[Free] 2019(Nov) EnsurePass Juniper JN0-102 Dumps with VCE and PDF 371-380

Get Full Version of the Exam

Question No.371

What are three benefits of using a dynamic routing protocol? (Choose three.)

  1. increased network security

  2. decreased network latency

  3. increased network availability

  4. greater network scalability

  5. lower administrative overhead

Correct Answer: CDE

Question No.372

What are the usable hosts on the network?

  1. .24 through .48

  2. .24 through .32

  3. .25 through .30

  4. .35 through .31

Correct Answer: C


The minimum host address is, and the maximum host address is References:


Question No.373

Click the Exhibit button.

***Exhibit is Missing***

You have the policy configuration shown in the exhibit applied to your BGP peering. You find that your customer routes coming from the network are being rejected.

Which command should be used to correct the problem?

  1. [edit policy-options policy-statement my-policy] user@router# insert term 1 before term 2

  2. [edit policy-options policy-statement my-policy] user@router# insert term 2 before term 1

  3. [edit policy-options policy-statement my-policy] user@router# copy term 2 to term 0

  4. [edit policy-options policy-statement my-policy] user@router# rename term 1 to term 3

Correct Answer: B

Question No.374

Which application would be suited for UDP traffic?

  1. Web browsing

  2. downloading a program

  3. streaming television shows

  4. on-line shopping

Correct Answer: C


UDP flows would be appropriate for streaming Video shows.

Question No.375

Which statement is true when using the allow command and deny command attributes when creating user permissions?

  1. If you allow and deny the same commands, the Junos OS will fail the commit check.

  2. If you allow and deny the same command, the allow command permissions take precedence over the deny command permissions.

  3. If you specify a regular expression for allow and deny with two variants of a command, both will be ignored.

  4. The all login class permission bits take precedence over allow and deny when a user issues the rollback command.

Correct Answer: B

Question No.376

Which two protocols are connection-oriented? (Choose two.)

  1. Ethernet

  2. PPP

  3. TCP

  4. UDP

Correct Answer: BC


Point-to-Point Protocol (PPP) and Transmission Control Protocol (TCP) are a connection- oriented protocols.

References: http://searchnetworking.techtarget.com/definition/connection-oriented

Question No.377

You recently uploaded a new software package to your Junos and you want to ensure that the file uploaded successfully by verifying the file size. In this scenario, which command should you use?

  1. file checksum sha1

  2. file compare

  3. file list detail

  4. file show encoding

Correct Answer: C

Question No.378

Click the Exhibit button.


Your configuration contains the static routes shown in the exhibit.

Which command will successfully remove the static route?

  1. delete routing-options static route qualified-next-hop interface irb.222

  2. delete routing-options static route

  3. delete routing-options static route qualified-next-hop

  4. delete routing-options static route qualified-next-hop

Correct Answer: B

Question No.379

What are three Application Layer protocols? (Choose three.)

  1. DNS

  2. TCP

  3. HTTP

  4. FTP

  5. ATM

    Correct Answer: ACD

    Question No.380

    What are three acceptable modifiers to a terminating action of a firewall flter? (Choose three.)

    1. policer

    2. count

    3. log

    4. discard

    5. syslog

Correct Answer: BCE

Get Full Version of the Exam
JN0-102 Dumps
JN0-102 VCE and PDF