December/2019 New Braindump2go JN0-102 Exam Dumps with PDF and VCE Free Updated Today! Following are some new JN0-102 Exam Questions,
December/2019 New Braindump2go JN0-102 Exam Dumps with PDF and VCE Free Updated Today! Following are some new JN0-102 Exam Questions,
2018 July Juniper JN0-102 Exam Dumps with PDF and VCE New Updated Today! Following are some new JN0-102 Real Exam Questions:
2018 July Juniper JN0-102 Exam Dumps with PDF and VCE New Updated Today! Following are some new JN0-102 Real Exam Questions:
QUESTION 16
Which statement is correct regarding IPv6 addresses?
A. An IPv6 address consists of 128 bits separated into eight 16-bit hexadecimal sections.
B. An IPv6 address consists of 64 bits separated into four 16-bit hexadecimal sections.
C. An IPv6 address consists of 128 bits separated into sixteen 8-bit hexadecimal sections.
D. An IPv6 address consists of 64 bits separated into eight 8-bit hexadecimal sections.
Answer: A
QUESTION 17
Which two statements about MPLS label-switched paths (LSPs) are true? (Choose two.)
A. LSPs are bidirectional.
B. LSPs are unidirectional.
C. LSPs must follow the IGP’s shortest path.
D. LSPs can follow paths other than the IGP’s shortest path.
Answer: BD
QUESTION 18
What are two ways that packet fragmentation is handled differently between IPv6 and IPv4? (Choose two.)
A. End hosts determine the path MTU for IPv6.
B. End hosts determine the path MTU for IPv4.
C. Packet fragmentation occurs at intermediate nodes for IPv4.
D. Packet fragmentation occurs at intermediate nodes for IPv6.
Answer: AC
QUESTION 19
In the exhibit, there are four static routes that route traffic through different interfaces.
user@router> show route protocol static
inet.0: 15 destinations, 15 routes (15 active, 0 holddown, 0 hidden)
+ = Active Route, – = Last Active, * = Both
99.0.0.0/17 *[Static/5] 00:00:11
> to 10.1.1.2 via ge-0/0/1.0
99.0.0.0/19 *[Static/5] 00:00:11
> to 10.1.2.2 via ge-0/0/2.0
99.0.0.0/24 *[Static/5] 00:00:11
> to 10.1.3.2 via ge-0/0/3.0
99.0.0.0/26 *[Static/5] 00:00:11
> to 10.1.4.2 via ge-0/0/4.0
Which interface does the router use if traffic is sent to the 99.0.0.1 destination?
A. ge-0/0/1
B. ge-0/0/2
C. ge-0/0/3
D. ge-0/0/4
Answer: D
QUESTION 20
In dotted decimal notation, what is the equivalent of 11010101 01000010 01111111 11000010?
A. 213.66.127.194
B. 214.66.128.195
C. 212.64.143.194
D. 213.66.111.194
Answer: A
QUESTION 21
What is the binary equivalent of 242.168.94.124?
A. 11110011 10101000 01011110 01111100
B. 11110010 10101010 01011110 01111100
C. 11110010 10101000 01011110 01111100
D. 11110010 10101000 01010110 01111100
Answer: C
QUESTION 22
What is the last usable IP address in the 218.6.0.0/17 network?
A. 218.6.125.254
B. 218.6.126.254
C. 218.6.127.254
D. 218.6.128.254
Answer: C
QUESTION 23
What is the network address for the 10.13.147.100/19 host?
A. 10.13.128.0
B. 10.13.147.0
C. 10.13.0.0
D. 10.13.100.0
Answer: A
QUESTION 24
Which two prefixes would summarize the networks shown below? (Choose two.)
192.168.1.0/24
192.168.2.0/24
192.168.3.0/24
A. 192.168.0.0/23
B. 192.168.0.0/22
C. 192.168.0.0/24
D. 192.168.0.0/21
Answer: BD
QUESTION 25
How many host addresses are available in the /28 network?
A. 6
B. 14
C. 28
D. 30
Answer: B
QUESTION 26
What are three benefits of using IPv6? (Choose three.)
A. IPv6 supports a greater level of security by integrating features that were optional add- ons in IPv4.
B. IPv6 reduces administrative overhead using stateless address autoconfiguration for hosts.
C. IPv6 eliminates the need for private to public NAT using a large address pool.
D. IPv6 provides backward compatibility with IPv4 using the Next Header field.
E. IPv6 represents large IP addresses using dotted decimal notation.
Answer: ABC
QUESTION 27
Which statement is correct about the forwarding table?
A. The forwarding table is stored only on the PFE.
B. The forwarding table contains all known routes.
C. The forwarding table is stored on both the RE and PFE.
D. The forwarding table is stored only on the RE.
Answer: C
QUESTION 28
Which statement describes exception traffic?
A. Exception traffic must be sent to the PFE for processing.
B. Exception traffic enters one ingress port and is sent out multiple egress ports.
C. Exception traffic is rate-limited on the internal link to prevent DoS attacks.
D. Exception traffic is processed after forwarding traffic when congestion exists.
Answer: C
QUESTION 29
What are two benefits of the modular design of the Junos OS? (Choose two.)
A. Each module uses application-specific integrated circuits (ASICs).
B. Each module runs in its own protected memory space.
C. Each module can be individually restarted.
D. Each module is supported across all Junos platforms.
Answer: BC
QUESTION 30
Which statement describes the PFE?
A. The PFE controls the RE by providing Layer 2 and Layer 3 forwarding tables.
B. The PFE implements advanced services such as policing, stateless firewall filtering, and class of service.
C. The PFE sends traffic to the RE for systematic packet forwarding.
D. The PFE receives hardware and environmental status messages from the RE.
Answer: B
!!!RECOMMEND!!!
1.|2018 Latest JN0-102 Exam Dumps (PDF & VCE) 418Q&As Download:
https://www.braindump2go.com/jn0-210.html
2.|2018 Latest JN0-102 Exam Questions & Answers Download:
https://drive.google.com/drive/folders/1xUsSbyZK9KPIC3mfgfQfQjbxmPifvFEF?usp=sharing
3.|2018 Latest JN0-102 Study Guide Video:
2018 July Juniper JN0-102 Exam Dumps with PDF and VCE New Updated Today! Following are some new JN0-102 Real Exam Questions:
2017 May New Version: Juniper JN0-102 Exam Dumps with PDF and VCE Free Updated in www.Braindump2go.com Today!100% Real Exam Questions! 100% Exam Pass Guaranteed!
QUESTION 1
Which network mask is the equivalent of 255.255.248.0?
A. /20
B. /21
C. /22
D. /23
Answer: B
QUESTION 2
Which login class permission will allow a user to use the telnet utility?
A. Network permission
B. Maintenance permission
C. Supervisor permission
D. Shell permission
Answer: A
QUESTION 3
Which command do you issue to upgrade the current software on Junos devices?
A. request system software replace
B. request system software install
C. request system software add
D. request system software upgrade
Answer: C
QUESTION 4
Which statement is true about terms in a policy?
A. A single term can be applied to a protocol or interface, independent of the policy.
B. Once configured, terms within a policy cannot be reordered.
C. The name of a term is limited to five characters.
D. A from statement is optional in a term.
Answer: D
QUESTION 5
What is the decimal equivalent of 10101010?
A. 182
B. 180
C. 172
D. 170
Answer: D
QUESTION 6
Two devices on an Ethernet segment sent frames at the same time causing a collision.
Which two statements are true? (Choose two.)
A. Both devices stop transmitting, wait a random period of time, verify the wire is idle, and re- transmit.
B. The device with the lowest MAC address is permitted to retransmit first.
C. The device with the lowest MAC address sends a jam signal to notify all other devices of the collision.
D. Both devices send a jam signal to notify all other devices of the collision.
Answer: AD
QUESTION 7
You issue the command telnet interface ge-1/1/0 10.10.10.1 source 192.168.100.1 bypass-routing.
Which statement is correct?
A. The bypass-routing parameter is ignored when using private IP addressing.
B. The telnet session will have the source IP address 10.10.10.1.
C. The telnet session will connect to the neighboring device’s interface ge-1/1/0.
D. Return traffic for the telnet session might not arrive at interface ge-1/1/0.
Answer: D
QUESTION 8
Which statement is true regarding the Junos OS?
A. Each process runs in its own protected memory space ensuring that one process cannot directly interfere with another.
B. Processes share memory space but use separate ASICs so that one process cannot directly interfere with another.
C. A central processor called the IP2 Chip dynamically assigns memory as process needs fluctuate.
D. The memory management daemon (mmd) is responsible for allocating new memory for processes as they request it.
Answer: A
QUESTION 9
Which two statements apply when a user has entered private configuration mode by typing configure private? (Choose two.)
A. All users have their own active configuration.
B. All users have their own private candidate configuration.
C. When a user commits, all nonconflicting changes made by all users are committed.
D. When a user commits, only the user’s own changes are committed.
Answer: BD
QUESTION 10
What is the default SNMP permission level on Junos devices?
A. read
B. read-write
C. read-only
D. write
Answer: C
QUESTION 11
Which two statements are true of a network mask? (Choose two.)
A. A subnet mask specifies the portion of an IP address that is in a binary format.
B. A subnet mask specifies the portion of an IP address that is in a decimal format.
C. A subnet mask specifies the portion of an IP address that represents a network prefix.
D. A subnet mask specifies the portion of an IP address that represents network hosts.
Answer: CD
QUESTION 12
Which statement is true regarding the Junos OS?
A. The Junos kernel is based on the Solaris operating system.
B. The Junos kernel is based on the GNU Zebra operating system.
C. The Junos kernel is completely original and not based on any other operating system.
D. The Junos kernel is based on the FreeBSD UNIX operating system.
Answer: D
QUESTION 13
How can you verify that you have correctly configured SSH access to your Junos device?
A. user@router# show system services
B. user@router> show configuration services
C. user@router# show configuration system services
D. user@router# show system login
Answer: A
QUESTION 14
Which statement is true regarding the password-recovery process?
A. You must have a console connection.
B. You cannot set the console port to an insecure mode.
C. You must press the Enter key so that you can boot into single-user mode.
D. When prompted to enter the full pathname of the shell, you must press the Enter key.
Answer: A
QUESTION 15
You are at the top of the hierarchy and must configure OSPF on interface so-0/0/0 unit 100.
Which two achieve this result? (Choose two.)
A. set protocols
set ospf area 0
set interface so-0/0/0.100
B. set protocols ospf area 0 interface so-0/0/0.100
C. edit protocols ospf interface so-0/0/0.100
D. edit protocols ospf area 0
set interface so-0/0/0.100
Answer: BD
QUESTION 16
Which statement describes an advantage of dynamic routing?
A. Dynamic routing provides redundant IP addresses for end-user devices, unlike static routing.
B. Dynamic routing requires no initial user configuration, unlike static routing.
C. Dynamic routing provides DNS services along with IP connectivity; static routing does not.
D. Dynamic routing typically requires less time to implement than static routing in a large network.
Answer: D
QUESTION 17
Which statement is true about the forwarding plane?
A. It uses ASICs for increased performance.
B. It is the intelligence of the platform.
C. It maintains the routing tables.
D. It is based on an x86 architecture.
Answer: A
QUESTION 18
Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors? (Choose two.)
A. set protocols rip export demo
B. edit policy-options policy-statement demo
set term 1 from protocol static
set term 1 then accept
C. edit policy-options policy-statement demo
set term 1 from protocol static accept
D. set protocols rip group internal export demo
Answer: BD
Passing your Juniper JN0-102 Exam by using the latest Juniper JN0-102 Exam Demo Full Version: http://www.braindump2go.com/jn0-102.html