题:单选题In which mode are users allowed to configure the device, including interfaces, protocols, user access, and system hardware properties?()A priviledged modeB configuration modeC monitoring modeD operational mode
问题:单选题Which statement is correct about the validate option when upgrading JUNOS software?()A It will check the MD5 checksum of the install package.B It will check if the device meets the memory requirements for the install package.C It will check the compatibility of the configuration with the install package.D It will check if the device meets the storage requirement for the install package.