The output of the show aaa domain-map displays the following information: Domain: isp1.com; virtual-router: vr1; loopback: 1 Domain: isp2.com; virtual-router: vr2; loopback: 1 Domain: none; virtual-router: vr3; loopback: 1 Domain: default; virtual-router: vr4; loopback: 1 The end user supplies a login name of joe with no domain name.
Which virtual router is responsible for authenticating this user?
A. vr1
B. vr2
C. vr3
D. vr4
In BGP MPLS VPNs, which router maintains VPN-specific routing tables, also known as VRFs?
A. P
B. CE
C. PE
D. SP
Which two statements are true about precedence values in policy? (Choose two.)
A. 1 is the default precedence.
B. A lower number is preferred.
C. A higher number is preferred.
D. 100 is the default precedence.
What are three characteristics of RIPv1? (Choose three.)
A. Performs classful routing.
B. Implements poison reverse.
C. Includes prefix length in updates.
D. Supports simple password authentication.
E. Broadcasts messages between neighbors.
Which CLI command disconnects all subscribers on an ATM PVC?
A. clear port 4/3.99
B. logout port 4/3.99
C. clear subscriber port 4/3.99
D. logout subscriber port 4/3.99
Which configuration is correct for a DHCP Relay Proxy?
A. set dhcp relay 1.1.1.1 set dhcp relay 2.2.2.2 set dhcp relay
B. set dhcp relay proxy set dhcp relay 1.1.1.1 set dhcp relay 2.2.2.2
C. set dhcp relay 1.1.1.1 proxy set dhcp relay 2.2.2.2
D. set dhcp relay 1.1.1.1 set dhcp relay 2.2.2.2 proxy
Which CLI command displays the status of a PPP over Ethernet subinterface?
A. show pppoe interface
B. show ppp int state up
C. show ip interface brief
D. show pppoe subinterface
An authentication request for a PPP over ATM client has been returned to the router with an address of
255.255.255.254. What does this indicate to the router?
A. A static IP address is used.
B. An unnumbered address is used.
C. The returned RADIUS address is used.
D. The IP address-pool configuration is used.
Which three statements describe macros on the ERX Edge Router? (Choose three.)
A. They prompt users for input.
B. They cannot prompt users for input.
C. They can be created on the router itself.
D. They are an embedded programming language.
E. They can be created on the user's workstation.
Which two features protect the ERX Edge Router from denial-of-service attacks? (Choose two.)
A. rate limiting of ICMP
B. RADIUS authorizations
C. source address validation
D. stateful firewall on the router
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Juniper exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JN0-130 exam preparations and Juniper certification application, do not hesitate to visit our Vcedump.com to find your solutions here.