It is impossible to pass Juniper JN0-102 exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed Juniper JN0-102 practice questions. You will get a surprising result by our Renovate Junos, Associate (JNCIA-Junos) practice guides.
Q131. What represents the binary equivalence of 96?
A. 11010100
B. 01100000
C. 11010000 D. 11101010
Answer: B
Q132. Which statement is true about terms in a policy?
A. A single term can be applied to a protocol or interface, independent of the policy.
B. Once configured, terms within a policy cannot be reordered.
C. The name of a term is limited to five characters.
D. A from statement is optional in a term.
Answer: D
Q133. Which command would you use to view interface usage details in real time?
A. show interfaces terse
B. show interfaces extensive
C. monitor interface traffic
D. monitor traffic interface
Answer: C
Q134. What are two examples of RE exception traffic? (Choose two.)
A. BGP updates that travel through the local router and are destined for a remote router.
B. OSPF hello packets that are sent from a remote router and are destined for the local router.
C. Telnet traffic that is sent from a remote host and is destined for the local router.
D. Telnet traffic that travels through the local router and is destined for a remote end host.
Answer: B,C
Q135. What are two valid match criteria for a routing policy? (Choose two.)
A. OSPF area ID
B. prefix list
C. port
D. time-to-live (TTL)
Answer: A,B
Q136. Which two external authentication methods are supported by the Junos OS for user authentication? (Choose two.)
A. RADIUS
B. KERBEROS
C. IPsec
D. TACACS+
Answer: A,D
Q137. What are two valid actions for a routing policy? (Choose two.)
A. discard
B. next policy
C. accept
D. ignore
Answer: B,C
Q138. Which command gracefully shuts down the Junos OS?
A. request system reboot
B. request system logout
C. request system halt
D. restart gracefully
Answer: C
Q139. -- Exhibit – -- Exhibit --
Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.
Which firewall filter configuration do you use?
A. [edit firewall family inet filter STOP-MAL-USER]
user@router# show
term one {
from {
source-address {
200.200.200.0/24;
}
destination-address {
100.100.100.10/32;
}
protocoltcp;
destination-port http;
}
then accept;
}
term two {
then {
reject;
}
}
B. [edit firewall family inet filter STOP-MAL-USER]
user@router# show
term one {
from {
source-address {
100.100.100.0/24;
}
destination-address {
200.200.200.1/32;
}
protocoltcp;
destination-port http;
}
then accept;
}
term two {
then {
reject;
}
}
C. [edit firewall family inet filter STOP-MAL-USER]
user@router# show
term one {
from {
source-address {
100.100.100.0/24;
}
destination-address {
200.200.200.1/32;
}
protocoltcp;
destination-port http;
}
then reject;
}
term two {
then {
accept;
}
}
D. [edit firewall family inet filter STOP-MAL-USER]
user@router# show
term one {
from {
source-address {
200.200.200.0/24;
}
destination-address {
100.100.100.10/32;
}
protocoltcp;
destination-port http;
}
then reject;
}
term two {
then {
accept;
}
}
Answer: D
Q140. -- Exhibit --user@router> show route protocol static
inet.0: 15 destinations, 15 routes (15 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
99.0.0.0/17 *[Static/5] 00:00:11 >to 10.1.1.2 via ge-0/0/1.0 99.0.0.0/19 *[Static/5] 00:00:11 >to 10.1.2.2 via ge-0/0/2.0
99.0.0.0/24 *[Static/5] 00:00:11 >to 10.1.3.2 via ge-0/0/3.0 99.0.0.0/26 *[Static/5] 00:00:11 >to 10.1.4.2 via ge-0/0/4.0 -- Exhibit --
In the exhibit, there are four static routes that route traffic through different interfaces.
Which interface does the router use if traffic is sent to the 99.0.0.1 destination?
A. ge-0/0/1
B. ge-0/0/2
C. ge-0/0/3
D. ge-0/0/4
Answer: D