DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Juniper JN0-105 Practice Exam 2024, Juniper Mock Exam | SPOTO

The Juniper JN0-105 exam is a vital certification for network professionals aiming to validate their knowledge of Junos OS and basic networking concepts. It is a key component of the JNCIA-Junos certification track, focusing on essential topics like network protocols, device configuration, and troubleshooting. To help candidates prepare effectively, SPOTO offers a JN0-105 Practice Exam for 2024. This mock exam is designed to simulate the actual test environment, giving you a chance to practice with real exam-style questions and assess your understanding of key concepts. By taking the Juniper JNCIA-Junos mock exam, you can identify areas where you need more study and build confidence to pass the official exam, ensuring success in obtaining your Juniper Networks certification.
Take other online exams

Question #1
What is the purpose of a network mask?
A. It is used to identify the maximum hop count of a subnetwork
B. It is used to identify an IP address as either private or public
C. It is used to identify the network to which an IP address belongs
D. It is used to identify the total number of bits present in an IP address
View answer
Correct Answer: C

View The Updated JN0-105 Exam Questions

SPOTO Provides 100% Real JN0-105 Exam Questions for You to Pass Your JN0-105 Exam!

Question #2
Which two characteristics describe the UDP protocol? (Choose two.)
A. limited error checking
B. defined timers
C. no recovery mechanisms
D. three-way handshake
View answer
Correct Answer: AC
Question #3
When attempting to view the OSPF routes in the routing table, you issue the command show route table inet.3 but no OSPF routes are displayed. What is the problem?
A. The OSPF routes are located in the inet4
B. The OSPF routes are located in the inet
C. The OSPF routes are located in the inet
D. The OSPF routes are located in the inet4
View answer
Correct Answer: B
Question #4
What is the default export routing policy for RIP?
A. Accept all local routes
B. Accept all RIP routes
C. Accept no routes
D. Accept all direct routes
View answer
Correct Answer: C
Question #5
By default, which two statements are true about export routing policies? (Choose two.)
A. Export policies can evaluate only active routes
B. Export policies can evaluate all routes
C. Export policies can be applied to the forwarding table
D. Export policies can be applied directly to interfaces
View answer
Correct Answer: AC
Question #6
Click the exhibit button. Which statement is correct regarding the configuration shown in the exhibit?
A. When the ospf-trace file has created five files, it will stop logging additional information
B. When the ospf-trace file reaches the 64 KB file size, it is renamed and begins a new file
C. Timestamp information will not be included for each line of ospf-trace output
D. The ospf-trace file will automatically replace any existing trace file with the same name
View answer
Correct Answer: B
Question #7
Which process is responsible for controlling all interfaces on a Junos device?
A. rpd
B. chassisd
C. mgd
D. dcd
View answer
Correct Answer: D
Question #8
Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?
A. [edit firewall]user@router# showpolicer LIMIT-MAL-USER {if-exceeding {bandwidth-limit 400k;burstsize-limit 100k;}then discard;}familyinet {filter STOP-MAL-USER {term one {from {source-address {100
B. [edit firewall]user@router# showpolicer LIMIT-BAD-USER {if-exceeding {bandwidth-limit 400k;burstsize-limit 100k;}then discard;}familyinet {filter STOP-MAL-USER {term one {from {source-address {100
C. [edit firewall]user@router# showpolicer LIMIT-MAL-USER {if-exceeding {bandwidth-limit 400k;burstsize-limit 100k;}then discard;}familyinet {filter STOP-MAL-USER {term one {from {source-address {100
D. [edit firewall]user@router# showpolicer LIMIT-MAL-USER {if-exceeding {bandwidth-limit 400k;burstsize-limit 100k;}then discard;}familyinet {filter STOP-MAL-USER {term one {from {source-address {200
View answer
Correct Answer: A
Question #9
-- Exhibit -user@router> show route protocol static inet.0: 12 destinations, 12 routes (12 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both 192.168.1.128/27 *[Static/5] 00:03:13 >to 10.20.106.10 via fe-0/0/5.1 192.168.1.144/29 *[Static/5] 00:03:13 >to 10.20.14.131 via ge-0/0/0.0 192.168.1.192/27 *[Static/5] 00:03:13 >to 10.18.1.1 via ge-0/0/1.0 192.168.1.128/28 *[Static/5] 00:01:06 >to 10.20.14.130 via ge-0/0/0.0 -- Exhibit -Given the routing entries shown in the exhibit, which next
A. 10
B. 10
C. 10
D. 10
View answer
Correct Answer: D
Question #10
Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?
A. [edit firewall family inet filter STOP-MAL-USER]user@router# showterm one {from {source-address {200
B. [edit firewall family inet filter STOP-MAL-USER]user@router# showterm one {from {source-address {100
C. [edit firewall family inet filter STOP-MAL-USER]user@router# showterm one {from {source-address {100
D. [edit firewall family inet filter STOP-MAL-USER]user@router# showterm one {from {source-address {200
View answer
Correct Answer: D
Question #11
Your network administrator has asked you to view the real-time interface usage on ge- 0/0/0. Which command would be used?
A. monitor interface ge-0/0/0
B. traceoptions interface ge-0/0/0
C. debug interface ge-0/0/0
D. monitor usage ge-0/0/0
View answer
Correct Answer: A
Question #12
What represents the decimal equivalence of 11100101?
A. 5
B. 93
C. 177
D. 229
View answer
Correct Answer: D
Question #13
Which command configures an address of 192.168.1.1 with a mask of 255.255.255.0 on interface ge0/0/0?
A. set ip interface ge-0/0/0 address 192
B. set ip interface ge-0/0/0 address 192
C. set interface ge-0/0/0 ip4 address 192
D. set interfaces ge-0/0/0 unit 0 family inet address 192
View answer
Correct Answer: D
Question #14
Which protocol creates a complete database of the network topology prior to calculating the optimal route?
A. BGP
B. PIM
C. OSPF
D. RIP
View answer
Correct Answer: C
Question #15
What is the purpose of a network mask?
A. It is used in conjunction with the wildcard mask to determine the number of hosts on a network
B. It is used to define which parts of the IP address are allocated to host addresses and network prefixes
C. It is used to hide subnets from external networks by masking the subnets with NAT
D. It is used to differentiate a network as a classful network or a classless network
View answer
Correct Answer: B
Question #16
Which three protocols are connectionless? (Choose three.)
A. DNS
B. TFTP
C. ICMP
D. SSH
E. Telnet
View answer
Correct Answer: ABC
Question #17
Two devices on an Ethernet segment sent frames at the same time causing a collision. Which two statements are true? (Choose two.)
A. Both devices stop transmitting, wait a random period of time, verify the wire is idle, and re-transmit
B. The device with the lowest MAC address is permitted to retransmit first
C. The device with the lowest MAC address sends a jam signal to notify all other devices of the collision
D. Both devices send a jam signal to notify all other devices of the collision
View answer
Correct Answer: AD
Question #18
Which CIDR notation is the equivalent of the subnet mask of 255.255.192.0?
A. /18
B. /19
C. /17
D. /20
View answer
Correct Answer: A
Question #19
Which two commands would you use to view OSPF routes? (Choose two.)
A. show ip route ospf
B. show ospf routes
C. show route protocol ospf
D. show route
View answer
Correct Answer: CD
Question #20
What are three physical interface properties? (Choose three.)
A. payload scrambling
B. virtual circuit identifier
C. FCS
D. link speed
E. IP address
View answer
Correct Answer: ACD
Question #21
Which configuration causes RIP-learned routes to be advertised to other RIP neighbors?
A. set protocol rip no-passive
B. top edit policy-options policy-statement demoset term 1 from protocol ripset term 1 then accepttop set protocols rip group internal export demo
C. set protocols rip advertise in-out
D. top edit policy-options policy-statement demoset term 1 from active routesset term 1 then accepttop set protocols rip group internal export demo
View answer
Correct Answer: B
Question #22
Which IP protocol number is assigned to TCP?
A. 17
B. 4
C. 18
D. 6
View answer
Correct Answer: D
Question #23
By default, what are three valid routing tables? (Choose three.)
A. inet
B. inet4
C. inet
D. inet6
E. inet
View answer
Correct Answer: ADE
Question #24
Using the command, user@router# load override latest.conf, where in the file system will the latest.conf be located?
A. /var/home/user/
B. /var/config/saved/
C. /var/tmp/
D. /config/
View answer
Correct Answer: A
Question #25
Which statement is true when using the allow command and deny command attributes when creating user permissions?
A. If you allow and deny the same commands, the Junos OS will fail the commit check
B. If you allow and deny the same commands, the allow command permissions take precedence over the deny command permissions
C. If you specify a regular expression for allow and deny with two variants of a command, both will be ignored
D. The all login class permission bits take precedence over allow and deny when a user issues the rollback command
View answer
Correct Answer: B
Question #26
What does the command show | compare rollback 1 display?
A. the difference between the current candidate configuration and the candidate configuration from one commit ago
B. the difference between the current active configuration and the current candidate configuration
C. the difference between the current active configuration and the active configuration from one commit ago
D. the difference between the current candidate configuration and the archived configuration from one commit ago
View answer
Correct Answer: D
Question #27
What are three acceptable modifiers to a terminating action of a firewall filter? (Choose three.)
A. Policer
B. Count
C. Syslog
D. Log
E. Discard
View answer
Correct Answer: ABD
Question #28
When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?
A. snoop
B. tcpdump
C. monitor
D. tail
View answer
Correct Answer: B
Question #29
Which two fields are found in an Ethernet frame header? (Choose two.)
A. TTL
B. flags
C. checksum
D. type
View answer
Correct Answer: CD
Question #30
You have configured a firewall filter with a single term matching on packets with a source address in the 10.0.0.0/24 subnet. This term only includes the count action. Which two statements are true about traffic evaluated by this firewall filter? (Choose two.)
A. Packets within the 10
B. Packets within the 10
C. Packets within the 10
D. Packets within the 10
View answer
Correct Answer: AC
Question #31
What are two protocols that the Junos OS uses to archive configuration files remotely? (Choose two.)
A. SCP
B. HTTP
C. SFTP
D. FTP
View answer
Correct Answer: AD
Question #32
Which two statements describe the RE on Junos OS devices? (Choose two.)
A. The RE is considered the control plane
B. The RE forwards traffic based on its local copy of the forwarding table
C. The RE provides hardware status messages for the PFE
D. The RE maintains the routing tables
View answer
Correct Answer: AD
Question #33
Which three statements describe the Transmission Control Protocol (TCP)? (Choose three.)
A. TCP is a transport layer protocol
B. TCP is faster than the User Datagram Protocol (UDP)
C. TCP provides delivery notification and error-checking mechanisms
D. TCP uses a best-effort delivery approach
E. TCP application examples include HTTP and SMTP
View answer
Correct Answer: ACE
Question #34
What information would you find using the CLI help command?
A. message of the day
B. an explanation for specific system log error messages
C. hyperlinks for remediation actions
D. a URL for accessing the technical documentation
View answer
Correct Answer: B
Question #35
Click the Exhibit button. Which operational mode command in Junos OS produces the output shown in the exhibit?
A. show system users
B. show system connections
C. show system commit
D. show system reboot
View answer
Correct Answer: C
Question #36
Which two statements describe IPv4 default behavior for BGP? Choose Two
A. All Active BGP routes are exported to configured EBGP neighbors
B. All BGP routes are exported to configured EBGP neighbors
C. All BGP routes are imported into the inet
D. All BGP routes are imported into the inet4
View answer
Correct Answer: AC
Question #37
Which two statements about firewall filters are correct? (Choose two.)
A. Firewall filters can match Layer 7 parameters
B. Firewall filters are stateless
C. Firewall filters are stateful
D. Firewall filters can match Layer 4 parameters
View answer
Correct Answer: BD
Question #38
Which two statements describe PFE functions are true?
A. The PFE implements rate limiting using policers
B. The PFE stores the master copy of the layer 2 and layer 3 forwarding tables
C. The PFE provides access to the CLI and Jweb
D. The PFE stores a local copy of the layer 2 and layer 3 forwarding tables
View answer
Correct Answer: AD
Question #39
What is the purpose of the load merge command?
A. to add or delete variables from the configuration based on the contents of a specified path file
B. to completely overwrite the current configuration with the configuration you load
C. to combine the current configuration with the configuration you load
D. to look for a replace tag in the configuration you load
View answer
Correct Answer: C
Question #40
You are asked to configure your device running Junos OS to automatically archive your configuration upon commit. In this scenario, which two methods are supported by the Junos OS? (Choose two.)
A. SCP
B. RCP
C. FTP
D. HTTP
View answer
Correct Answer: AB
Question #41
Referring to the exhibit, what is the expected behavior for login attempts from users that receive a reject form from both the RADIUS and TACACS+ servers?
A. Users are prompted for a local authentication password
B. Users are not prompted for a local authentication password
C. Users are prompted for the root authentication password
D. Users are granted limited access to the device using a guest account
View answer
Correct Answer: B

View The Updated Juniper Exam Questions

SPOTO Provides 100% Real Juniper Exam Questions for You to Pass Your Juniper Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: