JN0-102 Exam - Junos, Associate (JNCIA-Junos)

certleader.com

Q1. When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed? 

A. snoop 

B. tcpdump 

C. monitor 

D. tail 

Answer:

Q2. What happens when you issue the ping 172.19.102.2 count 5 command? 

A. ICMP echo requests are sent to 172.19.102.2 in five-millisecond intervals. 

B. ICMP echo requests are sent to 172.19.102.2 until five packets are dropped. 

C. ICMP echo requests are sent to 172.19.102.2 five times. 

D. ICMP echo requests are sent continuously to 172.19.102.2 for five seconds. 

Answer:

Q3. -- Exhibit --

user@router# run show interfaces terse Interface Admin Link Proto Local fe-0/0/0 up up fe-0/0/0.0 up upinet 10.0.39.2/24 iso mpls fe-0/0/1 up up fe-0/0/1.0 up upinet 10.0.18.2/24 fe-0/0/1.5 down up inet 10.0.19.2/24 -- Exhibit --

An administrator is unable to ping any address on the 10.0.19.0/24 subnet. To identify the problem, the administrator uses the command shown in the exhibit. 

Which step should be taken to solve the problem? 

A. Check the physical cable. 

B. Issue the command activate interfaces fe-0/0/1.5 . 

C. Issue the command delete interfaces fe-0/0/1.5 disable. 

D. Reconfigure the IP address. 

Answer:

Q4. -- Exhibit – 

-- Exhibit --

Which command produces the output shown in the exhibit? 

A. show firewall counter telnet-counter filter select-telnet 

B. show firewall log 

C. show log messages 

D. show services accounting usage 

Answer:

Q5. For the interface ge-1/2/3.4, what does the "ge" represent? 

A. Gigabit Ethernet 

B. SONET/SDH 

C. Aggregated Ethernet 

D. GRE 

Answer:

Q6. Which two commands allow you to return to a previous version of software on the device? (Choose two.) 

A. request system software add 

B. request system software downgrade 

C. request system software replace 

D. request system software rollback 

Answer: A,D 

Q7. What is the purpose of a network mask? 

A. It is used to identify the maximum hop count of a subnetwork. 

B. It is used to identify an IP address as either private or public. 

C. It is used to identify the network to which an IP address belongs. 

D. It is used to identify the total number of bits present in an IP address. 

Answer:

Q8. Which process is responsible for the routing protocols on a Junos device? 

A. rpd 

B. mgd 

C. dcd 

D. chassisd 

Answer:

Q9. You are asked to change the cable on interface ge-0/2/1. 

Which statement is correct? 

A. The cable is found on slot 2, port 0, and FPC 1. 

B. The cable is found on FPC 0, slot 1, and port 2. 

C. The cable is found on port 1, slot 0, and FPC 2. 

D. The cable is found on slot 2, port 1, and FPC 0. 

Answer:

Q10. Which three statements are true about terms in a policy? (Choose three.) 

A. The order of the terms in a policy is irrelevant. 

B. The action is specified in a then statement. 

C. Terms are optional in a policy. 

D. The match condition can be identified with a from statement. 

E. A from statement is mandatory in a term. 

Answer: B,C,D