Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESEJNCIA 102

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
JNCIA 102

Descripción:
Examen B juniper 101-200

Autor:
desconocido
(Otros tests del mismo autor)

Fecha de Creación:
21/05/2019

Categoría:
Otros

Número preguntas: 100
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
QUESTION 131 The IP address 192.168.100.1 belongs to which class of IP address space? A. Class A B. Class B C. Class C D. Class D.
QUESTION 132 For the interface ge-1/2/3.4, what does the "ge" represent? A. Gigabit Ethernet B. SONET/SDH C. Aggregated Ethernet D. GRE.
QUESTION 133 Which word starts a command to add configuration on a Junos device? A. get B. set C. put D. show.
QUESTION 134 Which word starts the command to remove configuration elements on a Junos device? A. undo B. remove C. delete D. unset.
QUESTION 135 After editing to your device's configuration, which command must you enter to activate the configuration changes? A. set B. copy candidate active C. apply-config D. commit.
QUESTION 136 What is the decimal equivalent of 00000110? A. 2 B. 4 C. 6 D. 11.
QUESTION 137 Which CLI mode allows you to make configuration changes? A. enable mode B. configuration mode C. operational mode D. active mode.
QUESTION 138 Which command do you use to navigate to [edit interfaces]? A. cd interfaces B. dir edit interfaces C. edit interfaces D. interfaces.
QUESTION 139 Which command will display the contents of the forwarding table? A. show route forwarding-table B. show forwarding C. show configuration D. show interfaces.
QUESTION 140 Which operating system do Juniper Networks MX Series routers use? A. IOS B. MX-OS C. UNIX D. Junos OS.
QUESTION 141 Which command do you use to go from the shell prompt to the CLI prompt? A. run cli B. cli C. start cli D. edit.
QUESTION 142 Which account is used to access a Junos device in factory-default configuration? A. root B. admin C. juniper D. user.
QUESTION 143 Which statement is true regarding the Junos OS? A. Each process runs in its own protected memory space ensuring that one process cannot directly interfere with another. B. Processes share memory space but use separate ASICs so that one process cannot directly interfere with another. C. A central processor called the IP2 Chip dynamically assigns memory as process needs fluctuate. D. The memory management daemon (mmd) is responsible for allocating new memory for processes as they.
QUESTION 144 Which statement is true regarding the Junos OS? A. The Junos kernel is based on the Solaris operating system. B. The Junos kernel is based on the GNU Zebra operating system. C. The Junos kernel is completely original and not based on any other operating system. D. The Junos kernel is based on the FreeBSD UNIX operating system.
QUESTION 145 Which statement is true regarding the Junos OS? A. All platforms running the Junos OS use the same source code base. B. All platforms running the Junos OS use the same PFE. C. All platforms running the Junos OS use a hard drive to optimize syslog data storage. D. All platforms running the Junos OS use a separate process with protected memory space for each routing protocol.
QUESTION 146 Which statement is true regarding the Junos OS? A. All platforms running the Junos OS have identical factory-default configurations. B. All platforms running the Junos OS use the IP2 processor for longest-match lookup. C. All platforms running the Junos OS use the same source code base. D. All platforms running the Junos OS use FXP1 for communication between control and forwarding planes.
QUESTION 147 What are two Junos processes? (Choose two.) A. OSPF SPF daemon (ospfd) B. SNMP daemon (snmpd) C. BGP daemon (bgpd) D. Routing protocols daemon (rpd).
QUESTION 148 On which operating system is the Junos OS based? A. ScreenOS B. Solaris C. FreeBSD D. HP-UX.
QUESTION 149 What is an advantage of multiple software processes running in the Junos OS? A. Each process has its own protected memory space. B. Each process is started manually by the user at boot. C. All processes are dependent on each other. D. Multiple processes allow each routing protocol to be independent.
QUESTION 150 Which two statements are true regarding the role of the Routing Engine (RE)? (Choose two.) A. The RE controls and monitors the chassis. B. The RE manages the Packet Forwarding Engine (PFE). C. The RE receives a copy of the forwarding table from the forwarding plane. D. The RE implements class of service (COS).
QUESTION 151 Which statement is true regarding the Junos OS? A. All platforms running the Junos OS separate the functions of learning and flooding. B. All platforms running the Junos OS separate the functions of control and forwarding. C. All platforms running the Junos OS separate the functions of routing and bridging. D. All platforms running the Junos OS separate the functions of management and routing.
QUESTION 152 Which statement is true about the forwarding plane? A. The forwarding plane is the intelligence of the platform. B. The forwarding plane is based on an X86 architecture. C. The forwarding plane maintains the routing tables, bridging table, and primary forwarding table. D. The forwarding plane implements policers, stateless firewall filters, and class of service.
QUESTION 153 Which statement is true regarding the forwarding plane? A. The forwarding plane is contained within the Routing Engine (RE). B. The forwarding plane processes and evaluates exception traffic. C. The forwarding plane contains the Packet Forwarding Engine (PFE). D. The forwarding plane is not present on all platforms running the Junos OS.
QUESTION 154 Which statement is true about the forwarding plane? A. It uses ASICs for increased performance. B. It is the intelligence of the platform. C. It maintains the routing tables. D. It is based on an x86 architecture.
QUESTION 155 By default, which character indicates the configuration mode prompt? A. # B. > C. $ D. %.
By default, which character indicates the UNIX shell prompt? A. # B. > C. $ D. %.
QUESTION 157 How do you ping from configuration mode? A. [edit interfaces] user@router# run ping 1.1.1.1 B. [edit interfaces] user@router# ping 1.1.1.1 C. [edit interfaces] user@router# up ping 1.1.1.1 D. [edit interfaces] user@router# exit ping 1.1.1.1.
QUESTION 158 Which two commands will successfully create ping traffic? (Choose two.) A. user@router# ping 10.10.10.1 B. user@router# run ping 10.10.10.1 C. user@router> ping 10.10.10.1 D. user@router> request ping 10.10.10.1.
QUESTION 159 Which command is used to display all output at once? A. show interfaces | all B. show interfaces | no-more C. show interfaces | hold D. show interfaces | display-all.
QUESTION 160 Which CLI command is used to display output one page at a time? A. user@router> show interfaces | no-more B. user@router> show interfaces | trim C. user@router> show interfaces D. user@router> show interfaces | display.
QUESTION 161 What information does the help reference command provide? A. A brief description of commands and their default values B. The serial number and version number of the device used to open a support case with JTAC C. A list of all the active hardware alarms on the device D. A display of the current configuration while in operational mode.
QUESTION 162 Which command do you use to identify the meaning of a syslog message? A. help log messages B. man log messages C. man syslog D. help syslog.
QUESTION 163 You want to log in to the router and make a configuration change. After logging in as the root user, what is the next command you must enter? A. enable B. configure C. edit D. cli.
QUESTION 164 You are configuring a new BGP neighbor and want to view the configuration of interface ge-0/0/0.42. Which command do you use to achieve this result? A. [edit protocols bgp group external] user@router# set interfaces ge-0/0/0.42 B. [edit protocols bgp group external] user@router# edit show interfaces ge-0/0/0.42 C. [edit protocols bgp group external] user@router# top show interfaces ge-0/0/0.42 D. [edit protocols bgp group external] user@router# show interfaces ge-0/0/0.42.
QUESTION 165 You are at the top of the hierarchy and must configure OSPF on interface so-0/0/0 unit 100. Which two achieve this result? (Choose two.) A. set protocols setospf area 0 set interface so-0/0/0.100 B. set protocols ospf area 0 interface so-0/0/0.100 C. edit protocols ospf interface so-0/0/0.100 D. edit protocols ospf area 0 set interface so-0/0/0.100.
QUESTION 166 Which CLI keyboard sequence allows you to move the cursor to the beginning of the line? A. Ctrl+e B. Ctrl+p C. Ctrl+w D. Ctrl+a.
QUESTION 167 Which two statements apply when a user has entered private configuration mode by typing configure private? (Choose two.) A. All users have their own active configuration. B. All users have their own private candidate configuration. C. When a user commits, all nonconflicting changes made by all users are committed. D. When a user commits, only the user's own changes are committed.
QUESTION 168 Which two statements are true when using the configure exclusive CLI command? (Choose two.) A. Multiple users can enter configuration mode and have their own private configuration. B. When a user commits, only the user's changes are committed. C. A message indicates which other users are in configuration mode and what portion of the configuration they are editing. D. Only a single user can edit the configuration.
QUESTION 169 How do you save the current candidate configuration in the set format to permanent storage media? A. [edit] user@router# show | set | save /var/tmp/current.conf B. [edit] user@router# show | compare set | save /var/tmp/current.conf C. [edit] user@router# save /var/tmp/current.conf | display set D. [edit] user@router# show | display set | save /var/tmp/current.conf.
QUESTION 170 You configured an interface with an IP address and committed the change. You then committed a change that added an exception in a firewall filter to allow this network through the filter. You realize that this work was done on the wrong router. How do you undo all these changes? A. rollback 2 B. rollback 1 C. rollback 0 D. rollback 3.
QUESTION 171 You have just issued the command user@router# save current.conf. Assuming the default settings, where in the file system is current.conf saved? A. /var/tmp/ B. /var/config/saved/ C. /var/home/user/ D. /config/.
QUESTION 172 Using the command, user@router# load override latest.conf, where in the file system will the latest.conf be located? A. /var/home/user/ B. /var/config/saved/ C. /var/tmp/ D. /config/.
QUESTION 173 What does the command show | compare rollback 1 display? A. the difference between the current candidate configuration and the candidate configuration from one commit ago B. the difference between the current active configuration and the current candidate configuration C. the difference between the current active configuration and the active configuration from one commit ago D. the difference between the current candidate configuration and the archived configuration from one commit ago.
QUESTION 174 How do you write the current candidate configuration to the permanent storage media? A. [edit] user@router# save /var/tmp/current.conf B. [edit] user@router# write /var/tmp/current.conf C. [edit] user@router# commit /var/tmp/current.conf D. [edit] user@router# dump /var/tmp/current.conf.
QUESTION 175 Which J-Web tab do you use to add licenses to the device? A. "Configure" B. "Troubleshoot" C. "Monitor" D. "Maintain".
QUESTION 176 Which three functions are available under the "Maintain" tab of J-Web? (Choose three.) A. download and delete log files B. view real-time statistics of interfaces C. reboot the system D. view and add licenses E. edit security settings.
QUESTION 177 Which command is used to enable access to J-Web using HTTPS? A. set system remote-access profile https B. set services remote-access profile j-web-https C. set system services web-management https D. set services web-management j-web-https.
QUESTION 178 How can you verify that you have correctly configured SSH access to your Junos device? A. user@router# show system services B. user@router> show configuration services C. user@router# show configuration system services D. user@router# show system login.
QUESTION 179 What must be configured prior to the first commit after factory defaults are loaded? A. root authentication B. default gateway C. host name D. management services.
QUESTION 180 Which two statements are true about the rescue configuration file? (Choose two.) A. It must include a root password. B. It is rollback file number 50, and you can recover it by issuing rollback 50. C. It is created by issuing request system configuration rescue save. D. It is updated automatically when you commit.
QUESTION 181 Which command will save the current active configuration as the rescue configuration? A. user@router# save | rescue B. user@router> request system configuration rescue save C. user@router# save rescue configuration D. user@router> file save rescue-configuration.
QUESTION 182 Which command will delete the current rescue configuration? A. user@router# system delete configuration rescue B. user@router> request system configuration rescue delete C. user@router# delete rescue configuration D. user@router> file delete rescue-configuration.
QUESTION 183 Which two statements are true about the primary address on an interface? (Choose two.) A. It is the address used by default as the local address for broadcast and multicast packets sourced locally and sent out of the interface. B. You use the primary address when you have multiple IP addresses belonging to the same subnet on the same interface. C. It can be useful for selecting the local address used for packets sent out of unnumbered interfaces when multiple non-127 addresses are configured on the loopback interface. D. By default, the primary address on an interface is selected as the numerically highest local address configured on the interface.
QUESTION 184 What are three physical interface properties? (Choose three.) A. payload scrambling B. virtual circuit identifier C. FCS D. link speed E. IP address.
QUESTION 185 Which two commands may be used when configuring an IP address for a Gigabit Ethernet interface? (Choose two.) A. set interfaces ge-0/0/0.0 address 10.1.1.1/24 B. set interfaces ge-0/0/0.0 family inet address 10.1.1.1/24 C. set interfaces ge-0/0/0 unit 0 family inet address 10.1.1.1/24 D. set interfaces ge-0/0/0 address 10.1.1.1/24.
QUESTION 186 You accidentally configured interface so-0/0/0.0 with /32 instead of /30. Which two solutions could you use to correct this configuration? (Choose two.) A. [edit interfaces so-0/0/0.0] user@router# replace family inet address /32 with /30 B. [edit interfaces so-0/0/0.0] user@router# rename family inet address /32 to address /30 C. [edit] user@router# replace interface so-0/0/0.0 family inet address /32 with address /30 D. [edit interfaces so-0/0/0.0] user@router# delete family inet address user@router# set family inet address /30.
QUESTION 187 Which three user authentication methods are supported by the Junos OS? (Choose three.) A. RADIUS B. CHAP C. local user database D. TACACS+ E. PAP.
QUESTION 188 Which user authentication method is supported by the Junos OS as a last resort alternative? A. TACACS+ B. RADIUS C. local user database D. enable password.
QUESTION 189 Which two external authentication methods are supported by the Junos OS for user authentication? (Choose two.) A. RADIUS B. KERBEROS C. IPsec D. TACACS+.
QUESTION 190 The authentication order configuration on your M120 includes the settings tacplus and radius (in that order), but does not include the password parameter. You attempt to log in to the device, but the network containing the authentication servers is currently down. Which statement is true about your login attempt? A. The login attempt is rejected. B. The login attempt is automatically accepted after the authentication servers' timeout value is reached, since there are no other authentication methods available. C. The M120 automatically tries authenticating locally on the device after the authentication servers' timeout value is reached. D. The M120 automatically tries authenticating locally on the device before using external authentication.
QUESTION 191 You have been asked to configure a login class that will permit its users to view and edit the configuration. The class should allow a user to view the entire configuration, but only to edit the interfaces, routing-options, and protocols hierarchies. Which configuration accomplishes this login class? A. permissions [ view-configuration clear network view ]; allow-configuration "(interfaces) | (routing-options) | (policy-options) | (protocols)"; B. permissions [ view-configuration clear network view ]; allow-commands "(configure)"; C. permissions [ view-configuration clear network view ]; allow-commands "(configure)"; allow-configuration "(interfaces) | (routing-options) | (protocols)"; D. permissions [ clear network view ]; allow-commands "(configure)";.
QUESTION 192 Which two login-class permissions could permit a user to view the system hierarchy of the active configuration? (Choose two.) A. system permission B. view-configuration permission C. network permission D. super-user permission.
QUESTION 193 Which login class permission will allow a user to use the telnet utility? A. network permission B. maintenance permission C. supervisor permission D. shell permission.
QUESTION 194 Which two statements are true regarding trace options on Junos devices? (Choose two.) A. You can see the contents of the log file by entering the show log <filename> command. B. Trace options will send information to your screen automatically. C. Trace options are limited to one protocol at a time. D. The file name and a set of flags may be specified when enabling traceoptions.
QUESTION 195 Which directory does the Junos OS use to store syslog information by default? A. /var/messages B. /var/syslog C. /var/tmp D. /var/log.
QUESTION 196 Which statement is true regarding syslog on Junos devices? A. No logging is enabled by default. B. By default, the information is stored in a file named events. C. Only the message severity level must be configured. D. You can configure the router to send log messages to the console.
QUESTION 197 What is the default SNMP permission level on Junos devices? A. read B. read-write C. read-only D. write.
QUESTION 198 Which operational mode command can be used to synchronize the local system time with an NTP server? A. set ntp time 64.32.129.3 B. set clock ntp 64.32.129.3 C. set time 64.32.129.3 D. set date ntp 64.32.129.3.
QUESTION 199 When configuring more than one archival site, which statement is true? A. The system will first attempt the transfer using the URL configured last. B. The system will transfer the configuration to each archival site. C. The system will not transfer to a secondary site unless the previous site fails. D. The system will transfer using secure copy protocol (SCP) before attempting FTP.
QUESTION 200 When considering the default behavior of Junos platforms, which statement is true about archiving configurations? A. A system log message is generated, confirming the transfer attempt. B. The destination filename format can be altered by configuration. C. The frequency the system archives the configuration cannot be changed. D. An archive log is created to track transfer attempts, both failed and successful.
QUESTION 101 -- Exhibit -- [edit routing-options] user@router# show static { route 0.0.0.0/0 { next-hop 10.1.1.1; qualified-next-hop 10.1.1.254 { preference 4; } } } -- Exhibit -- Assuming both paths shown in the exhibit are available, which statement is correct? A. Traffic matching the default route will use 10.1.1.1 as the next hop. B. Traffic matching the default route will use 10.1.1.254 as the next hop. C. Traffic matching the default route will be load-balanced per packet across both next hops. D. Traffic matching the default route will be load-balanced per flow across both next hops.
QUESTION 102 Which command will silently drop a matching packet? A. set routing-options static route 10.1.1.1/32 no-retain B. set routing-options static route 10.1.1.1/32 discard C. set routing-options static route 10.1.1.1/32 reject D. set routing-options static route 10.1.1.1/32 passive.
QUESTION 103 Which command will drop a matching packet and send out a notification message? A. set routing-options static route 10.1.1.1/32 no-retain B. set routing-options static route 10.1.1.1/32 discard C. set routing-options static route 10.1.1.1/32 reject D. set routing-options static route 10.1.1.1/32 no-install.
QUESTION 104 Which command will show the best paths that are installed in the PFE? A. show route B. show route active-path C. show route private D. show route forwarding-table.
QUESTION 105 Which command displays the egress interfaces selected on the PFE for destination prefixes? A. show route forwarding-table B. show route table C. show route table extensive D. show pfefwdd.
QUESTION 106 Which route filter match type only matches prefixes greater than the defined prefix? A. exact B. upto C. longer D. orlonger.
QUESTION 107 In which hierarchy are routing policies defined? A. [edit policy-options] B. [edit routing-options] C. [edit forwarding-options] D. [edit protocols].
QUESTION 108 What are two default routing policies on Junos devices? (Choose two.) A. The BGP import policy accepts all BGP routes. B. The BGP export policy rejects all active BGP routes. C. The OSPF import policy accepts all OSPF routes. D. The OSPF export policy accepts all active OSPF routes.
QUESTION 109 Which statement is correct about policies in the Junos OS? A. Import policies are used to filter routes from the routing table to the forwarding table. B. Import policies are used to filter routes destined for the routing table. C. Import policies are used to filter routes being sent to neighboring devices. D. Import policies are used to filter traffic entering the device.
QUESTION 110 Which statement is correct about policies in the Junos OS? A. Export policies are used to filter routes from the RE forwarding table to the PFE forwarding table. B. Export policies are used to filter routes destined for the routing table. C. Export policies are used to filter routes being sent to neighboring devices. D. Export policies are used to filter traffic leaving the device.
QUESTION 111 What is the default action for firewall filters? A. accept B. reject C. discard D. log.
QUESTION 112 What is the purpose of unicast reverse path forwarding? A. to validate packet receipt on interfaces where the traffic should be received B. to forward packets out the interfaces where the traffic should be received C. to forward packets out the interfaces where the traffic should be sent D. to validate packet receipt on interfaces where the traffic should be sent.
QUESTION 113 Which two statements are correct about firewall filters in the Junos OS? (Choose two.) A. Firewall filters are stateless. B. Firewall filters are used to control routing information that is exchanged between devices. C. Firewall filters are used to control traffic passing through the device. D. Firewall filters can only be applied to traffic entering the device.
QUESTION 114 Which two firewall filter actions will terminate the processing and evaluation of a packet? (Choose two.) A. permit B. accept C. deny D. discard.
QUESTION 115 Which two statements are true regarding routing policy processing? (Choose two.) A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs. B. Policies are evaluated from right to left as displayed in the Junos OS configuration file. C. Polices are evaluated based on the order in which they are applied to a routing protocol. D. Policy processing stops once the last statement in the policy is evaluated.
QUESTION 116 What are three firewall filter terminating actions? (Choose three.) A. accept B. log C. reject D. discard E. drop.
QUESTION 117 Which command will apply a policy to redistribute static routes into OSPF? A. set protocols ospf import static-routes B. set protocols ospf export static-routes C. set routing-options static defaults readvertise D. set routing-options static route 0.0.0.0/0 readvertise.
QUESTION 118 -- Exhibit -- [edit firewall family inet filter input-filter] user@router# show term my-policy { from { source-address { 151.43.62.0/24; } } then { count; } } term else { then { discard; } } -- Exhibit -- Which two tasks are accomplished by the firewall filter shown in the exhibit? (Choose two.) A. Traffic matching the my-policy term will be counted and accepted. B. Traffic matching the my-policy term will be counted and discarded. C. Traffic not matching the my-policy term will be discarded. D. Traffic not matching the my-policy term will be accepted.
QUESTION 119 -- Exhibit -- [edit policy-options] user@router# show policy-statement my-policy { term 1 { from { route-filter 172.27.0.0/24 longer; } } then reject; } -- Exhibit -- Which statement is correct about the policy shown in the exhibit? A. All routes are accepted. B. All routes are rejected. C. A 172.27.0.0/24 route will be accepted. D. A 172.27.0.0/16 route will be accepted.
-- Exhibit -- policy-options { policy-statement example-pol { term 1 { from { protocol static; route-filter 10.1.0.0/16 exact; } then { preference 6; accept; } } term 2 { from { protocol static; route-filter 10.1.1.0/24 longer; } then { preference 7; accept; } } from { protocol static; route-filter 10.1.0.0/16 upto /24; } then { preference 8; accept; } } term 4 { then accept; } } } -- Exhibit -- Referring to the exhibit, if the static route with prefix 10.1.1.0/24 is evaluated against the routing policy, which preference value will be set? A. The preference will be 6. B. The preference will be 7. C. The preference will be 8. D. The preference will be the default for static routes.
QUESTION 121 -- Exhibit -- [edit policy-options] user@router# show policy-statement block-routes { term 1 { from { route-filter 172.27.0.0/24 longer; } then reject; } term 2 { then accept; } } -- Exhibit -- You are asked to ensure that your device does not accept any prefixes within the 172.27.0.0/24 network. You have applied the policy shown in the exhibit, but the 172.27.0.0/24 route is still present on your device. Which configuration will resolve this problem? A. [edit policy-options policy-statement block-routes] user@router# set term 1 from route-filter 172.27.0.0/24 orlonger B. [edit policy-options policy-statement block-routes] user@router# set term 1 from route-filter 172.27.0.0/24 upto /30 C. [edit policy-options policy-statement block-routes] user@router# set term 2 from route-filter 172.27.0.0/24 longer D. [edit policy-options policy-statement block-routes] user@router# set term 2 from route-filter 172.27.0.0/24 orlonger.
QUESTION 122 -- Exhibit -- [edit policy-options policy-statement my-policy] user@router# show term 1 { from { route-filter 192.168.0.0/16 orlonger; } then accept; } -- Exhibit -- Referring to the exhibit, which three networks match the policy? (Choose three.) A. 192.168.0.0/16 B. 192.168.0.0/15 C. 192.168.65.0/24 D. 192.167.0.0/17 E. 192.168.24.89/32.
QUESTION 123 -- Exhibit -- firewall { filter select-telnet { term 1 { from { source-address { 10.0.0.0/8; } } then log; } term 2 { from { protocoltcp; port telnet; } then { syslog; reject; } } term 3 { from { source-address { 10.1.1.1/32; } protocoltcp; port telnet; } then { sample; accept; } } } } -- Exhibit -- A Telnet session is initiated from host 10.1.1.1. What will happen when it is processed by the firewall filter shown in the exhibit? A. The packet will be accepted and logged. B. The packet will be discarded and logged. C. The packet will be rejected and a syslog message generated. D. The packet will be accepted and sampled.
QUESTION 124 -- Exhibit -- [edit policy-options policy-statement my-policy] user@router# show term 1 { from { route-filter 192.168.0.0/16 prefix-length-range /20-/24; } then accept; } -- Exhibit -- Referring to the exhibit, which three networks match the policy? (Choose three.) A. 192.168.0.0/20 B. 192.168.0.0/16 C. 192.168.128.0/18 D. 192.168.128.0/21 E. 192.168.64.0/24.
QUESTION 125 -- Exhibit -- [edit policy-options policy-statement my-policy] user@router# show term reject { then reject; } term match { from { protocolbgp; route-filter 10.10.10.0/24 exact; } } -- Exhibit -- Referring to the exhibit, you must move the match term above the reject term. Which command would accomplish this task? A. set term match from policy reject B. up 1 copy policy-statement my-policy term match to term before-reject C. activate term match to policy D. insert term match before term reject.
QUESTION 126 -- Exhibit – picture -- Exhibit -- Which command produces the output shown in the exhibit? A. show firewall counter telnet-counter filter select-telnet B. show firewall log C. show log messages D. show services accounting usage.
QUESTION 127 Which two statements are true about firewall filter configurations? (Choose two.) A. Multiple action modifiers can be included in the same term. B. Only a single action modifier can be included in the same term. C. The default term within a firewall filter uses the discard action. D. The default term within a firewall filter uses the reject action.
QUESTION 128 Which two statements are true about firewall filter configurations? (Choose two.) A. Multiple action modifiers can be included in the same term. B. Only a single action modifier can be included in the same term. C. If an action modifier exists without a terminating action, matching packets will be accepted. D. If an action modifier exists without a terminating action, matching packets will be discarded.
QUESTION 129 You have configured a firewall filter with a single term matching on packets with a source address in the 10.0.0.0/24 subnet. This term only includes the count action. Which two statements are true about traffic evaluated by this firewall filter? (Choose two.) A. Packets outside the 10.0.0.0/24 subnet will be accepted. B. Packets outside the 10.0.0.0/24 subnet will be rejected. C. Packets outside the 10.0.0.0/24 subnet will be counted. D. Packets outside the 10.0.0.0/24 subnet will not be counted.
QUESTION 130 You have configured a firewall filter with a single term matching on packets with a source address in the 10.0.0.0/24 subnet. This term only includes the count action. Which two statements are true about traffic evaluated by this firewall filter? (Choose two.) A. Packets within the 10.0.0.0/24 subnet will be accepted. B. Packets within the 10.0.0.0/24 subnet will be rejected. C. Packets within the 10.0.0.0/24 subnet will be counted. D. Packets within the 10.0.0.0/24 subnet will not be counted.
Denunciar test Consentimiento Condiciones de uso