Which statement is true?
You are configuring CoS classifiers and want to use both BA and MF classification. After
applying the configuration, you realize that the classifiers have a conflict. Which statement is
true?
Which configuration statement will accomplish this task?
On your EX Series switch you must configure a delay buffer for the best effort queue
scheduler named BE-sch which restricts the buffer usage to only 25 percent of the available
buffer size. Which configuration statement will accomplish this task?
Which Junos command can help verify connectivity in the network?
A user complains about connectivity problems from their IP address (10.1.1.87) to a server
(10.65.1.100). Which Junos command can help verify connectivity in the network?
which two scenarios would the port authentication move back to 802.1X?
Port authentication falls back to Captive Portal. In which two scenarios would the port
authentication move back to 802.1X? (Choose two.)
Which protocol meets this requirement?
A network routes IPv4 traffic only. You want to add IPv6 to the network, but you must use a
single IGP for both IPv4 and IPv6 traffic. Which protocol meets this requirement?
Which protocol should you enable on the EX Series switch to address this condition in the future?
A Layer 2 forwarding loop occurred on your network during a scheduled maintenance
period. You must prevent this behavior in the future. Which protocol should you enable on
the EX Series switch to address this condition in the future?
Which command allows this access?
You have implemented 802.1X authentication in your Layer 2 network and you have only a
single RADIUS server. You are asked to ensure that if the RADIUS server becomes
unreachable or fails, users connected to the ge-0/0/0 port are still able to reach the Internet
using a predefined guest VLAN. Which command allows this access?
Which option is a valid IPv6 multicast address?
Which option is a valid IPv6 multicast address?
Which 802.1X authentication protocol is required?
A company is deploying a new 802.1X port-based security infrastructure to allow users to
access resources through wired Ethernet ports. However they recently deployed an RSA
token-based system for users to connect remotely. The network administrator wants to
reuse the same security database for 802.1X port-based security. Which 802.1X
authentication protocol is required?
Which protocol reachability is advertised by OSPFv2?
Which protocol reachability is advertised by OSPFv2?