Question 91
Click the Exhibit. A customer reports that they have recently lost connectivity to a remote site over a shared architecture.
Referring to the exhibit, what is the problem?
A. The authentication method or key has been changed.
B. The remote link is down.
C. The remote router has been powered off.
D. The remote site router has been configured for OSPF.
Question 92
Which two commands would you use to reset the candidate configuration to the active configuration? (Choose two.)
A. rollback 0
B. rollback 1
C. rollback 2
D. rollback
Question 93
Given the following configuration:
set system authentication-order [ tacplus ]
Which two statements are correct? (Choose two.)
A. If the TACACS+ server is available and rejects the username/password provided, the user is not allowed to access the device.
B. If the TACACS+ server is available and rejects the username/password provided, the local password database is checked.
C. If the TACACS+ server is not available, the user is not allowed to access the device.
D. If the TACACS+ server is not available, the local user database is checked.
Question 94
Which two keystrokes will auto-complete a command? (Choose two.)
A. Esc
B. Tab
C. Spacebar
D. End
Question 95
Which keystroke is used to auto-complete user-defined variables?
A. Spacebar
B. Home
C. Esc
D. Tab
Question 96
Routing policies contain which two type of statements? (Choose two.)
A. and
B. from
C. default
D. then
Question 97
Which command allows you to verify the syntax and consistency of your configuration without actually activating your configuration?
A. User Interfaces
B. commit verify
C. commit check
D. check commit
E. commit no-activate
Question 98
In your configuration, an interface contains multiple IP addresses belonging to the same subnet. You want to identify the IP address to use for packets sent to hosts on the same subnet. Which parameter would you use to accomplish this task?
A. relative
B. preferred
C. primary
D. patch
Question 99
You recently uploaded a new software package to your Junos device and you want to ensure that the file uploaded successfully by verifying the file size.
In this scenario, which command should you use?
A. file show encoding
B. file compare
C. file checksum sha1
D. file list detail
Question 100
Which two statements are correct about the inet.0 routing table? (Choose two.)
A. It stores information learned from routing protocols and other sources.
B. It is used for populating the forwarding policy.
C. It is used for populating the forwarding table.
D. It is used for populating the Ethernet switching table.