Free JN0-105 Exam Braindumps (page: 6)

Page 5 of 17

What are two examples of exception traffic? (Choose two.)

  1. transit packets
  2. routing updates
  3. log messages
  4. ping to the local device

Answer(s): B,C

Explanation:

Exception traffic includes traffic that is not simply forwarded by the router but requires special handling, such as routing updates (B) and log messages (C). These types of traffic are processed by the router's control plane rather than just being forwarded through the data plane.



You need to recover the root password on a Junos router without losing the current configuration settings.
Which three statements describe what you should perform in this scenario? (Choose three.)

  1. Enter and commit the new root password.
  2. Load the factory-default configuration.
  3. Upgrade the Junos OS to the latest version.
  4. Hit the space bar and enter recovery when prompted.
  5. Use a console connection to reboot the device.

Answer(s): A,D,E

Explanation:

To recover the root password on a Junos router without losing the configuration, you should (A) enter and commit the new root password once you have gained access to the system, (D) hit the space bar to interrupt the boot process and enter recovery mode when prompted during the boot process, and

(E) use a console connection to reboot the device and access the bootloader prompt. These steps allow you to reset the root password while preserving the existing configuration.



You configured your system authentication order using the set authentication-order tacplus radius password command.
Which statement is correct in this scenario?

  1. A rejection by TACACS+ will prevent a login and bypass the other two authentication methods.
  2. The password authentication will only be used if the TACACS+ and RADIUS servers fail to respond.
  3. All authentication methods are used with the most restrictive permission set used.
  4. The password authentication method is evaluated if the TACACS+ and RADIUS servers respond with a reject message.

Answer(s): B

Explanation:

In the scenario where the system authentication order is set to "tacplus radius password," the correct statement is (B). If the TACACS+ and RADIUS servers are unreachable or fail to respond, the system will fall back to using password authentication. This ensures that users can still authenticate using locally stored passwords if external authentication servers are unavailable.



Which three benefits occur when operating an interior gateway protocol (IGP) in an autonomous system (AS)? (Choose three.)

  1. IGPs automatically distribute static routing information.
  2. IGPs determine the optimal paths for data transmission.
  3. IGPs learn prefixes in the global Internet's routing table.
  4. IGPs react very fast to network change.
  5. IGPs learn everything about the subnets and best paths within your network.

Answer(s): B,D,E

Explanation:

Operating an Interior Gateway Protocol (IGP) within an Autonomous System (AS) provides several benefits, including determining the optimal paths for data transmission (B), reacting quickly to network changes (D), and learning all about the subnets and best paths within the network (E). IGPs are designed to manage routing within a single AS efficiently, adapting to changes and ensuring data is routed through the best available paths.






Post your Comments and Discuss Juniper JN0-105 exam with other Community members: