Get Full Version of the Exam
http://www.EnsurePass.com/JN0-102.html
Question No.371
What are three benefits of using a dynamic routing protocol? (Choose three.)
-
increased network security
-
decreased network latency
-
increased network availability
-
greater network scalability
-
lower administrative overhead
Correct Answer: CDE
Question No.372
What are the usable hosts on the 192.168.1.24/29 network?
-
.24 through .48
-
.24 through .32
-
.25 through .30
-
.35 through .31
Correct Answer: C
Explanation:
The minimum host address is 192.168.1.25, and the maximum host address is 192.168.1.30. References:
http://jodies.de/ipcalc?host=192.168.1.24amp;mask1=29amp;mask2=
Question No.373
Click the Exhibit button.
***Exhibit is Missing***
You have the policy configuration shown in the exhibit applied to your BGP peering. You find that your customer routes coming from the 10.1.1.0/24 network are being rejected.
Which command should be used to correct the problem?
-
[edit policy-options policy-statement my-policy] user@router# insert term 1 before term 2
-
[edit policy-options policy-statement my-policy] user@router# insert term 2 before term 1
-
[edit policy-options policy-statement my-policy] user@router# copy term 2 to term 0
-
[edit policy-options policy-statement my-policy] user@router# rename term 1 to term 3
Correct Answer: B
Question No.374
Which application would be suited for UDP traffic?
-
Web browsing
-
downloading a program
-
streaming television shows
-
on-line shopping
Correct Answer: C
Explanation:
UDP flows would be appropriate for streaming Video shows.
Question No.375
Which statement is true when using the allow command and deny command attributes when creating user permissions?
-
If you allow and deny the same commands, the Junos OS will fail the commit check.
-
If you allow and deny the same command, the allow command permissions take precedence over the deny command permissions.
-
If you specify a regular expression for allow and deny with two variants of a command, both will be ignored.
-
The all login class permission bits take precedence over allow and deny when a user issues the rollback command.
Correct Answer: B
Question No.376
Which two protocols are connection-oriented? (Choose two.)
-
Ethernet
-
PPP
-
TCP
-
UDP
Correct Answer: BC
Explanation:
Point-to-Point Protocol (PPP) and Transmission Control Protocol (TCP) are a connection- oriented protocols.
References: http://searchnetworking.techtarget.com/definition/connection-oriented
Question No.377
You recently uploaded a new software package to your Junos and you want to ensure that the file uploaded successfully by verifying the file size. In this scenario, which command should you use?
-
file checksum sha1
-
file compare
-
file list detail
-
file show encoding
Correct Answer: C
Question No.378
Click the Exhibit button.
Your configuration contains the static routes shown in the exhibit.
Which command will successfully remove the 166.74.67.131 static route?
-
delete routing-options static route 166.74.67.131/32 qualified-next-hop 166.113.123.37 interface irb.222
-
delete routing-options static route 166.74.67.131/32
-
delete routing-options static route 166.74.67.131/32 qualified-next-hop 166.113.123.37
-
delete routing-options static route 166.74.67.131/32 qualified-next-hop
Correct Answer: B
Question No.379
What are three Application Layer protocols? (Choose three.)
-
DNS
-
TCP
-
HTTP
-
FTP
-
ATM
Correct Answer: ACD
Question No.380
What are three acceptable modifiers to a terminating action of a firewall flter? (Choose three.)
-
policer
-
count
-
log
-
discard
-
syslog
-
Correct Answer: BCE
Get Full Version of the Exam
JN0-102 Dumps
JN0-102 VCE and PDF