Thursday, July 29, 2010

JNCIA-ER PRE-Assessment Exam

JNCIA-ER PRE-Assessment Exam

Q1. Which J-Web menu should you use to view the router's "last known good" configuration?


  • Configuration > View and Edit
  • Configuration > Rescue
  • Configuration > Rollback
  • Configuration > History

Q2. Which J-Web window pane allows you to view and manage licenses?

  • Monitor
  • Configuration
  • Diagnose
  • Manage

Q3. Which major J-Web menu should you use to view the physical hardware in the router?

  • Manage
  • Diagnose
  • Configuration
  • Monitor

Q4. You are logged in to an M10i router as the lab user. The J-Web 8.0R2.8 package is located in your home directory.

Which CLI command would install the J-Web interface?

  • Load software jweb-8.0R2.8-signed.tgz
  • Load software /home/lab/jweb-8.0R2.8-signed.tgz
  • Request system software add jweb-8.0R2.8-signed.tgz
  • Request system software add /home/lab/jweb-8.0R2.8-signed.tgz

Q5. Which J-Web menu displays the amount of free space on the router's compact flash?

  • Manage > System
  • Diagnose > Flash
  • Monitor > System
  • Monitor > Flash

Q6. What is the purpose of the services interface?

  • Processes traffic using class-of-service.
  • Provides various layer 2 and layer 3 services.
  • Used to bundle Ethernet interfaces on M-series routers.
  • Allows for secure shell access to the router.

Q7. Which definition most accurately describes VRRP?

  • An election protocol used to designate one of multiple routers as the master router, which serves as the forwarding next-hop for the LAN.
  • A virtual protocol which makes VPN communications possible.
  • A redundancy protocol used to identify the active WAN circuit.
  • A link-state routing protocol used in Ethernet environments.

Q8. Which three daemons are contained in the JUNOS software?

There are 3 correct answers

  • VPN
  • Routing Protocol
  • Management
  • Chassis

Q9. Which two statements regarding the JUNOS software user authentication methods are correct?

There are 2 correct answers

  • Multiple users can authenticate using a common local user account.
  • Only one authentication method can be configured.
  • Multiple authentication methods can be configured.
  • All users must be configured locally on the router.

Q10. Which CLI command displays the hardware currently installed in the router?

  • Show chassis alarms
  • Show system hardware
  • Show chassis hardware
  • Show system environment

Q11. Which statements are true regarding DHCP services and J-series routers?

There are 2 correct answers

  • J-series routers can operate as a DHCP-relay agent only.
  • J-series routers can operate as a DHCP server.
  • J-series routers can function as a DHCP-relay agent and DHCP server simultaneously.
  • J-series routers can relay DHCP requests from one LAN to another.

12. Which CLI command displays any active alarms on the router?

  • Show system alarms
  • Show chassis alarms
  • Show system environment
  • Show chassis environment

Q13. Which configuration statement contacts a TACACS+ server when the primary RADIUS server is unreachable?

  • [edit] system { authentication-order [ radius tacacs+ ]; }
  • [edit] authentication { login-order [ radius tacplus ]; }
  • [edit] system { authentication-order [ radius tacplus ]; }
  • [edit] authentication { login-order [ radius tacplus ]; }

Q14. What are three characteristics of the JUNOS software?

There are 3 correct answers

  • Contains a modular operating system.
  • Separate forwarding and control planes.
  • Single software train for all M,T and J-series routers.
  • Contains easy to read registry keys.

Q15. What statements about ALGs are true?

There are 2 correct answers

  • ALGs monitor protocol exchanges and perform address and port translations within the payload for certain protocols.
  • ALGs allow the router to interact with layer 4 and above when performing translation services.
  • ALGs are required whenever NAT is used.
  • ALGs are only used when PAT is configured.

Q16. Which type of IGP should you use to achieve scalability in a large enterprise network?

  • Distance-vector protocol
  • Link-state protocol
  • Bellman-Ford protocol
  • Path-vector protocol

Q17. What are two services provided by the SDX?

There are 2 correct answers

  • Customized firewall modifications
  • An XML interface for router configuration
  • Usage tracking and accounting
  • Secure remote access to the router

Q18. Which statements are true regarding the ASM?CD

There are 2 correct answers

  • The ASM supports only layer 3 services.
  • The ASM comes standard with all M7i and M10i routers.
  • The ASM supports the layer 2 and layer 3 service packages simultaneously.
  • The ASM is an option when ordering the M7i.

Q19. You have a router which does not have the J-Web interface installed by default.

Which CLI command installs the J-Web package?

  • Load system software jweb-8.0R2.8-signed.tgz
  • Install package jweb-8.0R2.8-signed.tgz
  • Request system software add jweb-8.0R2.8-signed.tgz
  • Package add jweb-8.0R2.8-signed.tgz

Q20. Which VRRP configuration option monitors the state of an interface and is capable of initiating a change in mastership if the monitored interface goes down?

  • Snoop
  • Monitor
  • Preempt
  • Track

Q21. Which JUNOS software feature forms the basis for JUNOScope?

  • J-Web
  • JUNOScript
  • BSD Kernel
  • SDX

Q22. Which configuration option allows you to view auto installation messages?

  • Trace options
  • Debug
  • View
  • Decode

Q23. Which of the following address assignment options are available when configuring NAT?

There are 2 correct answers

  • Static
  • Dynamic
  • One-to-one
  • One-to-many

Q24. Within the J-Web initial setup wizard, which menu is used to configure the hostname of the router?

  • Set Up
  • Interfaces
  • Users
  • Routing

Q25. Which MLPPP configuration statement determines the threshold for maintaining the state of an MLPPP bundle?

  • Link-limit
  • Link-threshold
  • Minimum-threshold
  • Minimum-links

Q26. What are three protocol limitations of RIP? (Choose three.)

  • It has a maximum network diameter.
  • It can only be used on broadcast links.
  • It will count to infinity and slow down loop prevention.
  • It will send periodic updates of the entire routing table.

Q27. What is the JUNOS software term for decoding protocol packets?

  • Dump
  • Stat
  • Trace
  • Debug

Q28. Which CLI command displays all static routes in the routing table?

  • Show static all
  • Show route static
  • Show static route
  • Show route protocol static

Q29. When using the J-Web interface to configure RIP, which two policies are automatically configured by the router? (Choose two.)

  • Import policy to block RIP routes.
  • Import policy to block direct routes.
  • Export policy to advertise RIP routes.
  • Export policy to advertise direct routes.

Q30. Which statement describes the function of a routing policy?

  • It controls the size of routing protocol packets.
  • It allows routing protocols to be auto configured.
  • It allows for the configuration and management of user permissions.
  • It controls routing information transferred in and out of the routing table.

Q31. Which type of routing protocol is RIP?

  • Link state
  • Path vector
  • Policy based
  • Distance vector

Q32. Which routing technology is often used when a customer is single-homed to a service provider?

  • RIP
  • BGP
  • Static
  • OSPF

Q33. Which command configures a minimal SNMP Configuration?

  • edit snmp community juniper
  • set snmp server 10.12.1.1 version 2c
  • set snmp community juniper authorization read-only
  • snmp community juniper authorization read-only

Q34. Which protocol family must be configured on an interface to allow ICMP traffic to be received?

  • IP
  • INET
  • ICMP
  • Management

Q35. Which statements are true regarding DHCP services and J-series routers?

  • J-series routers can operate as a DHCP-relay agent only.
  • J-series routers can operate as a DHCP server
  • J-series routers can function as DHCP-relay agent and DHCP server simultaneously
  • J-series routers can relay DHCP requests from one LAN to another

Q36. Which CLI command displays the current RIP configuration on a J-series router?

  • Show protocols rip
  • Show configuration rip
  • Show rip configuration
  • Show configuration protocols rip

Q37. Which tool can be used to verify that packets are using the correct path toward a given destination?

  • Ping
  • Netstat
  • Nslookup
  • Traceroute

Q38. What is one way to activate the rescue configuration on a J-series router?

  • Issue the load rescue command.
  • Issue the activate rescue command.
  • Press the rescue button for less than 5 seconds.
  • Press the configuration button for less than 5 seconds.

Q39. Which type of policy allows RIP routes to be placed into OSPF?

  • RIP import policy
  • RIP export policy
  • OSPF import policy
  • OSPF export policy

Q40. What are two action types in the Juniper routing policy? (Choose two.)

  • Sorting
  • EE-writing
  • Terminating
  • Modifying

Q41. Where do you configure a RIP neighbor in the CLI?

  • Under [routing rip neighbor]
  • Under [protocols rip neighbor]
  • Under [routing rip group "group-name" neighbor]
  • Under [protocols rip group "group-name" neighbor

Tuesday, July 27, 2010

JNCIA-EX PRE-Assessment exam

JNCIA-EX PRE-Assessment exam

Q1. What does the Virtual Router Redundancy Protocol (VRRP) provide?

  • VRRP provides a way for multiple routers to form a virtual chassis.
  • VRRP provides a way for multiple routers to share routing information.
  • VRRP provides a way for multiple routers to function as a redundant gateway for a subnet.
  • VRRP provides a way for multiple routers to share information about virtual chassis with each other.

Q2. What is true about the way the JUNOS software processes routing policies?


  • The JUNOS software processes terms in order. When it finds a matching from clause, it applies all the actions specified in the then statement. It stops processing further terms.
  • The JUNOS software processes terms in order. When it finds a matching from clause, it applies all the actions specified in the then statement. It continues processing further terms until it reaches a reject action.
  • The JUNOS software processes terms in order. When it finds a matching from clause, it applies all the actions specified in the then statement. It continues processing further terms until a terminating action is reached.
  • The JUNOS software processes terms in order. When it finds a matching from clause, it applies the first action specified in the then statement. It stops processing further terms unless the next term action is specified.

Q3. Which three statements are true regarding firewall filters?
There are 3 correct answers

  • Firewall filters contain terms.
  • Terms contain then clauses.
  • Terms are processed sequentially.
  • from clauses specify only the source addresses and port information.
  • to clauses specify only the destination addresses and port information.

Q4. Which three are valid firewall filter application points?
There are 3 correct answers

  • Input on a VLAN
  • Output on a VLAN
  • Output on a trunk-mode switch port
  • Input on an access-mode switch port
  • Output on an access-mode switch port

Q5.Which three configurable actions are supported for MAC limiting on an EX-series switch?
There are 3 correct answers

  • log
  • trap
  • drop
  • none
  • admin-down

Q6. What is the default re-authentication interval for 802.1X?

  • 1600 seconds
  • 2600 seconds
  • 3600 seconds
  • 4600 seconds

Q7. Which statement correctly describes a benefit of 802.1X?

  • 802.1X provides a way to prevent unauthorized access to the network.
  • 802.1X provides access control and authentication mechanism on a per- VLAN basis.
  • 802.1X provides efficiency by allowing supplicants to communicate directly with the authentication server.
  • 802.1X provides a comprehensive authentication and authorization method that can replace any other security features against Denial of Service (DoS) attacks.

Q8. What is the benefit of enabling the voice VLAN feature on EX-series switches?

  • It allows only one device to be connected on an enabled port.
  • It automatically applies Class of Service (COS) on enabled ports.
  • It helps to reduce the number of ports required for connected devices.
  • It helps combine both data and voice traffic into a single defined VLAN

Q9. Which term describes a network device that implements the Link Layer Discovery Protocol (LLDP)?

  • LLDP Agent
  • LLDP Object
  • LLDP Client
  • LLDP Identity

Q10. What is the command to set an IP address on an interface?

  • [edit interfaces ge-0/0/0] root# set unit 0 IP address 10.1.1.1/24
  • [edit interfaces ge-0/0/0] root# set unit 0 family inet address 10.1.1.1/24
  • [edit interface ge-0/0/0] root# set unit 0 ip address 10.1.1.1 255.255.255.0
  • [edit interfaces ge-0/0/0] root# set unit 0 family inet address 10.1.1.1 255.255.255.0

Q11. What is the purpose of the command shown below?
[edit] user@switch# save config.conf

  • This command saves the current active configuration to the /var/tmp directory.
  • This command saves the current candidate configuration to the /var/tmp directory.
  • This command saves the current active configuration to the user’s home directory.
  • This command saves the current candidate configuration to the user’s home directory.

Q12. Which configuration-mode command loads the EX-series switch back to its factory-default configuration?

  • load factory-default
  • save factory-default
  • activate factory-default
  • rollback factory-default

Q13. Which configuration would allow a user to authenticate with an EX-series switch if both the RADIUS and TACACS+ server rejected the authentication?

  • [edit system] lab@s1# show authentication-order [ radius ];
  • [edit system] lab@s1# show authentication-order [ tacplus ];
  • [edit system] lab@s1# show authentication-order [ radius tacplus local ];
  • [edit system] lab@s1# show authentication-order [ radius tacplus password ];

Q14.What are three predefined system login classes?
There are 3 correct answers

  • Remote
  • Operator
  • Read-only
  • Super-user
  • Administratorr


Q15. Which configuration sends syslog messages with a facility of authorization and a severity level of info to a syslog server with the IP address 10.0.0.1?

  • [edit system] lab@s1# show syslog 10.0.0.1 { authorization info; }
  • [edit system] lab@s1# show syslog { host 10.0.0.1 { authorization info; } }
  • [edit system] lab@s1# show syslog { host 10.0.0.1 { authorization all; } }
  • [edit system] lab@s1# show syslog 10.0.0.1 { info authorization; }

16. Which two commands display the Routing Engine temperature?
There are 2 correct answers

  • show chassis status
  • show chassis environment
  • show chassis routing-engine
  • show chassis temperature-thresholds

Q17. Which two statements are true with regard to roles and responsibilities in a virtual chassis?
There are 2 correct answers

  • When the virtual chassis master switch fails, a new election occurs to elect the new master switch.
  • In the virtual chassis mastership election process the switch with the highest mastership priority wins.
  • In the virtual chassis mastership election process, the switch with the lowest mastership priority wins.
  • When the virtual chassis master switch fails, the backup switch will automatically become the new master switch

Q18. What are three roles of member switches in a virtual chassis?
There are 3 correct answers

  • Slave
  • Master
  • Backup
  • Standby
  • Line card


Q19. Which operational-mode command would you use to find out which switch is operating as the virtual chassis master switch?

  • show chassis hardware
  • show virtual-chassis status
  • show virtual-chassis protocol
  • show virtual-chassis active-topology

Q20. Which statement about virtual chassis technology is true?

  • PFEs in a virtual chassis use Link Layer Discovery Protocol (LLDP) to discover each other.
  • A virtual chassis uses a spanning-tree-type algorithm to prevent loops in a virtual chassis ring.
  • A virtual chassis uses token-based ring-access technology to forward packets between ports on different member switches.
  • A virtual chassis uses a shortest-path-based algorithm to decide how packets are forwarded between ports on different member switches.

Q22. What are three valid port roles used in RSTP?
There are 3 correct answers

  • Trunk port
  • access port
  • backup port
  • alternate port
  • designated port

Q23. What are two purposes of STP?
There are 2 correct answers

  • Loop prevention
  • Best path calculation
  • Create redundant paths
  • Lower convergence time

Q24. Which two elements make up an STP bridge ID?
There are 2 correct answers

  • Cost
  • bridge priority value
  • interface priority value
  • system MAC address

Q25. You are connecting a PC that does not support 802.1X to an EX-series switch port with 802.1X enabled.
Which action would allow the device to gain access to the network?

  • Configure the dynamic VLAN on the interface.
  • Configure firewall filter to bypass 802.1X authentication.
  • Configure the number of retries parameter of interface to 0.
  • Configure authentication bypass for the PC’s MAC address.

Q26. In which two situations would you use a routing policy?

There are 2 correct answers

  • When you need to restrict Telnet to the device.
  • When you need to deny packets over an interface.
  • When you need to modify routes in the forwarding table.
  • When you need to restrict advertisements to a neighbor.

Sunday, July 25, 2010

JNCIA-JUNOS PRE-Assessment Exam

JNCIA-JUNOS PRE-Assessment Exam

Q1: What are two functions of the routing-engine? (Choose two)

  • To build OSPF and ISIS adjacencies.
  • To build the layer 2 and layer 3 forwarding tables.
  • To receive and process packets that could not be forwarded by the pfe.
  • To verify that packets arriving at the router are allowed by any configured firewall filters.

Q2: In which mode are users allowed to monitor and troubleshoot the software, network connectivity, and hardware

  • Privilege mode
  • Operational mode
  • Configuration mode
  • Monitoring mode

Q3: in configuration mode you see the following prompt [edit interfaces fe-1/1/1] user@router#

Which command will take you to operational mode?

  • End
  • Exit
  • Quit
  • Exit configuration-mode

Q4: what are two functions of the packet forwarding engine? (Choose two)

  • To build the layer 2 forwarding table
  • To forward packets based on the forwarding table
  • To send ICMP time exceeded messages when the ttl reaches 0
  • To implement policing, firewall filtering, and QoS

Q5: Which character in the JUNOS software CLI allows you to filter and manipulate command output?

  • < >
  • ?
  • |

Q6: When you first login into a router, how does the router indicate that factory defaults are being used?

  • The router host-name is Anmesiac
  • The password you used to login is JUNOS
  • The router goes immediately into configuration mode after you login.
  • The router allows you to get into configuration mode without you having to login.


Q7: Which statement is correct about protocol families on an interface?

  • Only one family is allowed on an interface
  • Only one address per family is allowed on an interface
  • Only one address per family is allowed on a given unit
  • Multiple address families and addressed can be configured under the same unit.

Q8: What is the third SONET interface on a PIC installed in PIC slot 1, FPC slot 1?

  • Interface sonnet-1/3/1
  • Interface so-1/1/2
  • Interface so-3/1/1
  • Interface so-0/1/1.2

Q9: Which three user authentication methods are supported by the JUNOS software? (Choose three)

  • LDAP
  • RADIUS
  • TACACS
  • LOCAL PASSWORD
  • Web authentication

Q10: Which two JUNOS software authentication methods require the use of a server for authentication? (Choose two)

  • CHAP
  • RADIUS
  • Kerberos
  • TACACS

Q11: Which three configuration components are required to create a user account using locat authentication? (Choose three)

  • Permissions
  • Class
  • User name
  • User ID
  • User authentication (password)

Q12: Which command allows you to quickly verify the state of all physical and logical interfaces?

User@host> show interface summary

User@host> show interfaces terse

User@host> show interfaces brief

User@host> show interfaces routing

Q13: A network administrator would like to verify the active alarms on interface so-0/0/0.0.

Which command displays this information?

  • Show alarms
  • Show interfaces terse
  • Show alarms extensive
  • Show interfaces extensive

Q14: what could you type to view all of the PICs within a router as well as their serial numbers?

  • Show chassis interfaces
  • Show chassis pics
  • Show chassis inventory
  • Show chassis hardware

Q15: Which routing table is used for all IPv4 unicast forwarding?

  • inet.0
  • Inet4.0
  • Ipv4.0
  • Forwarding.0

Q16: What is a characteristic of route preference?

  • it is the same as a route metric
  • it must be assigned manually for each protocol
  • a higher preference is better than a lower preference
  • A lower preference is better than a higher preference.

Q17: What is the correct CLI command to display the routing table?

  • Show routing-table
  • Show routes
  • Display routes
  • Show route

Q18: which two are considered match criteria in a policy? (Choose two)

  • Next-term
  • As path
  • Prefix-file
  • Community

Q19: Which policy action is considered a flow control action?

  • Accept
  • Next term
  • Reject
  • Preference

Q20: What is the proper order for CoS processing for egress packets on a juniper router?

  • Multifield Classifier > scheduler/sharper/RED>Rewrite marker
  • Policer > Multifield Classifier > Scheduler/shaper/RED > Rewrite Marker
  • Scheduler/shaper/RED > Multifield Classifier > Policing > Rewrite Marker
  • Rewrite marker > Policer > Multifield Classifier > Scheduler/shaper/RED

Q21: What is the purpose of queuing traffic in a CoS scenario ?

  • it allows routed traffic to be handled before switched traffic.
  • It allows the handling of traffic based on its TOS code
  • It allows traffic to be classified into forwarding classes.
  • It allows traffic to be forwarded based on its forwarding class.

Q22: Which command swquence shows most of the CoS configuration for an interface?

  • show interface queue ge-0/0/0
  • show queues interfaces ge-0/0/0
  • show class-of-serviice interface ge-0/0/0
  • show interface queue detail

Q23: what is the binary equivalent of 100.25.98.207

  • 01100100 00011001 01100010 11001111
  • 01110100 00011001 01101010 11001111
  • 01100100 00011001 01101010 11001111
  • 11100100 00001001 01100010 11001110

Q24: What is typically used to break up individual broadcast domains?

  • Bridge
  • Router
  • Switch
  • Hub

Q25: Which two statements are true regarding collisions on an Ethernet segment? (Choose two)

  • When a collision occurs, the device with the lowest MAC address sends a jam signal to notify all other devices of the collision
  • When a collision occurs, both devices stop transmitting, wait a random period of time, verify the wire is idle and retransmit.
  • When a cjollision occurs, the device with the lowest MAC address is permitted to retransmit first.
  • When a collision occurs, both transmitting devices send a jam signal jto notify all other devices of the collision.