单选题 Which command would allow you to login to FPC 1 to collect FPC specific logs?()
start shell fpc1
start shell tnp1
start shell tnp address 1
start shell pfe network fpc1
多选题 Which two statements are true regarding an Ethernet collision domain?()
If a switch is used, the collision domain includes all devices connected to the switch.
If a hub is used, the collision domain includes all devices connected to the hub.
If a hub is used, the collision domain is limited to each device and the hub.
If a switch is used, the collision domain is limited to each device and the switch.
单选题 What are the contents of a scheduler?()
A scheduler contains parameters that describe how a queue should be serviced.
A scheduler contains traffic that is ready to be transmitted.
A scheduler contains forwarding classes that allow traffic to be forwarded.
A scheduler contains a map between the classification of a packet and its forwarding class.
单选题 How can you reset your router or switch to factory defaults?()
reset configuration
load factory-default
load override default
set default configuration
多选题 For which two functions is the Routing Engine responsible?()
packet forwarding
queuing functions
routing protocol control
JUNOS software operation
单选题 What is used to segment larger networks into smaller networks?()
supernet masks
subnet masks
wildcard masks
route filtering
单选题 What is the last CoS process performed prior to a packet leaving a router?()
Rewrite Marker
Multifield Classifier
Policing
BA Classifier
单选题 Which statement is true about a forwarding table?()
It stores a subset of information from the routing table.
It contains routes learned from all protocols to a destination.
It provides a database for routes selected and placed into the routing table.
Every routing protocol maintains its own forwarding table.
单选题 By default, which routing table is used to store unicast IPv4 routes?()
inet.0
inet.1
inet.2
inet.3
多选题 Which three steps are part of the PPP CHAP 3-way handshake?()
The caller sends a challenge to the authenticator.
The authenticator sends a challenge to the caller.
The caller encrypts the challenge using a secret.
The caller sends a success message to the authenticator.
The authenticator encrypts the challenge using a secret.