Juniper JN0-105 Exam
Junos, Associate (JNCIA-Junos) (Page 6 )

Updated On: 7-Feb-2026

What are two attributes of the UDP protocol? (Choose two.)

  1. UDP is more reliable than TCP.
  2. UDP is always slower than TCP.
  3. UDP is best effort.
  4. UDP is connectionless.

Answer(s): C,D

Explanation:

UDP (User Datagram Protocol) is known for being connectionless (D) and providing best-effort delivery without the reliability mechanisms present in TCP (C). This means that UDP does not establish a connection before sending data and does not guarantee delivery, order, or error checking, making it faster but less reliable than TCP.



You are creating a new policy to accept and redistribute routes into your IGP. In this scenario, which match criteria would you use to identify the route prefixes to select?

  1. instance
  2. route-type
  3. neighbor
  4. route-filter

Answer(s): D

Explanation:

When creating a new policy to accept and redistribute routes into your Interior Gateway Protocol (IGP), the route-filter match criteria is used to identify the route prefixes to select. The route-filter statement specifies which prefixes should be matched in a policy. This allows for precise control over which routes are accepted and redistributed, facilitating efficient and secure routing policies within the network.


Reference:

"show | display set | match ge-0/0/2" indicating command examples and match criteria from Useful Juniper Commands.txt.
Juniper official documentation: Routing Policy and Firewall Filters Configuration Guide.



Which two addresses are included in an Ethernet frame header? (Choose two.)

  1. source IP address
  2. source MAC address
  3. destination IP address
  4. destination MAC address

Answer(s): B,D

Explanation:

An Ethernet frame header includes the source MAC address (B) and the destination MAC address (D). These addresses are used to deliver the frame from one Ethernet device to another directly connected Ethernet device on the same network segment. Ethernet frames do not include IP addresses, as those are part of the IP packet encapsulated within the Ethernet frame.



You issue the monitor traffic interface ge-0/0/0 command.
What will this command accomplish?

  1. It displays real-time statistics for interface ge-0/0/0.
  2. It displays an operational summary of ge-0/0/0.
  3. It displays the MTU and MAC address for ge-0/0/0.
  4. It displays a packet capture on interface ge-0/0/0.

Answer(s): D

Explanation:

The command "monitor traffic interface ge-0/0/0" (D) initiates a packet capture on the specified interface, allowing you to view the actual packets being transmitted and received. This is useful for troubleshooting and analyzing the traffic passing through the interface in real time.



Exhibit

{hold:node0}[edit]
root# set system root-authentication ?
Possible completions:
+ apply-groups Groups from which to inherit configuration data + apply-groups-except Don't inherit configuration data from these groups encrypted-password Encrypted password string load-key-file File (URL) containing one or more ssh keys plain-text-password Prompt for plain text password (autoencrypted) > ssh-dsa Secure shell (ssh) DSA public key string
> ssh-rsa Secure shell (ssh) RSA public key string
{hold:node0}[edit]
root# set system root-authentication plain-text-password New password:
Retype new password:

{hold:node0}[edit]
root# commit and-quit
[edit interfaces]
'ge-0/0/0'
HA management port cannot be configured error: configuration check-out failed

{hold:node0}[edit]
root#
You are unable to remotely access your Juniper device using the CLI. Referring to the exhibit, which command would you add to the existing configuration to enable remote CLI access?

  1. load factory-default
  2. set system root-authentication plain-text-password
  3. set system services ssh
  4. set system login idle-timeout 20

Answer(s): C

Explanation:

In Junos OS, remote access to the device's CLI is commonly facilitated through Secure Shell (SSH), a protocol providing secure command-line access over an insecure network. The given exhibit indicates an attempt to set a root authentication password but does not show configuration for enabling remote access services. To enable SSH, which is not shown in the configuration snippet, you need to configure the device to accept SSH connections. This is done by enabling the SSH service within the system services hierarchy of the configuration. The correct command to add to the existing configuration for enabling remote CLI access via SSH is set system services ssh. This command activates the SSH service, allowing secure remote logins to the device.






Post your Comments and Discuss Juniper JN0-105 exam prep with other Community members:

Join the JN0-105 Discussion