2014 Latest Juniper JN0-102 Exam Demo Free Download!
QUESTION 1
Which network mask is the equivalent of 255.255.248.0?
A. /20
B. /21
C. /22
D. /23
Answer: B
QUESTION 2
Which login class permission will allow a user to use the telnet utility?
A. Network permission
B. Maintenance permission
C. Supervisor permission
D. Shell permission
Answer: A
QUESTION 3
Which command do you issue to upgrade the current software on Junos devices?
A. request system software replace
B. request system software install
C. request system software add
D. request system software upgrade
Answer: C
QUESTION 4
Which statement is true about terms in a policy?
A. A single term can be applied to a protocol or interface, independent of the policy.
B. Once configured, terms within a policy cannot be reordered.
C. The name of a term is limited to five characters.
D. A from statement is optional in a term.
Answer: D
QUESTION 5
What is the decimal equivalent of 10101010?
A. 182
B. 180
C. 172
D. 170
Answer: D
QUESTION 6
Two devices on an Ethernet segment sent frames at the same time causing a collision.
Which two statements are true? (Choose two.)
A. Both devices stop transmitting, wait a random period of time, verify the wire is idle, and re- transmit.
B. The device with the lowest MAC address is permitted to retransmit first.
C. The device with the lowest MAC address sends a jam signal to notify all other devices of the collision.
D. Both devices send a jam signal to notify all other devices of the collision.
Answer: AD
QUESTION 7
You issue the command telnet interface ge-1/1/0 10.10.10.1 source 192.168.100.1 bypass-routing.
Which statement is correct?
A. The bypass-routing parameter is ignored when using private IP addressing.
B. The telnet session will have the source IP address 10.10.10.1.
C. The telnet session will connect to the neighboring device’s interface ge-1/1/0.
D. Return traffic for the telnet session might not arrive at interface ge-1/1/0.
Answer: D
QUESTION 8
Which statement is true regarding the Junos OS?
A. Each process runs in its own protected memory space ensuring that one process cannot directly interfere with another.
B. Processes share memory space but use separate ASICs so that one process cannot directly interfere with another.
C. A central processor called the IP2 Chip dynamically assigns memory as process needs fluctuate.
D. The memory management daemon (mmd) is responsible for allocating new memory for processes as they request it.
Answer: A
QUESTION 9
Which two statements apply when a user has entered private configuration mode by typing configure private? (Choose two.)
A. All users have their own active configuration.
B. All users have their own private candidate configuration.
C. When a user commits, all nonconflicting changes made by all users are committed.
D. When a user commits, only the user’s own changes are committed.
Answer: BD
QUESTION 10
What is the default SNMP permission level on Junos devices?
A. read
B. read-write
C. read-only
D. write
Answer: C
QUESTION 11
Which two statements are true of a network mask? (Choose two.)
A. A subnet mask specifies the portion of an IP address that is in a binary format.
B. A subnet mask specifies the portion of an IP address that is in a decimal format.
C. A subnet mask specifies the portion of an IP address that represents a network prefix.
D. A subnet mask specifies the portion of an IP address that represents network hosts.
Answer: CD
QUESTION 12
Which statement is true regarding the Junos OS?
A. The Junos kernel is based on the Solaris operating system.
B. The Junos kernel is based on the GNU Zebra operating system.
C. The Junos kernel is completely original and not based on any other operating system.
D. The Junos kernel is based on the FreeBSD UNIX operating system.
Answer: D
QUESTION 13
How can you verify that you have correctly configured SSH access to your Junos device?
A. user@router# show system services
B. user@router> show configuration services
C. user@router# show configuration system services
D. user@router# show system login
Answer: A
QUESTION 14
Which statement is true regarding the password-recovery process?
A. You must have a console connection.
B. You cannot set the console port to an insecure mode.
C. You must press the Enter key so that you can boot into single-user mode.
D. When prompted to enter the full pathname of the shell, you must press the Enter key.
Answer: A
QUESTION 15
You are at the top of the hierarchy and must configure OSPF on interface so-0/0/0 unit 100.
Which two achieve this result? (Choose two.)
A. set protocols
set ospf area 0
set interface so-0/0/0.100
B. set protocols ospf area 0 interface so-0/0/0.100
C. edit protocols ospf interface so-0/0/0.100
D. edit protocols ospf area 0
set interface so-0/0/0.100
Answer: BD
QUESTION 16
Which statement describes an advantage of dynamic routing?
A. Dynamic routing provides redundant IP addresses for end-user devices, unlike static routing.
B. Dynamic routing requires no initial user configuration, unlike static routing.
C. Dynamic routing provides DNS services along with IP connectivity; static routing does not.
D. Dynamic routing typically requires less time to implement than static routing in a large network.
Answer: D
QUESTION 17
Which statement is true about the forwarding plane?
A. It uses ASICs for increased performance.
B. It is the intelligence of the platform.
C. It maintains the routing tables.
D. It is based on an x86 architecture.
Answer: A
QUESTION 18
Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors? (Choose two.)
A. set protocols rip export demo
B. edit policy-options policy-statement demo
set term 1 from protocol static
set term 1 then accept
C. edit policy-options policy-statement demo
set term 1 from protocol static accept
D. set protocols rip group internal export demo
Answer: BD
Passing your Juniper JN0-102 Exam by using the latest Juniper JN0-102 Exam Demo Full Version: http://www.braindump2go.com/jn0-102.html