You are configuring a firewall filter on a Juniper device.
In this scenario, what are two valid terminating actions? (Choose two.)
Which two statements are correct about the empioyee@Ri> prompt? (Choose two.)
In the Junos OS, which keyboard shortcut allows you to move to the start of the line?
By default, how does the PFE manage unicast traffic destined for an existing forwarding table entry?
What are two types of transit traffic that traverse the forwarding plane of a Layer 3 router? (Choose two.)
Exhibit.
Referring to the exhibit, which routing configuration is required for these two users to access the remote server?
What is the primary system log file that is present in the default configuration of a Junos device?
A network administrator is attempting to route traffic on a Juniper switch to one of three different VLANs: Prod, Test, and Dev. Each VLAN has been assigned a numerical value.
In this scenario, what are these numerical values called?
Click the Exhibit button.
Referring to the exhibit, what is the source IP address of the ping that was executed?
You received a new Junos device and are configuring the system-related settings. You must configure this device for the current date and time on the US West coast. You have set the time zone to America/Los_Angeies. however the time and date did not change.
In this scenario, which two additional actions would satisfy this requirement? (Choose two.)
You configured your system authentication order using the set authentication-order tacplus radius password command.
Which statement is correct in this scenario?
You have just increased the MTU size of interface ge-0/0/0 and committed the configuration.
Which command would help you identify the applied MTU change?
Which Junos OS component is responsible for maintaining the forwarding table?
You have completed the initial configuration of your new Junos device. You want to be able to load this configuration at a later time.
Which action enables you to perform this task?
Exhibit
{hold:node0}[edit]
root# set system root-authentication ?
Possible completions:
+ apply-groups Groups from which to inherit configuration data
+ apply-groups-except Don't inherit configuration data from these groups
encrypted-password Encrypted password string
load-key-file File (URL) containing one or more ssh keys
plain-text-password Prompt for plain text password (autoencrypted)
> ssh-dsa Secure shell (ssh) DSA public key string
> ssh-rsa Secure shell (ssh) RSA public key string
{hold:node0}[edit]
root# set system root-authentication plain-text-password
New password:
Retype new password:
{hold:node0}[edit]
root# commit and-quit
[edit interfaces]
'ge-0/0/0'
HA management port cannot be configured
error: configuration check-out failed
{hold:node0}[edit]
root#
You are unable to remotely access your Juniper device using the CLI.
Referring to the exhibit, which command would you add to the existing configuration to enable remote CLI access?
Which two statements are correct regarding Layer 2 network switches? (Choose two.)