JN0-105 Practice Test Questions

100 Questions


You are asked to convert the number 7 from decimal to binary. Which number is correct in this scenario?


A. 00001000


B. 00010000


C. 00000111


D. 11100000





C.
  00000111

Explanation:
The binary system is a base-2 numbering system, meaning each digit (or bit) can only be a 0 or a 1. The value of a bit is determined by its position, which corresponds to a power of 2, starting from 2⁰ on the far right (the Least Significant Bit).

To convert decimal 7, we determine which powers of 2 sum to 7:
2² = 4
2¹ = 2
2⁰ = 1
Adding these together: 4 + 2 + 1 = 7.

In binary, we represent this by placing a '1' in the positions for 4, 2, and 1, and '0's in all others. Writing this out for a single byte (8 bits) looks like this:

128 (2⁷)   64 (2⁶)   32 (2⁵)   16 (2⁴)   8 (2³)   4 (2²)   2 (2¹)   1 (2⁰)

0 0 0 0 0 1 1 1 Thus, the binary equivalent is 00000111. The leading zeros are often included in networking contexts to explicitly show the full octet.

Analysis of Incorrect Options

A. 00001000
Incorrect. This binary number represents decimal 8. The only '1' is in the 2³ (value 8) position. The calculation is (0+0+0+0+8+0+0+0) = 8. This is the value one greater than 7.

B. 00010000
Incorrect. This binary number represents decimal 16. The only '1' is in the 2⁴ (value 16) position. The calculation is (0+0+0+16+0+0+0+0) = 16. This is more than double the value of 7.

D. 11100000
Incorrect. This binary number represents a much larger decimal value, 224. The '1's are in the 2⁷ (128), 2⁶ (64), and 2⁵ (32) positions. The calculation is (128 + 64 + 32 + 0 + 0 + 0 + 0 + 0) = 224. This is a common distractor that tests if you are reading the bits from the correct direction (right-to-left for LSB).

Reference:
Understanding binary numbering is an absolute prerequisite for IP networking and is a foundational skill tested on the JNCIA-Junos exam. It is essential for comprehending:

IP Addressing: An IPv4 address is four 8-bit binary numbers (octets) represented in decimal for readability.

Subnet Masks: Subnetting entirely relies on manipulating binary bits to create network and host portions of an IP address.

Which command displays all IPv6 routes in the default routing instance?


A. showroute table inet.0


B. showroute table inet6.1


C. showroute table inet.1


D. showroute table inet6.0





D.
  showroute table inet6.0

Explanation:
Junos OS uses specific, well-defined routing tables to store different types of routes. The table name is constructed from two key parts: the address family and the table type.

Address Family (inet6): This part of the table name specifies the protocol family of the routes it contains. inet6 is the designation for the IPv6 address family.

Table Type (.0): This suffix identifies the purpose of the table. The .0 suffix universally denotes the unicast routing table for its respective address family.

Therefore, inet6.0 is the unified name for the primary IPv6 unicast routing table. Executing show route table inet6.0 will display all active and candidate IPv6 routes that the routing protocol process (rpd) has installed, including directly connected, static, and dynamically learned routes.

Analysis of Incorrect Options

A. show route table inet.0
Incorrect. This command displays the IPv4 unicast routing table. The address family inet is used for IPv4. While the command structure is identical, it shows the wrong protocol's routes. This is a common mistake when working in dual-stack (IPv4/IPv6) environments.

B. show route table inet6.1
Incorrect. There is no standard Junos routing table named inet6.1 for storing active unicast routes. The .1 suffix is not part of the conventional routing table naming scheme for this purpose. This option is a distractor.

C. show route table inet.1
Incorrect. This command displays the IPv4 multicast routing table. The .1 suffix specifically identifies the multicast RIB (Routing Information Base). It is used by protocols like PIM to build multicast distribution trees and does not contain the unicast routes used for standard IPv4 packet forwarding.

Reference:

This knowledge is a core component of the JNCIA-Junos certification and is covered under "Monitoring Routing Tables" in the official Juniper curriculum. Understanding the routing table architecture is fundamental for any Junos administrator. The standard routing tables are:

inet.0: The main IPv4 unicast routing table.
inet6.0: The main IPv6 unicast routing table.
inet.1: The IPv4 multicast RIB.
mpls.0: The MPLS label switching table.

Which two statements are correct about Junos traceoptions? (Choose two.)


A. Traceoptions cannot be enabled in a production environment.


B. Traceoptions are enabled through configuration.


C. Traceoptions are enabled by default.


D. Traceoption output, by default, is stored in /var/iog/.





B.
  Traceoptions are enabled through configuration.

D.
  Traceoption output, by default, is stored in /var/iog/.

Explanation:

Traceoptions are Junos OS's powerful, built-in debugging and troubleshooting tool. They allow an administrator to log the internal operations and state changes of a specific process (like OSPF, BGP, or the chassis manager).

B. Traceoptions are enabled through configuration.
This is correct. Traceoptions are not active by default. They must be explicitly configured by the administrator within the specific hierarchy of the protocol or process they wish to monitor. For example, to trace OSPF events, you would configure them under protocols ospf traceoptions. This is a deliberate design to prevent unnecessary performance overhead when debugging is not required.

D. Traceoption output, by default, is stored in /var/log/.
This is correct. By default, when you configure traceoptions and specify a file , that file is created within the /var/log/ directory. For instance, configuring file bgp-trace would generate a log file at /var/log/bgp-trace. This centralizes all log and trace data in a standard location on the device's storage.

Analysis of Incorrect Options

A. Traceoptions cannot be enabled in a production environment.
Incorrect. While it is a strong best practice to use traceoptions with extreme caution in production due to the potential for high CPU usage and disk consumption, they are absolutely a functional feature that can be enabled. The statement is too absolute. Juniper provides the feature for real-world troubleshooting, but administrators must be aware of the performance impact and should use filters and size limits.

C. Traceoptions are enabled by default.
Incorrect. If traceoptions were enabled by default, Junos devices would constantly generate massive amounts of debugging data, severely impacting performance and filling the disk. As stated in the explanation for option B, they are disabled by default and must be manually enabled by a user with configuration access.

Reference:

The configuration and use of traceoptions is a fundamental troubleshooting skill covered in the JNCIA-Junos curriculum, typically under sections like "System Logging and Tracing" or "Troubleshooting Tools." The official Junos documentation extensively details the syntax for enabling traceoptions for each protocol, emphasizing the use of the traceoptions statement within the specific configuration hierarchy. Understanding their power and associated risks is critical for any network engineer working with Junos.

Which Junos OS component is responsible for maintaining the forwarding table?


A. Routing Engine


B. chassis control daemon


C. Packet Forwarding Engine


D. management daemon





C.
  Packet Forwarding Engine

Explanation:
This question tests the fundamental Junos architecture concept of the separation between the Control Plane and the Forwarding Plane.

The Packet Forwarding Engine (PFE) is the high-speed, application-specific integrated circuit (ASIC)-based component responsible for the actual process of receiving a packet on an ingress interface, performing a lookup, and sending it out an egress interface. To do this at line rate, it maintains its own copy of the forwarding table.

The PFE's forwarding table is a streamlined, optimized version of the main routing table. It contains only the information essential for packet switching, such as next-hop addresses and outgoing interfaces.

Analysis of Incorrect Options

A. Routing EngineC Incorrect. The Routing Engine (RE) is the control plane. It runs the Junos OS, routing protocols, and management processes. The RE is responsible for building the routing table based on configured and learned routes. It then downloads a copy of this information to the PFE to populate the PFE's forwarding table, but the RE itself does not maintain or use the forwarding table for packet forwarding.

B. Chassis Control Daemon (chassisd)
Incorrect. The chassis daemon is responsible for monitoring and managing the physical components of the router/switch, such as power supplies, fan trays, and Physical Interface Cards (PICs). It deals with hardware status, not the data plane's forwarding tables.

D. Management Daemon (mgd)
Incorrect. The management daemon is the process that provides the Junos CLI and handles all user configuration and operational commands. It is the interface for the administrator to manage the device but is not involved in maintaining the forwarding table.

Reference:

This is a core topic in the JNCIA-Junos certification, covered under "Junos OS Architecture" or "Control and Forwarding Plane Separation." Understanding the distinct roles of the Routing Engine (control plane) and the Packet Forwarding Engine (forwarding plane) is essential for understanding Junos operation, high availability features like Graceful Routing Engine Switchover (GRES), and troubleshooting performance issues.

Which two statements are correct about MAC addresses? (Choose two.)


A. Switches use the Address Resolution Protocol table to assign MAC addresses to network interface cards in the forwarding frame.


B. The source and destination MAC addresses always remains static to the final destination.


C. The MAC address identifies the physical hardware.


D. Switches use the destination MAC address to identify the next-hop destination and to change the destination MAC address in the frame.





C.
  The MAC address identifies the physical hardware.

D.
  Switches use the destination MAC address to identify the next-hop destination and to change the destination MAC address in the frame.

Explanation:

C. The MAC address identifies the physical hardware.
This is correct. A Media Access Control (MAC) address is a globally unique, 48-bit hardware address burned into the network interface card (NIC) by the manufacturer. It operates at Layer 2 (the Data Link layer) of the OSI model and is used for communication within the same local network segment (broadcast domain). It is fundamentally tied to the physical network interface.

D. Switches use the destination MAC address to identify the next-hop destination and to change the destination MAC address in the frame.
This is a more nuanced but critically important correct statement. A Layer 2 switch uses its MAC address table to forward frames within a VLAN.

Identifies the next-hop destination:The switch looks at the destination MAC address in the incoming frame to decide which specific switch port to send it out of.

Changes the destination MAC address: This part is often misunderstood. When a frame is sent between two different devices via a router (i.e., between different subnets/IP networks), the router rewrites the Layer 2 header. The source and destination MAC addresses are changed for the next hop. The source becomes the router's own MAC address, and the destination becomes the MAC address of the next device (either the final host or the next router). A switch performing pure Layer 2 switching does not do this, but the statement is correct in the broader context of how MAC addresses are used in networking, especially when describing the role of a Layer 3 switch or router.

Analysis of Incorrect Options

A. Switches use the Address Resolution Protocol table to assign MAC addresses to network interface cards in the forwarding frame.
Incorrect. This statement contains multiple fundamental errors.
First, MAC addresses are assigned by the manufacturer, not by a switch or ARP.
Second, switches do not use an "ARP table"; they build a MAC address table (or CAM table) by learning the source MAC addresses of incoming frames.
Third, ARP (Address Resolution Protocol) is a protocol used to map a known IP address (Layer 3) to an unknown MAC address (Layer 2). It does not assign addresses.

B. The source and destination MAC addresses always remains static to the final destination.
Incorrect. This is false. MAC addresses are only relevant for a single Layer 2 hop. As a packet traverses a router from one network to another, the router strips off the existing Layer 2 frame header (including the source and destination MAC addresses) and creates a new one for the next segment. Therefore, the source and destination MAC addresses change at every router hop along the path to the final destination.

Reference:

This topic is covered in the JNCIA-Junos curriculum under "Layer 2 Switching" or "Ethernet Bridging" fundamentals. It is a core networking concept that is essential for understanding how Ethernet frames are forwarded within a VLAN and how routing between subnets works. The distinction between the unchanging nature of IP addresses (source/dest) in a packet across a routed path versus the constantly changing nature of MAC addresses in a frame is a key learning objective.

What are two examples of exception traffic? (Choose two.)


A. transit packets


B. routing updates


C. log messages


D. ping to the local device





B.
  routing updates

D.
  ping to the local device

Explanation:

In Junos OS, exception traffic refers to any traffic that is destined for the local device itself, rather than being forwarded through it. This traffic must be processed by the device’s control plane (Routing Engine) instead of the data plane (Packet Forwarding Engine).

Normally, Juniper devices are designed to forward transit traffic at high speed through the PFE, without involving the Routing Engine (RE). However, certain packets must be sent to the RE for handling — such as routing protocol messages, management access, and ICMP packets directed to the device’s own IP addresses.

This type of traffic is called exception traffic because it is an exception to the normal fast-forwarding process. It requires CPU processing by the RE, which means excessive exception traffic can affect control-plane performance.

✅ B. Routing updates — Correct
Routing protocol updates (like OSPF, BGP, RIP, or IS-IS messages) are classic examples of exception traffic. These updates are not transit traffic — they are specifically addressed to the router itself so that it can learn, update, or maintain routing information.

For example:
OSPF Hello packets
BGP TCP sessions between routers
RIP updates

All of these packets are processed by the Routing Engine, because they update the routing table and control-plane state. The Packet Forwarding Engine simply identifies them as control traffic and forwards them internally to the RE for processing.

Hence, routing updates are considered exception traffic.

✅ D. Ping to the local device — Correct
A ping (ICMP echo request) directed at one of the router’s own interface IP addresses is also exception traffic.

This is because the packet’s destination IP matches the router’s local address, meaning it must be handled locally — not forwarded. The RE processes the ICMP request, generates an ICMP echo reply, and sends it back via the PFE.

Example:
user@host> ping 192.168.1.1
If 192.168.1.1 is an interface on the router, this ping is exception traffic.
Therefore, a ping to the local device is handled by the control plane, making it exception traffic.

❌ A. Transit packets — Incorrect
Transit traffic refers to packets that pass through the router from one interface to another without being addressed to the router itself. These packets are processed entirely in the Packet Forwarding Engine (PFE) for fast hardware-based forwarding.
Because they do not require any action from the Routing Engine, transit packets are not exception traffic.
Example:
Traffic traveling from one network, through the router, and out another interface is transit — not exception.

❌ C. Log messages — Incorrect
Log messages are locally generated by the system software on the device. They are not received network packets. Although they are processed by the control plane, they are not considered exception traffic because they are not incoming packets that require special routing treatment.
Exception traffic specifically refers to packets that arrive on an interface and are destined for the router itself for control or management processing. Log messages don’t fit that definition.

📘 References:
Juniper Networks TechLibrary – Control Plane and Data Plane Overview

Understanding Exception Traffic
JNCIA-Junos Study Guide (Juniper Press / Junos Genius):
Chapter: Routing and Forwarding Concepts — explains data plane vs. control plane and exception traffic handling.

Juniper Day One Book: Inside the Junos Packet Flow
Details how Junos distinguishes between transit, control, and exception traffic.

Summary:
Exception traffic = packets destined to the router itself, handled by the Routing Engine (control plane).
Examples: Routing updates (BGP/OSPF) and pings to local interfaces.
Not exception traffic: Transit packets (forwarded in hardware) and log messages (locally generated events).

What information would you find using the CLI help command?


A. hyperlinks for remediation actions


B. a URL for accessing the technical documentation


C. an explanation for specific system log error messages


D. message of the day





C.
  an explanation for specific system log error messages

Explanation:
In Junos OS, the CLI help command is a valuable tool for troubleshooting and understanding system behavior. It provides detailed information about system messages, including error codes, warnings, and informational messages found in system logs such as /var/log/messages.

When you encounter a system log entry, the CLI help command allows you to query the message ID or error code to get more context about the event, including:

A description of the message
Possible causes
Recommended actions to resolve the issue

Example Usage:
Suppose you see an error in the logs:
%OSPF-3-NBRCHANGE: OSPF neighbor state changed
You can use the CLI help system as follows:
user@device> help topic ospf-3-nbrchange

The output provides:
Explanation of the OSPF neighbor state change message
Potential causes (e.g., link failure, authentication mismatch)
Suggestions for remediation or further investigation
This feature is particularly useful for:
Troubleshooting routing protocol issues
Interpreting system error messages
Understanding protocol or system behavior without referring to external documentation
Thus, the CLI help command directly aids in diagnosing log messages and system events, making Option C correct.

❌ Why the Other Options Are Incorrect:

A. Hyperlinks for remediation actions
The CLI help system does not provide clickable hyperlinks.
It outputs textual explanations and suggestions within the CLI itself.
While it may suggest remediation steps, these are plain text instructions, not hyperlinks to web content.

B. A URL for accessing the technical documentation
Junos help output does not include URLs.
Juniper’s online technical documentation must be accessed separately via a web browser at the Juniper TechLibrary.
The CLI help is local and interactive, providing guidance without requiring internet access.

D. Message of the day (MOTD)
The message of the day is a static banner displayed when a user logs in to the device, typically configured under:
system {
login {
message "Welcome to the router!";
}
}

It is unrelated to the CLI help system and does not provide information about log messages or troubleshooting.

📘 References:

Juniper Networks TechLibrary – CLI Help System
Using CLI Help Topics
Explains how to query system messages and error codes using the help topic command.

JNCIA-Junos Study Guide (Juniper Press / Junos Genius)
Chapter: Monitoring and Troubleshooting — describes how to interpret log messages using CLI help.

Juniper Day One Book: Troubleshooting Junos Devices
Section: Using the CLI Help System — demonstrates querying messages for explanations and suggested actions.

Your router has a route to the 10.1.1.0/24 network with a next hop of r jet. In this scenario, which action will your router perform when traffic destined to the 10.1.1.0/24 network is received?


A. The traffic will be discarded and an ICMP unreachable message will be sent to the destination of the traffic.


B. The traffic will be discarded and an ICMP unreachable message will be sent to the source of the traffic.


C. The traffic will be redirected using a default route.


D. The traffic will be silently discarded.





B.
  The traffic will be discarded and an ICMP unreachable message will be sent to the source of the traffic.

Explanation:
The scenario describes a classic "routing black hole" or "unreachable next hop" situation.

The Route Exists: The router's Routing Information Base (RIB) has a valid route for 10.1.1.0/24.

The Next-Hop is Unreachable: The critical detail is that the next-hop address (likely a typo for an IP like 192.168.1.1 or a hostname) is unreachable. This means the router does not have an ARP entry for it (if on a LAN) or a direct route to it, making it effectively a "dead" next-hop.

When the router receives traffic for 10.1.1.0/24, its standard forwarding process is:
It looks up the destination 10.1.1.x and finds the matching route with next-hop r jet.
It then checks the Forwarding Information Base (FIB) to resolve how to reach this next-hop.
If the next-hop itself is unreachable, the router cannot forward the packet.

According to standard IP protocol behavior (RFC 792), when a router cannot forward a packet due to an unreachable next-hop, it must discard the packet and send an ICMP Destination Unreachable message back to the source IP address of the original traffic. This informs the sender that their packet could not be delivered.

Analysis of Incorrect Options:

A. The traffic will be discarded and an ICMP unreachable message will be sent to the destination of the traffic.
Incorrect. This is logically impossible. The "destination" is the unreachable 10.1.1.0/24 network. If the router could send a message there, it would be able to forward the original traffic. ICMP error messages are always sent back to the originator (the source).

C. The traffic will be redirected using a default route.
Incorrect. Junos OS uses a most-specific-route matching algorithm. The /24 route is more specific than a default route (0.0.0.0/0). Therefore, the router will never use the less specific default route for this traffic as long as the more specific /24 route is active in the routing table.

D. The traffic will be silently discarded.
Incorrect. While the traffic is discarded, the process is not "silent." Standard IP behavior mandates sending an ICMP unreachable message to the source to facilitate troubleshooting. "Silent discard" typically occurs due to a firewall filter with a discard action or a reject action without the send-to-client modifier.

Reference:

This behavior is defined by core IP networking standards and is a fundamental aspect of router operation, covered in the JNCIA-Junos curriculum under "IP Routing Fundamentals" or "Troubleshooting Routing Issues." Understanding the interaction between the RIB (control plane) and the FIB (forwarding plane), and the generation of ICMP error messages, is essential for effective network diagnostics.

Which two statements are correct about a Routing Engine? (Choose two.)


A. It processes CoS marked traffic.


B. It forwards transit traffic.


C. It processes management traffic.


D. It maintains routing tables.





C.
  It processes management traffic.

D.
  It maintains routing tables.

Explanation:
The Routing Engine (RE) is the control plane of a Junos device. It handles all the intelligent, decision-making processes for the device.

D. It maintains routing tables.
This is a primary function of the RE. It runs the routing protocol daemon (rpd), which is responsible for building the Routing Information Base (RIB) by learning routes from directly connected interfaces, static configuration, and dynamic routing protocols like OSPF and BGP.

C. It processes management traffic.
The RE is the management brain of the device. All traffic destined to the device itself, such as SSH, Telnet, SNMP, and HTTP/HTTPS for management, is processed by the RE. This is because the RE runs the Junos OS and the services that handle these management tasks.

Analysis of Incorrect Options

A. It processes CoS marked traffic.
Incorrect. While the RE configures the Class of Service (CoS) policies, the actual processing, queuing, and forwarding of traffic based on CoS markings is performed at line rate by the Packet Forwarding Engine (PFE). The RE does not sit in the data path for transit traffic.

B. It forwards transit traffic.
Incorrect. This is the core function of the Packet Forwarding Engine (PFE). Transit traffic (traffic passing through the device) is forwarded by the PFE's ASICs using the forwarding table, which is a optimized copy of the RE's routing table. Involving the RE in forwarding would be a massive performance bottleneck.

Reference:
This distinction between the control plane (Routing Engine) and the forwarding plane (Packet Forwarding Engine) is a fundamental architectural concept in Junos OS. It is a key topic in the JNCIA-Junos certification, covered under "Junos OS Architecture" or "Control and Forwarding Plane Separation." Understanding this separation is critical for troubleshooting, understanding device performance, and configuring high-availability features.

After the factory default configuration is loaded, which configuration object must be created prior to the first commit?


A. root authentication


B. loopback IP address


C. out-of-band connectivity


D. host name





A.
  root authentication

Explanation:

When a Junos device is reset to factory defaults (e.g., using request system zeroize), the entire configuration, including the root user's password, is erased. The device reboots with a minimal default configuration that lacks any user authentication.

The Requirement: Before any configuration can be committed—even a completely blank one—Junos OS must have a password or some form of authentication (like an SSH key) configured for the root user. This is a critical security measure to prevent a device from being active on the network with a default or blank password.

The Process:
After the factory reset, you log in as root with no password. The system will immediately force you into the configuration mode to set a root password. You cannot exit or commit any other configuration until this single mandatory step is completed.

Therefore, the root authentication object (which contains the password or key) is the one and only configuration object that must be created prior to the first successful commit.

Analysis of Incorrect Options

B. loopback IP address
Incorrect. A loopback address is a common and recommended best practice for management, but it is not a prerequisite for the first commit. The device can be committed and managed solely through its out-of-band or other physical interface addresses.

C. out-of-band connectivity
Incorrect. While configuring an out-of-band management interface (like fxp0 or em0) is often the first step for remote access, it is not mandatory for the commit itself. The initial configuration can be performed via the console port without any network connectivity configured.

D. host name
Incorrect. The device has a default hostname (often Amnesiac or similar). Changing the hostname is a common early configuration step for identification, but it is not required for the system to accept a commit.

Reference:
This process is a fundamental part of the initial setup of any Junos device and is covered in the JNCIA-Junos curriculum under "Initial Configuration" or "System Basics." The official Juniper documentation for initial configuration explicitly states that setting the root password is the first and mandatory task after a factory reset. This enforces a basic security posture from the very first moment the device is operational.

An administrator configures a router's interface with an IPv4 address and subnet mask. The administrator also confirms that this interface is in an up state. In this scenario, which two route types are created on the local router? (Choose two.)


A. a static route


B. a local route


C. a dynamic route


D. a direct route





B.
  a local route

D.
  a direct route

Explanation:
When you configure an IPv4 address on a Junos interface and it is operationally up, the routing protocol process (rpd) automatically installs two types of routes into the routing table without requiring any static or dynamic routing configuration.

D. A direct route:
This is the route to the connected network (the subnet) of the configured interface.

Example: If you configure 192.168.1.1/24 on ge-0/0/0, the direct route would be 192.168.1.0/24.
Purpose: This route informs the router that any host within the 192.168.1.0/24 subnet is directly reachable out of the ge-0/0/0 interface. It is the fundamental basis for local network communication.

B. A local route:
This is a host route (a /32 route) pointing to the specific IP address assigned to the router's own interface.

Example: Using the same configuration, the local route would be 192.168.1.1/32.
Purpose: This route is crucial for traffic that is destined to the router itself. When a packet arrives at the router with a destination IP of 192.168.1.1, the local route ensures that the Packet Forwarding Engine (PFE) knows to punt that packet to the Routing Engine (RE) for processing (e.g., for a ping, SSH session, or routing protocol update).
These two routes work together: the direct route defines "how to get to my local network," and the local route defines "how to get to me on that network."

Analysis of Incorrect Options

A. A static route
Incorrect. A static route is one that an administrator manually configures using the set routing-options static route ... command. It is not automatically created by bringing up an interface.

C. A dynamic route
Incorrect. A dynamic route is learned from a routing protocol like OSPF, BGP, or ISIS. These are learned from neighboring routers, not generated internally from a local interface configuration.

Reference:
This is a core routing fundamental covered in the JNCIA-Junos curriculum under "Routing Tables" or "Routing Fundamentals." You can observe these routes by using the show route command. The direct route is typically marked with * and C (for Connected), and the local route is marked with * and L (for Local). Understanding the existence and purpose of these automatically generated routes is essential for IP networking and troubleshooting.

What does the user@router> clear log ospf-trace command accomplish?


A. Logging data into ospf-trace is stopped.


B. Trace parameters are removed from the OSPF protocol configuration.


C. Data in the ospf-trace file is removed and logging continues.


D. The ospf-trace file is deleted.





C.
  Data in the ospf-trace file is removed and logging continues.

Explanation:
The clear log command in Junos OS is an operational mode command designed for log file management. Its specific function is to erase the current contents of a specified log file without stopping the logging process itself.

Function: When you execute clear log ospf-trace, the system empties the /var/log/ospf-trace file, resetting its size to zero bytes.

Logging Continues: Crucially, the OSPF traceoptions that were configured to write to this file remain fully active. Any new OSPF events that occur after the command is issued will be written to the now-empty ospf-trace file. This is extremely useful for troubleshooting an ongoing issue, as it allows you to start with a clean log to capture only the most recent events without the noise of old data.

Analysis of Incorrect Options

A. Logging data into ospf-trace is stopped.
Incorrect. The clear log command does not stop, disable, or modify the configuration for logging. It only clears the existing data. To stop logging, you would need to remove the traceoptions configuration.

B. Trace parameters are removed from the OSPF protocol configuration.
Incorrect. This command does not interact with or alter the device's configuration in any way. It is a purely operational command that acts on the log files generated by an existing configuration.

D. The ospf-trace file is deleted.
Incorrect. The command clears the file's contents; it does not delete the file itself from the file system. The file remains as an empty container, ready to receive new log entries.

Reference:
This is a common operational task covered in the JNCIA-Junos curriculum under "System Logging and Tracing" or "Troubleshooting Tools." The clear log command is an essential tool for effective troubleshooting, allowing an administrator to manage log file sizes and focus on recent events. This behavior is consistent across all log files in Junos, not just those for OSPF.


Page 1 out of 9 Pages