JN0-105 Practice Test Questions

100 Questions


What are two functions of the routing protocol daemon (rpd)? (Choose two.)


A. It generates chassis alarms.


B. It provides access to the CLI.


C. It creates forwarding tables.


D. It maintains routing tables.





C.
  It creates forwarding tables.

D.
  It maintains routing tables.

Explanation:

The rpd is the core process responsible for all routing intelligence on a Junos device. It is the "brain" of the control plane for routing.

D. It maintains routing tables.
This is the primary function of the rpd. It is responsible for building the Routing Information Base (RIB) by:
Learning routes from directly connected interfaces.
Processing statically configured routes.
Running dynamic routing protocols (OSPF, BGP, IS-IS, etc.) to exchange routing information with neighbors and select the best paths based on protocol metrics and Junos routing policy.

C. It creates forwarding tables.
This is a critically important function. Once the rpd has built the master RIB, it processes the routes and creates a forwarding table for each routing instance (e.g., inet.0 for IPv4). This forwarding table is then downloaded from the Routing Engine (RE) to the Packet Forwarding Engine (PFE), which uses it to make high-speed forwarding decisions for transit traffic. The rpd creates the table; the kernel pushes it to the PFE.

Analysis of Incorrect Options

A. It generates chassis alarms.
Incorrect. Chassis alarms are generated by the Chassis Daemon (chassisd), which is responsible for monitoring the physical hardware components like power supplies, fan trays, and Physical Interface Cards (PICs). The rpd deals with logical routing information, not physical hardware status.

B. It provides access to the CLI.
Incorrect. Access to the Junos CLI is provided by the Management Daemon (mgd). The mgd handles all user interaction, authentication, and configuration sessions. While you can use the CLI to view and configure routing protocols (which are part of the rpd), the rpd process itself does not provide the CLI interface.

Reference:
This topic is a core part of the Junos OS architecture and is covered in the JNCIA-Junos curriculum under "Junos OS Architecture" or "Control and Forwarding Plane Separation." Understanding the role of the rpd is fundamental. It highlights the separation where the rpd on the RE builds the routing and forwarding tables, and the PFE uses those downloaded tables to forward traffic at line rate.

You need to recover the root password on a Junos router without losing the current configuration settings. Which three statements describe what you should perform in this scenario? (Choose three.)


A. Enter and commit the new root password.


B. Load the factory-default configuration.


C. Upgrade the Junos OS to the latest version.


D. Hit the space bar and enter recovery when prompted.


E. Use a console connection to reboot the device.





A.
  Enter and commit the new root password.

D.
  Hit the space bar and enter recovery when prompted.

E.
  Use a console connection to reboot the device.

Explanation:
The standard Junos root password recovery procedure is designed to allow administrative access without erasing the device's configuration. The correct steps are as follows:

E. Use a console connection to reboot the device.
Why: This is the first physical step. You must have physical or out-of-band console access to interact with the device's boot process. A network connection will not work as you cannot log in.

D. Hit the space bar and enter recovery when prompted.
Why: As the device boots, you will see a prompt asking you to press any key to enter the boot loader. Pressing the space bar at this moment interrupts the normal boot process and gives you access to the loader prompt, where you can type recovery to boot into single-user (recovery) mode. This mode grants you root shell access without requiring a password.

A. Enter and commit the new root password.
Why: Once in single-user mode, you mount the hard drive, load the existing configuration, set the new root-authentication (password or SSH key), and most critically, you commit the change. The commit saves the new password to the configuration, preserving all other existing settings. After a reboot, you can log in with the new password, and the configuration will be intact.

Analysis of Incorrect Options:

B. Load the factory-default configuration.
Incorrect. This is the exact opposite of the goal. Loading the factory-default configuration (load factory-default) erases the entire current configuration, including the root password and all other settings. This command is used to completely wipe a device, not to recover a password while preserving settings.

C. Upgrade the Junos OS to the latest version.
Incorrect. An OS upgrade is unrelated to password recovery. While it's possible to perform during maintenance, it is not a step in the password recovery process and does not help regain access to a locked device.

Reference:

This procedure is a critical administrative task documented by Juniper in their official technical documentation, often found in a guide titled "How to Recover a Lost root Password" or within the "System Basics" administration guide. It is a key topic for the JNCIA-Junos exam, testing the candidate's knowledge of fundamental system recovery techniques. The core principle is using the boot loader to bypass normal authentication while maintaining the integrity of the configuration database.

Which statement is correct concerning exception traffic processing?


A. Exception traffic is always dropped during congestion.


B. Exception traffic is rate-limited to protect the RE.


C. Exception traffic is discarded by the PFE.


D. Exception traffic is never forwarded.





B.
  Exception traffic is rate-limited to protect the RE.

Explanation:
Exception traffic (traffic destined to the router itself, such as SSH, OSPF, BGP, and pings to the router's interface) must be processed by the Routing Engine's (RE) CPU. This makes the RE a potential target for denial-of-service attacks where an attacker could overwhelm the CPU with traffic.

To mitigate this risk, Junos OS has a built-in protective mechanism:

Rate Limiting:The system automatically imposes rate limits (policers) on exception traffic. If the volume of exception traffic exceeds a predefined threshold, the Packet Forwarding Engine (PFE) will drop the excess packets before they can reach the RE.

Purpose: This ensures that even under a flood of management or control plane traffic, the RE retains enough CPU capacity to perform its critical functions, like running routing protocols and allowing administrator access for troubleshooting.

Analysis of Incorrect Options

A. Exception traffic is always dropped during congestion.
Incorrect. It is not always dropped. It is only dropped if it exceeds the policer's rate limit. A normal, non-malicious level of exception traffic is processed without issue, even during network congestion affecting transit traffic.

C. Exception traffic is discarded by the PFE.
Incorrect and Misleading. While the PFE does drop packets due to rate limiting, its primary role for exception traffic is to identify it and forward it to the RE for processing. Saying it is "discarded by the PFE" implies that is its final destination, which is false. The PFE's job is to send it to the RE, unless a policer is triggered.

D. Exception traffic is never forwarded.
Incorrect. This statement is ambiguous but generally false. Exception traffic is "forwarded" by the PFE—but it is forwarded up to the RE (the control plane), not out another data plane interface (like transit traffic). Furthermore, the router itself can generate and forward new packets in response to exception traffic (e.g., sending an OSPF update or an ICMP reply).

Reference:
This is a key security and architectural concept in Junos OS, covered in the JNCIA-Junos curriculum under topics like "Control Plane Protection" or "Traffic Processing." Understanding that the RE is protected by implicit rate limits is fundamental for both network security and for troubleshooting scenarios where legitimate control plane traffic might be dropped under high-load conditions.

You want to find out the chassis serial number of a Junos device. Which command would display this information?


A. show chassis environment


B. show chassis hardware


C. show chassis routing-engine


D. show chassis location





B.
  show chassis hardware

Explanation:
The show chassis hardware command provides a detailed inventory of all physical components in the device, including the chassis itself, Routing Engines, line cards (FPCs), Physical Interface Cards (PICs), and more. For each component, it lists the:

Hardware model number
Serial number
Part number
Version number

The very first entry in this output is for the chassis itself, which includes the chassis serial number. This is the standard and most direct command to obtain this information.

Analysis of Incorrect Options

A. show chassis environment
Incorrect. This command displays environmental status information, such as temperatures, fan speeds, and power supply states. It does not list serial numbers or hardware inventory.

C. show chassis routing-engine
Incorrect. This command shows status information specific to the Routing Engine(s), such as CPU and memory utilization, temperature, and uptime. It may show the serial number of the Routing Engine, but not necessarily the serial number of the overall chassis.

D. show chassis location
Incorrect. This command is used to display or configure physical location information for the chassis, such as a data center location, row, and rack. This is a user-configured field and does not display the manufacturer-assigned serial number.

Reference
This is a fundamental operational command covered in the JNCIA-Junos curriculum under "System Monitoring" or "Hardware Inventory." The show chassis hardware command is the primary tool for auditing device components and is essential for support cases with Juniper, as it provides all the necessary hardware identification details.

Which service does RADIUS provide?


A. routing


B. authentication


C. DNS resolution


D. time synchronization





B.
  authentication

Explanation:
RADIUS (Remote Authentication Dial-In User Service) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service.

Authentication: This is its primary service. It verifies the identity of a user attempting to access the network, typically by checking a username and password against a central database.

Authorization: After authenticating a user, it determines what network resources and level of access that user is permitted to use.

Accounting: It tracks the usage of network resources by the user, such as session time and data volume, for billing or auditing purposes.

In the context of a Junos device, RADIUS is commonly configured as an external server to authenticate administrators logging in via SSH or Telnet, providing a more secure and centralized alternative to local user accounts.

Analysis of Incorrect Options

A. routing
Incorrect. Routing is the process of determining the path for network traffic. Protocols like OSPF, BGP, and RIP handle routing. RADIUS operates at the application layer for management access and has no role in packet forwarding.

C. DNS resolution
Incorrect. DNS (Domain Name System) is the service that translates human-readable domain names (like www.juniper.net) into IP addresses. This is a completely separate function from user authentication.

D. time synchronization
Incorrect. Time synchronization is the function of the NTP (Network Time Protocol). RADIUS does not provide or manage time services.

Reference:
The use of RADIUS for user authentication is a standard security practice in network administration and is covered in the JNCIA-Junos curriculum under "System Services" or "User Authentication". Configuring RADIUS involves specifying the server details under the [edit system] hierarchy in Junos, demonstrating its role as a centralized authentication service for device management.

You have just increased the MTU size of interface ge-0/0/0 and committed the configuration. Which command would help you identify the applied MTU change?


A. monitor interface ge-0/0/0


B. monitor traffic interface ge-0/0/0


C. show interfaces ge-0/0/0 terse


D. show interfaces ge-0/0/0





D.
  show interfaces ge-0/0/0

Explanation:
The show interfaces command (without any terse or extensive modifiers) is the primary tool for displaying the detailed status and configuration of a specific interface. When you run show interfaces ge-0/0/0, the output includes a dedicated line that explicitly shows the configured MTU.

You will see an output section that looks similar to this:
text
Physical interface: ge-0/0/0, Enabled, Physical link is Up
Interface index: 148, SNMP ifIndex: 526
Link-level type: Ethernet, MTU: 1514, Speed: 1000mbps, ...(output truncated)...
The MTU: 1514 field in this output directly confirms the currently applied MTU size for the interface.
This is the most straightforward and definitive way to verify the configuration change.

Analysis of Incorrect Options
A. monitor interface ge-0/0/0
Incorrect. The monitor interface command launches a real-time traffic monitoring tool that shows packet and byte counters, errors, and packet rates. It is used for observing traffic flow, not for displaying static interface configuration parameters like MTU.

B. monitor traffic interface ge-0/0/0
Incorrect. This command is used to capture live packet headers on the specified interface. It is a troubleshooting tool for analyzing the contents of packets, not for viewing interface configuration settings.

C. show interfaces ge-0/0/0 terse
Incorrect. The terse modifier provides a condensed, summarized overview of all interfaces or a specific one. While it shows the interface's administrative and operational status along with IP addresses, it omits detailed configuration parameters like the MTU.

Reference:
This is a fundamental operational task covered in the JNCIA-Junos curriculum under "Monitoring Interfaces". The show interfaces command is the standard method for verifying the operational state and configuration of any interface. Understanding the different output formats of the show interfaces command (terse, detail, extensive) and knowing which one provides the required information is a key skill for the exam and real-world network management.

You received a new Junos device and are configuring the system-related settings. You must configure this device for the current date and time on the US West coast. You have set the time zone to America/Los_Angeies. however the time and date did not change. In this scenario, which two additional actions would satisfy this requirement? (Choose two.)


A. Set the date and time setting manually.


B. Configure an NTP server.


C. Configure a DNS server.


D. Reboot the device.





A.
  Set the date and time setting manually.

B.
  Configure an NTP server.

Explanation:
Configuring the time zone alone only tells the device how to offset the system clock from Universal Coordinated Time (UTC). It does not actually set the system clock itself.

A. Set the date and time setting manually.
This is a direct and immediate solution. From operational mode, you can use the set date command (e.g., set date YYYYMMDDHHMM.SS) to manually configure the correct local time. The device will then use the configured America/Los_Angeles timezone to calculate and display the time correctly.

B. Configure an NTP server.
This is the preferred and most accurate method for production environments. By configuring NTP under [edit system ntp] and committing, the device will automatically synchronize its clock with a reliable time server. Once synchronized, it will apply the America/Los_Angeles timezone offset to display the correct local time. This ensures long-term accuracy without manual intervention.

Both of these actions provide the necessary step of actually setting the system clock, which is what was missing after only configuring the timezone.

Analysis of Incorrect Options

C. Configure a DNS server.
Incorrect. DNS is used for domain name resolution (translating hostnames to IP addresses). It has no functional relationship with time synchronization or setting the system clock.

D. Reboot the device.
Incorrect. Rebooting the device will not magically set the correct time. The device will likely just restart with the same incorrect hardware clock time it had before. A reboot is not a step in the time configuration process.

Reference:
This process is covered in the JNCIA-Junos curriculum under "Initial System Configuration" or "System Management." The official Junos documentation clearly outlines that setting the timezone and setting the clock are two distinct configuration tasks. The set date command is for immediate manual correction, while NTP configuration is for automated, sustained timekeeping, which is a critical best practice for logging, security, and troubleshooting.

When considering routing tables and forwarding tables, which two statements are correct? (Choose two.)


A. The routing table is used by the RE to select the best route.


B. The forwarding table stores all routes and prefixes from all protocols.


C. The forwarding table is used by the RE to select the best route.


D. The routing table stores all routes and prefixes from all protocols.





A.
  The routing table is used by the RE to select the best route.

D.
  The routing table stores all routes and prefixes from all protocols.

Explanation:
This question tests the fundamental distinction between the control plane (Routing Engine) and the forwarding plane (Packet Forwarding Engine) in Junos architecture.

A. The routing table is used by the RE to select the best route.
Correct. The Routing Engine (RE) is the control plane. It runs the routing protocols (OSPF, BGP, etc.). The primary function of the routing protocol process (rpd) on the RE is to take all learned routes (from all protocols and sources), run a route selection algorithm, and choose the single best route for each prefix. This collection of best routes is stored in the main routing table.

D. The routing table stores all routes and prefixes from all protocols.
Correct.The routing table, or Routing Information Base (RIB), is the master database on the RE. It contains all routes learned from all sources—directly connected, static, OSPF, BGP, etc. For each prefix, it shows every possible path and then marks the best one as active. You can view this with the show route command.

Analysis of Incorrect Options

B. The forwarding table stores all routes and prefixes from all protocols.
Incorrect. This is the role of the routing table (RIB) on the RE. The forwarding table, or Forwarding Information Base (FIB), is a streamlined, optimized version that resides on the PFE. It contains only the active routes from the RIB, along with the specific next-hop information needed for high-speed packet forwarding. It does not store all possible paths, only the best one.

C. The forwarding table is used by the RE to select the best route.
Incorrect. This statement reverses the entire process. The RE uses the routing table (RIB) to select the best route. After the best route is selected in the RIB, that information is downloaded from the RE to the PFE to populate the forwarding table (FIB). The RE does not use the FIB for route selection; it creates it.

Reference
This is a core architectural concept in Junos OS and is a key topic in the JNCIA-Junos certification, covered under "Junos OS Architecture" or "Routing Tables." Understanding the separation between the RIB (control plane, all routes, best path selection) and the FIB (forwarding plane, active routes only, high-speed lookups) is fundamental to understanding how Juniper devices operate and how to troubleshoot routing issues.

Which Junos feature limits the amount of exception traffic that is sent from the PFE to the RE?


A. scheduler


B. policer


C. CoS markings


D. routing policy





B.
  policer

Which type of device uses the destination IP address to forward packets?


A. Layer 3 router


B. Layer 2 switch


C. repeater


D. hub





A.
  Layer 3 router

You issue the monitor traffic interface ge-0/0/0 command.
What will this command accomplish?


A. It displays real-time statistics for interface ge-0/0/0.


B. It displays an operational summary of ge-0/0/0.


C. It displays the MTU and MAC address for ge-0/0/0.


D. It displays a packet capture on interface ge-0/0/0.





D.
  It displays a packet capture on interface ge-0/0/0.

Which two statements are correct about firewall filters? (Choose two.)


A. "Discard" is the default action of packets that are not explicitly allowed.


B. There can be only one firewall filter.


C. "Accept" is the default action of packets that are not explicitly allowed.


D. There can be multiple firewall filters.





A.
  "Discard" is the default action of packets that are not explicitly allowed.

D.
  There can be multiple firewall filters.


Page 2 out of 9 Pages
Previous