问题:单选题Which statement is true about a forwarding table?()A It stores a subset of information from the routing table.B It contains routes learned from all protocols to a destination.C It provides a database for routes selected and placed into the routing table.D Every routing protocol maintains its own forwarding table.
Tuesday, January 30, 2024
问题:多选题Which two fields are found in an Ethernet frame?()AVersionBTTLCChecksumDFlagsEData
Friday, January 12, 2024
问题:单选题What represents the decimal equivalence of 11000000 10101000 10101100 11110001?()A 192.168.184.201B 192.168.172.241C 192.170.172.237D 192.170.184.221
Tuesday, July 4, 2023
问题:多选题What are two valid initial configuration methods supported on Juniper routers?()ACLIBJ-WebCJUNOScopeDPCMCIA flash card
Wednesday, March 6, 2024
问题:多选题Which two statements are true regarding interface properties? ()AMTU and speed must be configured under each unit.BPhysical parameters such as MTU, duplex mode, and speed are configured under the interface name.CIP and IPv6 addresses are configured under a unit-number.DDLCI numbers, VPI/VCI values, and VLAN tags are physical parameters.
Monday, October 31, 2022
问题:多选题Which two statements regarding JUNOS architecture are correct?()AThe Routing Engine handles all exception traffic.BThe Routing Engine synchronizes the route table with the PFECThe Routing Engine is hot-pluggable.DThe Routing Engine controls the PFE
Sunday, October 8, 2023
问题:多选题Which two statements about subnet masks are true?()AIf a bit is turned on (1), the corresponding bit in the IP address is used for the host portion.BIf a bit is turned off (0), the corresponding bit in the IP address is used for the host portion.CIf a bit is turned on (1), the corresponding bit in the IP address is used for the network prefix.DIf a bit is turned off (0), the corresponding bit in the IP address is used for the network prefix.
问题:单选题What is a vaild action for a firewall filter?()A then dropB then countC then allowD then community add
Thursday, September 22, 2022
问题:多选题For which two functions is the Routing Engine responsible?()Apacket forwardingBqueuing functionsCrouting protocol controlDJUNOS software operation
Saturday, May 13, 2023
问题:多选题Which two loopback types are supported for serial interfaces on Juniper devices?()ALocalBFar EndCRemoteDBidirectional
问题:单选题What happens when a route does not match any user configured policies?()A The route is rejected.B The route is accepted.C The route is given a lower priority.D The route is sent to the default policy.
问题:多选题Which two commands are needed to create and apply an export policy that advertises static routes to OSPF neighbors?()Aedit policy-options policy-statement policy-name set term 1 from protocol static set term 1 then acceptBedit ospf policy set from protocol static set 1 then acceptCset protocols OSPF export policy-nameDset protocols OSPF policy policy-name
问题:单选题The auto-complete feature in the JUNOS CLI is triggered by which method?()A space bar for both command and variable completionB space bar for command completion;tab key for variable completionC space bar for variable completion;tab key for command completionD tab key for variable and command completion;space bar for command completion
问题:单选题Which statement is true about configuring a back-to-back connection frame-relay on Juniper Routers?()A Both DTE and DCE will send keep-alives by default so no special configuration is required.B The circuit is negotiated automatically so no special configuration is required.C All equipment is by default DTE, one side should be set to DCED All equipment is by default DCE, one side should be set to DTE
Wednesday, May 15, 2024
问题:单选题When performing password recovery, which command should be entered at the boot prompt?()A boot -sB boot -rC boot singleD boot recovery
Saturday, December 16, 2023
问题:单选题Which CLI command displays error statistics for an interface in real-time?()A monitor trafficB show interfacesC monitor interfaceD show interfaces extensive
问题:单选题You have been asked to use a 30 bit subnet mask to segment the following network block: 108.12.5.0. How many useable subnetworks and usable hosts could be created?()A 32 networks with 8 hostsB 62 networks with 2 hostsC 30 networks with 16 hostsD 32 networks with 14 hosts
Wednesday, November 30, 2022
问题:单选题A routing policy has three terms and the first term of the policy does not contain a terminating action. What will become of the routes after they have been evaluated by the first term?()A In the absence of a terminating action, all routes are accepted.B The route will be evaluated by the second term in the policy.C The default action will be applied.D In the absence of a termination action, all routes are rejected.
问题:多选题Which three statements describe the User Datagram Protocol (UDP)?()AUDP provides delivery notification and error checking mechanisms.BUDP is faster than the Transmission Control Protocol (TCP).CUDP application examples include DNS and VoIP.DUDP is an application layer protocol.EUDP uses a best effort delivery approach.