ExamGecko
Home Home / Juniper / JN0-105

Juniper JN0-105 Practice Test - Questions Answers, Page 4

Question list
Search
Search

What information would you find using the CLI help command?

A.
hyperlinks for remediation actions
A.
hyperlinks for remediation actions
Answers
B.
a URL for accessing the technical documentation
B.
a URL for accessing the technical documentation
Answers
C.
an explanation for specific system log error messages
C.
an explanation for specific system log error messages
Answers
D.
message of the day
D.
message of the day
Answers
Suggested answer: C

Explanation:

The CLI help command in Junos OS provides assistance and explanations for commands, command options, and in some cases, specific system log error messages. By using the help command followed by specific keywords or messages, users can get detailed information and context for the commands they are using or errors they are encountering. This feature is particularly useful for understanding the purpose of commands, their syntax, and troubleshooting error messages that may appear in system logs.

Exhibit

Exhibit

[edit]

root# set system host-name TEST_DEVICE [edit]

root# commit

[edit]

'system'

Missing mandatory statement: 'root-authentication' error: commit failed: (missing mandatory statements) [edit] root#

You are configuring a new device.

Which action solves the error shown in the exhibit?

A.
configuring a non-root username and password
A.
configuring a non-root username and password
Answers
B.
configuring a password for the root account
B.
configuring a password for the root account
Answers
C.
loading the factory-default configuration
C.
loading the factory-default configuration
Answers
D.
reinstalling Junos
D.
reinstalling Junos
Answers
Suggested answer: B

Explanation:

The error message in the exhibit indicates that the root-authentication statement is missing, which is mandatory for committing the configuration. In Junos OS, it is required to set a password for the root account to commit any configuration changes. This is a security measure to ensure that unauthorized users cannot access the device's configuration mode. To solve the error shown in the exhibit, configuring a password for the root account is necessary. This can be done by using the set system root-authentication plain-text-password command, after which the user will be prompted to enter a new password for the root account.

Exhibit

user@router> show route 192.168.100.2

inet.O: 15 destinations, 17 routes (15 active, 0 holddown, 0 hidden) Limit/Threshold: 1048576/1048576 destinations

+ = Active Route, - = Last Active, * = Both 192.168.100.2/32 *[OSPF/IO] 00:14:29, metric 1

> to 172.16.1.6 via ge-0/0/1.0 [BGP/170] 00:06:49, localpref 100

AS path: 65102 I, validation-state: unverified > to 172.16.1.6 via ge-0/0/1.0

Referring to the exhibit, which statement is correct?

A.
The BGP path is the only active route.
A.
The BGP path is the only active route.
Answers
B.
The BGP route is preferred over the OSPF route.
B.
The BGP route is preferred over the OSPF route.
Answers
C.
The OSPF path is the only active route.
C.
The OSPF path is the only active route.
Answers
D.
/ Traffic is load-balanced across two routes.
D.
/ Traffic is load-balanced across two routes.
Answers
Suggested answer: C

Explanation:

Referring to the exhibit, the presence of the '+' symbol next to the OSPF route for 192.168.100.2/32 indicates that this is the active route being used to forward traffic. The BGP route, although present, does not have the '+' symbol, indicating it is not the active route. In Junos OS, the routing table displays the active route with a '+' symbol, and the fact that the OSPF route has this symbol means it is the preferred path based on the routing protocol's decision process, which takes into account factors such as route preference (administrative distance) and metrics.

Exhibit

[edit system archival] user@router# show configuration {

transfer-on-commit; archive-sites {

'scp://[email protected] : /archive' password ## SECRET-DATA

'ftp://[email protected]:/archive' password '$9...'; ## SECRET-DATA

.

Referring to the exhibit, where are the configuration backup files stored?

A.
Files are stored to the SCP site and the FTP site in a round-robin manner.
A.
Files are stored to the SCP site and the FTP site in a round-robin manner.
Answers
B.
Files are stored to the SCP site and the FTP site simultaneously.
B.
Files are stored to the SCP site and the FTP site simultaneously.
Answers
C.
Files are stored to any site as selected by Junos internally.
C.
Files are stored to any site as selected by Junos internally.
Answers
D.
Files are stored to the SCP site but if the transfer fails, then to the FTP site.
D.
Files are stored to the SCP site but if the transfer fails, then to the FTP site.
Answers
Suggested answer: B

Explanation:

In Junos OS, the archival configuration under [edit system] allows for the automatic backup of configuration files to designated locations upon commit. When multiple archive-sites are specified, as shown in the exhibit with both SCP and FTP sites listed, the device does not choose between them or use them in a round-robin manner. Instead, it attempts to transfer the configuration backup files to all specified sites simultaneously upon each commit. This ensures redundancy and increases the likelihood that a backup will be successfully stored even if one of the transfer methods or destinations fails.

You want to find out the chassis serial number of a Junos device.

Which command would display this information?

A.
show chassis environment
A.
show chassis environment
Answers
B.
show chassis hardware
B.
show chassis hardware
Answers
C.
show chassis routing-engine
C.
show chassis routing-engine
Answers
D.
show chassis location
D.
show chassis location
Answers
Suggested answer: B

Explanation:

The show chassis hardware command in Junos OS displays detailed information about the hardware installed in the device, including the chassis itself. This command provides a list of all hardware components, their serial numbers, part numbers, and version information. When looking for the chassis serial number specifically, this command is the most direct and comprehensive way to retrieve that information, as it includes the serial number of the chassis among the details provided.

What are two benefits when implementing class of service? (Choose two.)

A.
Traffic congestion will be eliminated.
A.
Traffic congestion will be eliminated.
Answers
B.
The network will be faster.
B.
The network will be faster.
Answers
C.
Traffic congestion can be managed.
C.
Traffic congestion can be managed.
Answers
D.
Latency-sensitive traffic can be prioritized.
D.
Latency-sensitive traffic can be prioritized.
Answers
Suggested answer: C

Explanation:

Class of Service (CoS) in Junos OS provides tools for managing traffic congestion and ensuring that latency-sensitive traffic is given priority over less time-critical data. By implementing CoS, network administrators can classify traffic into different priority levels, apply scheduling policies to ensure that high-priority traffic is transmitted first, and use congestion management techniques such as queue buffers and drop profiles. This helps in maintaining the quality of service for critical applications, especially during periods of high network congestion. However, CoS does not eliminate congestion entirely nor does it inherently make the network faster; it provides a mechanism for better managing and controlling traffic flows according to their importance and time sensitivity.

Which two external authentication methods does Junos support for administrative access? (Choose two.)

A.
TACACS+
A.
TACACS+
Answers
B.
NIS
B.
NIS
Answers
C.
RADIUS
C.
RADIUS
Answers
D.
ACE
D.
ACE
Answers
Suggested answer: A

Explanation:

Junos OS supports several external authentication methods for administrative access, with TACACS+ (Terminal Access Controller Access-Control System Plus) and RADIUS (Remote Authentication Dial-In User Service) being among the most commonly used. Both TACACS+ and RADIUS are protocols that allow network devices to communicate with a central authentication server, enabling centralized control over user authentication and authorization. This centralization simplifies the management of user credentials and access policies, especially in larger networks with multiple devices.

Which two fields are you required to enter when you create a new user account? (Choose two.)

A.
username
A.
username
Answers
B.
full name
B.
full name
Answers
C.
user ID
C.
user ID
Answers
D.
login class
D.
login class
Answers
Suggested answer: A, D

Explanation:

In Junos OS, when creating a new user account, the minimum required fields are the username and the login class. The username is the identifier for the account, while the login class specifies the level of access or permissions the user has on the device. Login classes allow for the differentiation between various roles, such as read-only access or full administrative rights. Other information, such as full name or user ID, is optional and not strictly necessary for the creation of a functional user account.

What are two advantages of using the Junos OS? (Choose two.)

A.
It enables you to roll back to a previous configuration.
A.
It enables you to roll back to a previous configuration.
Answers
B.
It pushes your configuration changes 'live' immediately.
B.
It pushes your configuration changes 'live' immediately.
Answers
C.
It is modular.
C.
It is modular.
Answers
D.
It supports up to a maximum of two previous configurations.
D.
It supports up to a maximum of two previous configurations.
Answers
Suggested answer: A, C

Explanation:

One of the key advantages of Junos OS is its ability to roll back to previous configurations. This feature allows administrators to revert to an earlier configuration state, which is invaluable for quickly recovering from configuration errors or undesired changes. Junos OS maintains an archive of previous configurations, enabling easy rollback to any saved state. Another significant advantage of Junos OS is its modular design. The operating system is structured so that different processes and services run in separate protected memory spaces, enhancing the stability and reliability of the system. If one process fails, it does not affect the others, thereby minimizing the risk of system-wide failures.

Exhibit

term limit-icmp { from {

source-address {

172.25.11.0/24;

}

protocol icmp;

}

then {

count count-icmp; discard;

}

}

Referring to the exhibit, which two actions will occur when a packet matches the firewall filter? (Choose two.)

A.
An ICMP destination unreachable message will be returned.
A.
An ICMP destination unreachable message will be returned.
Answers
B.
The packet will be forwarded.
B.
The packet will be forwarded.
Answers
C.
The packet will be discarded.
C.
The packet will be discarded.
Answers
D.
A counter will be incremented.
D.
A counter will be incremented.
Answers
Suggested answer: C

Explanation:

Referring to the firewall filter configuration in the exhibit, when a packet matches the specified term limit-icmp, two actions are defined in the then statement: count count-icmp and discard. The count count-icmp action means that each time a packet matches this term, a counter named count-icmp will be incremented, providing a tally of how many packets have matched the term. The discard action means that the packet will be dropped and not forwarded through the device. This effectively prevents the packet from reaching its intended destination. There is no action specified that would cause an ICMP destination unreachable message to be returned, nor is there any action that would allow the packet to be forwarded.

Total 100 questions
Go to page: of 10