Category Archives: Juniper Exam

2015 New Released Juniper JN0-633 Dumps Verison Free Use in Braindump2go

JUNIPER OFFICIAL NEWS: JN0-633 Exam Questions have been Updated Today! Get the Latest JN0-633 Dumps Full Version from Braindump2go Now!
2015 Timesaving Comprehensive Guides For Juniper JN0-633 Exam: Using Latst Released Braindump2go JN0-633 Practice Tests Questions, Quickly Pass JN0-633 Exam 100%! Following Questions and Answers are all the New Published By Juniper Official Exam Center!

Continue reading

2015 Braindump2go Juniper JN0-360 Practice Exam Dumps New Version From Juniper Official Exam Center

New Released Braindump2go Juniper JN0-360 Dumps PDF – Questions and Answers Updated with Juniper Official Exam Center! Visit Braindump2go and download our JN0-360 Exam Questions Now, Pass JN0-360 100% at your first time!

Exam Code: JN0-360
Exam Name: Juniper Networks Certified Internet Specialist SP (JNCIS-SP)
Certification Provider: Juniper

Continue reading

2014 Latest Juniper JN0-370 Exam Dump Free Download!

QUESTION 1
Node devices provide which three connectivity functions on QFabric systems? (Choose three.)

A.    Connect to servers
B.    Connect to Director groups
C.    Connect to storage devices
D.    Connect to external networks
E.    Connect to redundant server Node groups

Answer: ACD

Continue reading

2014 Latest Juniper JN0-332 Exam Dump Free Download!

QUESTION 1
Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?

A.    policy-rematch
B.    policy-evaluate
C.    rematch-policy
D.    evaluate-policy

Answer: A

Continue reading

2014 Latest Juniper JN0-314 Exam Dump Free Download!

QUESTION 1
On a MAG Series device, where is the preauthentication sign-in message configured?

A.    On the configuration page for the sign-in notification message
B.    On the wireless user realm authentication policy
C.    On the sign-in policy of the URL being used by the wireless users
D.    On the sign-in page of the URL being used by the wireless users

Answer: C

Continue reading

2014 Latest Juniper JN0-311 Exam Dump Free Download!

QUESTION 1
Which two configurations are made using the QoS Setup Wizard? (Choose two.)

A.    Assign applications to traffic classes.
B.    Use ToS/DSCP values for traffic classes.
C.    Exclude subnets from QoS management.
D.    Select dedicated vs. over-subscribed circuits.

Answer: AD

Continue reading

2014 Latest Juniper JN0-141 Exam Dump Free Download!

QUESTION 1
Which three statements are true about Host Checker? (Choose three.)

A.    Host Checker can collect information for use with MAC authentication.
B.    Host Checker can modify a role assignment immediately if a policy fails.
C.    Host Checker can be invoked before a user is allowed to sign in to the Infranet Controller.
D.    The Host Checker Integrity Measurement Verifier (IMV) works only with Odyssey Access Client.
E.    The Host Checker Integrity Measurement Collector (IMC) can run on Windows, Mac, and Linux systems.

Answer: B C E

Continue reading

2014 Latest Juniper JN0-130 Exam Dump Free Download!

QUESTION 1
If all OSPF routers on a broadcast network have the same OSPF priority, what parameter is used to determine the new BDR at the time of a DR failure?

A.    area ID
B.    router ID
C.    loopback address
D.    IP address of interface on broadcast network

Answer: B

Continue reading

2014 Latest Juniper JN0-101 Exam Dump Free Download!

QUESTION 1
What is the purpose of a network mask?

A.    It is used to identify the maximum hop count of a subnetwork
B.    It is used to identify an IP address as either private or public
C.    It is used to identify the network to which an IP address belongs
D.    It is used to identify the total number of bits present in an IP address

Answer: C

Continue reading

2014 Latest Juniper JN0-120 Exam Dump Free Download!

QUESTION 1
Which type of cable is required to access the router’s console port from a PC?

A.    modem
B.    Ethernet
C.    null modem
D.    straight-through

Answer: C

QUESTION 2
When using a 40 Gbps switch fabric, how much full duplex bandwidth is available to each slot?

A.    1.25 Gbps
B.    1.65 Gbps
C.    2.55 Gbps
D.    5.00 Gbps

Answer: A

QUESTION 3
What does the SRP distribute to the line modules when a routing table changes?

A.    updated RIB-Out
B.    link-state information
C.    an incremental update
D.    the complete routing table

Answer: D

QUESTION 4
Which three CLI modes are available on the ERX Edge Router? (Choose three.)

A.    User Exec
B.    Privileged Exec
C.    Super User Exec
D.    Global Configuration
E.    Private Configuration

Answer: ABD

QUESTION 5
The primary line module has failed and the spare line module is now active. What occurs, by default, when the primary line module returns to an operational status?

A.    The primary line module is inactive for five minutes and then becomes active.
B.    The primary line module is in standby mode, while the spare line module remains active.
C.    The primary line module becomes active immediately and the spare line module becomes inactive.
D.    The primary and spare line modules are active for five minutes, after which time the spare line module becomes inactive.

Answer: B

QUESTION 6
Where does Layer 2 de-encapsulation occur on the ERX Edge Router?

A.    on the SRP
B.    on the I/O adapter
C.    on the egress line module
D.    on the ingress line module

Answer: D

QUESTION 7
Which configuration command enables the router for SNMP?

A.    snmp-client
B.    snmp-server
C.    snmp-client enable
D.    snmp-server enable

Answer: B

QUESTION 8
Which CLI command copies a file called 4-0-0.rel from FTP server userpc to the router?

A.    get 4-0-0.rel userpc:4-0-0.rel
B.    get userpc:4-0-0.rel 4-0-0.rel
C.    copy 4-0-0.rel userpc:4-0-0.rel
D.    copy userpc:4-0-0.rel 4-0-0.rel

Answer: D

QUESTION 9
Which ERX Edge Router component is responsible for all packet processing and packet forwarding?

A.    I/O adapter
B.    line module
C.    shared memory fabric
D.    switch route processor

Answer: B

QUESTION 10
You would like to configure your PC’s IP address of 10.10.0.156 as an FTP host with a username of user and a password of mypass. Which configuration command accomplishes this goal?

A.    host userpc 10.10.0.156 ftp user mypass
B.    host userpc 10.10.0.156 tftp user mypass
C.    hostname userpc 10.10.0.156 ftp user mypass
D.    hostname userpc 10.10.0.156 tftp user mypass

Answer: A

QUESTION 11
Which two parameters are virtual router specific? (Choose two.)

A.    ATM PVC
B.    static routes
C.    IP interfaces
D.    encapsulations

Answer: BC

QUESTION 12
Beginning with software version 4-0-0.rel, how many virtual routers can be configured on the ERX Edge Router?

A.    32
B.    128
C.    256
D.    1000

Answer: D

QUESTION 13
Your ERX router is supporting 100 virtual routers. A specific line module supports IP interfaces in 5 virtual routers.
How many routing tables are maintained on that module?

A.    0
B.    1
C.    5
D.    100

Answer: C
Passing your Vmware VCAC510 Exam by using the latest Vmware VCAC510 Exam Demo Full Version: http://www.braindump2go.com/jn0-120.html

2014 Latest Juniper JN0-120 Exam Dump Free Download!

QUESTION 1
Which type of cable is required to access the router’s console port from a PC?

A.    modem
B.    Ethernet
C.    null modem
D.    straight-through

Answer: C

QUESTION 2
When using a 40 Gbps switch fabric, how much full duplex bandwidth is available to each slot?

A.    1.25 Gbps
B.    1.65 Gbps
C.    2.55 Gbps
D.    5.00 Gbps

Answer: A

QUESTION 3
What does the SRP distribute to the line modules when a routing table changes?

A.    updated RIB-Out
B.    link-state information
C.    an incremental update
D.    the complete routing table

Answer: D

QUESTION 4
Which three CLI modes are available on the ERX Edge Router? (Choose three.)

A.    User Exec
B.    Privileged Exec
C.    Super User Exec
D.    Global Configuration
E.    Private Configuration

Answer: ABD

QUESTION 5
The primary line module has failed and the spare line module is now active. What occurs, by default, when the primary line module returns to an operational status?

A.    The primary line module is inactive for five minutes and then becomes active.
B.    The primary line module is in standby mode, while the spare line module remains active.
C.    The primary line module becomes active immediately and the spare line module becomes inactive.
D.    The primary and spare line modules are active for five minutes, after which time the spare line module becomes inactive.

Answer: B

QUESTION 6
Where does Layer 2 de-encapsulation occur on the ERX Edge Router?

A.    on the SRP
B.    on the I/O adapter
C.    on the egress line module
D.    on the ingress line module

Answer: D

QUESTION 7
Which configuration command enables the router for SNMP?

A.    snmp-client
B.    snmp-server
C.    snmp-client enable
D.    snmp-server enable

Answer: B

QUESTION 8
Which CLI command copies a file called 4-0-0.rel from FTP server userpc to the router?

A.    get 4-0-0.rel userpc:4-0-0.rel
B.    get userpc:4-0-0.rel 4-0-0.rel
C.    copy 4-0-0.rel userpc:4-0-0.rel
D.    copy userpc:4-0-0.rel 4-0-0.rel

Answer: D

QUESTION 9
Which ERX Edge Router component is responsible for all packet processing and packet forwarding?

A.    I/O adapter
B.    line module
C.    shared memory fabric
D.    switch route processor

Answer: B

QUESTION 10
You would like to configure your PC’s IP address of 10.10.0.156 as an FTP host with a username of user and a password of mypass. Which configuration command accomplishes this goal?

A.    host userpc 10.10.0.156 ftp user mypass
B.    host userpc 10.10.0.156 tftp user mypass
C.    hostname userpc 10.10.0.156 ftp user mypass
D.    hostname userpc 10.10.0.156 tftp user mypass

Answer: A

QUESTION 11
Which two parameters are virtual router specific? (Choose two.)

A.    ATM PVC
B.    static routes
C.    IP interfaces
D.    encapsulations

Answer: BC

QUESTION 12
Beginning with software version 4-0-0.rel, how many virtual routers can be configured on the ERX Edge Router?

A.    32
B.    128
C.    256
D.    1000

Answer: D

QUESTION 13
Your ERX router is supporting 100 virtual routers. A specific line module supports IP interfaces in 5 virtual routers.
How many routing tables are maintained on that module?

A.    0
B.    1
C.    5
D.    100

Answer: C
Passing your Vmware VCAC510 Exam by using the latest Vmware VCAC510 Exam Demo Full Version: http://www.braindump2go.com/jn0-120.html

2014 Latest Juniper JN0-643 Exam Demo Free Download!

QUESTION 1
Which command prevents Layer 2 loops if the switch stops receiving spanning-tree keepalives on port ge-1/0/1?

A.    [edit protocols rstp]
user@switch# show
interface ge-1/0/1 {
  bpdu-block;
}
B.    [edit protocols layer2-control]
user@switch# show
interface ge-1/0/1 {
  bpdu-time-out-action {
    block;
    alarm;
  }
}
C.    [edit protocols layer2-control]
user@switch# show
bpdu-block {
  interface ge-1/0/1;
}
D.    [edit protocols rstp]
interface ge-1/0/1
{
  no-root-port;
}

Answer: D

QUESTION 2
Click the Exhibit button.
 clip_image001
You are attaching into an EX Series switch-1a legacy IP phone that does not support LLDP-MED, but does allow configuration using DHCP, as shown in the exhibit.
Your existing network QoS policies dictate that VoIP traffic must traverse over VLAN 10.
Which two actions put VoIP traffic onto VLAN 10? (Choose two.)

A.    Configure protocols cdp on switch-1.
B.    Manually configure the voice VLAN on the IP phone.
C.    Configure vlan 1 under forwarding-options bootp.
D.    Configure interface ge-0/0/5 under forwarding-options bootp.

Answer: BD

QUESTION 3
What are three types of port designation specific to Private VLANs? (Choose three.)

A.    Promiscuous ports
B.    Transparent ports
C.    PVLAN trunk ports
D.    Designated ports
E.    Isolated ports

Answer: ACE

QUESTION 4
Click the Exhibit button.
 clip_image001[4]
Looking at the output in the exhibit, why is the BGP neighbor not in Established state?

A.    BGP Refresh is not supported.
B.    Multihop is not configured.
C.    The peer address is not reachable.
D.    Authentication is configured.

Answer: B

QUESTION 5
Which two statements about MVRP on EX Series switches are true? (Choose two.)

A.    MVRP can add VLANs on access interfaces.
B.    MVRP can add VLANs on trunk interfaces.
C.    MVRP adds VLANs on MVRP-enabled interfaces by default.
D.    MVRP is in transparent mode on MVRP-enabled interfaces by default.

Answer: BC

QUESTION 6
Your customer has five office locations.
Each office location has 20 VLANs configured, one for each department.
Your engineering team has recently secured a government contract with strict regulations which require that engineers be placed into separate workgroups.
These workgroups cannot communicate with each other.
Without changing the primary VLAN assignments, which JUNOS feature meets this requirement with minimal configuration?

A.    Create a series of firewall filters to block users in each workgroup.
B.    Configure a Private VLAN and assign each workgroup a secondary VLAN.
C.    Configure Virtual Private LAN Service to isolate broadcast domain.
D.    Turn off the default BUM (Broadcast, unknown, multicast) flooding mode.

Answer: B

QUESTION 7
Click the Exhibit button.
 clip_image001[6]
In the exhibit, switches S1, S2, and S3 have Q-in-Q tunneling configured between Site 1 and Site 2.
Which configuration on switch S1 allows Site 1 and Site 2 to exchange Cisco Discovery Protocol (CDP), but blocks VLAN Trunking Protocol (VTP) between Site 1 and Site 2?

A.    {master:0}[edit vlans provider-vlan]
user@S1# set dot1q-tunneling layer2-protocol-tunneling cdp
B.    {master:0}[edit vlans provider-vlan]
user@S1# set dot1q-tunneling l2tp cdp
C.    {master:0}[edit vlans provider-vlan]
user@S1# set dot1q-tunneling layer2-protocol-tunneling deny vtp
D.    {master:0}[edit vlans provider-vlan]
user@S1# set dot1q-tunneling l2tp deny vtp

Answer: A

QUESTION 8
A coffee shop offering free Internet service to customers wants to implement the following security policies:
1. Every customer must agree to a set of terms and conditions before accessing the Internet.
2. Log out customers that are logged in for more than one hour.
3. Log out customers that are idle for more than 5 minutes.
4. Authenticate employee desktop computers with known hardware addresses in the office of the coffee shop to access the Internet without the above restrictions.
The following configuration has been applied to the switch:
set access radius-server 172.16.14.26 port 1812
set access radius-server 172.16.14.26 secret Am@zingC00f33
set access profile dot1x authentication-order radius
set access profile dot1x radius authentication-server 172.27.14.226
What would you add to implement these policies?

A.    set protocols dot1x authenticator interface ge-0/0/12.0 supplicant multiple
set protocols dot1x authenticator interface ge-0/0/12.0 mac-radius
set protocols dot1x authenticator authentication-profile-name dot1x
set services captive-portal authentication-profile-name dot1x
set services captive-portal interface ge-0/0/12.0
set services captive-portal secure-authentication https
set services captive-portal custom-options header-message “Welcome to Our Coffee Shop”
set services captive-portal custom-options banner-message “Terms and Conditions of Use”
B.    set protocols dot1x authenticator interface ge-0/0/12.0 supplicant multiple
set protocols dot1x authenticator authentication-profile-name dot1x
set services captive-portal authentication-profile-name dot1x
set services captive-portal interface ge-0/0/12.0
set services captive-portal secure-authentication https
set services captive-portal custom-options header-message “Welcome to Our Coffee Shop”
set services captive-portal custom-options banner-message “Terms and Conditions of Use”
C.    set protocols dot1x authenticator interface ge-0/0/12.0 supplicant multiple
set protocols dot1x authenticator interface ge-0/0/12.0 mac-radius
set protocols dot1x authenticator authentication-profile-name dot1x
set services captive-portal authentication-profile-name dot1x
set services captive-portal interface ge-0/0/12.0
set services captive-portal interface ge-0/0/12.0 idle-timeout 300
set services captive-portal interface ge-0/0/12.0 user-timeout 3600
set services captive-portal secure-authentication https
set services captive-portal custom-options header-message “Welcome to Our Coffee Shop”
set services captive-portal custom-options banner-message “Terms and Conditions of Use”
D.    set protocols dot1x authenticator interface ge-0/0/12.0 supplicant multiple
set protocols dot1x authenticator interface ge-0/0/12.0 mac-radius
set protocols dot1x authenticator interface ge-0/0/12.0 idle-timeout 300
set protocols dot1x authenticator interface ge-0/0/12.0 user-timeout 3600
set protocols dot1x authenticator authentication-profile-name dot1x
set services captive-portal authentication-profile-name dot1x
set services captive-portal interface ge-0/0/12.0
set services captive-portal secure-authentication https
set services captive-portal custom-options header-message “Welcome to Our Coffee Shop”
set services captive-portal custom-options banner-message “Terms and Conditions of Use”

Answer: A

QUESTION 9
Click the Exhibit button.
 clip_image001[8]
In the PIM-SM network in the exhibit, all links in the topology have the same IGP metric configured.
Which link will not be on the RPT?

A.    R1-R4
B.    R3-R6
C.    R4-R5
D.    R5-R6

Answer: A

QUESTION 10
Click the Exhibit button.
 clip_image001[10]
In the exhibit, Site 1 is sending traffic on VLANs 100, 200, and 300.
The provider operating switch S1 must configure Q-in-Q tunneling to transport VLANs 100 and 200 to Site2.
The provider must configure switch S1 to block traffic received from site 1 on VLAN 300.
Which configuration accomplishes this goal?

A.    {master:0}[edit vlans pv200]
user@S1# show
vlan-id 200;
interface {
  ge-0/0/0.0;
  ge-0/0/1.0;
}
dot1q-tunneling {
  customer-vlans [ 100 200 ];
}
B.    {master:0}[edit vlans pv200]
user@S1# show
vlan-id [100 200];
interface {
  ge-0/0/0.0 {
    dot1q-tunneling {
      block-vlans 300;
    }
  }
  ge-0/0/1.0;
}
C.    {master:0}[edit vlans pv200]
user@S1# show
vlan-id 200;
interface {
  ge-0/0/0.0;
  ge-0/0/1.0;
}
dot1q-tunneling {
  block-vlans 300;
}
D.    {master:0}[edit vlans pv200]
user@S1# show
vlan-id 200;
interface {
  ge-0/0/0.0 {
    dot1q-tunneling {
      customer-vlans [ 100 200 ];
    }
  }
  ge-0/0/1.0;
}

Answer: A

QUESTION 11
Click the Exhibit button.
 clip_image001[12]
The four routers in the exhibit are participating in a multi-area OSPF topology.
Node B (in the upper right-hand corner) is an ASBR advertising an external route.
Node A (lower left-hand corner) receives the external route and begins to forward traffic to the ASBR.
How many hops will the packets take through this topology? (Do not count node A.)

A.    2
B.    3
C.    4
D.    5

Answer: C

QUESTION 12
Click the Exhibit button.
 clip_image001[14]
The phone connected to switch-1 in the exhibit cannot communicate with the rest of the network.
How do you solve this problem?

A.    Add the VLAN named voice as a member of the trunk on interface ge-0/0/12.0.
B.    Configure the voice VLAN on interface ge-0/0/6.0.
C.    Add interface ge-0/0/12.0 to the ethernet-switching-options voip hierarchy.
D.    Configure LLDP-MED for interface ge-0/0/12.0.

Answer: A

QUESTION 13
You are AS 6573.Which AS path regular expression matches only routes originated in your AS?

A.    “6573.*”
B.    “.*”
C.    “{“
D.    “^$”

Answer: D

QUESTION 14
Which protocol reachability is advertised by OSPFv2? (Choose two.)

A.    IPv4
B.    IPv5
C.    IPv6
D.    ISO

Answer: AD

QUESTION 15
Click the Exhibit button.
 clip_image002
You are using an IBGP route reflector within your network.
Your route reflector has received the 2001:1:2::/64 prefix, but it is not advertising the prefix to its cluster members.
After examining the route reflector, you notice the output shown in the exhibit.
Which configuration statement causes the route reflector to transmit the route to its IBGP peers?

A.    set protocols bgp group ibgpv6 advertise-inactive
B.    set protocols bgp group ibgpv6 accept-remote-nexthop
C.    set protocols bgp group ibgpv6 multipath
D.    set protocols bgp group ibgpv6 include-mp-next-hop

Answer: A

Passing your Juniper JN0-643 Exam by using the latest Juniper JN0-643 Exam Demo Full Version: http://www.braindump2go.com/jn0-643.html

2014 Latest Juniper JN0-533 Exam Demo Free Download!

QUESTION 1
Your ScreenOS device does not have a static IP address. You want to be able to access it using its FQDN. How would you implement this task?

A.    Configure a domain in DNS.
B.    Configure syslog.
C.    Configure SNMP.
D.    Configure DDNS.

Answer: D

QUESTION 2
You have just installed a new ScreenOS device in your network and you want only a select range of IP addresses to have administrative access to the device. Which choice will allow you to accomplish this?

A.    Configure a manager IP.
B.    Configure the management interface.
C.    Configure a management IP on the trust interface.
D.    Configure new system administrators.

Answer: A

QUESTION 3
A routing table contains an IBGP route for 192.168.0.0/24, a RIP route for 192.168.0.0/23, an OSPF route for 192.168.0.0/22, and a static route for 192.168.0.0/16. When the router receives traffic destined for 192.168.0.1, which route will the router use?

A.    the IBGP route
B.    the OSPF route
C.    the RIP route
D.    the static route

Answer: A

QUESTION 4
You are troubleshooting telnet traffic destined to IP address 10.10.10.1. You decide to run debug and want to set the flow filter. Which command will show only the telnet traffic going to the 10.10.10.1 address?

A.    ssg5-serial-> set ffilter dst-ip 10.10.10.1
ssg5-serial-> set ffilter dst-port 23
B.    ssg5-serial-> set ffilter dst-ip 10.10.10.1 dst-port 23
C.    ssg5-serial-> set ffilter dst-port 23
D.    ssg5-serial-> set ffilter dst-ip 10.10.10.1

Answer: B

QUESTION 5
You have enabled BGP on your ScreenOS device and configured a single EBGP peer. The CLI shows that the BGP connection is transitioning between the CONNECT and ACTIVE states, but never reaching the ESTABLISHED state. What are three reasons for this behavior? (Choose three.)

A.    The peer is blocking traffic destined for TCP port 179.
B.    The peer address is not configured correctly.
C.    The enable statement has not been configured for the peer.
D.    The peer AS number is not configured correctly.
E.    BGP has not been enabled on the virtual router.

Answer: ABD

QUESTION 6
You want to set up a last resort route and prevent route lookups in either the source-based routing table or the destination-based routing table. What should you do?

A.    Disable SIBR and create a default route in the trust-vr table using the null interface as the outgoing
interface with a higher metric than other routes.
B.    Disable SIBR and create a default route in the trust-vr table using the null interface as the outgoing
interface with a lower metric than other routes.
C.    Enable SIBR and create a default route in the SIBR table using the null interface as the outgoing
interface with a higher metric than other routes.
D.    Enable SIBR and create a default route in the SIBR table using the null interface as the outgoing
interface with a lower metric than other routes.

Answer: C

QUESTION 7
You have the following BGP configuration in place to establish a session with a remote peer over your ethernet4 interface.
set vrouter trust-vr protocol bgp 65000
set vrouter trust-vr protocol bgp enable
set vrouter trust-vr protocol bgp neighbor remote-as 65500
set vrouter trust-vr protocol bgp neighbor enable
Which additional statement is necessary to establish the session?

A.    set interface protocol bgp enable
B.    set interface ethernet4 bgp enable
C.    set vrouter trust-vr protocol bgp interface ethernet4
D.    set interface ethernet4 protocol bgp

Answer: D

QUESTION 8
You have only one public IP address available and you must allow external access to three servers on a DMZ network. Which two NAT types would allow you to accomplish your objective? (Choose two.)

A.    MIP
B.    VIP
C.    NAT-dst
D.    NAT-src

Answer: BC

QUESTION 9
Your ScreenOS device is configured with multiple NAT types.
What is the order of precedence in this situation?

A.    interface-based NAT -> VIP -> MIP -> policy-based NAT
B.    VIP -> MIP -> policy-based NAT -> interface-based NAT
C.    MIP -> VIP -> interface-based NAT -> policy-based NAT
D.    MIP -> VIP -> policy-based NAT -> interface-based NAT

Answer: D

QUESTION 10
You must translate a range of public IP addresses to a range of internal IP addresses. Which two mechanisms would you use to accomplish your objective? (Choose two.)

A.    MIP using masks
B.    VIP using masks
C.    policy-based NAT-dst
D.    policy-based NAT-src

Answer: AC

QUESTION 11
You enter the following commands:
snoop filter ip dst-ip 1.1.1.10
snoop filter ip src-ip 2.1.1.10
What is the net result of these settings?

A.    Only packets with both a dst-ip of 1.1.1.10 and a src-ip of 2.1.1.10 will be captured
B.    Packets that have either a dst-ip of 1.1.1.10 or packets with a src-ip of 2.1.1.10 will be captured
C.    The second command will be ignored since a second filter cannot be added until the first one has been deleted
D.    The second command you entered will overwrite the first command you entered so you will only capture traffic with a src-ip of 2.1.1.10

Answer: B
Passing your Juniper JN0-533 Exam by using the latest Juniper JN0-533 Exam Demo Full Version: http://www.braindump2go.com/jn0-533.html

2014 Latest Juniper JN0-360 Exam Demo Free Download!

QUESTION 1
Which OSPF LSA type is sent from the ABR to describe an ASBR that is in an area to which it is connected?

A.    Type 7
B.    Type 5
C.    Type 4
D.    Type 3

Answer: C

QUESTION 2
Click the Exhibit button. You are asked to configure a new external BGP peering. You have configured BGP on R1 as shown in the exhibit, however the BGP peering remains in Active state.
Which additional configuration is required on R1 to establish the BGP peering?
 clip_image002[4]

A.    Configure the local-address.
B.    Configure the BGP type as external.
C.    Remove the local-as statement.
D.    Remove the autonomous-system statement.

Answer: C

QUESTION 3
Which OSPF adjacency state is reached when a hello packet has been sent, but bidirectional communication has not been established?

A.    Down
B.    Init
C.    2-way
D.    ExStart

Answer: B

QUESTION 4
Based on the exhibit, which configuration will permit end-to-end routing through the GRE tunnel for R1?
 clip_image001[8]

A.    [edit]
user@R1# show routing-options static
route 12.168.2.1/32 next-hop gr-0/0/0.0;
route 172.20.111.0/24 next-hop 12.168.1.1;
B.    [edit]
user@R1# show routing-options static
route 12.168.2.1/32 next-hop gr-0/0/0.0;
route 172.20.111.0/24 next-hop 172..1.1;
C.    [edit]
user@R1# show routing-options static
route 12.168.2.1/32 next-hop 172..1.1;
route 172.20.111.0/24 next-hop gr-0/0/0.0;
D.    [edit]
user@R1# show routing-options static
route 12.168.2.1/32 next-hop 172..2.2;
route 172.20.111.0/24 next-hop 172..1.1;

Answer: C

QUESTION 5
Which two OSPF areas allow external routes? (Choose two.)

A.    backbone area
B.    not-so-stubby area
C.    stub area
D.    totally stubby area

Answer: AB

QUESTION 6
Which LSA packet types are originated only by an OSPF ABR router?

A.    Type 2 and Type 3
B.    Type 3 and Type 4
C.    Type 5 and Type 6
D.    Type 6 and Type 7

Answer: B

QUESTION 7
In an OSPF environment, which two configuration parameters are used to determine which router is the DR? (Choose two.)

A.    the router with the highest priority
B.    the router with the lowest priority
C.    the router with the highest RID
D.    the router with the lowest RID

Answer: AC

QUESTION 8
You have entered the show ospf route command and see routes with a metric type of EXT2.
What does this indicate?

A.    These routes are OSPF interarea routes.
B.    These routes have been redistributed into OSPF and are using a Type 2 metric.
C.    These routes are preferred over the same routes with an EXT1 metric.
D.    These routes are OSPF intra-area routes.

Answer: B

QUESTION 9
You want to verify the frequency and type of SPF calculations on your Junos device.
Which command displays this information?

A.    show ospf database | match log
B.    show spf log
C.    show ospf log
D.    show ospf statistics

Answer: C

QUESTION 10
You are troubleshooting an OSPF adjacency that is stuck in the ExStart state.
What would be the correct step to resolve the problem?

A.    Look for a mismatched IP subnet or mask.
B.    Determine whether the neighbor is a DR-Other.
C.    Determine whether the hello and dead intervals are the same on both sides.
D.    Review the MTU settings to ensure that they match.

Answer: D

QUESTION 11
You are asked to redistribute routes into OSPF.
Which action accomplishes this task?

A.    Create a redistribution policy and apply it as an export policy under the [edit protocols ospf area] hierarchy.
B.    Create a redistribution policy and apply it as an import policy in the [edit protocols ospf] hierarchy.
C.    Create a redistribution policy and apply it as an import or an export policy in the [edit protocols ospf] hierarchy.
D.    Create a redistribution policy and apply it as an export policy in the [edit protocols ospf] hierarchy.

Answer: D

QUESTION 12
You are configuring OSPF on a Junos device; however, you have not configured a router ID.
What is the default behavior in this situation?

A.    If the loopback is configured with a 127/8 address, it will be used.
B.    If the loopback is not configured, it will use the interface with the highest IP address.
C.    If the loopback is configured and does not have a usable address, the IP address associated with the first hardware interface is used.
D.    If you configure a dedicated management address and include that interface in OSPF, it will be
used as the router ID.

Answer: C

QUESTION 13
Which two statements correctly describe IS-IS adjacencies? (Choose two.)

A.    Level 1 adjacencies can form in the same (intra) area only.
B.    Level 2 adjacencies are formed between (inter) areas only.
C.    Level 2 adjacencies can be established either interarea or intra-area.
D.    Level 2 adjacencies can form within the same (intra) area only.

Answer: AC

QUESTION 14
Which IS-IS PDU is used to request a retransmission of a missing link-state packet?

A.    the complete sequence number PDU
B.    the partial sequence number PDU
C.    a hello PDU with a request PDU TLV specifying the missing LSP
D.    a hello PDU with a refresh PDU TLV requesting all LSPs

Answer: B
Passing your Juniper JN0-360 Exam by using the latest Juniper JN0-360 Exam Demo Full Version: http://www.braindump2go.com/jn0-360.html

2014 Latest Juniper JN0-355 Exam Demo Free Download!

QUESTION 1
What does Junos Pulse Collaboration provide?

A.    group instant messaging services
B.    Web-based meeting services
C.    corporate file sharing services
D.    conference call services

Answer: C

QUESTION 2
What does Secure Virtual Workspace (SVW) provide?

A.    a virtual desktop on a client desktop
B.    protected file storage on a remote server
C.    a protected workspace on a client virtual machine
D.    a protected workspace on the client desktop

Answer: B

QUESTION 3
Which platform supports the Junos Pulse Secure Access Service?

A.    MX Series
B.    SRX Series
C.    MAG Series
D.    EX Series

Answer: A

QUESTION 4
What are two valid Junos Pulse Secure Access Service clustering implementations? (Choose two.)

A.    passive/passive
B.    active/passive
C.    online/offline
D.    active/active

Answer: AC

QUESTION 5
The Junos Pulse client connects to which two Juniper Networks services? (Choose two.)

A.    Junos Pulse Secure Access Service
B.    Junos Pulse Access Control Service
C.    Unified Threat Management
D.    Intrusion Detection Prevention

Answer: CD

QUESTION 7
Which two server instances would be used as secondary authentication servers on the Junos Pulse Secure Access Service? (Choose two.)

A.    RADIUS server
B.    anonymous server
C.    Active Directory server
D.    certificate server

Answer: AC

QUESTION 8
Which two statements describe the functionality of the client standalone installer? (Choose two.)

A.    All Windows clients are available as standalone installers, except Host Checker.
B.    Juniper Installer Service client deployment requires administrative privileges.
C.    Juniper Installer Service client can be deployed using the automated Microsoft Systems Management
Server (SMS) service.
D.    Clients deployed using Juniper Installer Service require post-installation machine reboot.

Answer: BC
Passing your Juniper JN0-355 Exam by using the latest Juniper JN0-355 Exam Demo Full Version: http://www.braindump2go.com/jn0-355.html