Which command modifier would you use to see all possible completions for a specific command?
How many login classes are assignable to a user account?
Exhibit
{hold:node0}[edit]
root# set system root-authentication ?
Possible completions:
+ apply-groups Groups from which to inherit configuration data
+ apply-groups-except Don't inherit configuration data from these groups
encrypted-password Encrypted password string
load-key-file File (URL) containing one or more ssh keys
plain-text-password Prompt for plain text password (autoencrypted)
> ssh-dsa Secure shell (ssh) DSA public key string
> ssh-rsa Secure shell (ssh) RSA public key string
{hold:node0}[edit]
root# set system root-authentication plain-text-password
New password:
Retype new password:
{hold:node0}[edit]
root# commit and-quit
[edit interfaces]
'ge-0/0/0'
HA management port cannot be configured
error: configuration check-out failed
{hold:node0}[edit]
root#
You are unable to remotely access your Juniper device using the CLI.
Referring to the exhibit, which command would you add to the existing configuration to enable remote CLI access?
Exhibit
[edit]
user@routerl set interfaces ge-0/1/2 unit 0 family inet address 172.16.101.1/24 [edit]
user@router# commit check
configuration check succeeds
[edit]
user@router#
You need to configure interface ge-0/1/2 with an IP address of 172.16.100.1/24. You have accidentally entered 172.16.101.1/24 as shown in the exhibit.
Which command should you issue to solve the problem?
Which layer of the OSI model contains the IP address information?
You configured your system authentication order using the set authentication-order tacplus radius password command.
Which statement is correct in this scenario?
Which prompt indicates that you are using configuration mode?
Your network infrastructure transports data, voice, and video traffic. Users are complaining that voice and video calls are not performing to their expectations.
In this scenario, which technology would you implement to improve voice and video performance on your network?
You want to find out the chassis serial number of a Junos device.
Which command would display this information?
Which two common routing policy actions affect the flow of policy evaluation? (Choose two.)
Which process in the Junos OS is responsible for maintaining routing protocols and tables?
Which statement is correct when multiple users are configuring a Junos device using the configure private command?
You are configuring a firewall filter on a Juniper device.
In this scenario, what are two valid terminating actions? (Choose two.)
Which two external authentication methods does Junos support for administrative access? (Choose two.)
What are two attributes of the UDP protocol? (Choose two.)
Exhibit.
Referring to the exhibit, which routing configuration is required for these two users to access the remote server?
Which two statements are correct about firewall filters? (Choose two.)
You have configured some interfaces on a Junos device; however, you have not yet committed the configuration.
What happens if you issue the rollback 0 command in this scenario?
Click the Exhibit button.
How is traffic, sourced from 10.0.0.0/8, treated by the firewall filter shown in the exhibit?
Which two statements are correct about the empioyee@Ri> prompt? (Choose two.)
Which protocol would you configure to synchronize the time and date on a Junos device?
Which criteria does the Junos OS use to select an active route when two entries exist in the routing table?
Which two components are included in a transport header? (Choose two.)
Which character is used to filter the command output in the Junos CLI?
What are two link-state routing protocols? (Choose two.)
What will the request system configuration rescue save command do?
Which two statements are correct regarding Layer 2 network switches? (Choose two.)
Which two statements are correct about a Routing Engine? (Choose two.)
You issue the telnet 10.10.10.1 source 192.168.100.1 command.
Which two statements are correct in this scenario? (Choose two.)
You need to recover the root password on a Junos router without losing the current configuration settings.
Which three statements describe what you should perform in this scenario? (Choose three.)