How many usable host addresses are available in 181.74.94.235/21?

How many usable host addresses are available in 181.74.94.235/21?A . 2048B . 2044C . 1024D . 2046View AnswerAnswer: D

December 26, 2021 No Comments READ MORE +

Which command is used to replace a current configuration?

Which command is used to replace a current configuration?A . load replaceB . load patchC . load overrideD . load setView AnswerAnswer: C

December 26, 2021 No Comments READ MORE +

Which network mask do you use?

You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts. Which network mask do you use?A . /26B . /27C . /28D . /29View AnswerAnswer: C

December 26, 2021 No Comments READ MORE +

When a non-root user connects to a Junos device and successfully enters a username and password, they are immediately placed at which level?

When a non-root user connects to a Junos device and successfully enters a username and password, they are immediately placed at which level?A . UNIX shellB . user-level CLIC . configuration modeD . operational modeView AnswerAnswer: D

December 26, 2021 No Comments READ MORE +

Which of these commands can be used to discard changes made to candidate configuration? (Choose two)

Which of these commands can be used to discard changes made to candidate configuration? (Choose two)A . delete 0B . rollback 0C . deleteD . rollbackView AnswerAnswer: BD

December 26, 2021 No Comments READ MORE +

Referring to the exhibit, which command was issued to generate the output?

Exhibit: Referring to the exhibit, which command was issued to generate the output?A . show chassis environmentB . show chassis routing-engineC . show chassis fpcD . show chassis hardwareView AnswerAnswer: D

December 25, 2021 No Comments READ MORE +

Which statement is true about exception traffic?

Which statement is true about exception traffic?A . Exception traffic is automatically logged in /var/log/messages.B . Exception traffic requires a firewall filter before it can be acted upon.C . Exception traffic requires some form of special handling.D . Exception traffic passes through the local device.View AnswerAnswer: C

December 25, 2021 No Comments READ MORE +

What will the command ping 192.168.1.1 count 5 perform?

What will the command ping 192.168.1.1 count 5 perform?A . ICMP echo requests are sent to 192.168.1.1 for five secondsB . ICMP echo requests are sent to 192.168.1.1 until five responses are receivedC . ICMP echo requests are sent to 192.168.1.1 in five second intervalsD . ICMP echo requests are...

December 25, 2021 No Comments READ MORE +

Which command will satisfy this requirement?

You need to access a server on a subnet 172.0.46.0/24. The next-hop router is 10.0.4.2/30. A static route on the gateway has been configured to accomplish the task. You want to keep the static route from being redistributed into dynamic routing protocols. Which command will satisfy this requirement?A . set...

December 25, 2021 No Comments READ MORE +

Which two commands are used during the password recovery process?

Which two commands are used during the password recovery process?A . clear system loginB . boot -sC . recoveryD . delete system root-authenticationView AnswerAnswer: BC

December 25, 2021 No Comments READ MORE +