Juniper Junos, Associate JN0-105 Exam Questions

Page: 1 / 14
Total 107 questions
Question 1

What information is exchanged during a TCP three-way handshake? (Choose two)



Answer : A, C

The TCP three-way handshake establishes a reliable connection between two hosts. During this process:

SYN: The client sends a TCP segment with the SYN flag set, including an initial sequence number (ISN) and port information.

SYN-ACK: The server responds with a SYN-ACK, which contains its own sequence number and acknowledgment of the client's ISN.

ACK: The client replies with an ACK, confirming receipt of the server's ISN.

Thus, port numbers (to identify the application endpoints) and sequence numbers (to ensure ordered and reliable data transfer) are exchanged.

Interfaces and application names are not exchanged during this process.

From Junos OS Fundamentals / TCP Concepts:

''The TCP three-way handshake establishes a reliable session by exchanging port numbers and sequence numbers between peers. This process synchronizes both sides before data transmission begins.''


Juniper TechLibrary -- TCP Overview

JNCIA-Junos Exam Objective: TCP/IP Concepts

Question 2

Which two functions are performed by the PFE? (Choose two.)



Answer : A, C

The Packet Forwarding Engine (PFE) in Junos OS performs several key functions, including implementing firewall filters (A) and forwarding transit traffic (C). The PFE applies firewall filter rules to incoming and outgoing traffic and is responsible for the high-speed forwarding of packets based on the information in the forwarding table.


Question 3

Which layer of the OSI model contains the IP address information?



Answer : B

The OSI (Open Systems Interconnection) model is a conceptual framework used to understand network interactions in seven distinct layers. IP (Internet Protocol) addresses are part of Layer 3, known as the Network Layer. This layer is responsible for packet forwarding, including routing through intermediate routers, and it handles the logical addressing scheme of the network to ensure that packets can be routed across multiple networks and reach their destination. IP addresses provide unique identifiers for network interfaces, allowing for communication between devices on a network or across different networks.


Question 4

What are two examples of exception traffic? (Choose two.)



Answer : B, C

Exception traffic includes traffic that is not simply forwarded by the router but requires special handling, such as routing updates (B) and log messages (C). These types of traffic are processed by the router's control plane rather than just being forwarded through the data plane.


Question 5

What are two types of transit traffic that traverse the forwarding plane of a Layer 3 router? (Choose two.)



Answer : A, B

Transit traffic that traverses the forwarding plane of a Layer 3 router includes both unicast and multicast traffic types. Unicast traffic is directed from a single source to a single destination, while multicast traffic is sent from one source to multiple destinations that are part of a multicast group. These types of traffic are efficiently routed through the network by leveraging the router's forwarding plane capabilities. Exception traffic, which requires special handling by the control plane, and broadcast traffic, which is typically limited to a single broadcast domain and not usually forwarded by Layer 3 routers, are not considered standard types of transit traffic for the forwarding plane of a router.


Question 6

Which advantage is provided by multiple software processes running in the Junos OS?



Answer : D

In the Junos OS, multiple software processes run independently in their own protected memory spaces. This design ensures that if one process crashes or encounters an issue, it does not affect the other processes running on the system. This architecture enhances the stability and reliability of the network device, as each process operates independently and securely.


Question 7

What is a benefit of using J-Web?



Answer : B

If you've committed a configuration and then need to revert to the previous configuration, the rollback command is used. Since the incorrect IP address has not been committed, as indicated by the commit check command being successful, issuing rollback 1 will undo the changes made in the current session, which includes the accidental entry of the IP address.


Page:    1 / 14   
Total 107 questions