Juniper jn0-105 practice test

Junos, Associate (JNCIA-Junos)

Last exam update: Nov 27 ,2025
Page 1 out of 7. Viewing questions 1-15 out of 100

Question 1

How many login classes are assignable to a user account?

  • A. 3
  • B. 2
  • C. 4
  • D. 1
Mark Question:
Answer:

D


Explanation:
https://www.juniper.net/documentation/us/en/software/junos/user-access-evo/user-access/topics/topic-map/junos-os-login-class.html#:~:text=You%20can%20define%20any%20number,to%20an%20individual%20user%20acc
ount.
In Junos OS, each user account can be assigned only one login class. Login classes in Junos OS define
the permissions for users, controlling what they can access and modify within the system. This setup
helps in maintaining a clear and secure access control mechanism.
Reference:
Junos OS Documentation on User Accounts and Login Classes.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

You are asked to view the real-time usage statistics for the busiest interfaces on a device running
Junos OS.
Which command will achieve this task?

  • A. monitor traffic absolute-sequence
  • B. monitor interface traffic
  • C. monitor traffic
  • D. show interfaces extensive
Mark Question:
Answer:

B


Explanation:
To view real-time usage statistics for the busiest interfaces on a device running Junos OS, the correct
command is B, "monitor interface traffic." This command provides a dynamic, real-time view of the
traffic flowing through the interfaces, allowing administrators to quickly identify and monitor the
busiest interfaces on the device.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which type of device uses the destination IP address to forward packets?

  • A. Layer 3 router
  • B. Layer 2 switch
  • C. repeater
  • D. hub
Mark Question:
Answer:

A


Explanation:
A Layer 3 router forwards packets based on the destination IP address. It operates at the network
layer of the OSI model and uses routing tables to determine the best path for packet delivery. Unlike
Layer 2 switches, which forward packets based on MAC addresses, routers handle logical addressing,
making them crucial for inter-network communication.
Reference:
Junos OS Documentation on Routing Fundamentals.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

You have just increased the MTU size of interface ge-0/0/0 and committed the configuration.
Which command would help you identify the applied MTU change?

  • A. monitor interface ge-0/0/0
  • B. monitor traffic interface ge-0/0/0
  • C. show interfaces ge-0/0/0 terse
  • D. show interfaces ge-0/0/0
Mark Question:
Answer:

D


Explanation:
After increasing the MTU size of an interface and committing the configuration, the command to
verify the applied MTU change is D, "show interfaces ge-0/0/0." This command displays detailed
information about the interface, including the current MTU size, making it the best choice for
verifying the applied changes.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

When considering routing policies, which two statements are correct? (Choose two.)

  • A. Routing policies are applied to interfaces as input or export filters.
  • B. An import routing policy for BGP determines which received prefix advertisements are placed in the routing information base.
  • C. Policy terms are evaluated from top to bottom with action taken on the first match found.
  • D. Policy terms are evaluated from top to bottom with the most restrictive action taken of all the matching terms.
Mark Question:
Answer:

BC


Explanation:
Routing policies in Junos OS are crucial for controlling route advertisements and path selection. The
correct answers are B and C. An import routing policy for BGP determines which received prefix
advertisements are placed in the routing information base (RIB), and policy terms are evaluated from
top to bottom, with action taken on the first match found. This sequential evaluation allows for
precise control over routing decisions.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

When considering routing tables and forwarding tables, which two statements are correct? (Choose
two.)

  • A. The routing table is used by the RE to select the best route.
  • B. The forwarding table stores all routes and prefixes from all protocols.
  • C. The forwarding table is used by the RE to select the best route.
  • D. The routing table stores all routes and prefixes from all protocols.
Mark Question:
Answer:

AD


Explanation:
The routing table and forwarding table play distinct roles in a Junos OS device. The correct answers
are A and D. The routing table (A) is used by the Routing Engine (RE) to select the best route among
all the learned routes, while the routing table (D) stores all routes and prefixes learned from all
routing protocols. The forwarding table, in contrast, contains only the active routes chosen by the RE
and is used by the Packet Forwarding Engine for actual packet forwarding.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

What will the request system configuration rescue save command do?

  • A. It saves the most recently committed configuration as the rescue configuration.
  • B. It saves the candidate configuration as the rescue configuration.
  • C. It saves a configuration version prior to the configuration most recently committed as the rescue configuration.
  • D. It activates the rescue configuration.
Mark Question:
Answer:

A


Explanation:
The request system configuration rescue save command in Junos OS saves the most recently
committed configuration as the rescue configuration. This rescue configuration can be used to
recover the device if future configurations cause issues. It ensures there is a stable, known-good
configuration to fall back on, which is crucial in network management and troubleshooting.
Reference:
"rescue : save configurations as the rescue: request system configuration save .................( saves the
current configs as a rescue configs )" from Useful Juniper Commands.txt​​.
Juniper official documentation: Configuring and Activating a Rescue Configuration.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

An administrator configures a router's interface with an IPv4 address and subnet mask. The
administrator also confirms that this interface is in an up state.
In this scenario, which two route types are created on the local router? (Choose two.)

  • A. a static route
  • B. a local route
  • C. a dynamic route
  • D. a direct route
Mark Question:
Answer:

BD


Explanation:
When an interface on a router is configured with an IPv4 address and is in an up state, two types of
routes are automatically created in the routing table: a local route and a direct route, making B and D
the correct answers. The local route represents the interface's IP address itself, indicating that the
router can directly receive packets addressed to this IP. The direct route represents the subnet or
network segment to which the interface is connected, indicating that the router can directly forward
packets to destinations within this subnet.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

What is the maximum number of rollback configuration files that the Junos OS will store?

  • A. 65
  • B. 50
  • C. 25
  • D. 19
Mark Question:
Answer:

B


Explanation:
Junos OS can store up to 50 rollback configuration files, making B the correct answer. These rollback
files allow administrators to revert to previous configurations, providing a safety net that facilitates
recovery from configuration errors or undesired changes

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

You issue the telnet 10.10.10.1 source 192.168.100.1 command.
Which two statements are correct in this scenario? (Choose two.)

  • A. The telnet session will have a source address of 10.10.10.1.
  • B. The telnet session will have a destination address of 192.168.100.1.
  • C. The telnet session will have a destination address of 10.10.10.1.
  • D. The telnet session will have a source address of 192.168.100.1.
Mark Question:
Answer:

CD


Explanation:
In the given telnet command, "telnet 10.10.10.1 source 192.168.100.1," the destination address of
the telnet session is 10.10.10.1, and the source address of the session is specified as 192.168.100.1,
making C and D the correct answers. This command instructs the telnet client to use the specified
source IP address when establishing the connection to the destination.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

What are two attributes of the UDP protocol? (Choose two.)

  • A. UDP is more reliable than TCP.
  • B. UDP is always slower than TCP.
  • C. UDP is best effort.
  • D. UDP is connectionless.
Mark Question:
Answer:

CD


Explanation:
UDP (User Datagram Protocol) is known for being connectionless (D) and providing best-effort
delivery without the reliability mechanisms present in TCP (C). This means that UDP does not
establish a connection before sending data and does not guarantee delivery, order, or error checking,
making it faster but less reliable than TCP.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

You are creating a new policy to accept and redistribute routes into your IGP.
In this scenario, which match criteria would you use to identify the route prefixes to select?

  • A. instance
  • B. route-type
  • C. neighbor
  • D. route-filter
Mark Question:
Answer:

D


Explanation:
When creating a new policy to accept and redistribute routes into your Interior Gateway Protocol
(IGP), the route-filter match criteria is used to identify the route prefixes to select. The route-filter
statement specifies which prefixes should be matched in a policy. This allows for precise control over
which routes are accepted and redistributed, facilitating efficient and secure routing policies within
the network.
Reference:
"show | display set | match ge-0/0/2" indicating command examples and match criteria from Useful
Juniper Commands.txt​​.
Juniper official documentation: Routing Policy and Firewall Filters Configuration Guide.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Which two addresses are included in an Ethernet frame header? (Choose two.)

  • A. source IP address
  • B. source MAC address
  • C. destination IP address
  • D. destination MAC address
Mark Question:
Answer:

BD


Explanation:
An Ethernet frame header includes the source MAC address (B) and the destination MAC address (D).
These addresses are used to deliver the frame from one Ethernet device to another directly
connected Ethernet device on the same network segment. Ethernet frames do not include IP
addresses, as those are part of the IP packet encapsulated within the Ethernet frame.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

You issue the monitor traffic interface ge-0/0/0 command.
What will this command accomplish?

  • A. It displays real-time statistics for interface ge-0/0/0.
  • B. It displays an operational summary of ge-0/0/0.
  • C. It displays the MTU and MAC address for ge-0/0/0.
  • D. It displays a packet capture on interface ge-0/0/0.
Mark Question:
Answer:

D


Explanation:
The command "monitor traffic interface ge-0/0/0" (D) initiates a packet capture on the specified
interface, allowing you to view the actual packets being transmitted and received. This is useful for
troubleshooting and analyzing the traffic passing through the interface in real time.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Exhibit
{hold:node0}[edit]
root# set system root-authentication ?
Possible completions:
+ apply-groups​​​​​​​​ Groups from which to inherit configuration data
+ apply-groups-except​ Don't inherit configuration data from these groups
​ encrypted-password​​ Encrypted password string
​ load-key-file​​​​​​​ File (URL) containing one or more ssh keys
​ plain-text-password​ Prompt for plain text password (autoencrypted)
> ssh-dsa​​​​​​​​​​​​​ Secure shell (ssh) DSA public key string
> ssh-rsa​​​​​​​​​​​​​ Secure shell (ssh) RSA public key string
{hold:node0}[edit]
root# set system root-authentication plain-text-password
New password:
Retype new password:
{hold:node0}[edit]
root# commit and-quit
[edit interfaces]
​ 'ge-0/0/0'
​​​​ HA management port cannot be configured
error: configuration check-out failed
{hold:node0}[edit]
root#
You are unable to remotely access your Juniper device using the CLI.
Referring to the exhibit, which command would you add to the existing configuration to enable
remote CLI access?

  • A. load factory-default
  • B. set system root-authentication plain-text-password
  • C. set system services ssh
  • D. set system login idle-timeout 20
Mark Question:
Answer:

C


Explanation:
In Junos OS, remote access to the device's CLI is commonly facilitated through Secure Shell (SSH), a
protocol providing secure command-line access over an insecure network. The given exhibit
indicates an attempt to set a root authentication password but does not show configuration for
enabling remote access services. To enable SSH, which is not shown in the configuration snippet, you
need to configure the device to accept SSH connections. This is done by enabling the SSH service
within the system services hierarchy of the configuration. The correct command to add to the
existing configuration for enabling remote CLI access via SSH is set system services ssh. This
command activates the SSH service, allowing secure remote logins to the device.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2