ExamGecko
Home Home / Juniper / JN0-105

Juniper JN0-105 Practice Test - Questions Answers

Question list
Search
Search

What are two functions of the routing protocol daemon (rpd)? (Choose two.)

A.
It generates chassis alarms.
A.
It generates chassis alarms.
Answers
B.
It provides access to the CLI.
B.
It provides access to the CLI.
Answers
C.
It creates forwarding tables.
C.
It creates forwarding tables.
Answers
D.
It maintains routing tables.
D.
It maintains routing tables.
Answers
Suggested answer: C, D

Explanation:

The Routing Protocol Daemon (rpd) is a critical component in Juniper Networks devices, responsible for all routing operations. It maintains routing tables, which hold information about network paths and destinations derived from various routing protocols. These tables are used to make decisions about where to send packets. Additionally, rpd generates forwarding tables based on the information in the routing tables. The forwarding tables are then used by the Packet Forwarding Engine (PFE) to actually forward packets to their next hop or final destination.

What are two benefits when implementing class of service? (Choose two.)

A.
The network will be faster.
A.
The network will be faster.
Answers
B.
Traffic congestion can be managed.
B.
Traffic congestion can be managed.
Answers
C.
Traffic congestion will be eliminated.
C.
Traffic congestion will be eliminated.
Answers
D.
Latency-sensitive traffic can be prioritized
D.
Latency-sensitive traffic can be prioritized
Answers
Suggested answer: C, D

Explanation:

Implementing Class of Service (CoS) in a network provides numerous benefits, particularly in managing traffic based on its importance, source, or type. CoS enables network administrators to manage traffic congestion by applying various queuing techniques and policies to ensure that critical services remain unaffected during high congestion periods. Additionally, CoS allows for the prioritization of latency-sensitive traffic such as voice and video, ensuring that these services maintain quality despite varying network conditions.

Which two statements are correct about firewall filters? (Choose two.)

A.
'Discard' is the default action of packets that are not explicitly allowed.
A.
'Discard' is the default action of packets that are not explicitly allowed.
Answers
B.
There can be only one firewall filter.
B.
There can be only one firewall filter.
Answers
C.
'Accept' is the default action of packets that are not explicitly allowed.
C.
'Accept' is the default action of packets that are not explicitly allowed.
Answers
D.
There can be multiple firewall filters.
D.
There can be multiple firewall filters.
Answers
Suggested answer: A, D

Explanation:

In Juniper Networks devices, firewall filters are used to control packet flow through the device. The default action for packets that do not match any of the specified criteria in the firewall filter is to discard them, enhancing network security by ensuring that only explicitly allowed traffic can pass through. Furthermore, it is possible to configure multiple firewall filters on a device, allowing for granular control over traffic based on various criteria such as source, destination, and protocol type.

Which two statements are true about the PFE? (Choose two.)

A.
The PFE implements various services such as policing, stateless firewall filtering, and class of service.
A.
The PFE implements various services such as policing, stateless firewall filtering, and class of service.
Answers
B.
The PFE uses Layer 2 and Layer 3 forwarding tables to forward traffic toward its destination.
B.
The PFE uses Layer 2 and Layer 3 forwarding tables to forward traffic toward its destination.
Answers
C.
The PFE handles all processes that control the chassis components.
C.
The PFE handles all processes that control the chassis components.
Answers
D.
The PFE is responsible for performing protocol updates and system management.
D.
The PFE is responsible for performing protocol updates and system management.
Answers
Suggested answer: A, B

Explanation:

The Packet Forwarding Engine (PFE) in Juniper Networks devices is the heart of the data plane, handling the actual forwarding of packets based on pre-computed forwarding tables. It provides several critical services to manage and control traffic flow, including policing (to enforce bandwidth limits for certain traffic types), stateless firewall filtering (to permit or deny traffic based on predefined criteria), and Class of Service (CoS) (to prioritize traffic to ensure quality of service for critical applications). The PFE utilizes both Layer 2 (MAC addresses) and Layer 3 (IP addresses) forwarding tables to make intelligent forwarding decisions, ensuring that packets are efficiently routed toward their final destination.

Click the Exhibit button.

How is traffic, sourced from 10.0.0.0/8, treated by the firewall filter shown in the exhibit?

A.
logged and discarded
A.
logged and discarded
Answers
B.
logged and rejected
B.
logged and rejected
Answers
C.
logged with no further action
C.
logged with no further action
Answers
D.
logged and accepted
D.
logged and accepted
Answers
Suggested answer: D

Explanation:

The firewall filter configuration in the exhibit specifies a filter with two terms. Term 1 matches traffic from the source address 10.0.0.0/8 and has two actions: 'log' and 'next term'. The 'log' action will record the match to a log file, and 'next term' indicates that the firewall should evaluate the next term after logging. There is no explicit action such as 'accept' or 'reject' in term 1, so by default, the traffic will be accepted unless subsequently rejected by another term.

Term 2 has the action 'reject', which discards packets that reach this term. Since there is no 'from' condition in term 2, it acts as a default rule for all traffic not matched by term 1.

Because the traffic sourced from 10.0.0.0/8 matches term 1 and there is no reject action in that term, it will be logged and then accepted by the firewall filter. There is no subsequent term that rejects this specific traffic, so the action from term 2 does not apply to it.

Which two statements describe the result when you enter? at the command-line prompt? (Choose two.)

A.
It lists the available commands and options.
A.
It lists the available commands and options.
Answers
B.
It lists tips for the help menu.
B.
It lists tips for the help menu.
Answers
C.
It displays help about a text string contained in a statement.
C.
It displays help about a text string contained in a statement.
Answers
D.
It displays summary information about the commands and options.
D.
It displays summary information about the commands and options.
Answers
Suggested answer: A, D

Explanation:

When you enter ? at the command-line prompt in Junos OS, the system provides assistance in two significant ways. Firstly, it lists the available commands and options that can be used at the current point in the command hierarchy, aiding users in understanding what commands they can execute next. Secondly, it displays summary information about those commands and options, providing brief descriptions or additional context that can help users understand the function of each command or option. This feature is particularly useful for learning the command structure or for quick reference when specific command syntax is forgotten.

Which two statements are true about the candidate configuration? (Choose two.)

A.
Candidate configuration changes are automatically applied.
A.
Candidate configuration changes are automatically applied.
Answers
B.
You can deploy multiple changes at the same time.
B.
You can deploy multiple changes at the same time.
Answers
C.
Multiple users cannot modify the same candidate configuration.
C.
Multiple users cannot modify the same candidate configuration.
Answers
D.
You can discard changes before committing them.
D.
You can discard changes before committing them.
Answers
Suggested answer: B, D

Explanation:

The candidate configuration in Junos OS is a temporary configuration that allows network administrators to make and stage multiple configuration changes before applying them to the device. This approach enables the deployment of multiple changes in a single operation, ensuring that all configurations work together as intended before making them active. Additionally, the candidate configuration can be discarded if the administrator decides not to apply the staged changes, allowing for a 'trial and error' approach without affecting the currently active configuration. This feature provides flexibility and reduces the risk of disruptive changes to the network.

Which two statements about route preference in Junos are correct? (Choose two.)

A.
Both direct and static routes have the same preference.
A.
Both direct and static routes have the same preference.
Answers
B.
Both direct and local routes have the same preference.
B.
Both direct and local routes have the same preference.
Answers
C.
Both OSPF internal and OSPF AS external routes have the same preference.
C.
Both OSPF internal and OSPF AS external routes have the same preference.
Answers
D.
Both EBGP and IBGP routes have the same preference.
D.
Both EBGP and IBGP routes have the same preference.
Answers
Suggested answer: B, C

Explanation:

In Junos OS, route preference (also known as administrative distance) is used to determine the preferred route among multiple routes to the same destination learned via different routing protocols. Direct and local routes, which represent directly connected networks and interfaces, typically share the same low preference value, indicating high trustworthiness because they are directly connected to the router. OSPF internal routes (routes within the same OSPF area) and OSPF AS external routes (routes that are external to the OSPF autonomous system but redistributed into OSPF) also share the same preference value, although this value is higher (indicating less trust) than for direct and local routes. This distinction helps the routing engine decide which routes to use when multiple paths are available.

Which two statements are correct about the empioyee@Ri> prompt? (Choose two.)

A.
R1 is the hostname of your device.
A.
R1 is the hostname of your device.
Answers
B.
You are in operational mode.
B.
You are in operational mode.
Answers
C.
You are in configuration mode.
C.
You are in configuration mode.
Answers
D.
You are at a shell prompt.
D.
You are at a shell prompt.
Answers
Suggested answer: A, B

Explanation:

In Junos OS, the prompt employee@R1> indicates the current context of the user interface. The 'R1' part of the prompt signifies the hostname of the device, which in this case is 'R1'. The absence of a '#' symbol at the end of the prompt suggests that the user is in operational mode, as opposed to configuration mode which is indicated by a prompt ending in '#'. Operational mode allows users to view the status of the device and execute operational commands, but does not allow for configuration changes.

What are two link-state routing protocols? (Choose two.)

A.
RIP
A.
RIP
Answers
B.
BGP
B.
BGP
Answers
C.
OSPF
C.
OSPF
Answers
D.
IS-IS
D.
IS-IS
Answers
Suggested answer: C, D

Explanation:

Link-state routing protocols are a type of routing protocol used in packet-switching networks for finding the best path between source and destination. OSPF (Open Shortest Path First) and IS-IS (Intermediate System to Intermediate System) are both examples of link-state routing protocols. They work by maintaining a complete map or topology of the network, allowing routers to independently calculate the best path to each destination. Unlike distance-vector protocols like RIP, link-state protocols are more efficient and scalable, making them suitable for larger networks.

Total 100 questions
Go to page: of 10