Logo Passei Direto
Material
Study with thousands of resources!

Text Material Preview

Junos - Associate
(JNCIA-Junos) 2025
Exam
Version: Demo
[ Total Questions: 10]
Web: www.certsout.com
Email: support@certsout.com
Juniper
JN0-105
https://www.certsout.com
https://www.certsout.com/JN0-105-test.html
IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any 
suggestions, please feel free to contact us at feedback@certsout.com
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at and our technical experts will provide support within 24 hours.support@certsout.com
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized 
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Juniper - JN0-105Certs Exam
1 of 5Pass with Valid Exam Questions Pool
A. 
B. 
C. 
D. 
A. 
B. 
C. 
D. 
Question #:1
Which criteria does the Junos OS use to select an active route when two entries exist in the routing table?
the route with the lowest preference number
the most recently learned dynamic route
the route with the highest preference number
the route with the highest metric
Answer: A
Explanation
In Junos OS, when two entries for the same destination exist in the routing table, the route with the lowest 
preference number is selected as the active route. This preference number, also known as the route preference 
or administrative distance, is used to prioritize routes received from different routing protocols.
Question #:2
What information is exchanged during a TCP three-way handshake? (Choose two)
port numbers
interfaces
sequence numbers
application name
Answer: A C
Explanation
The establishes a reliable connection between two hosts. During this process:TCP three-way handshake
SYN: The client sends a TCP segment with the SYN flag set, including an initial sequence number 
(ISN) and port information.
SYN-ACK: The server responds with a SYN-ACK, which contains its own sequence number and 
acknowledgment of the client’s ISN.
ACK: The client replies with an ACK, confirming receipt of the server’s ISN.
Thus, (to identify the application endpoints) and (to ensure ordered and port numbers sequence numbers
reliable data transfer) are exchanged.
Juniper - JN0-105Certs Exam
2 of 5Pass with Valid Exam Questions Pool
A. 
B. 
C. 
D. 
A. 
B. 
C. 
D. 
Interfaces and application names are not exchanged during this process.
From :Junos OS Fundamentals / TCP Concepts
“The TCP three-way handshake establishes a reliable session by exchanging port numbers and sequence 
numbers between peers. This process synchronizes both sides before data transmission begins.”
References:
Juniper TechLibrary – TCP Overview
JNCIA-Junos Exam Objective: TCP/IP Concepts
Question #:3
What are two advantages of using the Junos OS? (Choose two.)
It enables you to roll back to a previous configuration.
It pushes your configuration changes "live" immediately.
It is modular.
It supports up to a maximum of two previous configurations.
Answer: A C
Explanation
One of the key advantages of Junos OS is its ability to roll back to previous configurations. This feature 
allows administrators to revert to an earlier configuration state, which is invaluable for quickly recovering 
from configuration errors or undesired changes. Junos OS maintains an archive of previous configurations, 
enabling easy rollback to any saved state. Another significant advantage of Junos OS is its modular design. 
The operating system is structured so that different processes and services run in separate protected memory 
spaces, enhancing the stability and reliability of the system. If one process fails, it does not affect the others, 
thereby minimizing the risk of system-wide failures.
Question #:4
You are trying to diagnose packet loss at interface ge-0/0/3.
In this scenario, which command would help you view error statistics in real time?
show interface terse
show interface ge-0/0/3
monitor interface traffic
Juniper - JN0-105Certs Exam
3 of 5Pass with Valid Exam Questions Pool
D. 
A. 
B. 
C. 
D. 
A. 
B. 
C. 
D. 
monitor interface ge-0/0/3
Answer: D
Explanation
The command is used in Junos OS to view real-time statistics for a specific monitor interface ge-0/0/3
interface. This command helps in diagnosing issues like packet loss by displaying real-time updates of traffic 
and error statistics for the specified interface.
Question #:5
Which statement is correct concerning exception traffic processing?
Exception traffic is always dropped during congestion.
Exception traffic is rate-limited to protect the RE.
Exception traffic is discarded by the PFE.
Exception traffic is never forwarded.
Answer: B
Explanation
Exception traffic refers to packets that the Packet Forwarding Engine (PFE) cannot process normally and 
must be forwarded to the Routing Engine (RE) for further processing. This includes packets destined for the 
router itself or packets needing special handling that the PFE cannot provide. To protect the RE from being 
overwhelmed by such traffic, which could potentially impact the router's control plane functions, exception 
traffic is rate-limited. This means that there's a threshold to how much exception traffic can be sent to the RE, 
ensuring that the router's critical management and control functions remain stable and responsive even during 
high traffic volumes or attacks.
Question #:6
After the factory default configuration is loaded, which configuration object must be created prior to the first 
commit?
root authentication
loopback IP address
out-of-band connectivity
host name
Answer: A
Explanation
Juniper - JN0-105Certs Exam
4 of 5Pass with Valid Exam Questions Pool
A. 
B. 
C. 
D. 
A. 
B. 
C. 
D. 
In Juniper Networks devices, when the factory default configuration is loaded, the first step before 
committing any configuration is to set up root authentication. This is crucial because it secures the device by 
ensuring that only authorized users have administrative access. Without setting up a root password, the device 
will not allow any commit operations, which is a safety measure to prevent unauthorized access. This 
requirement emphasizes the importance Juniper places on security right from the initial setup of the device.
Question #:7
Which advantage is provided by multiple software processes running in the Junos OS?
Each process allocates a fixed amount of CPU resources.
Each process dependency can be mapped independently.
Each process is started manually to ensure system stability.
Each process runs in a protected memory space.
Answer: D
Explanation
In the Junos OS, multiple software processes run independently in their own protected memory spaces. This 
design ensures that if one process crashes or encounters an issue, it does not affect the other processes running 
on the system. This architecture enhances the stability and reliability of the network device, as each process 
operates independently and securely.
Question #:8
What is the primary system log file that is present in the default configuration of a Junos device?
kmd
messages
vrrp
jsrpd
Answer: B
Explanation
In the default configuration of a Junos device, the primary system log file is "messages" (B). This log file 
contains a wide range of system messages, including operational status changes, system errors, and other 
critical information, making it a key resource for troubleshooting and monitoring the system's health.
Question #:9
Juniper - JN0-105Certs Exam
5 of 5Pass with Valid Exam Questions Pool
A. 
B. 
C. 
D. 
A. 
B. 
C. 
D. 
Which two statements are correct regarding Layer 2 network switches? (Choose two.)
Switches create a single collision domain.
Switches are susceptible to traffic loops.
Switchesflood broadcast traffic.
Switches do not learn MAC addresses.
Answer: B C
Explanation
Layer 2 network switches are crucial components in local area networks (LANs), providing multiple functions 
for data packet forwarding and network segmentation. One inherent characteristic of switches is their 
susceptibility to traffic loops, especially in networks with redundant paths. Without proper loop prevention 
protocols like Spanning Tree Protocol (STP), loops can cause broadcast storms and network instability. 
Additionally, switches inherently flood broadcast traffic to all ports within the broadcast domain, except the 
port on which the broadcast was received. This is because broadcast frames are meant to be delivered to all 
devices within the VLAN, and the switch ensures this by flooding these frames to all ports in the VLAN, 
except the source port.
Question #:10
Which protocol would you configure to synchronize the time and date on a Junos device?
SNMP
RIP
NTP
NMP
Answer: C
Explanation
The Network Time Protocol (NTP) is designed to synchronize the clocks of computers over a network. 
Configuring NTP on a Junos device ensures that its clock is set accurately, which is crucial for logging, 
troubleshooting, and maintaining the integrity of time-sensitive operations and security protocols. NTP allows 
devices to use a hierarchy of time sources, from primary servers synchronized to a reference clock (such as an 
atomic clock or GPS time) to secondary servers that distribute the time to other devices on the network.
About certsout.com
certsout.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam 
Questions, Study Guides, Practice Tests.
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially 
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
View list of all certification exams: All vendors
 
 
 
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses 
listed below.
Sales: sales@certsout.com
Feedback: feedback@certsout.com
Support: support@certsout.com
Any problems about IT certification or our products, You can write us back and we will get back to you within 24 
hours.
https://www.certsout.com
https://www.certsout.com/vendors.html
https://www.certsout.com/Apple-Practice-Test.html
https://www.certsout.com/Cisco-Practice-Test.html
https://www.certsout.com/Citrix-Practice-Test.html
https://www.certsout.com/CompTIA-Practice-Test.html
https://www.certsout.com/EMC-Practice-Test.html
https://www.certsout.com/ISC-Practice-Test.html
https://www.certsout.com/IBM-Practice-Test.html
https://www.certsout.com/Juniper-Practice-Test.html
https://www.certsout.com/Microsoft-Practice-Test.html
https://www.certsout.com/Oracle-Practice-Test.html
https://www.certsout.com/Symantec-Practice-Test.html
https://www.certsout.com/VMware-Practice-Test.html
mailto:sales@certsout.com
mailto:feedback@certsout.com
mailto:support@certsout.com