ExamGecko
Home Home / Juniper / JN0-105

Juniper JN0-105 Practice Test - Questions Answers, Page 8

Question list
Search
Search

Which statement is correct concerning exception traffic processing?

A.
Exception traffic is always dropped during congestion.
A.
Exception traffic is always dropped during congestion.
Answers
B.
Exception traffic is rate-limited to protect the RE.
B.
Exception traffic is rate-limited to protect the RE.
Answers
C.
Exception traffic is discarded by the PFE.
C.
Exception traffic is discarded by the PFE.
Answers
D.
Exception traffic is never forwarded.
D.
Exception traffic is never forwarded.
Answers
Suggested answer: B

Explanation:

Exception traffic refers to packets that the Packet Forwarding Engine (PFE) cannot process normally and must be forwarded to the Routing Engine (RE) for further processing. This includes packets destined for the router itself or packets needing special handling that the PFE cannot provide. To protect the RE from being overwhelmed by such traffic, which could potentially impact the router's control plane functions, exception traffic is rate-limited. This means that there's a threshold to how much exception traffic can be sent to the RE, ensuring that the router's critical management and control functions remain stable and responsive even during high traffic volumes or attacks.

Which component is considered part of the data plane?

A.
the Routing Engine
A.
the Routing Engine
Answers
B.
the Packet Forwarding Engine
B.
the Packet Forwarding Engine
Answers
C.
the power supply
C.
the power supply
Answers
D.
the fan tray
D.
the fan tray
Answers
Suggested answer: B

Explanation:

The Packet Forwarding Engine (PFE) is an integral component of Juniper Networks devices, responsible for the data plane operations. The data plane, also known as the forwarding plane, is where the actual processing and forwarding of packets occur based on the routing and forwarding tables. The PFE executes the forwarding decisions made by the Routing Engine (RE), handling all packet transmissions, including routing, filtering, and switching packets towards their destination. This contrasts with the control plane operations handled by the RE, which involve routing table maintenance, system management, and control protocol processing.

Which two statements are correct about a Routing Engine? (Choose two.)

A.
It processes CoS marked traffic.
A.
It processes CoS marked traffic.
Answers
B.
It forwards transit traffic.
B.
It forwards transit traffic.
Answers
C.
It processes management traffic.
C.
It processes management traffic.
Answers
D.
It maintains routing tables.
D.
It maintains routing tables.
Answers
Suggested answer: C, D

Explanation:

The Routing Engine (RE) in Juniper Networks devices plays a pivotal role in the control plane, handling tasks that are critical for the operation and management of the network. One of its key functions is processing management traffic, which includes user commands, system configuration, and monitoring operations. The RE also maintains routing tables, which are essential for network routing decisions. These tables contain network topology information and routing paths, which the RE uses to update the Packet Forwarding Engine (PFE) so that it can forward packets appropriately. The RE does not forward transit traffic or process Class of Service (CoS) marked traffic, as these tasks are handled by the PFE.

Your network infrastructure transports data, voice, and video traffic. Users are complaining that voice and video calls are not performing to their expectations.

In this scenario, which technology would you implement to improve voice and video performance on your network?

A.
NAT
A.
NAT
Answers
B.
CoS
B.
CoS
Answers
C.
STP
C.
STP
Answers
D.
IPv6
D.
IPv6
Answers
Suggested answer: B

Explanation:

In a network that carries diverse types of traffic like data, voice, and video, ensuring the performance of latency-sensitive applications such as voice and video calls is crucial. Class of Service (CoS) is a technology designed to prioritize network traffic, ensuring that critical applications like voice and video receive the necessary bandwidth and minimal latency. CoS mechanisms can include traffic classification, traffic policing, queue management, and scheduling. By implementing CoS, network administrators can assign higher priority to voice and video traffic, thus improving their performance across the network and addressing the users' complaints about call quality.

A network administrator is attempting to route traffic on a Juniper switch to one of three different VLANs: Prod, Test, and Dev. Each VLAN has been assigned a numerical value.

In this scenario, what are these numerical values called?

A.
defaults
A.
defaults
Answers
B.
interfaces
B.
interfaces
Answers
C.
names
C.
names
Answers
D.
tags
D.
tags
Answers
Suggested answer: D

Explanation:

In the context of VLANs (Virtual Local Area Networks) on a Juniper switch, the numerical values assigned to each VLAN, such as those for Prod, Test, and Dev, are known as VLAN tags. These tags are part of the 802.1Q VLAN standard, which allows multiple VLANs to coexist on a single physical network. Each tag uniquely identifies the VLAN to which a frame belongs, enabling the switch to segregate and manage traffic based on VLAN membership. This tagging mechanism allows for efficient traffic separation and management, ensuring that devices within one VLAN do not receive traffic intended for another, thus maintaining network security and efficiency.

Which two statements are correct regarding Layer 2 network switches? (Choose two.)

A.
Switches create a single collision domain.
A.
Switches create a single collision domain.
Answers
B.
Switches are susceptible to traffic loops.
B.
Switches are susceptible to traffic loops.
Answers
C.
Switches flood broadcast traffic.
C.
Switches flood broadcast traffic.
Answers
D.
Switches do not learn MAC addresses.
D.
Switches do not learn MAC addresses.
Answers
Suggested answer: B, C

Explanation:

Layer 2 network switches are crucial components in local area networks (LANs), providing multiple functions for data packet forwarding and network segmentation. One inherent characteristic of switches is their susceptibility to traffic loops, especially in networks with redundant paths. Without proper loop prevention protocols like Spanning Tree Protocol (STP), loops can cause broadcast storms and network instability. Additionally, switches inherently flood broadcast traffic to all ports within the broadcast domain, except the port on which the broadcast was received. This is because broadcast frames are meant to be delivered to all devices within the VLAN, and the switch ensures this by flooding these frames to all ports in the VLAN, except the source port.

Click the Exhibit button.

Referring the exhibit, what does the highlighted number indicate?

A.
route preference is 5
A.
route preference is 5
Answers
B.
hop count is 5
B.
hop count is 5
Answers
C.
cost is 5
C.
cost is 5
Answers
D.
metric is 5
D.
metric is 5
Answers
Suggested answer: A

Explanation:

In the exhibit shown, the highlighted number next to the route type (Static) within the square brackets indicates the route preference, also known as the administrative distance. In Junos, the route preference is a value that determines the priority of the route source. Lower numbers indicate a higher priority when the routing table is being calculated. The route preference is used to select the best route when multiple paths to the same destination exist from different routing sources. The number 5 is unusually low for a static route by default, suggesting it has been manually configured to override other route types.

What does the user@router> clear log ospf-trace command accomplish?

A.
Logging data into ospf-trace is stopped.
A.
Logging data into ospf-trace is stopped.
Answers
B.
Trace parameters are removed from the OSPF protocol configuration.
B.
Trace parameters are removed from the OSPF protocol configuration.
Answers
C.
Data in the ospf-trace file is removed and logging continues.
C.
Data in the ospf-trace file is removed and logging continues.
Answers
D.
The ospf-trace file is deleted.
D.
The ospf-trace file is deleted.
Answers
Suggested answer: C

Explanation:

The clear log ospf-trace command on a Juniper Networks router is used specifically to manage the contents of the log file named ospf-trace. Executing this command clears or deletes the existing data within the ospf-trace log file but does not stop the logging process. The router continues to log new OSPF-related events and data into this file after the command is executed. This functionality is crucial for troubleshooting and monitoring the OSPF (Open Shortest Path First) protocol's operation by allowing network administrators to remove old or irrelevant log data while continuously capturing new events without interruption.

Your router has a route to the 10.1.1.0/24 network with a next hop of r jet.

In this scenario, which action will your router perform when traffic destined to the 10.1.1.0/24 network is received?

A.
The traffic will be discarded and an ICMP unreachable message will be sent to the destination of the traffic.
A.
The traffic will be discarded and an ICMP unreachable message will be sent to the destination of the traffic.
Answers
B.
The traffic will be discarded and an ICMP unreachable message will be sent to the source of the traffic.
B.
The traffic will be discarded and an ICMP unreachable message will be sent to the source of the traffic.
Answers
C.
The traffic will be redirected using a default route.
C.
The traffic will be redirected using a default route.
Answers
D.
The traffic will be silently discarded.
D.
The traffic will be silently discarded.
Answers
Suggested answer: D

Explanation:

In a scenario where a router has a route to a specific network (in this case, 10.1.1.0/24) with a next hop that is unreachable or incorrectly specified (e.g., 'r jet' seems to be a typo or an undefined entity), the router will typically discard the traffic destined for that network. This action is taken because the router cannot determine a valid path to forward the traffic. Unlike some scenarios where the router might generate an ICMP (Internet Control Message Protocol) unreachable message, in many configurations, especially in production networks, the traffic might be silently discarded without providing feedback to the sender, as generating ICMP messages for all undeliverable packets could lead to additional network congestion and potential security concerns.

Which layer of the OSI model contains the IP address information?

A.
Layer 2
A.
Layer 2
Answers
B.
Layer 3
B.
Layer 3
Answers
C.
Layer 1
C.
Layer 1
Answers
D.
Layer 4
D.
Layer 4
Answers
Suggested answer: B

Explanation:

The OSI (Open Systems Interconnection) model is a conceptual framework used to understand network interactions in seven distinct layers. IP (Internet Protocol) addresses are part of Layer 3, known as the Network Layer. This layer is responsible for packet forwarding, including routing through intermediate routers, and it handles the logical addressing scheme of the network to ensure that packets can be routed across multiple networks and reach their destination. IP addresses provide unique identifiers for network interfaces, allowing for communication between devices on a network or across different networks.

Total 100 questions
Go to page: of 10