问题:单选题What is the primary purpose for the classification of traffic in a router?()A to use the classification to route trafficB to use the classification to reorder packets from various sourcesC to use the classification to discard malformed packetsD to use the classification to provide the configured service level
查看答案
问题:多选题Which two statements best describes the role of a router on a broadcast domain?()ARouters facilitate communications within a broadcast domain.BRouters facilitate communications between broadcast domains.CRouters are used to break up broadcast domains into separate networks.DRouters are used to connect small broadcast domains and form larger more efficient broadcast domains
问题:多选题Which two loopback types are supported for serial interfaces on Juniper devices?()ALocalBFar EndCRemoteDBidirectional
问题:多选题Which two commands are needed to create and apply an export policy that advertises static routes to OSPF neighbors?()Aedit policy-options policy-statement policy-name set term 1 from protocol static set term 1 then acceptBedit ospf policy set from protocol static set 1 then acceptCset protocols OSPF export policy-nameDset protocols OSPF policy policy-name
问题:多选题What are two valid initial configuration methods supported on Juniper routers?()ACLIBJ-WebCJUNOScopeDPCMCIA flash card
问题:多选题For which two functions is the Routing Engine responsible?()Apacket forwardingBqueuing functionsCrouting protocol controlDJUNOS software operation
问题:多选题Which two statements about subnet masks are true?()AIf a bit is turned on (1), the corresponding bit in the IP address is used for the host portion.BIf a bit is turned off (0), the corresponding bit in the IP address is used for the host portion.CIf a bit is turned on (1), the corresponding bit in the IP address is used for the network prefix.DIf a bit is turned off (0), the corresponding bit in the IP address is used for the network prefix.
问题:单选题A routing policy has three terms and the first term of the policy does not contain a terminating action. What will become of the routes after they have been evaluated by the first term?()A In the absence of a terminating action, all routes are accepted.B The route will be evaluated by the second term in the policy.C The default action will be applied.D In the absence of a termination action, all routes are rejected.
问题:单选题Which CLI command displays error statistics for an interface in real-time?()A monitor trafficB show interfacesC monitor interfaceD show interfaces extensive
问题:单选题After factory-defaults have been loaded, which two syslog files will be present in the configuration?()A system and chassisdB syslog-messages and NVRAMC messages and interactive-commandsD authorization and events
问题:单选题When a non-root user connects to a JUNOS platform and enters a username and password, the user is immediately placed at which level?()A UNIX shellB user level CLIC configuration modeD operational mode
问题:单选题Which command sequence displays queue statistics for an interface?()A monitor interface ge-0/0/0 queueB show interfaces queue ge-0/0/0C show interfaces ge-0/0/0 statistics extensiveD show statistics queue detail
问题:单选题In Ethernet networks, duplex mismatches will lower performance. Which error statistics can be seen if a duplex mismatch is present?()A collisions on the full-duplex side; runts on the half-duplex sideB collisions on the full-duplex side; collisions on the half-duplex sideC collisions on the half-duplex side; framing errors on the full-duplex sideD collisions on the half-duplex side; giants on the full-duplex side
问题:单选题What is a vaild action for a firewall filter?()A then dropB then countC then allowD then community add
问题:多选题Which two statements describe the default routing policy for BGP?()AAdvertise only locally originated routes.BAccept all BGP routes and import into inet.0.CAdvertise all active BGP routes.DAdvertise only EBGP routes.
问题:单选题You have been asked to use a 30 bit subnet mask to segment the following network block: 108.12.5.0. How many useable subnetworks and usable hosts could be created?()A 32 networks with 8 hostsB 62 networks with 2 hostsC 30 networks with 16 hostsD 32 networks with 14 hosts
问题:单选题When performing password recovery, which command should be entered at the boot prompt?()A boot -sB boot -rC boot singleD boot recovery
问题:单选题The auto-complete feature in the JUNOS CLI is triggered by which method?()A space bar for both command and variable completionB space bar for command completion;tab key for variable completionC space bar for variable completion;tab key for command completionD tab key for variable and command completion;space bar for command completion
问题:单选题In which routing table would you find an OSPF V2 route?()A ipv4-unicastB inet.0C inet.4D inet.ipv4