- 4.9/5.0
- 100 Questions
- Updated on: 7-Apr-2026
- Junos - Associate (JNCIA-Junos)
- 1100+ Prepared
- Valid Worldwide
Free JN0-105 Practice Test Questions | Know You're Ready for Junos - Associate (JNCIA-Junos)
This isn't guesswork. It's a mirror of the real Junos - Associate (JNCIA-Junos) exam. Our free JN0-105 practice test questions reveals exactly what you know, what you don't, and what you need to drill before exam day. No surprises. No outdated Junos - Associate (JNCIA-Junos) exam questions. Just a clear path to your Juniper certification.
You are asked to convert the number 7 from decimal to binary. Which number is correct in this scenario?
A. 00001000
B. 00010000
C. 00000111
D. 11100000
Explanation:
The binary system is a base-2 numbering system, meaning each digit (or bit) can only be a 0 or a 1. The value of a bit is determined by its position, which corresponds to a power of 2, starting from 2⁰ on the far right (the Least Significant Bit).
To convert decimal 7, we determine which powers of 2 sum to 7:
2² = 4
2¹ = 2
2⁰ = 1
Adding these together: 4 + 2 + 1 = 7.
In binary, we represent this by placing a '1' in the positions for 4, 2, and 1, and '0's in all others. Writing this out for a single byte (8 bits) looks like this:
128 (2⁷) 64 (2⁶) 32 (2⁵) 16 (2⁴) 8 (2³) 4 (2²) 2 (2¹) 1 (2⁰)
0 0 0 0 0 1 1 1
Thus, the binary equivalent is 00000111. The leading zeros are often included in networking contexts to explicitly show the full octet.
Analysis of Incorrect Options
A. 00001000
Incorrect. This binary number represents decimal 8. The only '1' is in the 2³ (value 8) position. The calculation is (0+0+0+0+8+0+0+0) = 8. This is the value one greater than 7.
B. 00010000
Incorrect. This binary number represents decimal 16. The only '1' is in the 2⁴ (value 16) position. The calculation is (0+0+0+16+0+0+0+0) = 16. This is more than double the value of 7.
D. 11100000
Incorrect. This binary number represents a much larger decimal value, 224. The '1's are in the 2⁷ (128), 2⁶ (64), and 2⁵ (32) positions. The calculation is (128 + 64 + 32 + 0 + 0 + 0 + 0 + 0) = 224. This is a common distractor that tests if you are reading the bits from the correct direction (right-to-left for LSB).
Reference:
Understanding binary numbering is an absolute prerequisite for IP networking and is a foundational skill tested on the JNCIA-Junos exam. It is essential for comprehending:
IP Addressing: An IPv4 address is four 8-bit binary numbers (octets) represented in decimal for readability.
Subnet Masks: Subnetting entirely relies on manipulating binary bits to create network and host portions of an IP address.
Which command displays all IPv6 routes in the default routing instance?
A. showroute table inet.0
B. showroute table inet6.1
C. showroute table inet.1
D. showroute table inet6.0
Explanation:
Junos OS uses specific, well-defined routing tables to store different types of routes. The table name is constructed from two key parts: the address family and the table type.
Address Family (inet6): This part of the table name specifies the protocol family of the routes it contains. inet6 is the designation for the IPv6 address family.
Table Type (.0): This suffix identifies the purpose of the table. The .0 suffix universally denotes the unicast routing table for its respective address family.
Therefore, inet6.0 is the unified name for the primary IPv6 unicast routing table. Executing show route table inet6.0 will display all active and candidate IPv6 routes that the routing protocol process (rpd) has installed, including directly connected, static, and dynamically learned routes.
Analysis of Incorrect Options
A. show route table inet.0
Incorrect. This command displays the IPv4 unicast routing table. The address family inet is used for IPv4. While the command structure is identical, it shows the wrong protocol's routes. This is a common mistake when working in dual-stack (IPv4/IPv6) environments.
B. show route table inet6.1
Incorrect. There is no standard Junos routing table named inet6.1 for storing active unicast routes. The .1 suffix is not part of the conventional routing table naming scheme for this purpose. This option is a distractor.
C. show route table inet.1
Incorrect. This command displays the IPv4 multicast routing table. The .1 suffix specifically identifies the multicast RIB (Routing Information Base). It is used by protocols like PIM to build multicast distribution trees and does not contain the unicast routes used for standard IPv4 packet forwarding.
Reference:
This knowledge is a core component of the JNCIA-Junos certification and is covered under "Monitoring Routing Tables" in the official Juniper curriculum. Understanding the routing table architecture is fundamental for any Junos administrator. The standard routing tables are:
inet.0: The main IPv4 unicast routing table.
inet6.0: The main IPv6 unicast routing table.
inet.1: The IPv4 multicast RIB.
mpls.0: The MPLS label switching table.
Which two statements are correct about Junos traceoptions? (Choose two.)
A. Traceoptions cannot be enabled in a production environment.
B. Traceoptions are enabled through configuration.
C. Traceoptions are enabled by default.
D. Traceoption output, by default, is stored in /var/iog/.
D. Traceoption output, by default, is stored in /var/iog/.
Explanation:
Traceoptions are Junos OS's powerful, built-in debugging and troubleshooting tool. They allow an administrator to log the internal operations and state changes of a specific process (like OSPF, BGP, or the chassis manager).
B. Traceoptions are enabled through configuration.
This is correct. Traceoptions are not active by default. They must be explicitly configured by the administrator within the specific hierarchy of the protocol or process they wish to monitor. For example, to trace OSPF events, you would configure them under protocols ospf traceoptions. This is a deliberate design to prevent unnecessary performance overhead when debugging is not required.
D. Traceoption output, by default, is stored in /var/log/.
This is correct. By default, when you configure traceoptions and specify a file
Analysis of Incorrect Options
A. Traceoptions cannot be enabled in a production environment.
Incorrect. While it is a strong best practice to use traceoptions with extreme caution in production due to the potential for high CPU usage and disk consumption, they are absolutely a functional feature that can be enabled. The statement is too absolute. Juniper provides the feature for real-world troubleshooting, but administrators must be aware of the performance impact and should use filters and size limits.
C. Traceoptions are enabled by default.
Incorrect. If traceoptions were enabled by default, Junos devices would constantly generate massive amounts of debugging data, severely impacting performance and filling the disk. As stated in the explanation for option B, they are disabled by default and must be manually enabled by a user with configuration access.
Reference:
The configuration and use of traceoptions is a fundamental troubleshooting skill covered in the JNCIA-Junos curriculum, typically under sections like "System Logging and Tracing" or "Troubleshooting Tools." The official Junos documentation extensively details the syntax for enabling traceoptions for each protocol, emphasizing the use of the traceoptions statement within the specific configuration hierarchy. Understanding their power and associated risks is critical for any network engineer working with Junos.
Which Junos OS component is responsible for maintaining the forwarding table?
A. Routing Engine
B. chassis control daemon
C. Packet Forwarding Engine
D. management daemon
Explanation:
This question tests the fundamental Junos architecture concept of the separation between the Control Plane and the Forwarding Plane.
The Packet Forwarding Engine (PFE) is the high-speed, application-specific integrated circuit (ASIC)-based component responsible for the actual process of receiving a packet on an ingress interface, performing a lookup, and sending it out an egress interface. To do this at line rate, it maintains its own copy of the forwarding table.
The PFE's forwarding table is a streamlined, optimized version of the main routing table. It contains only the information essential for packet switching, such as next-hop addresses and outgoing interfaces.
Analysis of Incorrect Options
A. Routing EngineC
Incorrect. The Routing Engine (RE) is the control plane. It runs the Junos OS, routing protocols, and management processes. The RE is responsible for building the routing table based on configured and learned routes. It then downloads a copy of this information to the PFE to populate the PFE's forwarding table, but the RE itself does not maintain or use the forwarding table for packet forwarding.
B. Chassis Control Daemon (chassisd)
Incorrect. The chassis daemon is responsible for monitoring and managing the physical components of the router/switch, such as power supplies, fan trays, and Physical Interface Cards (PICs). It deals with hardware status, not the data plane's forwarding tables.
D. Management Daemon (mgd)
Incorrect. The management daemon is the process that provides the Junos CLI and handles all user configuration and operational commands. It is the interface for the administrator to manage the device but is not involved in maintaining the forwarding table.
Reference:
This is a core topic in the JNCIA-Junos certification, covered under "Junos OS Architecture" or "Control and Forwarding Plane Separation." Understanding the distinct roles of the Routing Engine (control plane) and the Packet Forwarding Engine (forwarding plane) is essential for understanding Junos operation, high availability features like Graceful Routing Engine Switchover (GRES), and troubleshooting performance issues.
Which two statements are correct about MAC addresses? (Choose two.)
A. Switches use the Address Resolution Protocol table to assign MAC addresses to network interface cards in the forwarding frame.
B. The source and destination MAC addresses always remains static to the final destination.
C. The MAC address identifies the physical hardware.
D. Switches use the destination MAC address to identify the next-hop destination and to change the destination MAC address in the frame.
D. Switches use the destination MAC address to identify the next-hop destination and to change the destination MAC address in the frame.
Explanation:
C. The MAC address identifies the physical hardware.
This is correct. A Media Access Control (MAC) address is a globally unique, 48-bit hardware address burned into the network interface card (NIC) by the manufacturer. It operates at Layer 2 (the Data Link layer) of the OSI model and is used for communication within the same local network segment (broadcast domain). It is fundamentally tied to the physical network interface.
D. Switches use the destination MAC address to identify the next-hop destination and to change the destination MAC address in the frame.
This is a more nuanced but critically important correct statement. A Layer 2 switch uses its MAC address table to forward frames within a VLAN.
Identifies the next-hop destination:The switch looks at the destination MAC address in the incoming frame to decide which specific switch port to send it out of.
Changes the destination MAC address: This part is often misunderstood. When a frame is sent between two different devices via a router (i.e., between different subnets/IP networks), the router rewrites the Layer 2 header. The source and destination MAC addresses are changed for the next hop. The source becomes the router's own MAC address, and the destination becomes the MAC address of the next device (either the final host or the next router). A switch performing pure Layer 2 switching does not do this, but the statement is correct in the broader context of how MAC addresses are used in networking, especially when describing the role of a Layer 3 switch or router.
Analysis of Incorrect Options
A. Switches use the Address Resolution Protocol table to assign MAC addresses to network interface cards in the forwarding frame.
Incorrect. This statement contains multiple fundamental errors.
First, MAC addresses are assigned by the manufacturer, not by a switch or ARP.
Second, switches do not use an "ARP table"; they build a MAC address table (or CAM table) by learning the source MAC addresses of incoming frames.
Third, ARP (Address Resolution Protocol) is a protocol used to map a known IP address (Layer 3) to an unknown MAC address (Layer 2). It does not assign addresses.
B. The source and destination MAC addresses always remains static to the final destination.
Incorrect. This is false. MAC addresses are only relevant for a single Layer 2 hop. As a packet traverses a router from one network to another, the router strips off the existing Layer 2 frame header (including the source and destination MAC addresses) and creates a new one for the next segment. Therefore, the source and destination MAC addresses change at every router hop along the path to the final destination.
Reference:
This topic is covered in the JNCIA-Junos curriculum under "Layer 2 Switching" or "Ethernet Bridging" fundamentals. It is a core networking concept that is essential for understanding how Ethernet frames are forwarded within a VLAN and how routing between subnets works. The distinction between the unchanging nature of IP addresses (source/dest) in a packet across a routed path versus the constantly changing nature of MAC addresses in a frame is a key learning objective.
What are two examples of exception traffic? (Choose two.)
A. transit packets
B. routing updates
C. log messages
D. ping to the local device
D. ping to the local device
Explanation:
In Junos OS, exception traffic refers to any traffic that is destined for the local device itself, rather than being forwarded through it. This traffic must be processed by the device’s control plane (Routing Engine) instead of the data plane (Packet Forwarding Engine).
Normally, Juniper devices are designed to forward transit traffic at high speed through the PFE, without involving the Routing Engine (RE). However, certain packets must be sent to the RE for handling — such as routing protocol messages, management access, and ICMP packets directed to the device’s own IP addresses.
This type of traffic is called exception traffic because it is an exception to the normal fast-forwarding process. It requires CPU processing by the RE, which means excessive exception traffic can affect control-plane performance.
✅ B. Routing updates — Correct
Routing protocol updates (like OSPF, BGP, RIP, or IS-IS messages) are classic examples of exception traffic. These updates are not transit traffic — they are specifically addressed to the router itself so that it can learn, update, or maintain routing information.
For example:
OSPF Hello packets
BGP TCP sessions between routers
RIP updates
All of these packets are processed by the Routing Engine, because they update the routing table and control-plane state. The Packet Forwarding Engine simply identifies them as control traffic and forwards them internally to the RE for processing.
Hence, routing updates are considered exception traffic.
✅ D. Ping to the local device — Correct
A ping (ICMP echo request) directed at one of the router’s own interface IP addresses is also exception traffic.
This is because the packet’s destination IP matches the router’s local address, meaning it must be handled locally — not forwarded. The RE processes the ICMP request, generates an ICMP echo reply, and sends it back via the PFE.
Example:
user@host> ping 192.168.1.1
If 192.168.1.1 is an interface on the router, this ping is exception traffic.
Therefore, a ping to the local device is handled by the control plane, making it exception traffic.
❌ A. Transit packets — Incorrect
Transit traffic refers to packets that pass through the router from one interface to another without being addressed to the router itself. These packets are processed entirely in the Packet Forwarding Engine (PFE) for fast hardware-based forwarding.
Because they do not require any action from the Routing Engine, transit packets are not exception traffic.
Example:
Traffic traveling from one network, through the router, and out another interface is transit — not exception.
❌ C. Log messages — Incorrect
Log messages are locally generated by the system software on the device. They are not received network packets. Although they are processed by the control plane, they are not considered exception traffic because they are not incoming packets that require special routing treatment.
Exception traffic specifically refers to packets that arrive on an interface and are destined for the router itself for control or management processing. Log messages don’t fit that definition.
📘 References:
Juniper Networks TechLibrary – Control Plane and Data Plane Overview
Understanding Exception Traffic
JNCIA-Junos Study Guide (Juniper Press / Junos Genius):
Chapter: Routing and Forwarding Concepts — explains data plane vs. control plane and exception traffic handling.
Juniper Day One Book: Inside the Junos Packet Flow
Details how Junos distinguishes between transit, control, and exception traffic.
Summary:
Exception traffic = packets destined to the router itself, handled by the Routing Engine (control plane).
Examples: Routing updates (BGP/OSPF) and pings to local interfaces.
Not exception traffic: Transit packets (forwarded in hardware) and log messages (locally generated events).
What information would you find using the CLI help command?
A. hyperlinks for remediation actions
B. a URL for accessing the technical documentation
C. an explanation for specific system log error messages
D. message of the day
Explanation:
In Junos OS, the CLI help command is a valuable tool for troubleshooting and understanding system behavior. It provides detailed information about system messages, including error codes, warnings, and informational messages found in system logs such as /var/log/messages.
When you encounter a system log entry, the CLI help command allows you to query the message ID or error code to get more context about the event, including:
A description of the message
Possible causes
Recommended actions to resolve the issue
Example Usage:
Suppose you see an error in the logs:
%OSPF-3-NBRCHANGE: OSPF neighbor state changed
You can use the CLI help system as follows:
user@device> help topic ospf-3-nbrchange
The output provides:
Explanation of the OSPF neighbor state change message
Potential causes (e.g., link failure, authentication mismatch)
Suggestions for remediation or further investigation
This feature is particularly useful for:
Troubleshooting routing protocol issues
Interpreting system error messages
Understanding protocol or system behavior without referring to external documentation
Thus, the CLI help command directly aids in diagnosing log messages and system events, making Option C correct.
❌ Why the Other Options Are Incorrect:
A. Hyperlinks for remediation actions
The CLI help system does not provide clickable hyperlinks.
It outputs textual explanations and suggestions within the CLI itself.
While it may suggest remediation steps, these are plain text instructions, not hyperlinks to web content.
B. A URL for accessing the technical documentation
Junos help output does not include URLs.
Juniper’s online technical documentation must be accessed separately via a web browser at the Juniper TechLibrary.
The CLI help is local and interactive, providing guidance without requiring internet access.
D. Message of the day (MOTD)
The message of the day is a static banner displayed when a user logs in to the device, typically configured under:
system {
login {
message "Welcome to the router!";
}
}
It is unrelated to the CLI help system and does not provide information about log messages or troubleshooting.
📘 References:
Juniper Networks TechLibrary – CLI Help System
Using CLI Help Topics
Explains how to query system messages and error codes using the help topic command.
JNCIA-Junos Study Guide (Juniper Press / Junos Genius)
Chapter: Monitoring and Troubleshooting — describes how to interpret log messages using CLI help.
Juniper Day One Book: Troubleshooting Junos Devices
Section: Using the CLI Help System — demonstrates querying messages for explanations and suggested actions.
Your router has a route to the 10.1.1.0/24 network with a next hop of r jet. In this scenario, which action will your router perform when traffic destined to the 10.1.1.0/24 network is received?
A. The traffic will be discarded and an ICMP unreachable message will be sent to the destination of the traffic.
B. The traffic will be discarded and an ICMP unreachable message will be sent to the source of the traffic.
C. The traffic will be redirected using a default route.
D. The traffic will be silently discarded.
Explanation:
The scenario describes a classic "routing black hole" or "unreachable next hop" situation.
The Route Exists: The router's Routing Information Base (RIB) has a valid route for 10.1.1.0/24.
The Next-Hop is Unreachable: The critical detail is that the next-hop address (likely a typo for an IP like 192.168.1.1 or a hostname) is unreachable. This means the router does not have an ARP entry for it (if on a LAN) or a direct route to it, making it effectively a "dead" next-hop.
When the router receives traffic for 10.1.1.0/24, its standard forwarding process is:
It looks up the destination 10.1.1.x and finds the matching route with next-hop r jet.
It then checks the Forwarding Information Base (FIB) to resolve how to reach this next-hop.
If the next-hop itself is unreachable, the router cannot forward the packet.
According to standard IP protocol behavior (RFC 792), when a router cannot forward a packet due to an unreachable next-hop, it must discard the packet and send an ICMP Destination Unreachable message back to the source IP address of the original traffic. This informs the sender that their packet could not be delivered.
Analysis of Incorrect Options:
A. The traffic will be discarded and an ICMP unreachable message will be sent to the destination of the traffic.
Incorrect. This is logically impossible. The "destination" is the unreachable 10.1.1.0/24 network. If the router could send a message there, it would be able to forward the original traffic. ICMP error messages are always sent back to the originator (the source).
C. The traffic will be redirected using a default route.
Incorrect. Junos OS uses a most-specific-route matching algorithm. The /24 route is more specific than a default route (0.0.0.0/0). Therefore, the router will never use the less specific default route for this traffic as long as the more specific /24 route is active in the routing table.
D. The traffic will be silently discarded.
Incorrect. While the traffic is discarded, the process is not "silent." Standard IP behavior mandates sending an ICMP unreachable message to the source to facilitate troubleshooting. "Silent discard" typically occurs due to a firewall filter with a discard action or a reject action without the send-to-client modifier.
Reference:
This behavior is defined by core IP networking standards and is a fundamental aspect of router operation, covered in the JNCIA-Junos curriculum under "IP Routing Fundamentals" or "Troubleshooting Routing Issues." Understanding the interaction between the RIB (control plane) and the FIB (forwarding plane), and the generation of ICMP error messages, is essential for effective network diagnostics.
| Page 1 out of 13 Pages |
Why Take This JN0-105 Junos - Associate (JNCIA-Junos) Practice Exam Before the Real Exam?
This free Junos - Associate (JNCIA-Junos) practice test gives you three critical advantages:
- Real format, real pressure – Identical question structure and difficulty to the official exam
- Instant gap detection – You'll know exactly which topics need more attention
- Learn as you go – Every answer includes a clear explanation, so you're studying while testing