ExamGecko
Home Home / Juniper / JN0-105

Juniper JN0-105 Practice Test - Questions Answers, Page 3

Question list
Search
Search

You issue the monitor traffic interface ge-0/0/0 command.

What will this command accomplish?

A.
It displays real-time statistics for interface ge-0/0/0.
A.
It displays real-time statistics for interface ge-0/0/0.
Answers
B.
It displays an operational summary of ge-0/0/0.
B.
It displays an operational summary of ge-0/0/0.
Answers
C.
It displays the MTU and MAC address for ge-0/0/0.
C.
It displays the MTU and MAC address for ge-0/0/0.
Answers
D.
It displays a packet capture on interface ge-0/0/0.
D.
It displays a packet capture on interface ge-0/0/0.
Answers
Suggested answer: D

Explanation:

The command 'monitor traffic interface ge-0/0/0' (D) initiates a packet capture on the specified interface, allowing you to view the actual packets being transmitted and received. This is useful for troubleshooting and analyzing the traffic passing through the interface in real time.

Exhibit

root# set system root-authentication ? Possible completions: + apply-groups Groups from which to inherit configuration data + apply-groups-except Don't inherit configuration data from these groups encrypted-password Encrypted password string load-key-file File (URL) containing one or more ssh keys plain-text-password Prompt for plain text password (autoencrypted) > ssh-dsa Secure shell (ssh) DSA public key string > ssh-rsa Secure shell (ssh) RSA public key string

root# set system root-authentication plain-text-password

New password:

Retype new password:

root# commit and-quit [edit interfaces] 'ge-0/0/0' HA management port cannot be configured error: configuration check-out

root#

You are unable to remotely access your Juniper device using the CLI.

Referring to the exhibit, which command would you add to the existing configuration to enable remote CLI access?

A.
load factory-default
A.
load factory-default
Answers
B.
set system root-authentication plain-text-password
B.
set system root-authentication plain-text-password
Answers
C.
set system services ssh
C.
set system services ssh
Answers
D.
set system login idle-timeout 20
D.
set system login idle-timeout 20
Answers
Suggested answer: C

Explanation:

In Junos OS, remote access to the device's CLI is commonly facilitated through Secure Shell (SSH), a protocol providing secure command-line access over an insecure network. The given exhibit indicates an attempt to set a root authentication password but does not show configuration for enabling remote access services. To enable SSH, which is not shown in the configuration snippet, you need to configure the device to accept SSH connections. This is done by enabling the SSH service within the system services hierarchy of the configuration. The correct command to add to the existing configuration for enabling remote CLI access via SSH is set system services ssh. This command activates the SSH service, allowing secure remote logins to the device.

What is the primary system log file that is present in the default configuration of a Junos device?

A.
kmd
A.
kmd
Answers
B.
messages
B.
messages
Answers
C.
vrrp
C.
vrrp
Answers
D.
jsrpd
D.
jsrpd
Answers
Suggested answer: B

Explanation:

In the default configuration of a Junos device, the primary system log file is 'messages' (B). This log file contains a wide range of system messages, including operational status changes, system errors, and other critical information, making it a key resource for troubleshooting and monitoring the system's health.

What are two examples of exception traffic? (Choose two.)

A.
transit packets
A.
transit packets
Answers
B.
routing updates
B.
routing updates
Answers
C.
log messages
C.
log messages
Answers
D.
ping to the local device
D.
ping to the local device
Answers
Suggested answer: B, C

Explanation:

Exception traffic includes traffic that is not simply forwarded by the router but requires special handling, such as routing updates (B) and log messages (C). These types of traffic are processed by the router's control plane rather than just being forwarded through the data plane.

You need to recover the root password on a Junos router without losing the current configuration settings.

Which three statements describe what you should perform in this scenario? (Choose three.)

A.
Enter and commit the new root password.
A.
Enter and commit the new root password.
Answers
B.
Load the factory-default configuration.
B.
Load the factory-default configuration.
Answers
C.
Upgrade the Junos OS to the latest version.
C.
Upgrade the Junos OS to the latest version.
Answers
D.
Hit the space bar and enter recovery when prompted.
D.
Hit the space bar and enter recovery when prompted.
Answers
E.
Use a console connection to reboot the device.
E.
Use a console connection to reboot the device.
Answers
Suggested answer: A, D, E

Explanation:

To recover the root password on a Junos router without losing the configuration, you should (A) enter and commit the new root password once you have gained access to the system, (D) hit the space bar to interrupt the boot process and enter recovery mode when prompted during the boot process, and (E) use a console connection to reboot the device and access the bootloader prompt. These steps allow you to reset the root password while preserving the existing configuration.

You configured your system authentication order using the set authentication-order tacplus radius password command.

Which statement is correct in this scenario?

A.
A rejection by TACACS+ will prevent a login and bypass the other two authentication methods.
A.
A rejection by TACACS+ will prevent a login and bypass the other two authentication methods.
Answers
B.
The password authentication will only be used if the TACACS+ and RADIUS servers fail to respond.
B.
The password authentication will only be used if the TACACS+ and RADIUS servers fail to respond.
Answers
C.
All authentication methods are used with the most restrictive permission set used.
C.
All authentication methods are used with the most restrictive permission set used.
Answers
D.
The password authentication method is evaluated if the TACACS+ and RADIUS servers respond with a reject message.
D.
The password authentication method is evaluated if the TACACS+ and RADIUS servers respond with a reject message.
Answers
Suggested answer: B

Explanation:

In the scenario where the system authentication order is set to 'tacplus radius password,' the correct statement is (B). If the TACACS+ and RADIUS servers are unreachable or fail to respond, the system will fall back to using password authentication. This ensures that users can still authenticate using locally stored passwords if external authentication servers are unavailable.

Which three benefits occur when operating an interior gateway protocol (IGP) in an autonomous system (AS)? (Choose three.)

A.
IGPs automatically distribute static routing information.
A.
IGPs automatically distribute static routing information.
Answers
B.
IGPs determine the optimal paths for data transmission.
B.
IGPs determine the optimal paths for data transmission.
Answers
C.
IGPs learn prefixes in the global Internet's routing table.
C.
IGPs learn prefixes in the global Internet's routing table.
Answers
D.
IGPs react very fast to network change.
D.
IGPs react very fast to network change.
Answers
E.
IGPs learn everything about the subnets and best paths within your network.
E.
IGPs learn everything about the subnets and best paths within your network.
Answers
Suggested answer: B, D, E

Explanation:

Operating an Interior Gateway Protocol (IGP) within an Autonomous System (AS) provides several benefits, including determining the optimal paths for data transmission (B), reacting quickly to network changes (D), and learning all about the subnets and best paths within the network (E). IGPs are designed to manage routing within a single AS efficiently, adapting to changes and ensuring data is routed through the best available paths.

Which process in the Junos OS is responsible for device management tasks including the CLI and commit operations?

A.
mgd
A.
mgd
Answers
B.
chassisd
B.
chassisd
Answers
C.
rpd
C.
rpd
Answers
D.
dcd
D.
dcd
Answers
Suggested answer: A

Explanation:

In Junos OS, the management daemon (mgd) is responsible for handling all the device management tasks, including processing CLI commands and handling commit operations. The mgd daemon interacts with the Junos OS configuration database and provides the necessary logic to ensure that configuration changes are syntactically correct and do not conflict with each other. When a user commits a configuration, mgd validates the changes, applies them to the running configuration, and ensures that the necessary daemons are notified of the changes to apply them accordingly.

Which two components are included in a transport header? (Choose two.)

A.
destination port number
A.
destination port number
Answers
B.
source MAC address
B.
source MAC address
Answers
C.
source port number
C.
source port number
Answers
D.
destination MAC address
D.
destination MAC address
Answers
Suggested answer: A, C

Explanation:

The transport layer in the OSI model is responsible for end-to-end communication and error recovery. In a transport header, such as TCP or UDP, the key components include the source port number and the destination port number. These port numbers are used to identify sending and receiving applications. The source port number indicates the port of the sending application, and the destination port number refers to the port of the receiving application. MAC addresses, on the other hand, are part of the data link layer (Layer 2) and would be included in an Ethernet header, not a transport header.

Which Junos feature limits the amount of exception traffic that is sent from the PFE to the RE?

A.
scheduler
A.
scheduler
Answers
B.
policer
B.
policer
Answers
C.
CoS markings
C.
CoS markings
Answers
D.
routing policy
D.
routing policy
Answers
Suggested answer: B

Explanation:

In Junos OS, a policer is a feature used to limit the rate of traffic flow in the network, including exception traffic sent from the Packet Forwarding Engine (PFE) to the Routing Engine (RE). Exception traffic consists of packets that cannot be processed by the PFE alone and require intervention by the RE, such as control packets or packets destined for the device itself. A policer can be configured to enforce bandwidth limits and drop or mark packets that exceed specified rate limits, thus protecting the RE from being overwhelmed by excessive exception traffic.

Total 100 questions
Go to page: of 10