Exam4Training

Juniper JN0-105 Junos, Associate (JNCIA-Junos) Online Training

Question #1

How many login classes are assignable to a user account?

  • A . 3
  • B . 2
  • C . 4
  • D . 1

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Junos OS supports multiple login classes that can be assigned to user accounts, allowing for different levels of access and permissions. The correct answer is C, 4. These classes include "super-user," "read-only," "operator," and "unauthorized." Each class provides a different level of access to the Junos device, ranging from full configuration and operational command privileges to limited access for monitoring and viewing configurations.

Question #2

You are asked to view the real-time usage statistics for the busiest interfaces on a device running Junos OS.

Which command will achieve this task?

  • A . monitor traffic absolute-sequence
  • B . monitor interface traffic
  • C . monitor traffic
  • D . show interfaces extensive

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

To view real-time usage statistics for the busiest interfaces on a device running Junos OS, the correct command is B, "monitor interface traffic." This command provides a dynamic, real-time view of the traffic flowing through the interfaces, allowing administrators to quickly identify and monitor the busiest interfaces on the device.

Question #3

Which type of device uses the destination IP address to forward packets?

  • A . Layer 3 router
  • B . Layer 2 switch
  • C . repeater
  • D . hub

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

A Layer 3 router uses the destination IP address to forward packets. The correct answer is A. Routers operate at Layer 3 of the OSI model and make forwarding decisions based on IP addresses. They are responsible for routing packets across different networks by examining the destination IP address contained in the packet’s header.

Question #4

You have just increased the MTU size of interface ge-0/0/0 and committed the configuration.

Which command would help you identify the applied MTU change?

  • A . monitor interface ge-0/0/0
  • B . monitor traffic interface ge-0/0/0
  • C . show interfaces ge-0/0/0 terse
  • D . show interfaces ge-0/0/0

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

After increasing the MTU size of an interface and committing the configuration, the command to verify the applied MTU change is D, "show interfaces ge-0/0/0." This command displays detailed information about the interface, including the current MTU size, making it the best choice for verifying the applied changes.

Question #5

When considering routing policies, which two statements are correct? (Choose two.)

  • A . Routing policies are applied to interfaces as input or export filters.
  • B . An import routing policy for BGP determines which received prefix advertisements are placed in the routing information base.
  • C . Policy terms are evaluated from top to bottom with action taken on the first match found.
  • D . Policy terms are evaluated from top to bottom with the most restrictive action taken of all the matching terms.

Reveal Solution Hide Solution

Correct Answer: BC
BC

Explanation:

Routing policies in Junos OS are crucial for controlling route advertisements and path selection. The correct answers are B and C. An import routing policy for BGP determines which received prefix advertisements are placed in the routing information base (RIB), and policy terms are evaluated from top to bottom, with action taken on the first match found. This sequential evaluation allows for precise control over routing decisions.

Question #6

When considering routing tables and forwarding tables, which two statements are correct? (Choose two.)

  • A . The routing table is used by the RE to select the best route.
  • B . The forwarding table stores all routes and prefixes from all protocols.
  • C . The forwarding table is used by the RE to select the best route.
  • D . The routing table stores all routes and prefixes from all protocols.

Reveal Solution Hide Solution

Correct Answer: AD
AD

Explanation:

The routing table and forwarding table play distinct roles in a Junos OS device. The correct answers are A and D. The routing table (A) is used by the Routing Engine (RE) to select the best route among all the learned routes, while the routing table (D) stores all routes and prefixes learned from all routing protocols. The forwarding table, in contrast, contains only the active routes chosen by the RE and is used by the Packet Forwarding Engine for actual packet forwarding.

Question #7

What will the request system configuration rescue save command do?

  • A . It saves the most recently committed configuration as the rescue configuration.
  • B . It saves the candidate configuration as the rescue configuration.
  • C . It saves a configuration version prior to the configuration most recently committed as the rescue configuration.
  • D . It activates the rescue configuration.

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

The "request system configuration rescue save" command in Junos OS saves the most recently committed configuration as the rescue configuration, making A the correct answer. This feature allows administrators to set a known good configuration that can be quickly reverted to in case of configuration errors or issues.

Question #8

An administrator configures a router’s interface with an IPv4 address and subnet mask. The administrator also confirms that this interface is in an up state.

In this scenario, which two route types are created on the local router? (Choose two.)

  • A . a static route
  • B . a local route
  • C . a dynamic route
  • D . a direct route

Reveal Solution Hide Solution

Correct Answer: BD
BD

Explanation:

When an interface on a router is configured with an IPv4 address and is in an up state, two types of routes are automatically created in the routing table: a local route and a direct route, making B and D the correct answers. The local route represents the interface’s IP address itself, indicating that the router can directly receive packets addressed to this IP. The direct route represents the subnet or network segment to which the interface is connected, indicating that the router can directly forward packets to destinations within this subnet.

Question #9

What is the maximum number of rollback configuration files that the Junos OS will store?

  • A . 65
  • B . 50
  • C . 25
  • D . 19

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Junos OS can store up to 50 rollback configuration files, making B the correct answer. These rollback files allow administrators to revert to previous configurations, providing a safety net that facilitates recovery from configuration errors or undesired changes

Question #10

You issue the telnet 10.10.10.1 source 192.168.100.1 command.

Which two statements are correct in this scenario? (Choose two.)

  • A . The telnet session will have a source address of 10.10.10.1.
  • B . The telnet session will have a destination address of 192.168.100.1.
  • C . The telnet session will have a destination address of 10.10.10.1.
  • D . The telnet session will have a source address of 192.168.100.1.

Reveal Solution Hide Solution

Correct Answer: CD
CD

Explanation:

In the given telnet command, "telnet 10.10.10.1 source 192.168.100.1," the destination address of the telnet session is 10.10.10.1, and the source address of the session is specified as 192.168.100.1, making C and D the correct answers. This command instructs the telnet client to use the specified source IP address when establishing the connection to the destination.

Question #11

What are two attributes of the UDP protocol? (Choose two.)

  • A . UDP is more reliable than TCP.
  • B . UDP is always slower than TCP.
  • C . UDP is best effort.
  • D . UDP is connectionless.

Reveal Solution Hide Solution

Correct Answer: CD
CD

Explanation:

UDP (User Datagram Protocol) is known for being connectionless (D) and providing best-effort delivery without the reliability mechanisms present in TCP (C). This means that UDP does not establish a connection before sending data and does not guarantee delivery, order, or error checking, making it faster but less reliable than TCP.

Question #12

You are creating a new policy to accept and redistribute routes into your IGP.

In this scenario, which match criteria would you use to identify the route prefixes to select?

  • A . instance
  • B . route-type
  • C . neighbor
  • D . route-filter

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

When creating a policy to accept and redistribute routes into your IGP, "route-filter" (D) is the match criteria used to identify specific route prefixes. Route filters enable you to specify which routes should be accepted, rejected, or modified based on their attributes, such as prefix length or value.

Question #13

Which two addresses are included in an Ethernet frame header? (Choose two.)

  • A . source IP address
  • B . source MAC address
  • C . destination IP address
  • D . destination MAC address

Reveal Solution Hide Solution

Correct Answer: BD
BD

Explanation:

An Ethernet frame header includes the source MAC address (B) and the destination MAC address (D). These addresses are used to deliver the frame from one Ethernet device to another directly connected Ethernet device on the same network segment. Ethernet frames do not include IP addresses, as those are part of the IP packet encapsulated within the Ethernet frame.

Question #14

You issue the monitor traffic interface ge-0/0/0 command.

What will this command accomplish?

  • A . It displays real-time statistics for interface ge-0/0/0.
  • B . It displays an operational summary of ge-0/0/0.
  • C . It displays the MTU and MAC address for ge-0/0/0.
  • D . It displays a packet capture on interface ge-0/0/0.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

The command "monitor traffic interface ge-0/0/0" (D) initiates a packet capture on the specified interface, allowing you to view the actual packets being transmitted and received. This is useful for troubleshooting and analyzing the traffic passing through the interface in real time.

Question #15

+ apply-groups-except Don’t inherit configuration data from these groups

{hold:node0}[edit]

root#

You are unable to remotely access your Juniper device using the CLI.

Referring to the exhibit, which command would you add to the existing configuration to enable remote CLI access?

  • A . load factory-default
  • B . set system root-authentication plain-text-password
  • C . set system services ssh
  • D . set system login idle-timeout 20

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

In Junos OS, remote access to the device’s CLI is commonly facilitated through Secure Shell (SSH), a protocol providing secure command-line access over an insecure network. The given exhibit indicates an attempt to set a root authentication password but does not show configuration for enabling remote access services. To enable SSH, which is not shown in the configuration snippet, you need to configure the device to accept SSH connections. This is done by enabling the SSH service within the system services hierarchy of the configuration. The correct command to add to the existing configuration for enabling remote CLI access via SSH is set system services ssh. This command activates the SSH service, allowing secure remote logins to the device.

Question #16

What is the primary system log file that is present in the default configuration of a Junos device?

  • A . kmd
  • B . messages
  • C . vrrp
  • D . jsrpd

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

In the default configuration of a Junos device, the primary system log file is "messages" (B). This log file contains a wide range of system messages, including operational status changes, system errors, and other critical information, making it a key resource for troubleshooting and monitoring the system’s health.

Question #17

What are two examples of exception traffic? (Choose two.)

  • A . transit packets
  • B . routing updates
  • C . log messages
  • D . ping to the local device

Reveal Solution Hide Solution

Correct Answer: BC
BC

Explanation:

Exception traffic includes traffic that is not simply forwarded by the router but requires special handling, such as routing updates (B) and log messages (C). These types of traffic are processed by the router’s control plane rather than just being forwarded through the data plane.

Question #18

You need to recover the root password on a Junos router without losing the current configuration settings.

Which three statements describe what you should perform in this scenario? (Choose three.)

  • A . Enter and commit the new root password.
  • B . Load the factory-default configuration.
  • C . Upgrade the Junos OS to the latest version.
  • D . Hit the space bar and enter recovery when prompted.
  • E . Use a console connection to reboot the device.

Reveal Solution Hide Solution

Correct Answer: ADE
ADE

Explanation:

To recover the root password on a Junos router without losing the configuration, you should (A) enter and commit the new root password once you have gained access to the system, (D) hit the space bar to interrupt the boot process and enter recovery mode when prompted during the boot process, and (E) use a console connection to reboot the device and access the bootloader prompt. These steps allow you to reset the root password while preserving the existing configuration.

Question #19

You configured your system authentication order using the set authentication-order tacplus radius password command.

Which statement is correct in this scenario?

  • A . A rejection by TACACS+ will prevent a login and bypass the other two authentication methods.
  • B . The password authentication will only be used if the TACACS+ and RADIUS servers fail to respond.
  • C . All authentication methods are used with the most restrictive permission set used.
  • D . The password authentication method is evaluated if the TACACS+ and RADIUS servers respond with a reject message.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

In the scenario where the system authentication order is set to "tacplus radius password," the correct statement is (B). If the TACACS+ and RADIUS servers are unreachable or fail to respond, the system will fall back to using password authentication. This ensures that users can still authenticate using locally stored passwords if external authentication servers are unavailable.

Question #20

Which three benefits occur when operating an interior gateway protocol (IGP) in an autonomous system (AS)? (Choose three.)

  • A . IGPs automatically distribute static routing information.
  • B . IGPs determine the optimal paths for data transmission.
  • C . IGPs learn prefixes in the global Internet’s routing table.
  • D . IGPs react very fast to network change.
  • E . IGPs learn everything about the subnets and best paths within your network.

Reveal Solution Hide Solution

Correct Answer: BDE
BDE

Explanation:

Operating an Interior Gateway Protocol (IGP) within an Autonomous System (AS) provides several benefits, including determining the optimal paths for data transmission (B), reacting quickly to network changes (D), and learning all about the subnets and best paths within the network (E). IGPs are designed to manage routing within a single AS efficiently, adapting to changes and ensuring data is routed through the best available paths.

Exit mobile version