Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Juniper > JNCIA > JN0-105

JN0-105 Junos - Associate (JNCIA-Junos) 2025 Exam Question and Answers

Question # 4

Which two functions are performed by the PFE? (Choose two.)

A.

It implements firewall filters.

B.

It selects active routes.

C.

It forwards transit traffic.

D.

It maintains the routing table.

Full Access
Question # 5

What information is exchanged during a TCP three-way handshake? (Choose two)

A.

port numbers

B.

interfaces

C.

sequence numbers

D.

application name

Full Access
Question # 6

Which protocol would you configure to synchronize the time and date on a Junos device?

A.

SNMP

B.

RIP

C.

NTP

D.

NMP

Full Access
Question # 7

What does the user@router> clear log ospf-trace command accomplish?

A.

Logging data into ospf-trace is stopped.

B.

Trace parameters are removed from the OSPF protocol configuration.

C.

Data in the ospf-trace file is removed and logging continues.

D.

The ospf-trace file is deleted.

Full Access
Question # 8

You want to find out the chassis serial number of a Junos device.

Which command would display this information?

A.

show chassis environment

B.

show chassis hardware

C.

show chassis routing-engine

D.

show chassis location

Full Access
Question # 9

You have just increased the MTU size of interface ge-0/0/0 and committed the configuration.

Which command would help you identify the applied MTU change?

A.

monitor interface ge-0/0/0

B.

monitor traffic interface ge-0/0/0

C.

show interfaces ge-0/0/0 terse

D.

show interfaces ge-0/0/0

Full Access
Question # 10

You are asked to convert the number 7 from decimal to binary.

Which number is correct in this scenario?

A.

00001000

B.

00010000

C.

00000111

D.

11100000

Full Access
Question # 11

Click the Exhibit button.

How is traffic, sourced from 10.0.0.0/8, treated by the firewall filter shown in the exhibit?

A.

logged and discarded

B.

logged and rejected

C.

logged with no further action

D.

logged and accepted

Full Access
Question # 12

Which two statements about firewall filters are correct? (Choose two.)

A.

Firewall filters are stateless.

B.

Firewall filters can match Layer 7 parameters.

C.

Firewall filters are stateful.

D.

Firewall filters can match Layer 4 parameters.

Full Access
Question # 13

Which Junos feature limits the amount of exception traffic that is sent from the PFE to the RE?

A.

scheduler

B.

policer

C.

CoS markings

D.

routing policy

Full Access
Question # 14

You have completed the initial configuration of your new Junos device. You want to be able to load this configuration at a later time.

Which action enables you to perform this task?

A.

Enter the load factory-default command.

B.

Enter the request system reboot command.

C.

Enter the request system zeroize command.

D.

Enter the request system configuration rescue save command.

Full Access
Question # 15

Which two actions does the configure exclusive command perform? (Choose two.)

A.

It retains uncommitted changes in the candidate configuration

B.

It always discards uncommitted changes

C.

It enables only a single user to edit the configuration

D.

It allows up to 32 specified users to be in configuration mode simultaneously

Full Access
Question # 16

Which two statements are correct regarding Layer 2 network switches? (Choose two.)

A.

Switches create a single collision domain.

B.

Switches are susceptible to traffic loops.

C.

Switches flood broadcast traffic.

D.

Switches do not learn MAC addresses.

Full Access
Question # 17

What are two functions of the routing protocol daemon (rpd)? (Choose two.)

A.

It generates chassis alarms.

B.

It provides access to the CLI.

C.

It creates forwarding tables.

D.

It maintains routing tables.

Full Access
Question # 18

What information would you find using the CLI help command?

A.

hyperlinks for remediation actions

B.

a URL for accessing the technical documentation

C.

an explanation for specific system log error messages

D.

message of the day

Full Access
Question # 19

Which two external authentication methods does Junos support for administrative access? (Choose two.)

A.

TACACS+

B.

NIS

C.

RADIUS

D.

ACE

Full Access
Question # 20

How many rescue configuration files are supported on a Junos device?

A.

50

B.

3

C.

1

D.

49

Full Access
Question # 21

What is the maximum number of rollback configuration files that the Junos OS will store?

A.

65

B.

50

C.

25

D.

19

Full Access
Question # 22

Which Junos OS component is responsible for maintaining the forwarding table?

A.

Routing Engine

B.

chassis control daemon

C.

Packet Forwarding Engine

D.

management daemon

Full Access
Question # 23

What are two methods for navigating to configuration mode from an operational mode prompt? (Choose two.)

A.

Use the edit command.

B.

Use the quit command.

C.

Use the exit command.

D.

Use the configure command.

Full Access
Question # 24

What are two benefits when implementing class of service? (Choose two.)

A.

Traffic congestion will be eliminated.

B.

The network will be faster.

C.

Traffic congestion can be managed.

D.

Latency-sensitive traffic can be prioritized.

Full Access
Question # 25

Which three benefits occur when operating an interior gateway protocol (IGP) in an autonomous system (AS)? (Choose three.)

A.

IGPs automatically distribute static routing information.

B.

IGPs determine the optimal paths for data transmission.

C.

IGPs learn prefixes in the global Internet's routing table.

D.

IGPs react very fast to network change.

E.

IGPs learn everything about the subnets and best paths within your network.

Full Access
Question # 26

Which two fields are you required to enter when you create a new user account? (Choose two.)

A.

username

B.

full name

C.

user ID

D.

login class

Full Access
Question # 27

Which statement is correct when multiple users are configuring a Junos device using the configure private command?

A.

A commit by any user will commit changes made by all active users.

B.

A commit will not succeed until there is only a single user in configuration mode.

C.

Each user gets their own candidate configuration.

D.

Each user shares the same candidate configuration.

Full Access
Question # 28

Click the Exhibit button.

Referring the exhibit, what does the highlighted number indicate?

A.

route preference is 5

B.

hop count is 5

C.

cost is 5

D.

metric is 5

Full Access
Question # 29

After the factory default configuration is loaded, which configuration object must be created prior to the first commit?

A.

root authentication

B.

loopback IP address

C.

out-of-band connectivity

D.

host name

Full Access
Question # 30

You are trying to diagnose packet loss at interface ge-0/0/3.

In this scenario, which command would help you view error statistics in real time?

A.

show interface terse

B.

show interface ge-0/0/3

C.

monitor interface traffic

D.

monitor interface ge-0/0/3

Full Access
Question # 31

Which two statements describe the result when you enter? at the command-line prompt? (Choose two.)

A.

It lists the available commands and options.

B.

It lists tips for the help menu.

C.

It displays help about a text string contained in a statement.

D.

It displays summary information about the commands and options.

Full Access
Question # 32

What are two ways that the carrier-sense multiple access with collision detection (CSMA/CD) MAC protocol helps devices “talk” with each other in an Ethernet network? (Choose two.)

A.

It allows an Ethernet device to check to see if anything else is transmitting before trying to send

B.

It allows a network device to either transmit data or receive data

C.

It operates in half-duplex or full-duplex mode

D.

It allows a network device to transmit and receive data simultaneously

Full Access