00:00

QUESTION 1

Which two actions happen when multiple users issue the configure exclusive command to enter configuration mode on a Junos device? (Choose two.)

Correct Answer: CD
In Junos OS, when a user issues the configure exclusive command, it locks the candidate configuration for that user, preventing other users from making concurrent configuration changes. This exclusive lock ensures that configuration changes are managed in a controlled manner, reducing the risk of conflicting changes. As a result, while one user is in exclusive configuration mode, other users are prevented from entering configuration mode until the lock is released, either by the user committing the changes or exiting configuration mode.

QUESTION 2

You need to recover the root password on a Junos router without losing the current configuration settings.
Which three statements describe what you should perform in this scenario? (Choose three.)

Correct Answer: ADE
To recover the root password on a Junos router without losing the configuration, you should (A) enter and commit the new root password once you have gained access to the system, (D) hit the space bar to interrupt the boot process and enter recovery mode when prompted during the boot process, and (E) use a console connection to reboot the device and access the bootloader prompt. These steps allow you to reset the root password while preserving the existing configuration.

QUESTION 3

Click the Exhibit button.
JN0-105 dumps exhibit
How is traffic, sourced from 10.0.0.0/8, treated by the firewall filter shown in the exhibit?

Correct Answer: D
The firewall filter configuration in the exhibit specifies a filter with two terms. Term 1 matches traffic from the source address 10.0.0.0/8 and has two actions: 'log' and 'next term'. The 'log' action will record the match to a log file, and 'next term' indicates that the firewall should evaluate the next term after logging. There is no explicit action such as 'accept' or 'reject' in term 1, so by default, the traffic will be accepted unless subsequently rejected by another term.
Term 2 has the action 'reject', which discards packets that reach this term. Since there is no 'from' condition in term 2, it acts as a default rule for all traffic not matched by term 1. Because the traffic sourced from 10.0.0.0/8 matches term 1 and there is no reject action in that term, it will be logged and then accepted by the firewall filter. There is no subsequent term that rejects this specific traffic, so the action from term 2 does not apply to it.

QUESTION 4

You have completed the initial configuration of your new Junos device. You want to be able to load this configuration at a later time.
Which action enables you to perform this task?

Correct Answer: D
In Junos OS, the request system configuration rescue save command is used to save the current active configuration as a rescue configuration. This feature is particularly useful for preserving a known good configuration state that can be quickly reverted to in case of configuration errors or issues. By saving a rescue configuration, administrators can ensure that they have a reliable fallback option that can be loaded in the future to restore the device's operation without having to reconfigure from scratch. This is an essential practice for maintaining network stability and quick recovery.

QUESTION 5

Exhibit.
JN0-105 dumps exhibit
Referring to the exhibit, which routing configuration is required for these two users to access the remote server?

Correct Answer: B
For the users in the 10.1.1.0/24 subnet and the server in the 10.1.2.0/24 subnet to communicate with each other, they need to route packets through the router that connects these two subnets. Each user and the server need to have their default gateway set to the IP address of the router interface on their respective subnet (.254). This ensures that packets destined for other subnets are sent to the router, which then routes them to the correct destination subnet.
References:
✑ Juniper official documentation: Configuring Basic Routing.
✑ General networking principles.