ExamGecko
Home Home / Juniper / JN0-105

Juniper JN0-105 Practice Test - Questions Answers, Page 5

Question list
Search
Search

What is the protocol data unit (PDU) of the Data Link Layer?

A.
segment
A.
segment
Answers
B.
byte
B.
byte
Answers
C.
frame
C.
frame
Answers
D.
bit
D.
bit
Answers
Suggested answer: C

Explanation:

In the OSI model, the Data Link Layer is responsible for node-to-node delivery of data. It frames the packets received from the Network Layer and prepares them for physical transmission. The Protocol Data Unit (PDU) for the Data Link Layer is called a 'frame.' Frames encapsulate the network layer packets, adding a header and a trailer that include the hardware addresses of the source and destination, among other things, facilitating the data link layer services like frame synchronization, flow control, and error checking.

Which command displays all IPv6 routes in the default routing instance?

A.
show route table inet.0
A.
show route table inet.0
Answers
B.
show route table inet6.1
B.
show route table inet6.1
Answers
C.
show route table inet.1
C.
show route table inet.1
Answers
D.
show route table inet6.0
D.
show route table inet6.0
Answers
Suggested answer: D

Explanation:

The show route table inet6.0 command displays all IPv6 routes in the default routing instance. In Junos OS, the routing table for IPv6 addresses is referred to as inet6.0, whereas inet.0 is used for IPv4 unicast routes. The other options do not correspond to the correct IPv6 routing table.

Juniper official documentation: Junos OS Routing Tables Overview.

You are configuring a firewall filter on a Juniper device.

In this scenario, what are two valid terminating actions? (Choose two.)

A.
1 count
A.
1 count
Answers
B.
2discarD
B.
2discarD
Answers
C.
3next term
C.
3next term
Answers
D.
4accept
D.
4accept
Answers
Suggested answer: B, D

Explanation:

In Juniper firewall filter configurations, 'discard' and 'accept' are two valid terminating actions for a term within a filter. The 'discard' action drops the packet, preventing it from reaching its intended destination, while the 'accept' action allows the packet to pass through the filter, proceeding to its next hop or destination. 'Count' is a non-terminating action that increments a counter every time a packet matches the term but does not inherently determine the packet's fate. 'Next term' directs the evaluation to proceed to the next term in the filter for further processing, also a non-terminating action.

Which two statements about firewall filters are correct? (Choose two.)

A.
Firewall filters are stateless.
A.
Firewall filters are stateless.
Answers
B.
Firewall filters can match Layer 7 parameters.
B.
Firewall filters can match Layer 7 parameters.
Answers
C.
Firewall filters are stateful.
C.
Firewall filters are stateful.
Answers
D.
Firewall filters can match Layer 4 parameters.
D.
Firewall filters can match Layer 4 parameters.
Answers
Suggested answer: A, D

Explanation:

Firewall filters in Junos OS are stateless, meaning they process each packet individually without regard to the state of a connection or sequence of packets. These filters can match various packet attributes, including those at Layer 4, such as TCP and UDP port numbers. This allows for granular control over traffic based on the type of service or application. Unlike stateless filters, stateful firewalls keep track of the state of active connections and make decisions based on the context of the traffic flow, which is not a capability of Junos firewall filters. Additionally, Junos firewall filters primarily operate up to Layer 4 and do not natively inspect Layer 7 parameters, which involve application-level data.

You have configured some interfaces on a Junos device; however, you have not yet committed the configuration.

What happens if you issue the rollback 0 command in this scenario?

A.
The messages.log file is deleted.
A.
The messages.log file is deleted.
Answers
B.
The factory default configuration is loaded.
B.
The factory default configuration is loaded.
Answers
C.
The Junos device is rebooted.
C.
The Junos device is rebooted.
Answers
D.
The interface changes you made are discarded.
D.
The interface changes you made are discarded.
Answers
Suggested answer: D

Explanation:

Issuing the rollback 0 command in Junos OS will discard any uncommitted changes and revert to the last committed configuration. This command effectively cancels any configuration changes that have been made but not yet committed, ensuring that the device returns to its previous stable state.

'rollback 0 ...................................(rolls back the changes just made )' from Useful Juniper Commands.txt.

Juniper official documentation: Rolling Back a Configuration.

You want to redeploy a Junos device by clearing the existing configuration and resetting it to factory defaults.

In this scenario, which command would help to accomplish this task?

A.
show system storage
A.
show system storage
Answers
B.
request system storage cleanup
B.
request system storage cleanup
Answers
C.
request system storage cleanup dry-run
C.
request system storage cleanup dry-run
Answers
D.
request system zeroize media
D.
request system zeroize media
Answers
Suggested answer: D

Explanation:

The request system zeroize media command on a Junos device securely erases all data, including configuration and log files, and resets the device to its factory default settings. This command is used when redeploying a device to ensure no residual data remains from its previous deployment. It's a comprehensive and secure way to clear all configurations and data, making the device as if it were new. The other commands listed do not perform a full reset to factory defaults; for example, show system storage displays storage information, and request system storage cleanup offers to delete unnecessary files without resetting the device to factory settings.

By default, how does the PFE manage unicast traffic destined for an existing forwarding table entry?

A.
It sends the traffic through multiple ports toward its destination.
A.
It sends the traffic through multiple ports toward its destination.
Answers
B.
It sends the traffic through one port toward its destination.
B.
It sends the traffic through one port toward its destination.
Answers
C.
It sends the traffic through the f xpl interface to the RE.
C.
It sends the traffic through the f xpl interface to the RE.
Answers
D.
It sends all traffic to the control plane for further processing.
D.
It sends all traffic to the control plane for further processing.
Answers
Suggested answer: B

Explanation:

In a Juniper Networks device, the Packet Forwarding Engine (PFE) processes unicast traffic by forwarding it according to the existing entries in the forwarding table. When the PFE encounters unicast traffic destined for an address that has a corresponding entry in the forwarding table, it directs the traffic through a specific outgoing interface or port toward its destination. This process is based on the most efficient path determined by the routing protocols in use, ensuring that the packet reaches its intended destination through a singular path, unless specific configurations such as load balancing are in place.

What are two types of transit traffic that traverse the forwarding plane of a Layer 3 router? (Choose two.)

A.
unicast traffic
A.
unicast traffic
Answers
B.
multicast traffic
B.
multicast traffic
Answers
C.
exception traffic
C.
exception traffic
Answers
D.
broadcast traffic
D.
broadcast traffic
Answers
Suggested answer: A, B

Explanation:

Transit traffic that traverses the forwarding plane of a Layer 3 router includes both unicast and multicast traffic types. Unicast traffic is directed from a single source to a single destination, while multicast traffic is sent from one source to multiple destinations that are part of a multicast group. These types of traffic are efficiently routed through the network by leveraging the router's forwarding plane capabilities. Exception traffic, which requires special handling by the control plane, and broadcast traffic, which is typically limited to a single broadcast domain and not usually forwarded by Layer 3 routers, are not considered standard types of transit traffic for the forwarding plane of a router.

Which protocol is responsible for learning an IPv4 neighbor's MAC address?

A.
Address Resolution Protocol (ARP)
A.
Address Resolution Protocol (ARP)
Answers
B.
Network Address Translation (NAT)
B.
Network Address Translation (NAT)
Answers
C.
Media Access Control Security (MACsec)
C.
Media Access Control Security (MACsec)
Answers
D.
Neighbor Discovery Protocol (NDP)
D.
Neighbor Discovery Protocol (NDP)
Answers
Suggested answer: A

Explanation:

The Address Resolution Protocol (ARP) is responsible for mapping an IPv4 address to a machine's MAC address. ARP operates at Layer 2 of the OSI model and is used to find the MAC address of a host given its IPv4 address. When a device wants to communicate with another device on the same local network, it uses ARP to discover the recipient's MAC address.

Juniper official documentation: ARP.

Networking standards: RFC 826.

Exhibit

policy-options { policy-statement Load-Balance-Policy { term Load-Balance { then { load-balance per-flow; accept;

}

}

}

}

routing-options {

router-id 192.168.100.11; autonomous-system 65201; forwarding-table {

export Load-Balance-Policy;

Referring to the exhibit, which two statements are correct? (Choose two.)

A.
The policy enables equal cost load balancing in the forwarding table.
A.
The policy enables equal cost load balancing in the forwarding table.
Answers
B.
The policy must be applied under the protocols hierarchy.
B.
The policy must be applied under the protocols hierarchy.
Answers
C.
The policy enables per-packet load balancing.
C.
The policy enables per-packet load balancing.
Answers
D.
The policy enables flow-based load balancing.
D.
The policy enables flow-based load balancing.
Answers
Suggested answer: A

Explanation:

The load-balance per-flow statement in the Junos OS policy-options configuration enables flow-based load balancing in the forwarding table. This means that the traffic is distributed across multiple paths based on flows, where a flow is typically identified by attributes such as source and destination IP addresses, and possibly layer 4 information like TCP/UDP ports. This allows for more granular and efficient utilization of available paths, avoiding overloading a single path. The policy does not enable per-packet load balancing, which would send individual packets of the same flow over different paths, potentially causing out-of-order delivery issues. The policy's placement in the forwarding-table export suggests it's intended to influence forwarding behavior, not just routing protocol decisions, and does not necessarily have to be applied under the protocols hierarchy.

Total 100 questions
Go to page: of 10