An administrator wants to set up a remote user authentication service for the many users that access a Juniper security device. In this scenario, what are two supported authentication protocols? (Choose two.)
Which two statements are correct about a Routing Engine? (Choose two.)
Which two statements about prefix lists in Junos are correct? (Choose two.)
Which Junos tool should you use to identify the path that packets take through the network to a destination?