Thursday, August 12, 2010
Thursday, July 29, 2010
JNCIA-ER PRE-Assessment Exam
JNCIA-ER PRE-Assessment Exam
Q1. Which J-Web menu should you use to view the router's "last known good" configuration?
- Configuration > View and Edit
- Configuration > Rescue
- Configuration > Rollback
- Configuration > History
Q2. Which J-Web window pane allows you to view and manage licenses?
- Monitor
- Configuration
- Diagnose
- Manage
Q3. Which major J-Web menu should you use to view the physical hardware in the router?
- Manage
- Diagnose
- Configuration
- Monitor
Q4. You are logged in to an M10i router as the lab user. The J-Web 8.0R2.8 package is located in your home directory.
Which CLI command would install the J-Web interface?
- Load software jweb-8.0R2.8-signed.tgz
- Load software /home/lab/jweb-8.0R2.8-signed.tgz
- Request system software add jweb-8.0R2.8-signed.tgz
- Request system software add /home/lab/jweb-8.0R2.8-signed.tgz
Q5. Which J-Web menu displays the amount of free space on the router's compact flash?
- Manage > System
- Diagnose > Flash
- Monitor > System
- Monitor > Flash
Q6. What is the purpose of the services interface?
- Processes traffic using class-of-service.
- Provides various layer 2 and layer 3 services.
- Used to bundle Ethernet interfaces on M-series routers.
- Allows for secure shell access to the router.
Q7. Which definition most accurately describes VRRP?
- An election protocol used to designate one of multiple routers as the master router, which serves as the forwarding next-hop for the LAN.
- A virtual protocol which makes VPN communications possible.
- A redundancy protocol used to identify the active WAN circuit.
- A link-state routing protocol used in Ethernet environments.
Q8. Which three daemons are contained in the JUNOS software?
There are 3 correct answers
- VPN
- Routing Protocol
- Management
- Chassis
Q9. Which two statements regarding the JUNOS software user authentication methods are correct?
There are 2 correct answers
- Multiple users can authenticate using a common local user account.
- Only one authentication method can be configured.
- Multiple authentication methods can be configured.
- All users must be configured locally on the router.
Q10. Which CLI command displays the hardware currently installed in the router?
- Show chassis alarms
- Show system hardware
- Show chassis hardware
- Show system environment
Q11. Which statements are true regarding DHCP services and J-series routers?
There are 2 correct answers
- J-series routers can operate as a DHCP-relay agent only.
- J-series routers can operate as a DHCP server.
- J-series routers can function as a DHCP-relay agent and DHCP server simultaneously.
- J-series routers can relay DHCP requests from one LAN to another.
12. Which CLI command displays any active alarms on the router?
- Show system alarms
- Show chassis alarms
- Show system environment
- Show chassis environment
Q13. Which configuration statement contacts a TACACS+ server when the primary RADIUS server is unreachable?
- [edit] system { authentication-order [ radius tacacs+ ]; }
- [edit] authentication { login-order [ radius tacplus ]; }
- [edit] system { authentication-order [ radius tacplus ]; }
- [edit] authentication { login-order [ radius tacplus ]; }
Q14. What are three characteristics of the JUNOS software?
There are 3 correct answers
- Contains a modular operating system.
- Separate forwarding and control planes.
- Single software train for all M,T and J-series routers.
- Contains easy to read registry keys.
Q15. What statements about ALGs are true?
There are 2 correct answers
- ALGs monitor protocol exchanges and perform address and port translations within the payload for certain protocols.
- ALGs allow the router to interact with layer 4 and above when performing translation services.
- ALGs are required whenever NAT is used.
- ALGs are only used when PAT is configured.
Q16. Which type of IGP should you use to achieve scalability in a large enterprise network?
- Distance-vector protocol
- Link-state protocol
- Bellman-Ford protocol
- Path-vector protocol
Q17. What are two services provided by the SDX?
There are 2 correct answers
- Customized firewall modifications
- An XML interface for router configuration
- Usage tracking and accounting
- Secure remote access to the router
Q18. Which statements are true regarding the ASM?CD
There are 2 correct answers
- The ASM supports only layer 3 services.
- The ASM comes standard with all M7i and M10i routers.
- The ASM supports the layer 2 and layer 3 service packages simultaneously.
- The ASM is an option when ordering the M7i.
Q19. You have a router which does not have the J-Web interface installed by default.
Which CLI command installs the J-Web package?
- Load system software jweb-8.0R2.8-signed.tgz
- Install package jweb-8.0R2.8-signed.tgz
- Request system software add jweb-8.0R2.8-signed.tgz
- Package add jweb-8.0R2.8-signed.tgz
Q20. Which VRRP configuration option monitors the state of an interface and is capable of initiating a change in mastership if the monitored interface goes down?
- Snoop
- Monitor
- Preempt
- Track
Q21. Which JUNOS software feature forms the basis for JUNOScope?
- J-Web
- JUNOScript
- BSD Kernel
- SDX
Q22. Which configuration option allows you to view auto installation messages?
- Trace options
- Debug
- View
- Decode
Q23. Which of the following address assignment options are available when configuring NAT?
There are 2 correct answers
- Static
- Dynamic
- One-to-one
- One-to-many
Q24. Within the J-Web initial setup wizard, which menu is used to configure the hostname of the router?
- Set Up
- Interfaces
- Users
- Routing
Q25. Which MLPPP configuration statement determines the threshold for maintaining the state of an MLPPP bundle?
- Link-limit
- Link-threshold
- Minimum-threshold
- Minimum-links
Q26. What are three protocol limitations of RIP? (Choose three.)
- It has a maximum network diameter.
- It can only be used on broadcast links.
- It will count to infinity and slow down loop prevention.
- It will send periodic updates of the entire routing table.
Q27. What is the JUNOS software term for decoding protocol packets?
- Dump
- Stat
- Trace
- Debug
Q28. Which CLI command displays all static routes in the routing table?
- Show static all
- Show route static
- Show static route
- Show route protocol static
Q29. When using the J-Web interface to configure RIP, which two policies are automatically configured by the router? (Choose two.)
- Import policy to block RIP routes.
- Import policy to block direct routes.
- Export policy to advertise RIP routes.
- Export policy to advertise direct routes.
Q30. Which statement describes the function of a routing policy?
- It controls the size of routing protocol packets.
- It allows routing protocols to be auto configured.
- It allows for the configuration and management of user permissions.
- It controls routing information transferred in and out of the routing table.
Q31. Which type of routing protocol is RIP?
- Link state
- Path vector
- Policy based
- Distance vector
Q32. Which routing technology is often used when a customer is single-homed to a service provider?
- RIP
- BGP
- Static
- OSPF
Q33. Which command configures a minimal SNMP Configuration?
- edit snmp community juniper
- set snmp server 10.12.1.1 version 2c
- set snmp community juniper authorization read-only
- snmp community juniper authorization read-only
Q34. Which protocol family must be configured on an interface to allow ICMP traffic to be received?
- IP
- INET
- ICMP
- Management
Q35. Which statements are true regarding DHCP services and J-series routers?
- J-series routers can operate as a DHCP-relay agent only.
- J-series routers can operate as a DHCP server
- J-series routers can function as DHCP-relay agent and DHCP server simultaneously
- J-series routers can relay DHCP requests from one LAN to another
Q36. Which CLI command displays the current RIP configuration on a J-series router?
- Show protocols rip
- Show configuration rip
- Show rip configuration
- Show configuration protocols rip
Q37. Which tool can be used to verify that packets are using the correct path toward a given destination?
- Ping
- Netstat
- Nslookup
- Traceroute
Q38. What is one way to activate the rescue configuration on a J-series router?
- Issue the load rescue command.
- Issue the activate rescue command.
- Press the rescue button for less than 5 seconds.
- Press the configuration button for less than 5 seconds.
Q39. Which type of policy allows RIP routes to be placed into OSPF?
- RIP import policy
- RIP export policy
- OSPF import policy
- OSPF export policy
Q40. What are two action types in the Juniper routing policy? (Choose two.)
- Sorting
- EE-writing
- Terminating
- Modifying
Q41. Where do you configure a RIP neighbor in the CLI?
- Under [routing rip neighbor]
- Under [protocols rip neighbor]
- Under [routing rip group "group-name" neighbor]
- Under [protocols rip group "group-name" neighbor
Tuesday, July 27, 2010
JNCIA-EX PRE-Assessment exam
- VRRP provides a way for multiple routers to form a virtual chassis.
- VRRP provides a way for multiple routers to share routing information.
- VRRP provides a way for multiple routers to function as a redundant gateway for a subnet.
- VRRP provides a way for multiple routers to share information about virtual chassis with each other.
- The JUNOS software processes terms in order. When it finds a matching from clause, it applies all the actions specified in the then statement. It stops processing further terms.
- The JUNOS software processes terms in order. When it finds a matching from clause, it applies all the actions specified in the then statement. It continues processing further terms until it reaches a reject action.
- The JUNOS software processes terms in order. When it finds a matching from clause, it applies all the actions specified in the then statement. It continues processing further terms until a terminating action is reached.
- The JUNOS software processes terms in order. When it finds a matching from clause, it applies the first action specified in the then statement. It stops processing further terms unless the next term action is specified.
- Firewall filters contain terms.
- Terms contain then clauses.
- Terms are processed sequentially.
- from clauses specify only the source addresses and port information.
- to clauses specify only the destination addresses and port information.
- Input on a VLAN
- Output on a VLAN
- Output on a trunk-mode switch port
- Input on an access-mode switch port
- Output on an access-mode switch port
- log
- trap
- drop
- none
- admin-down
- 1600 seconds
- 2600 seconds
- 3600 seconds
- 4600 seconds
- 802.1X provides a way to prevent unauthorized access to the network.
- 802.1X provides access control and authentication mechanism on a per- VLAN basis.
- 802.1X provides efficiency by allowing supplicants to communicate directly with the authentication server.
- 802.1X provides a comprehensive authentication and authorization method that can replace any other security features against Denial of Service (DoS) attacks.
- It allows only one device to be connected on an enabled port.
- It automatically applies Class of Service (COS) on enabled ports.
- It helps to reduce the number of ports required for connected devices.
- It helps combine both data and voice traffic into a single defined VLAN
- LLDP Agent
- LLDP Object
- LLDP Client
- LLDP Identity
- [edit interfaces ge-0/0/0] root# set unit 0 IP address 10.1.1.1/24
- [edit interfaces ge-0/0/0] root# set unit 0 family inet address 10.1.1.1/24
- [edit interface ge-0/0/0] root# set unit 0 ip address 10.1.1.1 255.255.255.0
- [edit interfaces ge-0/0/0] root# set unit 0 family inet address 10.1.1.1 255.255.255.0
- This command saves the current active configuration to the /var/tmp directory.
- This command saves the current candidate configuration to the /var/tmp directory.
- This command saves the current active configuration to the user’s home directory.
- This command saves the current candidate configuration to the user’s home directory.
- load factory-default
- save factory-default
- activate factory-default
- rollback factory-default
- [edit system] lab@s1# show authentication-order [ radius ];
- [edit system] lab@s1# show authentication-order [ tacplus ];
- [edit system] lab@s1# show authentication-order [ radius tacplus local ];
- [edit system] lab@s1# show authentication-order [ radius tacplus password ];
- Remote
- Operator
- Read-only
- Super-user
- Administratorr
- [edit system] lab@s1# show syslog 10.0.0.1 { authorization info; }
- [edit system] lab@s1# show syslog { host 10.0.0.1 { authorization info; } }
- [edit system] lab@s1# show syslog { host 10.0.0.1 { authorization all; } }
- [edit system] lab@s1# show syslog 10.0.0.1 { info authorization; }
- show chassis status
- show chassis environment
- show chassis routing-engine
- show chassis temperature-thresholds
- When the virtual chassis master switch fails, a new election occurs to elect the new master switch.
- In the virtual chassis mastership election process the switch with the highest mastership priority wins.
- In the virtual chassis mastership election process, the switch with the lowest mastership priority wins.
- When the virtual chassis master switch fails, the backup switch will automatically become the new master switch
- Slave
- Master
- Backup
- Standby
- Line card
- show chassis hardware
- show virtual-chassis status
- show virtual-chassis protocol
- show virtual-chassis active-topology
- PFEs in a virtual chassis use Link Layer Discovery Protocol (LLDP) to discover each other.
- A virtual chassis uses a spanning-tree-type algorithm to prevent loops in a virtual chassis ring.
- A virtual chassis uses token-based ring-access technology to forward packets between ports on different member switches.
- A virtual chassis uses a shortest-path-based algorithm to decide how packets are forwarded between ports on different member switches.
- Trunk port
- access port
- backup port
- alternate port
- designated port
- Loop prevention
- Best path calculation
- Create redundant paths
- Lower convergence time
- Cost
- bridge priority value
- interface priority value
- system MAC address
- Configure the dynamic VLAN on the interface.
- Configure firewall filter to bypass 802.1X authentication.
- Configure the number of retries parameter of interface to 0.
- Configure authentication bypass for the PC’s MAC address.
- When you need to restrict Telnet to the device.
- When you need to deny packets over an interface.
- When you need to modify routes in the forwarding table.
- When you need to restrict advertisements to a neighbor.