PrepAway - Latest Free Exam Questions & Answers

Which configuration allows User A and User B access to the network, but prevents User C from accessing the net

Refer to the Exhibit.

In the exhibit, User A has authenticated using 802.1X. User B and User C have not authenticated.
The RADIUS server fails.Which configuration allows User A and User B access to the network, but
prevents User C from accessing the network?

PrepAway - Latest Free Exam Questions & Answers

A.
[edit protocols dot1x authenticator]
user@S1# set interface ge-0/0/0.0 server-fail use-cache
user@S1# set interface ge-0/0/1.0 server-fail permit
user@S1# set interface ge-0/0/2.0 server-fail use-cache

B.
[edit protocols dot1x authenticator]
user@S1# set interface ge-0/0/0.0 server-backup if-authenticated
user@S1# set interface ge-0/0/1.0 server-backup if-authenticated
user@S1# set interface ge-0/0/2.0 server-backup deny

C.
[edit protocols dot1x authenticator]
user@S1# set interface ge-0/0/0.0 server-backup if-authenticated
user@S1# set interface ge-0/0/1.0 server-backup permit
user@S1# set interface ge-0/0/2.0 server-backup deny

D.
[edit protocols dot1x authenticator]
user@S1# set interface ge-0/0/0.0 server-fail permit
user@S1# set interface ge-0/0/1.0 server-fail use-cache
user@S1# set interface ge-0/0/2.0 server-fail use-cache

Explanation:

3 Comments on “Which configuration allows User A and User B access to the network, but prevents User C from accessing the net

  1. Arlene Connin says:

    ATTENTION PLEASE!!! The JN0-643 exam has retired, and the new exam is JN0-647 test now!!!

    (15/Nov/2017 Updated) New JN0-647 Exam Questions:

    NEW QUESTION 13
    You created a firewall rule to protect the Routing Engine. After applying the rule, your OSPF adjacencies dropped. How would you solve this problem?

    A. Create a firewall term that allows IP protocol 89.
    B. Define a router ID under the [edit routing-options] hierarchy.
    C. Configure the loopback interface under the [edit protocols ospf] hierarchy.
    D. Apply the firewall filter to the physical ports.

    Answer: A

    NEW QUESTION 14
    What are two OSPF LSA types? (Choose two.)

    A. Stub
    B. Router
    C. Transit
    D. Network

    Answer: BD

    NEW QUESTION 15
    You are asked to merge a RIP network with your OSPF network. As a first step, you establish connectivity between the RIP network and the OSPF network. The RIP network connects to an NSSA area. Which two statements are true in this scenario? (Choose two.)

    A. To share RIP routes with the OSPF network, an export policy will be required on the ABR.
    B. To share RIP routes with the OSPF network, an export policy will be required on the ASBR.
    C. By default, external OSPF routes have a higher route preference than RIP routes.
    D. Be default, RIP routes have a higher route preference than external OSPF routes.

    Answer: BD

    NEW QUESTION 16
    Your campus EX9200 core devices are highly oversubscribed on bandwidth and reporting massive dropped packets. To immediately address the issue, you decide to implement shaping on all interfaces. Which action will accomplish?

    A. Apply the input-shape-rate 5G parameter to all interfaces under the [edit class-of service] hierarchy.
    B. Define a CoS input traffic control profile with the shape-rate 5G parameter and apply it to all interfaces.
    C. Define a CoS output traffic control profile with the shape-rate 5G parameter and apply it to all interfaces.
    D. Apply the shape-rate 5G parameter to all interfaces under the [edit class-of service] hierarchy.

    Answer: C

    NEW QUESTION 17
    What allows non-Web enabled devices to access the network on a port configured for captive portal?

    A. A MAC address white list can be configured on the switch to allow specific MAC addresses to bypass the captive portal process.
    B. LLDP can be used to query the type of device that is attempting to access the network, and predefined device types can be allowed to bypass the captive portal process.
    C. Captive portal can be configured to only prompt for credentials when HTTP or HTTPS traffic is requested on a port to allow on-HTTP enabled devices access to the network.
    D. Authentication credentials for specific devices can be preconfigured on the switch for automatic authentication.

    Answer: A

    NEW QUESTION 18
    Which two statements are true about PIM source-specific multicast (SSM)? (Choose two.)

    A. The receiver DR builds a source-base tree to the RP.
    B. S,G is always used.
    C. A Different group address must be used by each source.
    D. IGMPv3 is required.

    Answer: BD

    NEW QUESTION 19
    Which two statements about MVRP are correct? (Choose two.)

    A. MVRP monitors interfaces using VSTP and dynamically creates VLANs as necessary.
    B. MVRP PDUs are sent to other switches as periodic intervals.
    C. MVRP can propagate dynamic VLANs created on one switch to another switch.
    D. MVRP is enabled by adding trunk ports under the [edit protocols mvrp] hierarchy.

    Answer: BD

    NEW QUESTION 20
    Which three databases are used by the Dijkstra algorithm? (Choose three.)

    A. Tree database
    B. Link State database
    C. Candidate database
    D. MAC database
    E. Configuration database

    Answer: ABC

    NEW QUESTION 21
    A customer needs to pass Layer 2 protocols between sites. Which protocol or standard would be required to implement connectivity on EX4300, EX3400, and EX2300 devices?

    A. Q-in-Q
    B. IGMP
    C. VPLS
    D. OSPF

    Answer: A

    NEW QUESTION 22
    Which statement is correct about MSTP?

    A. MSTP enables mapping multiple independent spanning-tree instances onto one physical topology.
    B. MSTP enables dynamic discovery of Layer 2 neighbors.
    C. MSTP dynamically manages VLAN registration in a LAN.
    D. MSTP uses stacked VLAN tags to extend a Layer 2 Ethernet connection between multiple sites.

    Answer: A

    NEW QUESTION 23
    You configured static mode power management on an EX4300 to provide PoE power to telephone and access point equipment. Which statement is correct regarding the PoE power budget?

    A. Power is budgeted to devices on a first come, first served basis as devices are connected.
    B. The power budgeted will be based on the device class connected to each port.
    C. Power is budgeted to a port even if no device is connected to the port.
    D. The power budgeted to ports will adjust to how much power a device actually uses.

    Answer: C

    NEW QUESTION 24
    What information must you gather from the satellite device to provision a Junos Fusion Enterprise deployment on the aggregation device? (Choose two.)

    A. MAS address
    B. Serial number
    C. Software version
    D. Model number

    Answer: AB




    0



    0

Leave a Reply