Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

JN0-105 Questions and Answers

Question # 6

You are configuring a firewall filter on a Juniper device.

In this scenario, what are two valid terminating actions? (Choose two.)

A.

1 count

B.

2discarD

C.

3next term

D.

4accept

Full Access
Question # 7

Which two statements are correct about the empioyee@Ri> prompt? (Choose two.)

A.

R1 is the hostname of your device.

B.

You are in operational mode.

C.

You are in configuration mode.

D.

You are at a shell prompt.

Full Access
Question # 8

What are two examples of exception traffic? (Choose two.)

A.

transit packets

B.

routing updates

C.

log messages

D.

ping to the local device

Full Access
Question # 9

In the Junos OS, which keyboard shortcut allows you to move to the start of the line?

A.

Ctrl+a

B.

Ctrl+e

C.

Ctrl+w

D.

Ctrl+k

Full Access
Question # 10

By default, how does the PFE manage unicast traffic destined for an existing forwarding table entry?

A.

It sends the traffic through multiple ports toward its destination.

B.

It sends the traffic through one port toward its destination.

C.

It sends the traffic through the f xpl interface to the RE.

D.

It sends all traffic to the control plane for further processing.

Full Access
Question # 11

Which statement is correct concerning exception traffic processing?

A.

Exception traffic is always dropped during congestion.

B.

Exception traffic is rate-limited to protect the RE.

C.

Exception traffic is discarded by the PFE.

D.

Exception traffic is never forwarded.

Full Access
Question # 12

What are two types of transit traffic that traverse the forwarding plane of a Layer 3 router? (Choose two.)

A.

unicast traffic

B.

multicast traffic

C.

exception traffic

D.

broadcast traffic

Full Access
Question # 13

Exhibit.

Referring to the exhibit, which routing configuration is required for these two users to access the remote server?

A.

Users must connect directly to the router.

B.

Users and the server require a default gateway.

C.

Trunk ports must be enabled on the switch.

D.

A routing protocol must be enabled on the router.

Full Access
Question # 14

What is the primary system log file that is present in the default configuration of a Junos device?

A.

kmd

B.

messages

C.

vrrp

D.

jsrpd

Full Access
Question # 15

A network administrator is attempting to route traffic on a Juniper switch to one of three different VLANs: Prod, Test, and Dev. Each VLAN has been assigned a numerical value.

In this scenario, what are these numerical values called?

A.

defaults

B.

interfaces

C.

names

D.

tags

Full Access
Question # 16

Click the Exhibit button.

Referring to the exhibit, what is the source IP address of the ping that was executed?

A.

10.12.0.2

B.

10.23.0.2

C.

10.23.0.3

D.

10.24.0.4

Full Access
Question # 17

What is the protocol data unit (PDU) of the Data Link Layer?

A.

segment

B.

byte

C.

frame

D.

bit

Full Access
Question # 18

You received a new Junos device and are configuring the system-related settings. You must configure this device for the current date and time on the US West coast. You have set the time zone to America/Los_Angeies. however the time and date did not change.

In this scenario, which two additional actions would satisfy this requirement? (Choose two.)

A.

Set the date and time setting manually.

B.

Configure an NTP server.

C.

Configure a DNS server.

D.

Reboot the device.

Full Access
Question # 19

You configured your system authentication order using the set authentication-order tacplus radius password command.

Which statement is correct in this scenario?

A.

A rejection by TACACS+ will prevent a login and bypass the other two authentication methods.

B.

The password authentication will only be used if the TACACS+ and RADIUS servers fail to respond.

C.

All authentication methods are used with the most restrictive permission set used.

D.

The password authentication method is evaluated if the TACACS+ and RADIUS servers respond with a reject message.

Full Access
Question # 20

You have just increased the MTU size of interface ge-0/0/0 and committed the configuration.

Which command would help you identify the applied MTU change?

A.

monitor interface ge-0/0/0

B.

monitor traffic interface ge-0/0/0

C.

show interfaces ge-0/0/0 terse

D.

show interfaces ge-0/0/0

Full Access
Question # 21

What are two functions of the Routing Engine? (Choose two.)

A.

It processes all management traffic.

B.

It runs the Junos operating system.

C.

It evaluates firewall filters for transit traffic.

D.

It processes transit traffic.

Full Access
Question # 22

What are two link-state routing protocols? (Choose two.)

A.

RIP

B.

BGP

C.

OSPF

D.

IS-IS

Full Access
Question # 23

Which Junos OS component is responsible for maintaining the forwarding table?

A.

Routing Engine

B.

chassis control daemon

C.

Packet Forwarding Engine

D.

management daemon

Full Access
Question # 24

Which type of device uses the destination IP address to forward packets?

A.

Layer 3 router

B.

Layer 2 switch

C.

repeater

D.

hub

Full Access
Question # 25

You have completed the initial configuration of your new Junos device. You want to be able to load this configuration at a later time.

Which action enables you to perform this task?

A.

Enter the load factory-default command.

B.

Enter the request system reboot command.

C.

Enter the request system zeroize command.

D.

Enter the request system configuration rescue save command.

Full Access
Question # 26

Which layer of the OSI model contains the IP address information?

A.

Layer 2

B.

Layer 3

C.

Layer 1

D.

Layer 4

Full Access
Question # 27

Exhibit

{hold:node0}[edit]

root# set system root-authentication ?

Possible completions:

+ apply-groups         Groups from which to inherit configuration data

+ apply-groups-except  Don't inherit configuration data from these groups

  encrypted-password   Encrypted password string

  load-key-file        File (URL) containing one or more ssh keys

  plain-text-password  Prompt for plain text password (autoencrypted)

> ssh-dsa              Secure shell (ssh) DSA public key string

> ssh-rsa              Secure shell (ssh) RSA public key string

{hold:node0}[edit]

root# set system root-authentication plain-text-password

New password:

Retype new password:

{hold:node0}[edit]

root# commit and-quit

[edit interfaces]

  'ge-0/0/0'

     HA management port cannot be configured

error: configuration check-out failed

{hold:node0}[edit]

root#

You are unable to remotely access your Juniper device using the CLI.

Referring to the exhibit, which command would you add to the existing configuration to enable remote CLI access?

A.

load factory-default

B.

set system root-authentication plain-text-password

C.

set system services ssh

D.

set system login idle-timeout 20

Full Access
Question # 28

Which two statements are correct regarding Layer 2 network switches? (Choose two.)

A.

Switches create a single collision domain.

B.

Switches are susceptible to traffic loops.

C.

Switches flood broadcast traffic.

D.

Switches do not learn MAC addresses.

Full Access
Question # 29

What are two attributes of the UDP protocol? (Choose two.)

A.

UDP is more reliable than TCP.

B.

UDP is always slower than TCP.

C.

UDP is best effort.

D.

UDP is connectionless.

Full Access