JN0-105 Practice Test Questions

100 Questions


Which two statements are true about the candidate configuration? (Choose two.)


A. Candidate configuration changes are automatically applied.


B. You can deploy multiple changes at the same time.


C. Multiple users cannot modify the same candidate configuration.


D. You can discard changes before committing them.





B.
  You can deploy multiple changes at the same time.

D.
  You can discard changes before committing them.

Which process in the Junos OS is responsible for device management tasks including the CLI and commit operations?


A. mgd


B. chassisd


C. rpd


D. dcd





A.
  mgd

How many rescue configuration files are supported on a Junos device?


A. 50


B. 3


C. 49


D. 1





C.
  49

Which two actions happen when multiple users issue the configure exclusive command to enter configuration mode on a Junos device? (Choose two.)


A. Other users can enter configuration mode.


B. The candidate configuration is unlocked.


C. The candidate configuration is locked.


D. Other users cannot enter configuration mode.





C.
  The candidate configuration is locked.

D.
  Other users cannot enter configuration mode.

You have logged on to a Junos device and are at the operational mode prompt.
Which two commands are used at this prompt? (Choose two.)


A. show interface ge-0/0/0


B. request system shutdown


C. set interface ge-0/0/0 unit 0 family inet


D. run show interface terse





A.
  show interface ge-0/0/0

What is the maximum number of rollback configuration files that the Junos OS will store?


A. 65


B. 59


C. 25


D. 19





B.
  59

Which two functions are performed by the PFE? (Choose two.)


A. It implements firewall filters.


B. It selects active routes


C. It forwards transit traffic.


D. It maintains the routing table.





A.
  It implements firewall filters.

C.
  It forwards transit traffic.

Explanation: The Packet Forwarding Engine (PFE) in Junos OS performs several key functions, including implementing firewall filters (A) and forwarding transit traffic (C). The PFE applies firewall filter rules to incoming and outgoing traffic and is responsible for the high-speed forwarding of packets based on the information in the forwarding table.

What is a benefit of using J-Web?


A. It simultaneously manages multiple devices.


B. It provides a customizable dashboard.


C. It provides more advanced features than the CLI.


D. It provides console-based management.





B.
  It provides a customizable dashboard.

Explanation: If you've committed a configuration and then need to revert to the previous configuration, the rollback command is used. Since the incorrect IP address has not been committed, as indicated by the commit check command being successful, issuing rollback 1 will undo the changes made in the current session, which includes the accidental entry of the IP address.

You received a new Junos device and are configuring the system-related settings. You must configure this device for the current date and time on the US West coast. You have set the time zone to America/Los_Angeies. however the time and date did not change.
In this scenario, which two additional actions would satisfy this requirement? (Choose two.)


A. Set the date and time setting manually.


B. Configure an NTP server.


C. Configure a DNS server.


D. Reboot the device.





A.
  Set the date and time setting manually.

B.
  Configure an NTP server.

Explanation: When configuring the system-related settings for the current date and time on a Junos device, especially for a specific time zone like America/Los_Angeles, and the time does not automatically adjust, two effective actions can be taken. Firstly, setting the date and time manually allows for immediate correction of the system clock. This can be done via the CLI with the appropriate set date and time command. Secondly, configuring the device to use an NTP server can provide ongoing synchronization with an accurate time source, ensuring that the device maintains the correct time and date automatically in the future, even in the case of restarts or minor drifts in the internal clock.

Which statement is correct when multiple users are configuring a Junos device using the configure private command?


A. A commit by any user will commit changes made by all active users.


B. A commit will not succeed until there is only a single user in configuration mode.


C. Each user gets their own candidate configuration.


D. Each user shares the same candidate configuration.





C.
  Each user gets their own candidate configuration.

Explanation: When multiple users are configuring a Junos device using the "configure private" command, each user gets their own candidate configuration (C). This allows for isolated configuration sessions, where changes made by one user do not impact or interfere with the changes made by another user in their private session.

You are asked to view the real-time usage statistics for the busiest interfaces on a device running Junos OS.
Which command will achieve this task?


A. monitor traffic absolute-sequence


B. monitor interface traffic


C. monitor traffic


D. show interfaces extensive





B.
  monitor interface traffic

Explanation: To view real-time usage statistics for the busiest interfaces on a device running Junos OS, the correct command is B, "monitor interface traffic." This command provides a dynamic, real-time view of the traffic flowing through the interfaces, allowing administrators to quickly identify and monitor the busiest interfaces on the device.

Which two statements are correct regarding Layer 2 network switches? (Choose two.)


A. Switches create a single collision domain.


B. Switches are susceptible to traffic loops.


C. Switches flood broadcast traffic.


D. Switches do not learn MAC addresses.





B.
  Switches are susceptible to traffic loops.

C.
  Switches flood broadcast traffic.

Explanation: Layer 2 network switches are crucial components in local area networks (LANs), providing multiple functions for data packet forwarding and network segmentation. One inherent characteristic of switches is their susceptibility to traffic loops, especially in networks with redundant paths. Without proper loop prevention protocols like Spanning Tree Protocol (STP), loops can cause broadcast storms and network instability. Additionally, switches inherently flood broadcast traffic to all ports within the broadcast domain, except the port on which the broadcast was received. This is because broadcast frames are meant to be delivered to all devices within the VLAN, and the switch ensures this by flooding these frames to all ports in the VLAN, except the source port.


Page 3 out of 9 Pages
Previous