JN0-105 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.
Getting ready for your JN0-105 certification exam? Start your preparation the smart way with our JN0-105 Mock Test Free – a carefully crafted set of 50 realistic, exam-style questions to help you practice effectively and boost your confidence.
Using a mock test free for JN0-105 exam is one of the best ways to:
- Familiarize yourself with the actual exam format and question style
- Identify areas where you need more review
- Strengthen your time management and test-taking strategy
Below, you will find 50 free questions from our JN0-105 Mock Test Free resource. These questions are structured to reflect the real exam’s difficulty and content areas, helping you assess your readiness accurately.
Which character is used to filter the command output in the Junos CLI?
A. ?
B.
Which statement is correct when multiple users are configuring a Junos device using the configure private command?
A. A commit by any user will commit changes made by all active users.
B. Each user gets their own candidate configuration.
C. A commit will not succeed until there is only a single user in configuration mode.
D. Each user shares the same candidate configuration.
What is the maximum number of rollback configuration files that the Junos OS will store?
A. 25
B. 65
C. 50
D. 19
Which prompt indicates that you are using configuration mode?
A. >
B. $
C. #
D. %
What will the request system configuration rescue save command do?
A. It saves the candidate configuration as the rescue configuration.
B. It saves the most recently committed configuration as the rescue configuration.
C. It saves a configuration version prior to the configuration most recently committed as the rescue configuration.
D. It activates the rescue configuration.
What is a benefit of using J-Web?
A. It simultaneously manages multiple devices.
B. It provides more advanced features than the CLI.
C. It provides a customizable dashboard.
D. It provides console-based management.
What are two physical interface properties? (Choose two.)
A. routing protocols
B. MTU
C. IP address
D. MAC address
What information would you find using the CLI help command?
A. message of the day
B. an explanation for specific system log error messages
C. hyperlinks for remediation actions
D. a URL for accessing the technical documentation
You have just increased the MTU size of interface ge-0/0/0 and committed the configuration. Which command would help you identify the applied MTU change?
A. monitor traffic interface ge-0/0/0
B. show interfaces ge-0/0/0
C. show interfaces ge-0/0/0 terse
D. monitor interface ge-0/0/0
Which two addresses are included in an Ethernet frame header? (Choose two.)
A. destination MAC address
B. source IP address
C. destination IP address
D. source MAC address
Which two statements are correct about MAC addresses? (Choose two.)
A. Switches use the Address Resolution Protocol table to assign MAC addresses to network interface cards in the forwarding frame.
B. Switches use the destination MAC address to identify the next-hop destination and to change the destination MAC address in the frame.
C. The source and destination MAC addresses always remains static to the final destination.
D. The MAC address identifies the physical hardware.
Which two common routing policy actions affect the flow of policy evaluation? (Choose two.)
A. next term
B. next hop
C. next policy
D. community
In the Junos OS, which keyboard shortcut allows you to move to the start of the line?
A. Ctrl+e
B. Ctrl+a
C. Ctrl+k
D. Ctrl+w
Which Junos feature limits the amount of exception traffic that is sent from the PFE to the RE?
A. policer
B. CoS markings
C. routing policy
D. scheduler
What are two attributes of the UDP protocol? (Choose two.)
A. UDP is connectionless.
B. UDP is best effort.
C. UDP is more reliable than TCP.
D. UDP is always slower than TCP.
What does the user@router> clear log ospf-trace command accomplish?
A. Logging data into ospf-trace is stopped.
B. Trace parameters are removed from the OSPF protocol configuration.
C. Data in the ospf-trace file is removed and logging continues.
D. The ospf-trace file is deleted.
When considering routing policies, which two statements are correct? (Choose two.)
A. An import routing policy for BGP determines which received prefix advertisements are placed in the routing information base.
B. Policy terms are evaluated from top to bottom with action taken on the first match found.
C. Policy terms are evaluated from top to bottom with the most restrictive action taken of all the matching terms.
D. Routing policies are applied to interfaces as input or export filters.
Your router has a route to the 10.1.1.0/24 network with a next hop of rjct. In this scenario, which action will your router perform when traffic destined to the 10.1.1.0/24 network is received?
A. The traffic will be discarded and an ICMP unreachable message will be sent to the destination of the traffic.
B. The traffic will be silently discarded.
C. The traffic will be redirected using a default route.
D. The traffic will be discarded and an ICMP unreachable message will be sent to the source of the traffic.
How many login classes are assignable to a user account?
A. 2
B. 1
C. 4
D. 3
What is the protocol data unit (PDU) of the Data Link Layer?
A. segment
B. byte
C. bit
D. frame
Which two statements are true about the candidate configuration? (Choose two.)
A. You can discard changes before committing them.
B. You can deploy multiple changes at the same time.
C. Multiple users cannot modify the same candidate configuration.
D. Candidate configuration changes are automatically applied.
Which process in the Junos OS is responsible for device management tasks including the CLI and commit operations?
A. mgd
B. chassisd
C. dcd
D. rpd
Which two statements apply to the Routing Engine functions? (Choose two.)
A. It does not process routing updates.
B. It responds to ping and traceroute commands.
C. It maintains the routing tables.
D. It processes the transit traffic.
By default, how does the PFE manage unicast traffic destined for an existing forwarding table entry?
A. It sends the traffic through multiple ports toward its destination.
B. It sends the traffic through one port toward its destination.
C. It sends the traffic through the fxp1 interface to the RE.
D. It sends all traffic to the control plane for further processing.
Which two statements about firewall filters are correct? (Choose two.)
A. Firewall filters can match Layer 7 parameters.
B. Firewall filters are stateless.
C. Firewall filters are stateful.
D. Firewall filters can match Layer 4 parameters.
Click the Exhibit button. You are unable to remotely access your Juniper device using the CLI. Referring to the exhibit, which command would you add to the existing configuration to enable remote CLI access?
A. set system services ssh
B. load factory-default
C. set system login idle-timeout 20
D. set system root-authentication plain-text-password
Which two statements are correct about a Routing Engine? (Choose two.)
A. It processes CoS marked traffic.
B. It processes management traffic.
C. It maintains routing tables.
D. It forwards transit traffic.
What are two benefits when implementing class of service? (Choose two.)
A. Traffic congestion will be eliminated.
B. Traffic congestion can be managed.
C. The network will be faster.
D. Latency-sensitive traffic can be prioritized.
You configured your system authentication order using the set authentication-order tacplus radius password command. Which statement is correct in this scenario?
A. A rejection by TACACS+ will prevent a login and bypass the other two authentication methods.
B. The password authentication will only be used if the TACACS+ and RADIUS servers fail to respond.
C. All authentication methods are used with the most restrictive permission set used.
D. The password authentication method is evaluated if the TACACS+ and RADIUS servers respond with a reject message.
How many rescue configuration files are supported on a Junos device?
A. 3
B. 1
C. 50
D. 49
Which command displays all IPv6 routes in the default routing instance?
A. show route table inet6.0
B. show route table inet.1
C. show route table inet.0
D. show route table inet6.1
What are two methods for navigating to configuration mode from an operational mode prompt? (Choose two.)
A. Use the quit command.
B. Use the configure command.
C. Use the exit command.
D. Use the edit command.
Which two statements are correct regarding Layer 2 network switches? (Choose two.)
A. Switches flood broadcast traffic.
B. Switches are susceptible to traffic loops.
C. Switches do not learn MAC addresses.
D. Switches create a single collision domain.
Which two statements are correct about firewall filters? (Choose two.)
A. “Discard” is the default action of packets that are not explicitly allowed.
B. There can be only one firewall filter.
C. There can be multiple firewall filters.
D. “Accept” is the default action of packets that are not explicitly allowed.
You have logged on to a Junos device and are at the operational mode prompt. Which two commands are used at this prompt? (Choose two.)
A. show interface ge-0/0/0
B. request system shutdown
C. set interface ge-0/0/0 unit 0 family inet
D. run show interface terse
Which Junos OS component is responsible for maintaining the forwarding table?
A. Packet Forwarding Engine
B. chassis control daemon
C. Routing Engine
D. management daemon
Your network infrastructure transports data, voice, and video traffic. Users are complaining that voice and video calls are not performing to their expectations. In this scenario, which technology would you implement to improve voice and video performance on your network?
A. NAT
B. IPv6
C. CoS
D. STP
Which two statements are true about the PFE? (Choose two.)
A. The PFE handles all processes that control the chassis components.
B. The PFE is responsible for performing protocol updates and system management.
C. The PFE uses Layer 2 and Layer 3 forwarding tables to forward traffic toward its destination.
D. The PFE implements various services such as policing, stateless firewall filtering, and class of service.
What is the primary system log file that is present in the default configuration of a Junos device?
A. vrrp
B. kmd
C. messages
D. jsrpd
What are two types of transit traffic that traverse the forwarding plane of a Layer 3 router? (Choose two.)
A. exception traffic
B. broadcast traffic
C. unicast traffic
D. multicast traffic
Click the Exhibit button. Referring to the exhibit, where are the configuration backup files stored?
A. Files are stored to the SCP site and the FTP site in a round-robin manner.
B. Files are stored to the SCP site and the FTP site simultaneously.
C. Files are stored to any site as selected by Junos internally.
D. Files are stored to the SCP site but if the transfer fails, then to the FTP site.
Which service does RADIUS provide?
A. routing
B. authentication
C. DNS resolution
D. time synchronization
Which two fields are you required to enter when you create a new user account? (Choose two.)
A. login class
B. username
C. user ID
D. full name
What are two attributes of the UDP protocol? (Choose two.)
A. UDP is best effort.
B. UDP is always slower than TCP.
C. UDP is connectionless.
D. UDP is more reliable than TCP.
You are asked to configure your device running Junos OS to automatically archive your configuration upon commit. In this scenario, which two methods are supported by the Junos OS? (Choose two.)
A. SCP
B. RCP
C. FTP
D. HTTP
After the factory default configuration is loaded, which configuration object must be created prior to the first commit?
A. root authentication
B. loopback IP address
C. host name
D. out-of-band connectivity
You are configuring a firewall filter on a Juniper device. In this scenario, what are two valid terminating actions? (Choose two.)
A. count
B. discard
C. accept
D. next term
Which two actions happen when multiple users issue the configure exclusive command to enter configuration mode on a Junos device? (Choose two.)
A. Other users can enter configuration mode.
B. The candidate configuration is locked.
C. Other users cannot enter configuration mode.
D. The candidate configuration is unlocked.
Which protocol is responsible for learning an IPv4 neighbor's MAC address?
A. Neighbor Discovery Protocol (NDP)
B. Address Resolution Protocol (ARP)
C. Media Access Control Security (MACsec)
D. Network Address Translation (NAT)
Click the Exhibit button.You need to configure interface ge-0/1/2 with an IP address of 172.16.100.1/24. You have accidentally entered 172.16.101.1/24 as shown in the exhibit. Which command should you issue to solve the problem?
A. [edit]user@router# rollback rescue
B. [edit]user@router# rollback 1
C. [edit]user@router# rollback 0
D. [edit]user@router# rollback 2
Access Full JN0-105 Mock Test Free
Want a full-length mock test experience? Click here to unlock the complete JN0-105 Mock Test Free set and get access to hundreds of additional practice questions covering all key topics.
We regularly update our question sets to stay aligned with the latest exam objectives—so check back often for fresh content!
Start practicing with our JN0-105 mock test free today—and take a major step toward exam success!