Which two external authentication methods are supported by the Junos OS for user authentication? (Choose two.)
A. RADIUS
B. KERBEROS
C. IPsec
D. TACACS+
Which statement is true regarding the Junos OS?
A. Each process runs in its own protected memory space ensuring that one process cannot directly interfere with another.
B. Processes share memory space but use separate ASICs so that one process cannot directly interfere with another.
C. A central processor called the IP2 Chip dynamically assigns memory as process needs fluctuate.
D. The memory management daemon (mmd) is responsible for allocating new memory for processes as they request it.
Which two statements are true about firewall filter configurations? (Choose two.)
A. Multiple action modifiers can be included in the same term.
B. Only a single action modifier can be included in the same term.
C. The default term within a firewall filter uses the discard action.
D. The default term within a firewall filter uses the reject action.
You want to log in to the router and make a configuration change.
After logging in as the root user, what is the next command you must enter?
A. enable
B. configure
C. edit
D. cli
Which statement is true regarding the Junos OS?
A. The Junos kernel is based on the Solaris operating system.
B. The Junos kernel is based on the GNU Zebra operating system.
C. The Junos kernel is completely original and not based on any other operating system.
D. The Junos kernel is based on the FreeBSD UNIX operating system.
Which command will save the current active configuration as the rescue configuration?
A. user@router# save | rescue
B. user@router> request system configuration rescue save
C. user@router# save rescue configuration
D. user@router> file save rescue-configuration
Which two statements are correct about firewall filters in the Junos OS? (Choose two.)
A. Firewall filters are stateless.
B. Firewall filters are used to control routing information that is exchanged between devices.
C. Firewall filters are used to control traffic passing through the device.
D. Firewall filters can only be applied to traffic entering the device.
The IP address 192.168.100.1 belongs to which class of IP address space?
A. Class A
B. Class B
C. Class C
D. Class D
Which command do you use to identify the meaning of a syslog message?
A. help log messages
B. man log messages
C. man syslog
D. help syslog
You are configuring a new BGP neighbor and want to view the configuration of interface ge-0/0/0.42. Which command do you use to achieve this result?
A. [edit protocols bgp group external]user@router# set interfaces ge-0/0/0.42
B. [edit protocols bgp group external]user@router# edit show interfaces ge-0/0/0.42
C. [edit protocols bgp group external]user@router# top show interfaces ge-0/0/0.42
D. [edit protocols bgp group external]user@router# show interfaces ge-0/0/0.42
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Juniper exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JN0-102 exam preparations and Juniper certification application, do not hesitate to visit our Vcedump.com to find your solutions here.