Exhibit
{hold:node0}[edit] root# set system root-authentication ? Possible completions: + apply-groups Groups from which to inherit configuration data + apply-groups-except Don't inherit configuration data from these groups encrypted-password Encrypted password string load-key-file File (URL) containing one or more ssh keys plain-text-password Prompt for plain text password (autoencrypted) > ssh-dsa Secure shell (ssh) DSA public key string > ssh-rsa Secure shell (ssh) RSA public key string {hold:node0}[edit] root# set system root-authentication plain-text-password New password: Retype new password: {hold:node0}[edit] root# commit and-quit [edit interfaces] 'ge-0/0/0' HA management port cannot be configured error: configuration check-out failed {hold:node0}[edit] root#
You are unable to remotely access your Juniper device using the CLI.
Referring to the exhibit, which command would you add to the existing configuration to enable remote CLI access?
Answer : C
In Junos OS, remote access to the device's CLI is commonly facilitated through Secure Shell (SSH), a protocol providing secure command-line access over an insecure network. The given exhibit indicates an attempt to set a root authentication password but does not show configuration for enabling remote access services. To enable SSH, which is not shown in the configuration snippet, you need to configure the device to accept SSH connections. This is done by enabling the SSH service within the system services hierarchy of the configuration. The correct command to add to the existing configuration for enabling remote CLI access via SSH is set system services ssh. This command activates the SSH service, allowing secure remote logins to the device.
Which two common routing policy actions affect the flow of policy evaluation? (Choose two.)
Answer : A, C
In Junos OS routing policy evaluation, 'next policy' (A) and 'next term' (C) are common actions that affect the flow of policy evaluation. 'Next policy' directs the evaluation to the next policy in the sequence, whereas 'next term' moves the evaluation to the next term within the current policy, allowing for granular control over routing decisions.
Which Junos feature limits the amount of exception traffic that is sent from the PFE to the RE?
Answer : B
In Junos OS, a policer is a feature used to limit the rate of traffic flow in the network, including exception traffic sent from the Packet Forwarding Engine (PFE) to the Routing Engine (RE). Exception traffic consists of packets that cannot be processed by the PFE alone and require intervention by the RE, such as control packets or packets destined for the device itself. A policer can be configured to enforce bandwidth limits and drop or mark packets that exceed specified rate limits, thus protecting the RE from being overwhelmed by excessive exception traffic.
How many rescue configuration files are supported on a Junos device?
Answer : C
Junos OS supports only 1 rescue configuration file on a device. This rescue configuration is a safeguard feature that allows network administrators to revert to a known good configuration in case of a configuration error or issue, ensuring network stability.
In Junos OS, each device supports only one rescue configuration file. The rescue configuration is a specific configuration that can be saved and later retrieved if needed. This is used as a fallback configuration that you know works and can be applied in case of an emergency or if the current configuration has issues.
'You can create a rescue configuration file by using the request system configuration rescue save operational mode command. Each Junos OS device can have only one rescue configuration file.'
How many login classes are assignable to a user account?
Answer : D
https://www.juniper.net/documentation/us/en/software/junos/user-access-evo/user-access/topics/topic-map/junos-os-login-class.html#:~:text=You%20can%20define%20any%20number,to%20an%20individual%20user%20account.
In Junos OS, each user account can be assigned only one login class. Login classes in Junos OS define the permissions for users, controlling what they can access and modify within the system. This setup helps in maintaining a clear and secure access control mechanism.
Junos OS Documentation on User Accounts and Login Classes.
You issue the telnet 10.10.10.1 source 192.168.100.1 command.
Which two statements are correct in this scenario? (Choose two.)
Answer : C, D
In the given telnet command, 'telnet 10.10.10.1 source 192.168.100.1,' the destination address of the telnet session is 10.10.10.1, and the source address of the session is specified as 192.168.100.1, making C and D the correct answers. This command instructs the telnet client to use the specified source IP address when establishing the connection to the destination.
You configured your system authentication order using the set authentication-order tacplus radius password command.
Which statement is correct in this scenario?
Answer : B
In the scenario where the system authentication order is set to 'tacplus radius password,' the correct statement is (B). If the TACACS+ and RADIUS servers are unreachable or fail to respond, the system will fall back to using password authentication. This ensures that users can still authenticate using locally stored passwords if external authentication servers are unavailable.