Which statement is true?
You are configuring CoS classifiers and want to use both BA and MF classification. After applying
the configuration, you realize that the classifiers have a conflict.
Which statement is true?
Which configuration statement will accomplish this task?
On your EX Series switch you must configure a delay buffer for the best effort queue scheduler
named BE-sch which restricts the buffer usage to only 25 percent of the available buffer size.
Which configuration statement will accomplish this task?
Which Junos command can help verify connectivity in the network?
A user complains about connectivity problems from their IP address (10.1.1.87) to a server
(10.65.1.100).
Which Junos command can help verify connectivity in the network?
which two scenarios would the port authentication move back to 802.1X?
Port authentication falls back to Captive Portal.
In which two scenarios would the port authentication move back to 802.1X? (Choose two.)
Which protocol meets this requirement?
A network routes IPv4 traffic only. You want to add IPv6 to the network, but you must use a single
IGP for both IPv4 and IPv6 traffic.
Which protocol meets this requirement?
Which protocol should you enable on the EX Series switch to address this condition in the future?
A Layer 2 forwarding loop occurred on your network during a scheduled maintenance period. You
must prevent this behavior in the future.
Which protocol should you enable on the EX Series switch to address this condition in the future?
Which command allows this access?
You have implemented 802.1X authentication in your Layer 2 network and you have only a single
RADIUS server. You are asked to ensure that if the RADIUS server becomes unreachable or fails,
users connected to the ge-0/0/0 port are still able to reach the Internet using a predefined guest
VLAN.
Which command allows this access?
Which option is a valid IPv6 multicast address?
Which option is a valid IPv6 multicast address?
Which 802.1X authentication protocol is required?
A company is deploying a new 802.1X port-based security infrastructure to allow users to access
resources through wired Ethernet ports. However they recently deployed an RSA token-based
system for users to connect remotely. The network administrator wants to reuse the same security
database for 802.1X port-based security.
Which 802.1X authentication protocol is required?
Which protocol reachability is advertised by OSPFv2?
Which protocol reachability is advertised by OSPFv2?