Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

JN0-105 Questions and Answers

Question # 6

Click the Exhibit button.

Referring to the exhibit, what should be configured on R1 to advertise a default static route into OSPF?

A.

a firewall filter

B.

a routing policy

C.

a loopback interface

D.

a management interface

Full Access
Question # 7

Which command displays all IPv6 routes in the default routing instance?

A.

showroute table inet.0

B.

showroute table inet6.1

C.

showroute table inet.1

D.

showroute table inet6.0

Full Access
Question # 8

Which two common routing policy actions affect the flow of policy evaluation? (Choose two.)

A.

next policy

B.

community

C.

next term

D.

next hop

Full Access
Question # 9

What are two methods for navigating to configuration mode from an operational mode prompt? (Choose two.)

A.

Use the edit command.

B.

Use the quit command.

C.

Use the exit command.

D.

Use the configure command.

Full Access
Question # 10

Click the Exhibit button.

Referring the exhibit, what does the highlighted number indicate?

A.

route preference is 5

B.

hop count is 5

C.

cost is 5

D.

metric is 5

Full Access
Question # 11

You received a new Junos device and are configuring the system-related settings. You must configure this device for the current date and time on the US West coast. You have set the time zone to America/Los_Angeies. however the time and date did not change.

In this scenario, which two additional actions would satisfy this requirement? (Choose two.)

A.

Set the date and time setting manually.

B.

Configure an NTP server.

C.

Configure a DNS server.

D.

Reboot the device.

Full Access
Question # 12

You configured your system authentication order using the set authentication-order tacplus radius password command.

Which statement is correct in this scenario?

A.

A rejection by TACACS+ will prevent a login and bypass the other two authentication methods.

B.

The password authentication will only be used if the TACACS+ and RADIUS servers fail to respond.

C.

All authentication methods are used with the most restrictive permission set used.

D.

The password authentication method is evaluated if the TACACS+ and RADIUS servers respond with a reject message.

Full Access
Question # 13

Which statement is correct concerning exception traffic processing?

A.

Exception traffic is always dropped during congestion.

B.

Exception traffic is rate-limited to protect the RE.

C.

Exception traffic is discarded by the PFE.

D.

Exception traffic is never forwarded.

Full Access
Question # 14

What will the request system configuration rescue save command do?

A.

It saves the most recently committed configuration as the rescue configuration.

B.

It saves the candidate configuration as the rescue configuration.

C.

It saves a configuration version prior to the configuration most recently committed as the rescue configuration.

D.

It activates the rescue configuration.

Full Access
Question # 15

A network administrator is attempting to route traffic on a Juniper switch to one of three different VLANs: Prod, Test, and Dev. Each VLAN has been assigned a numerical value.

In this scenario, what are these numerical values called?

A.

defaults

B.

interfaces

C.

names

D.

tags

Full Access
Question # 16

You are asked to configure your device running Junos OS to automatically archive your configuration upon commit

In this scenario, which two methods are supported by the Junos OS? (Choose two)

A.

SCP

B.

RCP

C.

FTP

D.

HTTP

Full Access
Question # 17

Exhibit.

Referring to the exhibit, which routing configuration is required for these two users to access the remote server?

A.

Users must connect directly to the router.

B.

Users and the server require a default gateway.

C.

Trunk ports must be enabled on the switch.

D.

A routing protocol must be enabled on the router.

Full Access
Question # 18

What information is exchanged during a TCP three-way handshake? (Choose two)

A.

port numbers

B.

interfaces

C.

sequence numbers

D.

application name

Full Access
Question # 19

You issue the telnet 10.10.10.1 source 192.168.100.1 command.

Which two statements are correct in this scenario? (Choose two.)

A.

The telnet session will have a source address of 10.10.10.1.

B.

The telnet session will have a destination address of 192.168.100.1.

C.

The telnet session will have a destination address of 10.10.10.1.

D.

The telnet session will have a source address of 192.168.100.1.

Full Access
Question # 20

Which two statements about firewall filters are correct? (Choose two.)

A.

Firewall filters are stateless.

B.

Firewall filters can match Layer 7 parameters.

C.

Firewall filters are stateful.

D.

Firewall filters can match Layer 4 parameters.

Full Access
Question # 21

What are two functions of the Routing Engine? (Choose two.)

A.

It processes all management traffic.

B.

It runs the Junos operating system.

C.

It evaluates firewall filters for transit traffic.

D.

It processes transit traffic.

Full Access
Question # 22

Which two external authentication methods does Junos support for administrative access? (Choose two.)

A.

TACACS+

B.

NIS

C.

RADIUS

D.

ACE

Full Access
Question # 23

Click the Exhibit button.

Referring to the exhibit, what is the source IP address of the ping that was executed?

A.

10.12.0.2

B.

10.23.0.2

C.

10.23.0.3

D.

10.24.0.4

Full Access
Question # 24

Which two statements are correct about Junos traceoptions? (Choose two.)

A.

Traceoptions cannot be enabled in a production environment.

B.

Traceoptions are enabled through configuration.

C.

Traceoptions are enabled by default.

D.

Traceoption output, by default, is stored in /var/iog/.

Full Access
Question # 25

What does the user@router> clear log ospf-trace command accomplish?

A.

Logging data into ospf-trace is stopped.

B.

Trace parameters are removed from the OSPF protocol configuration.

C.

Data in the ospf-trace file is removed and logging continues.

D.

The ospf-trace file is deleted.

Full Access
Question # 26

Which character is used to filter the command output in the Junos CLI?

A.

|

B.

>

C.

<

D.

?

Full Access
Question # 27

Which criteria does the Junos OS use to select an active route when two entries exist in the routing table?

A.

the route with the lowest preference number

B.

the most recently learned dynamic route

C.

the route with the highest preference number

D.

the route with the highest metric

Full Access
Question # 28

Which prompt indicates that you are using configuration mode?

A.

>

B.

$

C.

#

D.

%

Full Access
Question # 29

What are two attributes of the UDP protocol? (Choose two.)

A.

UDP is more reliable than TCP.

B.

UDP is always slower than TCP.

C.

UDP is best effort.

D.

UDP is connectionless.

Full Access
Question # 30

You are configuring a firewall filter on a Juniper device.

In this scenario, what are two valid terminating actions? (Choose two.)

A.

count

B.

discard

C.

next term

D.

accept

Full Access
Question # 31

Which two actions happen when multiple users issue the configure exclusive command to enter configuration mode on a Junos device? (Choose two.)

A.

Other users can enter configuration mode.

B.

The candidate configuration is unlocked.

C.

The candidate configuration is locked.

D.

Other users cannot enter configuration mode.

Full Access
Question # 32

Exhibit

user@router> show route 192.168.36.1

inet.O: 5 destinations, 6 routes (5 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both

192.168.36.1/32 *[Static/5] 00:00:31

> to 10.1.1.2 via ge-0/0/10.0 [OSPF/IO] 00:02:21, metric 1 > to 10.1.1.2 via ge-0/0/10.0

Referring to the exhibit, which route(s) will be selected by Junos for packet forwarding?

A.

The OSPF route will be selected.

B.

The static route will be selected.

C.

The Junos OS randomly selects one route.

D.

The Junos OS selects both routes.

Full Access