ExamGecko
Home Home / Juniper / JN0-105

Juniper JN0-105 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Which service does RADIUS provide?

A.
routing
A.
routing
Answers
B.
authentication
B.
authentication
Answers
C.
DNS resolution
C.
DNS resolution
Answers
D.
time synchronization
D.
time synchronization
Answers
Suggested answer: B

Explanation:

RADIUS, which stands for Remote Authentication Dial-In User Service, provides authentication services for users trying to access a network. It is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service.

What are two methods for navigating to configuration mode from an operational mode prompt? (Choose two.)

A.
Use the edit command.
A.
Use the edit command.
Answers
B.
Use the quit command.
B.
Use the quit command.
Answers
C.
Use the exit command.
C.
Use the exit command.
Answers
D.
Use the configure command.
D.
Use the configure command.
Answers
Suggested answer: A, D

Explanation:

In Junos OS, to navigate from operational mode to configuration mode, you can use either the edit or configure command. Both commands move the CLI from operational mode, where you can view the state of the device, to configuration mode, where you can make changes to the device's configuration.

What are two functions of the Routing Engine? (Choose two.)

A.
It processes all management traffic.
A.
It processes all management traffic.
Answers
B.
It runs the Junos operating system.
B.
It runs the Junos operating system.
Answers
C.
It evaluates firewall filters for transit traffic.
C.
It evaluates firewall filters for transit traffic.
Answers
D.
It processes transit traffic.
D.
It processes transit traffic.
Answers
Suggested answer: A, B

Explanation:

The Routing Engine (RE) in Junos OS has several critical functions, including processing all management traffic (A) and running the Junos operating system (B). The RE handles system management tasks, user interfaces, system services, and routing protocol processes. It does not directly process transit traffic or evaluate firewall filters for transit traffic, as these tasks are handled by the Packet Forwarding Engine (PFE).

You are asked to convert the number 7 from decimal to binary.

Which number is correct in this scenario?

A.
00001000
A.
00001000
Answers
B.
00010000
B.
00010000
Answers
C.
00000111
C.
00000111
Answers
D.
11100000
D.
11100000
Answers
Suggested answer: C

Explanation:

To convert the decimal number 7 to binary, the correct representation is 00000111 (C). In binary, 7 is represented as 1+2+4 (2^0 + 2^1 + 2^2), which corresponds to the last three digits being 1 in the binary format, with leading zeros added for clarity.

Which statement is correct when multiple users are configuring a Junos device using the configure private command?

A.
A commit by any user will commit changes made by all active users.
A.
A commit by any user will commit changes made by all active users.
Answers
B.
A commit will not succeed until there is only a single user in configuration mode.
B.
A commit will not succeed until there is only a single user in configuration mode.
Answers
C.
Each user gets their own candidate configuration.
C.
Each user gets their own candidate configuration.
Answers
D.
Each user shares the same candidate configuration.
D.
Each user shares the same candidate configuration.
Answers
Suggested answer: C

Explanation:

When multiple users are configuring a Junos device using the 'configure private' command, each user gets their own candidate configuration (C). This allows for isolated configuration sessions, where changes made by one user do not impact or interfere with the changes made by another user in their private session.

You are logged in to a Junos OS device with SSH and issued the show protocols | compare command in the configuration, but no output is shown.

Which statement is correct in this scenario?

A.
The command only works for interface configuration differences.
A.
The command only works for interface configuration differences.
Answers
B.
There are no changes to the candidate configuration.
B.
There are no changes to the candidate configuration.
Answers
C.
Someone accidentally deleted the active configuration.
C.
Someone accidentally deleted the active configuration.
Answers
D.
You must commit the configuration before any output will be shown.
D.
You must commit the configuration before any output will be shown.
Answers
Suggested answer: B

Explanation:

The show | compare command in Junos OS is used to display the differences between the candidate configuration and the active configuration. If no output is shown when you issue this command, it means that there are no changes between the candidate configuration and the active configuration. This indicates that the candidate configuration is identical to the active configuration, and thus no differences are displayed.

'The show | compare command displays the differences between the candidate configuration and the active configuration. If there are no changes, no output is displayed.'

After the factory default configuration is loaded, which configuration object must be created prior to the first commit?

A.
root authentication
A.
root authentication
Answers
B.
loopback IP address
B.
loopback IP address
Answers
C.
out-of-band connectivity
C.
out-of-band connectivity
Answers
D.
host name
D.
host name
Answers
Suggested answer: A

Explanation:

In Juniper Networks devices, when the factory default configuration is loaded, the first step before committing any configuration is to set up root authentication. This is crucial because it secures the device by ensuring that only authorized users have administrative access. Without setting up a root password, the device will not allow any commit operations, which is a safety measure to prevent unauthorized access. This requirement emphasizes the importance Juniper places on security right from the initial setup of the device.

Click the Exhibit button.

Referring to the exhibit, what is the source IP address of the ping that was executed?

A.
10.12.0.2
A.
10.12.0.2
Answers
B.
10.23.0.2
B.
10.23.0.2
Answers
C.
10.23.0.3
C.
10.23.0.3
Answers
D.
10.24.0.4
D.
10.24.0.4
Answers
Suggested answer: B

Explanation:

The exhibit shows a ping test being executed from router R2 to the IP address 10.23.0.3. Since the ping command is issued on R2 and we see successful replies from 10.23.0.3, it means the source of the ping must be an interface on R2. Given the network diagram and the IP address scheme, the source IP address of the ping is on the interface ge-0/0/2 of R2, which is in the subnet 10.23.0.0/24. The only logical IP address for R2's interface in this subnet, based on standard networking practices and the given options, would be 10.23.0.2. The other addresses provided in the options belong to different subnets or are the destination of the ping itself.

Which two statements apply to the Routing Engine functions? (Choose two.)

A.
It responds to ping and traceroute commands.
A.
It responds to ping and traceroute commands.
Answers
B.
It maintains the routing tables.
B.
It maintains the routing tables.
Answers
C.
It does not process routing updates.
C.
It does not process routing updates.
Answers
D.
It processes the transit traffic.
D.
It processes the transit traffic.
Answers
Suggested answer: A, B

Explanation:

The Routing Engine (RE) in Juniper Networks devices plays a critical role in the control plane operations. One of its functions includes responding to network utility commands like ping and traceroute, which are essential for diagnosing network connectivity and path issues. Furthermore, the RE is responsible for maintaining the routing tables, which contain information about network paths and destinations. These tables are vital for making forwarding decisions but are distinct from the actual forwarding of packets, which is handled by the Packet Forwarding Engine (PFE).

Which two actions happen when multiple users issue the configure exclusive command to enter configuration mode on a Junos device? (Choose two.)

A.
Other users can enter configuration mode.
A.
Other users can enter configuration mode.
Answers
B.
The candidate configuration is unlocked.
B.
The candidate configuration is unlocked.
Answers
C.
The candidate configuration is locked.
C.
The candidate configuration is locked.
Answers
D.
Other users cannot enter configuration mode.
D.
Other users cannot enter configuration mode.
Answers
Suggested answer: C, D

Explanation:

In Junos OS, when a user issues the configure exclusive command, it locks the candidate configuration for that user, preventing other users from making concurrent configuration changes. This exclusive lock ensures that configuration changes are managed in a controlled manner, reducing the risk of conflicting changes. As a result, while one user is in exclusive configuration mode, other users are prevented from entering configuration mode until the lock is released, either by the user committing the changes or exiting configuration mode.

Total 100 questions
Go to page: of 10