Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Juniper > JNCIA > JN0-106

JN0-106 Junos - Associate (JNCIA-Junos) Junos OS 21.2 Question and Answers

Question # 4

How are the Routing Engine and the Packet Forwarding Engine components connected?

A.

They use shared memory access.

B.

They use external breakout cables.

C.

They use an MPLS connection.

D.

They use an internal Ethernet link.

Full Access
Question # 5

What are two characteristics of IPv6 addressing? (Choose two.)

A.

The IPv6 address is represented by a 128-bit address.

B.

The IPv6 header automatically includes a checksum.

C.

IPv6 uses ARP to discover neighboring devices.

D.

IPv6 addresses that begin with fe80 are not routable.

Full Access
Question # 6

Which two statements about route preference in Junos OS are correct? (Choose two.)

A.

Higher route preference values indicate higher priority.

B.

Route preference is considered after evaluating the longest prefix match.

C.

Lower route preference values indicate higher priority.

D.

Route preference determines the forwarding table size.

Full Access
Question # 7

When troubleshooting a problem, you issue the following commands in sequence:

    show chassis alarms

    show chassis fpc

    show chassis fpc detail

    show chassis errors fpc-slot 0

In this scenario, what happens when you press the up arrow key twice at the prompt?

A.

The show chassis fpc command is displayed at the prompt.

B.

The show chassis errors fpc-slot 0 command is displayed at the prompt.

C.

The show chassis alarms command is displayed at the prompt.

D.

The show chassis fpc detail command is displayed at the prompt.

Full Access
Question # 8

An administrator wants to set up a remote user authentication service for the many users that access a Juniper security device. In this scenario, what are two supported authentication protocols? (Choose two.)

A.

RADIUS

B.

TACACS+

C.

SHA

D.

IPsec

Full Access
Question # 9

Referring to the exhibit, which two statements about IPv6 routing are correct? (Choose two.)

A.

The router is not learning IPv6 routes from peers.

B.

The router cannot forward traffic to remote IPv6 networks.

C.

Traffic destined for the 2001:db8:22:108::/64 network is forwarded using the ge-0/0/5.0 interface.

D.

The router is connected to the 2001:db8:22:107::/64 network.

Full Access
Question # 10

Which routing table is used for IPv6 unicast routes by default?

A.

inet.0

B.

inet.6

C.

inet.1

D.

inet6.0

Full Access
Question # 11

Exhibit:

Referring to the exhibit, with firewall filter Packet-Filter attached to an interface, if traffic is sent from 192.168.1.1 to 8.8.8.8 for a UDP DNS query, what will happen to the traffic?

A.

The traffic will match term 1 and be forwarded.

B.

The traffic will match the default last term and be forwarded.

C.

The traffic will match the default last term and be discarded.

D.

The traffic will match term 3 and be forwarded.

Full Access
Question # 12

Which two tasks are performed by the Routing Engine in a Junos device? (Choose two.)

A.

The Routing Engine runs routing protocols.

B.

The Routing Engine evaluates transit traffic against firewall filters.

C.

The Routing Engine manages the device configuration.

D.

The Routing Engine forwards transit traffic.

Full Access
Question # 13

The MX204 has 12 built-in ports. Referring to the exhibit, to which interface does the arrow point?

A.

хе-0/2/7

B.

хе-0/0/7

C.

хе-0/1/7

D.

хе-0/1/6

Full Access
Question # 14

Which statement describes the purpose of configuring traceoption log files in Junos OS?

A.

The traceoption log files automatically optimize routing decisions based on traffic patterns.

B.

The traceoption log files enable detailed debugging of specific protocols or processes.

C.

The traceoption log files allow permanent storage of all system logs for compliance purposes.

D.

The traceoption log files provide real-time monitoring of interface bandwidth utilization.

Full Access
Question # 15

Which two statements are correct about logical units? (Choose two.)

A.

A physical interface can host multiple logical units.

B.

Logical units can have multiple IP addresses.

C.

Logical units are used only for management interfaces.

D.

A physical interface can host only one logical unit.

Full Access
Question # 16

Your routing policy has three terms. A route matches the first term with an accept action. In this scenario, what happens next?

A.

The route is rejected by default.

B.

The route is evaluated by the second term.

C.

The route is sent to the next policy chain.

D.

The route is accepted and no further terms are evaluated.

Full Access
Question # 17

You committed a new configuration on a Junos router, but users report connectivity issues. You must quickly restore the previous working configuration without manually editing the candidate configuration. Which command should you use to load the required configuration into the candidate configuration?

A.

rollback 0

B.

show | compare rollback

C.

rollback 1

D.

load override

Full Access
Question # 18

According to HPE Juniper Networking, what are two recommended tasks you should perform before upgrading Junos OS on a device? (Choose two.)

A.

Delete all rollback configurations.

B.

Verify available storage space using the show system storage command.

C.

Disable all interfaces to prevent traffic during the upgrade.

D.

Back up the active current configuration.

Full Access
Question # 19

Which statement is correct when Router R1 receives a packet from User A destined for User B as shown in the exhibit?

A.

Router R1 replaces the destination IP address in the packet with the IP address of Router R2.

B.

Router R1 leaves the packet unchanged.

C.

Router R1 replaces the destination MAC address in the packet with the MAC address of Router R2.

D.

Router R1 replaces the destination MAC address in the packet with the MAC address of User B.

Full Access
Question # 20

Which two statements about prefix lists in Junos are correct? (Choose two.)

A.

Prefix lists can be re-used in multiple routing policies.

B.

Prefix lists can be used in both firewall filters and routing policies.

C.

Prefix lists cannot be used in routing policies.

D.

Prefix lists cannot be used in firewall filters.

Full Access
Question # 21

You are creating a new user account on your Junos device. The user must be able to validate the routing table and interface statistics but should not be able to make any configuration changes. In this scenario, which permission flag would satisfy this requirement?

A.

configure

B.

all

C.

view

D.

network

Full Access
Question # 22

Click the Exhibit button.

Which command displays the output in the format shown in the exhibit?

A.

show configuration | display inheritance

B.

show configuration | display set

C.

show configuration

D.

show configuration | display detail

Full Access
Question # 23

Which two characteristics apply to TCP? (Choose two.)

A.

TCP guarantees fixed latency for application flows.

B.

TCP broadcasts datagrams by default on Ethernet.

C.

TCP uses a three-way handshake to establish a connection.

D.

TCP provides reliable, ordered delivery using sequence numbers.

Full Access
Question # 24

Which two statements are correct regarding Layer 2 network switches? (Choose two.)

A.

Switches are susceptible to traffic loops.

B.

Switches flood broadcast traffic.

C.

Switches do not learn MAC addresses.

D.

Switches create a single collision domain.

Full Access
Question # 25

Which two statements about firewall filters are correct? (Choose two.)

A.

Firewall filters are stateful.

B.

Firewall filters can match Layer 4 parameters.

C.

Firewall filters can match Layer 7 parameters.

D.

Firewall filters are stateless.

Full Access
Question # 26

Which two actions would you perform when you are in the operational mode of the CLI? (Choose two.)

A.

Clear the log files.

B.

Commit the configuration.

C.

Reboot the device.

D.

Configure routing protocols.

Full Access
Question # 27

Which two statements are correct about a Routing Engine? (Choose two.)

A.

It processes management traffic.

B.

It processes CoS marked traffic.

C.

It forwards transit traffic.

D.

It maintains routing tables.

Full Access
Question # 28

What does the user@router > clear log ospf-trace command accomplish?

A.

The ospf-trace file is deleted.

B.

Trace parameters are removed from the OSPF protocol configuration.

C.

Logging data into ospf-trace is stopped.

D.

Data in the ospf-trace file is removed and logging continues.

Full Access