Which three steps are part of the root password recovery process? (Choose three.)
A. Reboot the device.
B. Run the recovery script.
C. Reset the root password.
D. Reset the user passwords.
E. Load factory-default configuration.
What is the role of route preference?
A. It is used as a tiebreaker when the same prefix is available through multiple protocols.
B. It is used to determine the preferred path to a given destination.
C. It is used to select the best route between multiple equal-cost paths.
D. It is used to select which routing table to use for forwarding.
23.15.0/24 *[Static/5] 00:01:36
>to 172.23.10.1 via ge-0/0/6.0
— Exhibit —
Users are unable to access resources in the 172.23.14.0/24 subnet.
Referring to the exhibit, which two actions would solve this problem? (Choose two.)
A. Configure a separate routing instance.
B. Configure a default static route.
C. Configure a static route to 172.23.14.0/24.
D. Configure the existing routes to resolve the indirect next hop.
What is the function of the aggregation tier in a traditional three tier Layer 2 network environment?
A. The aggregation tier interfaces with lower tier Layer devices and provides a high-speed interconnect with the north-bound WAN edge device.
B. The aggregation tier relays packets between the lower tier Layer 2 devices and functions as the gateway to the upper tier Layer 2 device.
C. The aggregation tier provides network connectivity to end-user devices and other hosts and enforces network access policy.
D. The aggregation tier connects to the Internet and with lower tier Layer 2 devices to provide Layer 3 gateway services for the network.
Which two statements are true regarding routing policy processing? (Choose two.)
A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.
B. Policies are evaluated from right to left as displayed in the Junos OS configuration file.
C. Polices are evaluated based on the order in which they are applied to a routing protocol.
D. Policy processing stops once the last statement in the policy is evaluated.
Which command would correctly define a router’s host-name?
A. # set ip host-name <name>
B. > set ip host-name <name>
C. # set system host-name <name>
D. > set system host-name <name>
Configure the hostname, using the set system host-name command.
 [email protected]# set system host-name newton-re0
You receive an alarm that your Junos device is experiencing problems regarding temperature.
Which two commands would you use to investigate this problem? (Choose two.)
A. show chassis hardware
B. show chassis temperature-thresholds
C. show chassis pic fpc-slot <value> pic-slot <value>
D. show chassis environment