|
Question 1. Which multicast address does RIPv2 use for route updates by default? A. 224.0.0.2 B. 224.0.0.5 C. 224.0.0.9 D. 255.255.255.255 Answer: C Question 2. What are three methods for managing a Juniper Enterprise Router? (Choose three.) A. CLI B. SDX C. SAP D. J-Web E. J-Config Answer: A, B, D Question 3. Which IGP should you use to achieve scalability in a large enterprise network using Juniper enterprise routers? A. RIP B. BGP C. OSPF D. EIGRP Answer: C Question 4. Which configuration statement allows local non-root users access to the router only when the RADIUS server is unreachable? A. [edit] system { authentication-order radius; } B. [edit] system { authentication-order [ radius password ]; } C. [edit] system { authentication-order [ radius if-authenticated ]; } D. [edit] system { authentication-order [ radius local ]; } Answer: A Question 5. Which two statements about the Adaptive Services PIC are true? (Choose two.) A. The Adaptive Services PIC supports the Layer 3 service package by default. B. The Adaptive Services PIC is required when using the secure shell to access an M-series router. C. The Adaptive Services PIC can be configured for the Layer 2 and Layer 3 service packages simultaneously. D. The Adaptive Services PIC can be configured for either the Layer 2 or the Layer 3 service package but not both at the same time. Answer: A, D Question 6. What are two benefits of MLPPP? (Choose two.) A. Cost-efficient solution when incrementing bandwidth. B. Provides for fail over when the primary link goes down. C. Evenly distributes traffic over participating member links. D. Guarantees that the link will remain up during failure scenarios. Answer: A, C Question 7. Which major J-Web menu should you use to upgrade the JUNOS software on the router? A. Monitor B. Manage C. Diagnose D. Configuration Answer: B Question 8. How are multiple policies evaluated within the JUNOS software? A. alphabetically B. as an ordered list C. in a round robin manner D. numerically from lowest to highest Answer: B Question 9. Which statement is true about accessing a Juniper enterprise router using a Web browser? A. J-series routers are accessible by default. B. M7i and M10i routers are accessible by default. C. You need to install a license before accessing a J-series router. D. You need to enable the HTTP service on M7i, M10i, and J-series routers before accessing them. Answer: A Question 10. What are two ways to create a rescue configuration on a J-series router? (Choose two.) A. Use the J-Web System > Rescue menu. B. Use the J-Web Configuration > Rescue menu. C. Issue the configure rescue save command. D. Issue the request system configuration rescue save command. Answer: B, D
|
Question 1. Which advanced feature of the XIV Storage System eliminates the need for write-through mode? A. Redundant UPS B. Active/Active topology C. Data Striping D. Distributed Cache Answer: D Question 2. Which table contains the location of the physical data? A. Volume table B. Partition table C. Data table D. Distribution table Answer: B Question 3. An XIV event indicates that usage of a thin provisioned storage pool is at 90%. There is plenty of capacity left in the system. What should the system administrator do to the pool? A. Nothing B. Resize the soft capacity C. Resize hard capacity D. Extend the volume Answer: C Question 4. What are two unique benefits of thin provisioning on the XIV System? (Choose two.) A. Volumes can easily be moved between storage pools B. Reclaim capacity that is no longer in use after data migration C. Limit the storage expense to the actual capacity used D. East to resize the volume 2 E. Provides quota management Answer: B, C Question 5. What describes the XIV System strategy for new generation hardware upgrades? A. The XIV system architecture allows upgrading to new modules non-disruptively B. XIV System firmware version updates are automatic C. An XIV system administrator will perform an update to the new product release non disruptively D. The XIV system is the only product that does dynamic data migration between systems Answer: A, C Question 6. What are two advantages of the recommended multipath drivers over first generation multipath drivers? (Choose two.) A. They allow multi-vendor storage support B. HBA vendor-supplied multi-path software is available and mature C. They provide superior performance via next-generation fibre hannel D. They allow for integration with other network management tools E. They do NOT cost extra Answer: A, E Question 7. What are two limitations of Hitachi USP-V snapshots as compared to XIV? (Choose two.) A. There is a maximum volume size that can be snapped B. RAID 1 arrays cannot be snapped C. Additional volume must be the same size as the source D. Only one snapshot can be taken of a volume E. A snapshot of a snapshot cannot be taken Answer: A, E Question 8. If the customer wants to snap a 1 TB volume on an XIV System, how much space needs to be reserved for the snapshot target? A. None B. 150 GB Minimum C. 15% of source is the default D. Depends on the change rate Answer: A Question 9. An administrator is migrating data from legacy storage to an XIV System. What is the behavior of the host systems during this process? A. They access data at half their normal speed B. They function normally C. Their applications are suspended D. They are shut down Answer: B Question 10. How does the XIV System rapidly return to full redundancy after disk failures? A. The XIV System's data module uses cache and processor to calculate parity for disks in the drawer B. The XIV System's data module uses SMART data from the drive to begin proactive rebuild on a spare disk in the module C. The XIV System uses all disks to rebuild the failed disk using spare capacity throughput the system D. The XIV System quickly identifies the failed disk and starts rebuild on a spare disk in a separate data module Answer: C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.