DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Latest JN0-105 Questions and Answers​ 2024, Free PDF | SPOTO

The JN0-105 exam is a foundational certification for IT professionals aiming to demonstrate their proficiency in Junos OS and networking principles. It’s part of the JNCIA-Junos certification, covering topics like network protocols, device configuration, and operational troubleshooting. To make exam preparation more accessible, SPOTO provides the Latest JN0-105 Questions and Answers 2024 Free PDF, an essential study resource for aspiring candidates. This PDF includes up-to-date, expert-curated questions designed to match the actual exam format, helping you gain confidence and improve your knowledge. Whether you’re revising or testing your skills, SPOTO’s free materials are tailored to meet your needs, ensuring you’re thoroughly prepared to pass the Juniper JNCIA-Junos certification exam and advance in your networking career.
Take other online exams

Question #1
What are two services performed by the Packet Forwarding Engine? (Choose two.)
A. to process transit traffic
B. to implement stateless firewall filtering
C. to handle processes that control the device's Interfaces
D. to maintain the routing tables
View answer
Correct Answer: AB

View The Updated JN0-105 Exam Questions

SPOTO Provides 100% Real JN0-105 Exam Questions for You to Pass Your JN0-105 Exam!

Question #2
Click the Exhibit button. ***Exhibit is Missing*** UserA is currently working on routed and has issued the commands shown in the exhibit. UserB wants to update the IP address currently configured on interface xe-1/2/1.0. What will UserB do to complete the configuration changes without interfering with UserA's work?
A. UserB should use the configure private option to complete the changes while UserA continues with the changes
B. UserB should use the configure exclusive option to complete the changes while UserA continues with the changes
C. Use the edit command and run the commit confirmed option then proceed with UserB's changes
D. Wait for UserA to finish then proceed with changes using the configure private option
View answer
Correct Answer: B
Question #3
Which two platforms are supposed in both physical and virtual form factors? Choose TWO
A. NFX Series
B. ACX Series
C. SRX Series
D. MX Series
View answer
Correct Answer: CD
Question #4
Exhibit: Referring to the exhibit, which statement is true?
A. Traps are allowed from 10
B. Traps are sent to 10
C. Traps are sent to 10
D. Traps are allowed from 10
View answer
Correct Answer: D
Question #5
What are three characteristics of Layer 2 switches? (Choose Three)
A. Layer 2 switches separates multicast domains
B. Layer 2 switches separates collision domains
C. Layer 2 switches forward traffic addressed to hosts that reside on the same collision domain
D. Layer 2 switches forward traffic addressed to hosts that reside on a different collision domain
E. Layer 2 switches forward broadcast traffic
View answer
Correct Answer: BDE
Question #6
What is a function of the PFE?
A. to generate protocol control traffic
B. to monitor chassis components
C. to apply stateless firewall filters
D. to generate forwarding tables
View answer
Correct Answer: C
Question #7
What is the maximum number of rollback files a Junos device can store?
A. 5
B. 10
C. 49
D. 50
View answer
Correct Answer: D
Question #8
Which two platforms are supported in physical and virtual form factors? (Choose two.)
A. NFX Series
B. SRX Series
C. MX Series
D. ACX Series
View answer
Correct Answer: BC
Question #9
What are two link state routing protocols? (Choose two.)
A. IS-IS
B. OSPF
C. IBGP
D. EBGP
View answer
Correct Answer: AC
Question #10
Which command is used to validate the syntax of a configuration without applying the configuration?
A. commit check
B. commit confirmed
C. commit synchronize
D. commit and-quit
View answer
Correct Answer: A
Question #11
What are three acceptable modifiers to a terminating action on a firewall filter? (Choose three.)
A. policer
B. count
C. log
D. discard
E. syslog
View answer
Correct Answer: BCE
Question #12
Which two protocols use UDP to facilitate speed? (Choose two.)
A. OFTP
B. TFTP
C. SCP
D. SNMP
View answer
Correct Answer: BD
Question #13
You loaded the factory-default configuration on your Junos device. Which single element must be configured before a commit command will succeed?
A. An IPv4 address must be configured on the fxpO or emO interface
B. An IPv4 default route must be configured
C. A hostname must be configured
D. A root password must be configured
View answer
Correct Answer: D
Question #14
What is the network address for a host with an IP address of 192.168.87.125/16?
A. 192
B. 192
C. 192
D. 192
View answer
Correct Answer: D
Question #15
Click the Exhibit button. A user attempts to log in to a Junos device. but the RADIUS server is unreachable. Referring to the exhibit, what is the default action of a Junos device in this scenario?
A. The Junos device retries every 30 seconds until the connection is restored
B. The Junos device uses the local authentication database
C. The Junos device displays a RADIUS connection error
D. The Junos device prompts for a cached RADIUS password
View answer
Correct Answer: C
Question #16
What does the output of the show route forwarding-table command display?
A. The routing protocol databases in the Routing Engine
B. The inactive entries in the Routing Engine's routing table
C. The Routing Engine's forwarding table
D. The Packet Forwarding Engine routing table
View answer
Correct Answer: C
Question #17
The PFE receives which two tables from the RE? (Choose two.)
A. Layer 5 forwarding table
B. Layer 2 forwarding table
C. Layer 3 forwarding table
D. Laver 4 forwardina table
View answer
Correct Answer: BC
Question #18
Which system-defined user class is able to perform all operations on a device?
A. operator
B. authorized
C. read-write
D. super-user
View answer
Correct Answer: D
Question #19
What is the name of the volume containing the software and files used for the day-to day operation of a device using Junos with upgraded FreeBSD?
A. /var
B. /active
C. /junos
D. /oam
View answer
Correct Answer: C
Question #20
Click the Exhibit button. Which two statements about the output shown in the exhibit are correct? (Choose two.)
A. The neighbors are not using the Junos OS default OSPF priority value
B. The IP address assigned to the router's ge-0/0/1
C. The router has two OSPF adjacencies
D. The router ID of the neighbor connected to the ge-0/0/1
View answer
Correct Answer: AC
Question #21
When you choose to read your e-mail using an e-mail client, your e-mail client interacts with which OSI layer?
A. presentation
B. transport
C. application
D. session
View answer
Correct Answer: B
Question #22
Given the following configuration, set system authentication-order [ tacplus ] Which two statements are correct? (Choose two.)
A. If the TACACS+ server is available and rejects the username/password provided, the user is not allowed to access the device
B. If the TACACS+ server is available and rejects the username/password provided, the local password database is checked
C. If the TACACS+ server is not available, the user is not allowed to access the device
D. If the TACACS+ server is not available, the local user database is checked
View answer
Correct Answer: CD
Question #23
How would you change the display so the display so that 40 lines will be displayed in the terminal program when you are logged into a Junos device?
A. Issue the set cli screen-length 40 command from configuration mode
B. Set the display options in your terminal program
C. Issue the set cli screen-length 40 command from operational mode
D. Set the windows size of your terminal program
View answer
Correct Answer: C
Question #24
Which command should you use to check real-time statistics of all active interfaces?
A. ser@router> monitor interface traffic
B. ser@router> show interface detail
C. ser@router> show interface terse
D. ser@router> monitor traffic extensive
View answer
Correct Answer: A
Question #25
You notice that the terms in your firewall filter are not in the correct order. What would solve this problem?
A. Use the insert command to reorder the terms within the filter
B. Use the count parameter to ensure that the terms are evaluated correctly
C. Use the reject action to change the action of the filter
D. Use the next term action to force an evaluation of the next term
View answer
Correct Answer: A
Question #26
What statement is true about the orlonger route-filter match type?
A. All routes within the specified prefix that are longer than the given prefix are considered a match
B. All routes within the specified prefix that are longer or equal to the given prefix up to a defined acceptable prefix length are considered a match
C. All routes within the specified prefix that are longer or equal to the given prefix are considered a match
D. All routes within the specified prefix that are longer than the given prefix up to a defined acceptable prefix length are considered a match
View answer
Correct Answer: A
Question #27
Which TWO of the following are private IP addresses?
A. 12
B. 168
C. 172
D. 172
E. 192
View answer
Correct Answer: C
Question #28
Given the configuration shown below: set system authentication-order [tacplus] Which two statement are correct? (Choose two.)
A. If the TACACS+ server is no available, the user is not allowed to access the device
B. If the TACACS+ server is no available, the local database is checked
C. If the TACACS+ server is available, and rejects the username/password provided, the local password database is checked
D. If the TACACS+ server is available, and rejects the username/password provided, the user is not allowed to access the device
View answer
Correct Answer: BD
Question #29
The user root is unable to connect to the router using SSH. Referring to the exhibit, which configuration change will correct the problem?
A. [edit] user@router# set system services ssh root-login allow
B. [edit] userr@outer# set system services ssh
C. [edit] user@router# delete system services ssh
D. [edit] use^@router# delete system services ssh root-login deny
View answer
Correct Answer: A
Question #30
Which three statements describe the Transmission Control Protocol (TCP)? (Choose three.)
A. TCP is a transport layer protocol
B. TCP is faster than the User Datagram Protocol (UDP)
C. TCP provides delivery notification and error-checking mechanisms
D. TCP uses a best-effort delivery approach
E. TCP application examples include HTTP and SMTP
View answer
Correct Answer: ACE
Question #31
Which parameter must be included when executing operational mode commands from within configuration mode?
A. run
B. prompt
C. insert
D. do
View answer
Correct Answer: A
Question #32
Click the Exhibit button. Referring to the exhibit, which two statements are correct? (Choose two.)
A. The last 5 second CPU utilization is 99%
B. The last 5 second CPU utilization is 1%
C. The control plane memory used is 63%
D. The data plane memory used is 63%
View answer
Correct Answer: BC
Question #33
You have entered the command "show log messages | match "error | kernel | panic", which statement is correct regarding the keywords error, kernel and panic in the output?
A. the output messages will contain all messages from the file except the ones that contain all three defined keywords
B. the output messages will contain all messages from the file that contains all three defined Keywords
C. the output messages will contain all messages from the file that contains at least one of the three defined keywords
D. the output messages will contain all messages from the file except the ones that contains at least one of the three defined keywords
View answer
Correct Answer: B
Question #34
Referring to the exhibit. Which OSPF feature would connect Area 2 to Area 0?
A. route summarization
B. equal-cost multipath
C. virtual link
D. database synchronization
View answer
Correct Answer: C
Question #35
You are in configuration mode at the top of the hierarchy. How would you save your configuration to a file on the router?
A. save configuration
B. save config
C. save
D. save run
View answer
Correct Answer: C
Question #36
What are two default password requirements on devices running Junos OS? (Choose two.)
A. Passwords must be at least six characters in length
B. An expiration date must be set
C. Passwords must contain at least one special character
D. Alphanumeric characters classes must be used
View answer
Correct Answer: AD
Question #37
Which two interfaces are considered physical interfaces? (Choose two.)
A. xe-10/2/1
B. ge-0/0/0
C. et-3/0/0/0:0
D. et-7/1/4
View answer
Correct Answer: AB
Question #38
Click the Exhibit button. Referring to the exhibit, which command was issued to generate the output?
A. show chassis routing-engine
B. show chassis hardware
C. show chassis environment
D. show chassis fpc
View answer
Correct Answer: B
Question #39
After logging in as root, you enter the cl i command. What does this command do? A.
A. A
B. B
C. C
D. D
View answer
Correct Answer: C
Question #40
Which two statements describe a routing policy?
A. Active and inactive routes are available for export from the routing table
B. A routing policy allows you to control the flow of information into the routing table
C. Routing policy are used to choose which routes are sent to neighbors using dynamic routing Protocols
D. Attribute changes applied to export policies always affect the local routing table
View answer
Correct Answer: BC
Question #41
A packet enters a Junos device. No matching destination entry exists in the forwarding table. How will the device respond?
A. The RE responds to the source with a destination unreachable notification message
B. The PFE responds to the destination with a source unreachable notification message
C. The PFE responds to the source with a destination unreachable notification message
D. The RE responds to the destination with a source unreachable notification message
View answer
Correct Answer: B
Question #42
Click the Exhibit button. Referring to the exhibit, which action would synchronize the local router's clock with the NTP server?
A. Configure the correct NTP trusted key using the net trusted-key configuration command under the [edit system ntp] hierarchy
B. Issue the set date ntp operational command
C. Configure the NTP server using the set boot-server 172
D. Reboot the router
View answer
Correct Answer: B
Question #43
Which statement is true when using the allow command and deny command attributes when creating user permissions?
A. If you allow and deny the same commands, the Junos OS will fail the commit check
B. If you allow and deny the same command, the allow command permissions take precedence over the deny command permissions
C. If you specify a regular expression for allow and deny with two variants of a command, both will be ignored
D. The all login class permission bits take precedence over allow and deny when a user issues the rollback command
View answer
Correct Answer: B
Question #44
Click the Exhibit button. Which statement is correct regarding the configurration shown in the exhibit?
A. When the ospf-trace file has created five files, it will stop logging additional information
B. When the ospf-trace file reaches the 64 KB file size, it is renamed and begins a new file
C. The ospf-trace file will automatically replace any existing trace file with the same name
D. Timestamp information will not be included for each line of ospf-trace
View answer
Correct Answer: B
Question #45
Click the Exhibit button. You configured the route filter shown in the exhibit. In this scenario, which IP addresses would term-One accept?
A. IP addresses that are part of the 172
B. IP addresses that are part of the 172
C. IP addresses that are part of the 172
D. IP addresses that are part of the 172
View answer
Correct Answer: C
Question #46
What are three firewall filter terminating actions? (Choose three.)
A. discard
B. reject
C. log
D. accept
E. drop
View answer
Correct Answer: ABE
Question #47
Which command will completely turn off a Junos device?
A. request system halt
B. request chassis fpc offline
C. request system power-off
D. request system recover
View answer
Correct Answer: C
Question #48
In which directory are trace option files stored by default?
A. /var/tmp/
B. /var/log/
C. /var/home/
D. /var/db/
View answer
Correct Answer: B
Question #49
Your firewall filters are not in the correct order, what would solve this problem?
A. Use the next-term action to force an evaluation of the next-term
B. Use the commit parameter to ensure that terms are evaluated correctly
C. Use the reject action to change the action of the filter
D. Use the filter command to reorder the terms with the filter
View answer
Correct Answer: D
Question #50
Referring to the exhibit. what happens when you issue the exit command at the [edit protocols ospf area 0.0.0.51 stub] hierarchy level?
A. You move one level up to the [edit protocols ospf area 0
B. You exit the configuration mode
C. You move to the [edit] hierarchy level
D. You move to the most recent higher level of the [edit protocols ospf] hierarchy
View answer
Correct Answer: D

View The Updated Juniper Exam Questions

SPOTO Provides 100% Real Juniper Exam Questions for You to Pass Your Juniper Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: