New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Juniper JN0-105 Dumps Questions Answers

Page: 1 / 8
Total 100 questions

Junos - Associate (JNCIA-Junos) 2024 Exam Questions and Answers

Question 1

Which command modifier would you use to see all possible completions for a specific command?

Options:

A.

|

B.

detail

C.

?

D.

extensive

Buy Now
Question 2

How many login classes are assignable to a user account?

Options:

A.

3

B.

2

C.

4

D.

1

Question 3

Exhibit

{hold:node0}[edit]

root# set system root-authentication ?

Possible completions:

+ apply-groups         Groups from which to inherit configuration data

+ apply-groups-except  Don't inherit configuration data from these groups

  encrypted-password   Encrypted password string

  load-key-file        File (URL) containing one or more ssh keys

  plain-text-password  Prompt for plain text password (autoencrypted)

> ssh-dsa              Secure shell (ssh) DSA public key string

> ssh-rsa              Secure shell (ssh) RSA public key string

{hold:node0}[edit]

root# set system root-authentication plain-text-password

New password:

Retype new password:

{hold:node0}[edit]

root# commit and-quit

[edit interfaces]

  'ge-0/0/0'

     HA management port cannot be configured

error: configuration check-out failed

{hold:node0}[edit]

root#

You are unable to remotely access your Juniper device using the CLI.

Referring to the exhibit, which command would you add to the existing configuration to enable remote CLI access?

Options:

A.

load factory-default

B.

set system root-authentication plain-text-password

C.

set system services ssh

D.

set system login idle-timeout 20

Question 4

Exhibit

[edit]

user@routerl set interfaces ge-0/1/2 unit 0 family inet address 172.16.101.1/24 [edit]

user@router# commit check

configuration check succeeds

[edit]

user@router#

You need to configure interface ge-0/1/2 with an IP address of 172.16.100.1/24. You have accidentally entered 172.16.101.1/24 as shown in the exhibit.

Which command should you issue to solve the problem?

Options:

A.

(edit] user@router# rollback 1

B.

[edit] user@router# rollback 2

C.

[edit] userOrouter# rollback 0

D.

[edit] user@routeri rollback rescue

Question 5

Which layer of the OSI model contains the IP address information?

Options:

A.

Layer 2

B.

Layer 3

C.

Layer 1

D.

Layer 4

Question 6

You configured your system authentication order using the set authentication-order tacplus radius password command.

Which statement is correct in this scenario?

Options:

A.

A rejection by TACACS+ will prevent a login and bypass the other two authentication methods.

B.

The password authentication will only be used if the TACACS+ and RADIUS servers fail to respond.

C.

All authentication methods are used with the most restrictive permission set used.

D.

The password authentication method is evaluated if the TACACS+ and RADIUS servers respond with a reject message.

Question 7

Which prompt indicates that you are using configuration mode?

Options:

A.

>

B.

$

C.

#

D.

%

Question 8

Your network infrastructure transports data, voice, and video traffic. Users are complaining that voice and video calls are not performing to their expectations.

In this scenario, which technology would you implement to improve voice and video performance on your network?

Options:

A.

NAT

B.

CoS

C.

STP

D.

IPv6

Question 9

You want to find out the chassis serial number of a Junos device.

Which command would display this information?

Options:

A.

show chassis environment

B.

show chassis hardware

C.

show chassis routing-engine

D.

show chassis location

Question 10

Which two common routing policy actions affect the flow of policy evaluation? (Choose two.)

Options:

A.

next policy

B.

community

C.

next term

D.

next hop

Question 11

Which process in the Junos OS is responsible for maintaining routing protocols and tables?

Options:

A.

mgd

B.

chassisd

C.

rpd

D.

dcd

Question 12

Which statement is correct when multiple users are configuring a Junos device using the configure private command?

Options:

A.

A commit by any user will commit changes made by all active users.

B.

A commit will not succeed until there is only a single user in configuration mode.

C.

Each user gets their own candidate configuration.

D.

Each user shares the same candidate configuration.

Question 13

You are configuring a firewall filter on a Juniper device.

In this scenario, what are two valid terminating actions? (Choose two.)

Options:

A.

1 count

B.

2discarD

C.

3next term

D.

4accept

Question 14

Which two external authentication methods does Junos support for administrative access? (Choose two.)

Options:

A.

TACACS+

B.

NIS

C.

RADIUS

D.

ACE

Question 15

What are two attributes of the UDP protocol? (Choose two.)

Options:

A.

UDP is more reliable than TCP.

B.

UDP is always slower than TCP.

C.

UDP is best effort.

D.

UDP is connectionless.

Question 16

Exhibit.

Referring to the exhibit, which routing configuration is required for these two users to access the remote server?

Options:

A.

Users must connect directly to the router.

B.

Users and the server require a default gateway.

C.

Trunk ports must be enabled on the switch.

D.

A routing protocol must be enabled on the router.

Question 17

Which two statements are correct about firewall filters? (Choose two.)

Options:

A.

"Discard" is the default action of packets that are not explicitly allowed.

B.

There can be only one firewall filter.

C.

"Accept" is the default action of packets that are not explicitly allowed.

D.

There can be multiple firewall filters.

Question 18

You have configured some interfaces on a Junos device; however, you have not yet committed the configuration.

What happens if you issue the rollback 0 command in this scenario?

Options:

A.

The messages.log file is deleted.

B.

The factory default configuration is loaded.

C.

The Junos device is rebooted.

D.

The interface changes you made are discarded.

Question 19

Click the Exhibit button.

How is traffic, sourced from 10.0.0.0/8, treated by the firewall filter shown in the exhibit?

Options:

A.

logged and discarded

B.

logged and rejected

C.

logged with no further action

D.

logged and accepted

Question 20

Which two statements are correct about the empioyee@Ri> prompt? (Choose two.)

Options:

A.

R1 is the hostname of your device.

B.

You are in operational mode.

C.

You are in configuration mode.

D.

You are at a shell prompt.

Question 21

Which protocol would you configure to synchronize the time and date on a Junos device?

Options:

A.

SNMP

B.

RIP

C.

NTP

D.

NMP

Question 22

Which criteria does the Junos OS use to select an active route when two entries exist in the routing table?

Options:

A.

the route with the lowest preference number

B.

the most recently learned dynamic route

C.

the route with the highest preference number

D.

the route with the highest metric

Question 23

Which two components are included in a transport header? (Choose two.)

Options:

A.

destination port number

B.

source MAC address

C.

source port number

D.

destination MAC address

Question 24

Which character is used to filter the command output in the Junos CLI?

Options:

A.

|

B.

>

C.

<

D.

?

Question 25

What are two link-state routing protocols? (Choose two.)

Options:

A.

RIP

B.

BGP

C.

OSPF

D.

IS-IS

Question 26

What will the request system configuration rescue save command do?

Options:

A.

It saves the most recently committed configuration as the rescue configuration.

B.

It saves the candidate configuration as the rescue configuration.

C.

It saves a configuration version prior to the configuration most recently committed as the rescue configuration.

D.

It activates the rescue configuration.

Question 27

Which two statements are correct regarding Layer 2 network switches? (Choose two.)

Options:

A.

Switches create a single collision domain.

B.

Switches are susceptible to traffic loops.

C.

Switches flood broadcast traffic.

D.

Switches do not learn MAC addresses.

Question 28

Which two statements are correct about a Routing Engine? (Choose two.)

Options:

A.

It processes CoS marked traffic.

B.

It forwards transit traffic.

C.

It processes management traffic.

D.

It maintains routing tables.

Question 29

You issue the telnet 10.10.10.1 source 192.168.100.1 command.

Which two statements are correct in this scenario? (Choose two.)

Options:

A.

The telnet session will have a source address of 10.10.10.1.

B.

The telnet session will have a destination address of 192.168.100.1.

C.

The telnet session will have a destination address of 10.10.10.1.

D.

The telnet session will have a source address of 192.168.100.1.

Question 30

You need to recover the root password on a Junos router without losing the current configuration settings.

Which three statements describe what you should perform in this scenario? (Choose three.)

Options:

A.

Enter and commit the new root password.

B.

Load the factory-default configuration.

C.

Upgrade the Junos OS to the latest version.

D.

Hit the space bar and enter recovery when prompted.

E.

Use a console connection to reboot the device.

Page: 1 / 8
Total 100 questions