Juniper jn0-105 practice test

Exam Title: Junos, Associate (JNCIA-Junos)

Last update: Dec 11 ,2025
Question 1

What are two attributes of the UDP protocol? (Choose two.)

  • A. UDP is more reliable than TCP.
  • B. UDP is always slower than TCP.
  • C. UDP is best effort.
  • D. UDP is connectionless.
Answer:

CD


Explanation:
UDP (User Datagram Protocol) is known for being connectionless (D) and providing best-effort
delivery without the reliability mechanisms present in TCP (C). This means that UDP does not
establish a connection before sending data and does not guarantee delivery, order, or error checking,
making it faster but less reliable than TCP.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

You are creating a new policy to accept and redistribute routes into your IGP.
In this scenario, which match criteria would you use to identify the route prefixes to select?

  • A. instance
  • B. route-type
  • C. neighbor
  • D. route-filter
Answer:

D


Explanation:
When creating a new policy to accept and redistribute routes into your Interior Gateway Protocol
(IGP), the route-filter match criteria is used to identify the route prefixes to select. The route-filter
statement specifies which prefixes should be matched in a policy. This allows for precise control over
which routes are accepted and redistributed, facilitating efficient and secure routing policies within
the network.
Reference:
"show | display set | match ge-0/0/2" indicating command examples and match criteria from Useful
Juniper Commands.txt​​.
Juniper official documentation: Routing Policy and Firewall Filters Configuration Guide.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

Which two addresses are included in an Ethernet frame header? (Choose two.)

  • A. source IP address
  • B. source MAC address
  • C. destination IP address
  • D. destination MAC address
Answer:

BD


Explanation:
An Ethernet frame header includes the source MAC address (B) and the destination MAC address (D).
These addresses are used to deliver the frame from one Ethernet device to another directly
connected Ethernet device on the same network segment. Ethernet frames do not include IP
addresses, as those are part of the IP packet encapsulated within the Ethernet frame.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

You issue the monitor traffic interface ge-0/0/0 command.
What will this command accomplish?

  • A. It displays real-time statistics for interface ge-0/0/0.
  • B. It displays an operational summary of ge-0/0/0.
  • C. It displays the MTU and MAC address for ge-0/0/0.
  • D. It displays a packet capture on interface ge-0/0/0.
Answer:

D


Explanation:
The command "monitor traffic interface ge-0/0/0" (D) initiates a packet capture on the specified
interface, allowing you to view the actual packets being transmitted and received. This is useful for
troubleshooting and analyzing the traffic passing through the interface in real time.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

Exhibit
{hold:node0}[edit]
root# set system root-authentication ?
Possible completions:
+ apply-groups​​​​​​​​ Groups from which to inherit configuration data
+ apply-groups-except​ Don't inherit configuration data from these groups
​ encrypted-password​​ Encrypted password string
​ load-key-file​​​​​​​ File (URL) containing one or more ssh keys
​ plain-text-password​ Prompt for plain text password (autoencrypted)
> ssh-dsa​​​​​​​​​​​​​ Secure shell (ssh) DSA public key string
> ssh-rsa​​​​​​​​​​​​​ Secure shell (ssh) RSA public key string
{hold:node0}[edit]
root# set system root-authentication plain-text-password
New password:
Retype new password:
{hold:node0}[edit]
root# commit and-quit
[edit interfaces]
​ 'ge-0/0/0'
​​​​ HA management port cannot be configured
error: configuration check-out failed
{hold:node0}[edit]
root#
You are unable to remotely access your Juniper device using the CLI.
Referring to the exhibit, which command would you add to the existing configuration to enable
remote CLI access?

  • A. load factory-default
  • B. set system root-authentication plain-text-password
  • C. set system services ssh
  • D. set system login idle-timeout 20
Answer:

C


Explanation:
In Junos OS, remote access to the device's CLI is commonly facilitated through Secure Shell (SSH), a
protocol providing secure command-line access over an insecure network. The given exhibit
indicates an attempt to set a root authentication password but does not show configuration for
enabling remote access services. To enable SSH, which is not shown in the configuration snippet, you
need to configure the device to accept SSH connections. This is done by enabling the SSH service
within the system services hierarchy of the configuration. The correct command to add to the
existing configuration for enabling remote CLI access via SSH is set system services ssh. This
command activates the SSH service, allowing secure remote logins to the device.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

What is the primary system log file that is present in the default configuration of a Junos device?

  • A. kmd
  • B. messages
  • C. vrrp
  • D. jsrpd
Answer:

B


Explanation:
In the default configuration of a Junos device, the primary system log file is "messages" (B). This log
file contains a wide range of system messages, including operational status changes, system errors,
and other critical information, making it a key resource for troubleshooting and monitoring the
system's health.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

What are two examples of exception traffic? (Choose two.)

  • A. transit packets
  • B. routing updates
  • C. log messages
  • D. ping to the local device
Answer:

BC


Explanation:
Exception traffic includes traffic that is not simply forwarded by the router but requires special
handling, such as routing updates (B) and log messages (C). These types of traffic are processed by
the router's control plane rather than just being forwarded through the data plane.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

You need to recover the root password on a Junos router without losing the current configuration
settings.
Which three statements describe what you should perform in this scenario? (Choose three.)

  • A. Enter and commit the new root password.
  • B. Load the factory-default configuration.
  • C. Upgrade the Junos OS to the latest version.
  • D. Hit the space bar and enter recovery when prompted.
  • E. Use a console connection to reboot the device.
Answer:

ADE


Explanation:
To recover the root password on a Junos router without losing the configuration, you should (A) enter
and commit the new root password once you have gained access to the system, (D) hit the space bar
to interrupt the boot process and enter recovery mode when prompted during the boot process, and
(E) use a console connection to reboot the device and access the bootloader prompt. These steps
allow you to reset the root password while preserving the existing configuration.

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 9

You configured your system authentication order using the set authentication-order tacplus radius
password command.
Which statement is correct in this scenario?

  • A. A rejection by TACACS+ will prevent a login and bypass the other two authentication methods.
  • B. The password authentication will only be used if the TACACS+ and RADIUS servers fail to respond.
  • C. All authentication methods are used with the most restrictive permission set used.
  • D. The password authentication method is evaluated if the TACACS+ and RADIUS servers respond with a reject message.
Answer:

B


Explanation:
In the scenario where the system authentication order is set to "tacplus radius password," the correct
statement is (B). If the TACACS+ and RADIUS servers are unreachable or fail to respond, the system
will fall back to using password authentication. This ensures that users can still authenticate using
locally stored passwords if external authentication servers are unavailable.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

Which three benefits occur when operating an interior gateway protocol (IGP) in an autonomous
system (AS)? (Choose three.)

  • A. IGPs automatically distribute static routing information.
  • B. IGPs determine the optimal paths for data transmission.
  • C. IGPs learn prefixes in the global Internet's routing table.
  • D. IGPs react very fast to network change.
  • E. IGPs learn everything about the subnets and best paths within your network.
Answer:

BDE


Explanation:
Operating an Interior Gateway Protocol (IGP) within an Autonomous System (AS) provides several
benefits, including determining the optimal paths for data transmission (B), reacting quickly to
network changes (D), and learning all about the subnets and best paths within the network (E). IGPs
are designed to manage routing within a single AS efficiently, adapting to changes and ensuring data
is routed through the best available paths.

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Page 1 out of 9
Viewing questions 1-10 out of 100
Go To
page 2