Upload
drthtater
View
213
Download
0
Embed Size (px)
Citation preview
Brocade Certified Network Engineer 2012Number: 000-000Passing Score: 800
Time Limit: 120 min
Brocade 150-130
Which three transceiver form factors are supported by Brocade switches and routers? (Choose three.)
A. XPAKB. SFPC. SFP+D. X2E. XFP
Which type of transceiver would be used to support a 5 km single mode fiber 10 Gbps connection?
A. SFPB. SFP+C. GBICD. SFM
Two sites 8 km apart will be connected together using fiber optic cable. Which SFP/cable combination needs to be used?
A. short reach SFP with multi-mode fiberB. short reach SFP with single-mode fiberC. long reach SFP with multi-mode fiberD. long reach SFP with single-mode fiber
A powered device connected to a Brocade FastIron device has been auto discovered and classified as a class- 3 PoE device. However, its power consumption is only 10 watts. Which command would be used on the FastIron to reallocate power back to the available power budget, while still providing all the necessary power to the powered device?
A. no legacy-inline-powerB. inline power power-by-class 2C. inline power priority 2D. inline power power-limit 11000
Which two Layer 2 network discovery protocols are used to detect PoE power requirements?
(Choose two.)
A. FDPB. LLDP-MEDC. LACPD. CDP
What are two Brocade stackable products? (Choose two.)
A. Brocade Fastiron SXB. Brocade FastlronCXC. BrocadelCX6430D. Brocade MLXe
What are two Brocade products that are designed for use in a service provider network? (Choose two.)
A. Brocade Fastlron SXB. Brocade MLXeC. Brocade Netlron CER 2000D. Brocade FCX
You have just configured a new Multi-Chassis Trunk between two Brocade MLXe chassis.
Which protocol information will be distributed across this link?
A. IPv6B. BGPC. RIPv2D. STP
You have just purchased 22 new Brocade Fastlron FCXs. You want to take advantage of Brocade IronStack technology to make as many of the FCXs appear as a single stack as possible.What is the minimum number of Brocade IronStacks required?
A. 1B. 2C. 3D. 5
What are two supported stacking topologies for the Brocade IronStack technology? (Choose two.)
A. ringB. linearC. busD. star
The traffic volume received by your network clients is higher than desired. Which two features will help reduce the amount of unwanted traffic? (Choose two,)
A. ACLB. VRRP-EC. BPDU GuardD. IGMP Snooping
You have been asked to implement a standards-based Layer 2 loop avoidance protocol with a typical convergence time of 3 seconds or less. Which Layer 2 loop avoidance protocol should you use?
A. 802.1qB. 802.1DC. MRPD. RSTP
What are two valid BPDU types in Spanning Tree 802.1D? (Choose two.)
A. Configuration BPDUB. Root Override BPDUC. Failure Notification BPDUD. Topology Change Notification BPDU
Which statement is correct concerning Layer 2 frame forwarding?
A. Unknown unicast frames are flooded out all ports except the ingress port,B. Multicast frames are forwarded to a specific destination.C. Unicast frames are forwarded to multiple ports.D. Broadcast frames are flooded to a select number of ports.
Which two features enable discovery of network switches? (Choose two.)
A. LLDPB. UDLDC. FDPD. LFS
You want the links between two switches to forward traffic for more than one VLAN.
What should you use to configure the inter-connected ports?
A. load sharingB. taggedC. untaggedD. ISL
Which three statements are true when configuring virtual routing interfaces? (Choose three.)
A. A single virtual interface can be used to route traffic between all VLANs within the same switch.B. Each VLAN on a switch requires its own virtual interface.C. A virtual interface can be a member of multiple VLANs.D. A virtual interface can have multiple IP addresses.E. Hosts in a VLAN can use the IP address of the virtual interface as their default gateway.
You are configuring multiple VLANs using only untagged ports on two switches. Which statement is true?
A. All traffic between switches will use 802.lq.B. AII VLAN traffic can use a single untagged uplink port.C. Untagged ports can be placed into multiple VLANs.D. Each VLAN requires a dedicated uplink between switches.
Which two statements about LAGs are true? (Choose two.)
A. A LAG provides load-sharing.B. A LAG provides sub-microsecond failover,C. A LAG can contain links of different speeds.D. A LAG is treated as a single logical link by the switch.
On a Brocade MLXe device, which three conditions must be met for a LAG to form? (Choose three.)
A. AII ports configured in a LAG are of equal bandwidth.B. Ports must have different untagged VLANs.C. A LAG must have the primary port selected before it can be deployed.D. AII ports configured in a LAG must reside in the same VLANs.E. LACP forwarding must be disabled on the primary port and enabled on one or more of the secondary ports.
Which two results does the link-aggregate configure key <number> command accomplish when creating Link Aggregation Groups (LAGs) on a FastIron device? (Choose two.)
A. It encrypts the LAGs for security,B. It identifies LAG membership.C. It allows multiple LAGs to be configured on a device.D. It is used to configure VLANs on the LAG.
Which two destination addresses are used in an ARP request if the source station's IP address is:
192.168.5.12/16? (Choose two.)
A. 192.168.5.255B. FF:FF:FF:FF:FF:FFC. 00:19:B9:FF:FF:FFD. 192.168.255.255
Which type of message is exchanged between switches to prevent loops and maintain loop-free topologies?
A. LACPB. BPDUC. UDLDD. FDP
Which three types of network addresses are supported in IPv6? (Choose three.)
A. multicastB. broadcastC. anycastD. unicastE. ANAT
Given the command output shown below:
de(config)#mirror-port ethernet 1/2/4Brocade(config)#interface ethernet 1/2/11
Brocade(config-if-e100-11)#monitor ethernet 1/2/4 both
What do the Brocade commands accomplish?
A. They allow all traffic on interface ethernet 1/2/11 to be replicated on interface ethernet 1/2/4 for analysisB. They allow ingress only traffic on interface ethernet 1/2/4 to be replicated on interface Ethernet 1/2/11 for analysis.C. They allow all traffic on interface ethernet 1/2/4 to be replicated on interface
ethernet 1/2/11 for analysis.D. They allow egress only traffic on interface ethernet 1/2/4 to be replicated on interface Ethernet 1/2/11 for analysis.
Why would the IP SSH port <number> command be used?
A. This command is used to restrict certain port numbers from being used with SSH.B. This command is used to change the default port number used by SSH.C. This command is required before SSH will respond to any port.D. This command is used to set a range of port numbers to be used by SSH.
Why would the IP SSH port <number> command be used?
A. This command is used to restrict certain port numbers from being used with SSH.B. This command is used to change the default port number used by SSH.C. This command is required before SSH will respond to any port.D. This command is used to set a range of port numbers to be used by SSH.
What are two ways that TACACS+ differs from TACACS? (Choose two.)
A. TACACS + uses TCP.B. TACACS + uses UDP.C. TACACS + encrypts traffic between the Brocade device and the server.D. TACACS + does not encrypt traffic between the Brocade device and the server
You have to implement a security protocol that encrypts all traffic between the Brocade device and the authentication server.
Which security protocol would you use to support this requirement?
A. TACACS+B. TACACSC. RADIUSD. AAA
Which two protocols would be used to transfer new code to a Brocade FastIron, TurboIron, or NetIron device? (Choose two.)
A. FTPB. TFTPC. SFTPD. SCP
You have lost the super-user password to your Brocade device. You need to recover the device and bypass the password, using the serial console. Which command must you issue after you interrupt the boot sequence?
A. confreg 0x2142B. boot system password-bypassC. password recoverD. no password
You have a LAG configured and are having problems with the logical interface coming online.
What would cause this?
A. One end of the LAG is a Brocade FastIron stack.B. The LAG members are made up of 1 Gbps and 10 Gbps ports.C. The LAG includes members that are not consecutive (ports 1, 2, and 4).D. AII members of the LAG are configured as static.
Users connected to Switch1 are unable to access a database server connected to Switch2.
Referring to the exhibit, what are three explanations? (Choose three.)
A. Port 1/1/1 on Switch2 is administratively disabled.B. Port 1/1/1 on Switch1 is administratively disabled.C. One of the switches has a defective port.D. The cable between the two switches is damaged.E. Port 1/1/1 on Switch1 has Spanning Tree disabled.
Brocade support has requested that you gather supportsave data for troubleshooting an issue on a Brocade FastIron ICX. Which service is required to transfer the files?
A. A server with SFTP that is reachable by the Brocade FastIron ICX.B. An FTP server that is reachable by the Brocade FastIron ICX.C. A TFTP server that is reachable by the Brocade FastIron ICX.D. A RADIUS server that is reachable by the Brocade FastIron ICX.
You have been informed a group of remote employees are unable to authenticate with the RADIUS server. From the Brocade FCX router, you enable the debug dot1x events command.
Which three events will be viewed? (Choose three.)
A. authentications failedB. authentications succeededC. ACLs requested by the RADIUS server.D. standard ACL requestsE. extended ACL requests
You need to expedite a case to Brocade support for troubleshooting. What information is needed? (Choose three.)
A. topology diagramB. recent changesC. show tech-support outputD. errordump outputE. RASlog
A customer work group notifies you that they are trying to reach a custom application on a server.
The server is in a different IP domain. You have verified that the application is up. You can successfully run ping and traceroute to the server from the workgroup workstations. What would you look for next?
A. a MTU mismatch problemB. a mis-configured router portC. a blocked UDP/TCP port
D. a corrupt TCP session
What are two valid ways to represent the IPv6 address 2001:0000:0000:0200:002D:D0FF:FE48:4672? (Choose two.)
A. 2001::02:002D:D0FF:FE48:4672B. 2001:0:0:0200:002D:D0FF:FE48:4672C. 2001::0200:002D:D0FF:FE48:4672D. 21::0200:002D:D0FF:FE48:4672
An identical route has been discovered by OSPF and RIP. By default, the OSPF route is chosen and added to the routing table. What should be done to allow the RIP route to be preferred?
A. Redistribute OSPF routes into RIP.B. Change the administrative distance.C. Raise the route's priority in RIP.D. Use the no router OSPF command.
When configuring an IP static route in a Brocade router, which three parameters are required?
(Choose three.)
A. IP address of destinationB. administrative distance for the routeC. next hopD. subnet maskE. the metric for the route
When using CIDR notation, what is the default route in an IPv6 configuration?
A. ::/0B. 1001:ffff:0:0:0:0::Vl28C. 1001:ffff:0:0:0::y0D. ffff::/36
During the discovery process, to which registered multicast IP address does OSPF send a hello packet?
A. 224.0.0.5B. 224.0.0.100C. 224.0.0.2D. 224.0.0.6
In which stage is an OSPF neighbor adjacency complete?
A. loadingB. exchangeC. two-wayD. full
Which three parameters must match for two OSPF routers to become neighbors? (Choose three.)
A. router IDB. subnet maskC. area IDD. hello/dead intervalsE. bridge ID
In a DR/BDR election, what will be the result for Router 1 based on the information shown in the exhibit?
A. Router 1 will not participate in the election.
B. Router 1 will participate in the election but will not become either the DR or BDR.C. Router 1 will become the DR based on having the lowest priority value.D. Router 1 will become the DR based on having the lowest interface IP address.
Your company uses OSPF and has recently purchased another company that uses RIP.
Management requires that routes between the two companies be shared without interrupting services on either network. How is this implemented?
A. Enable route redistribution in both RIP and OSPF on the DR.B. Enable route redistribution in both RIP and OSPF on the BDR.C. Enable route redistribution in both RIP and OSPF on the ASBR.
D. Enable route redistribution in both RIP and OSPF in the ABR.
The multicast IP address 239.10.20.30 is mapped to which MAC address?
A. 00-00-ef-0b-15-1fB. 00-00-5e-0a-14-1eC. 01-00-ef-0b-15-1lfD. 01-00-5e-0a-14-1e
Which two multicast routing protocols are supported on Brocade FastIron devices? (Choose two.)
A. DVMRPB. PIMC. MBGPD. MOSPF
An engineer wants to implement Policy Based Routing (PBR). The IP address block to be matched is 100.100.100.128/25. Which ACL would match the traffic affected by PBR?
A. access-list 51 permit 100.100.100.128 0.0.0.127B. access-list 51 deny 100.100.100.128 0.0.0.127C. access-list 51 permit 100.100.100.0 0.0.0.127D. access-list 51 deny 100.100.100.0 0.0.0.127
What is the numeric range for standard ACL IDs?
A. 0 - 99B. 0 -100C. 1-99D. 1-100
Which two access control list (ACL) types will match on TCP/UDP ports? (Choose two.)
A. numbered standard ACLsB. numbered extended ACLsC. named standard ACLsD. named extended ACLs
You have configured your Brocade device as shown in the exhibit.
***Exhibit is Missing***
Which statement is correct regarding interface Ethernet 10 on this device having inbound traffic from 172.17.1.1/24 to 172.17.2.1/24 on port 21?
A. It would be permitted.B. It would be denied by the implicit deny statement.C. It would be denied by FTP port 21.
D. This ACL only applies to outbound traffic.
Which two statements are true about QoS when implemented on a Brocade FastIron platform?
(Choose two.)
A. Packets with lower priority classifications are given a higher precedence for forwarding.B. Packets with higher priority classifications are given a higher precedence for forwarding.C. Stackable devices use CoS 0 for stacking communication.D. Stackable devices use CoS 7 for stacking communication.
You want to classify and mark traffic at the edge of your network before it is sent to the core and routed where Layer 3 QoS is trusted and enabled. Which type of marking should you configure to ensure your application traffic is serviced correctly in the core of your network?
A. Mark the 802.lp field according to application priorityB. Mark the PCP field according to application priorityC. Mark the EXP field according to application priorityD. Mark the DSCP field according to application priority
You have a mission-critical application on your network that you know by IP address. You want this traffic to be serviced before all other traffic on the network. Which two features should you implement to ensure that this mission-critical application traffic is identified and serviced correctly? (Choose two.)
A. Configure an access control list to classify the traffic.B. Configure RADIUS to authenticate the traffic going over the network.C. Configure rate shaping for the ports across which the traffic is traveling.
D. Configure strict priority for the queue in which the traffic resides.
Which version of Simple Network Management Protocol (SNMP) supports the Advanced Encryption Standard (AES)?
A. SNMPv1B. SNMPv2C. SNMPv2cD. SNMPv3
Your Brocade network monitoring solution includes the requirements for random sampling of packets and time- based sampling of counters.
You have been asked to determine an appropriate solution.
What will fulfill the specified requirements?
A. sFlowB. RMON1C. RMON2D. Netflow
Which two protocols would be used to back up a Brocade device configuration? (Choose two.)
A. FTPB. SCPC. TFTPD. FTPS (FTP-SSL)
What is the purpose of the Brocade MLXe SNMP trap hold-down timer?
A. to send all traps before a router rebootB. to wait for convergence to occur before sending trapsC. to wait for UDP connection establishment before sending trapsD. to wait for TCP connection establishment before sending traps
You have been informed that you will need to implement 802.IX on all Brocade switches and routers.
Which three are required to support this request? (Choose three.)
A. applicantB. supplicantC. authenticatorD. authentication serverE. supplicant serverCorrect Answer: BCD
Section: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q61Given the following configuration:
Brocade(config)# aaa authentication enable default radius tacacs telnet local
What is the primary authentication method being used for Privileged EXEC mode and CONFIG
level access?
A. localB. telnetC. TACACSD. RADIUSCorrect Answer: DSection: (none)
ExplanationExplanation/Reference:Explanation:
Answer:
Q62What does the command copy flash tftp 192.168.13.37 FGSR07001.bin secondary do?
A. It copies the code contained in the secondary flash partition to a TFTP server located at 192.168.13.37.
B. It copies the configuration contained in the secondary flash partition to a TFTP server located at 192.168.13.37.C. It copies the code contained on a TFTP server located at 192.168.13.37 to the secondary flash partition.D. It copies the configuration contained on a TFTP server located at 192.168.13.37 to the secondary flash partition.Correct Answer: ASection: (none)ExplanationExplanation/Reference:Explanation:Exam
Answer:
Q63On Brocade FastIron, TurboIron, and Netlron platforms, which command saves the running configuration to the flash's startup configuration?
A. write memoryB. copy running-config startup-configC. config commitD. config save
Correct Answer: ASection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q64In the exhibit, which port is responding to a change in the network topology?
A. port 1B. port 2C. port 3D. port4Correct Answer: ASection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q65Optical monitoring is not returning data. What are three reasons for this happening? (Choose three.)
A. The optic module does not support optical monitoring.B. It is only supported on LR optics.C. The port is configured as a stacking port.D. The port is in use.E. The port is down.Correct Answer: ACESection: (none)
ExplanationExplanation/Reference:Explanation:
Answer:
Q66You have inherited the routing redundancy configuration shown in the exhibit. Router A is the current VRRP-E master. Your network is not failing over to router B. What needs to be added to configure router B as a backup and maintain the current master?
A. backup priority 100 track-priority 20B. backup priority 110 track-priority 20C. backup priority 120 track-priority 20D. backup priority 130 track-priority 20Correct Answer: ASection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q67You are configuring a keep-alive VLAN for a Multi-Chassis Trunking deployment on two new
Brocade MLXe chassis. You notice that STP and VLANs are not valid configuration options.
What have you overlooked during the configuration?
A. You need to include no route-only.B. You need to include trunk deploy.
C. You need to include deploy.D. You need to include route-only.Correct Answer: ASection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q68You need to troubleshoot problems with an optic connection on
a Brocade MLXe device.
What information is displayed by show optic <slot> for each port on that slot? (Choose three.)
A. This command displays the temperature information for the optic.B. This command displays the transmit power information for the optic.C. This command displays the number of interface flaps for the optic.D. This command displays the receive power information for
the optic.E. This command displays the length of the fiber cable.Correct Answer: ABDSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q69Referring to the exhibit, port eth 1 on Switch-A is connected to
port eth 1 on Switch-B.
***Exhibit is Missing***You notice high packet loss between the two devices communicating over this link.
What is causing high packet loss over this link?
A. BPDU Guard is enabled on Switch-A but disabled on Switch-B.B. The two ports are not a member of any active trunks.C. The port on Switch-A is 10 GbE while the port on Switch-B
is 1 GbE.D. The MTU values on Switch-A and Switch-B do not match.Correct Answer: DSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q70Referring to the exhibit, requests from Client A are being seen
on Server D but responses are not making it back to Client A.
***Exhibit is Missing***
What are two methods that will resolve the issue? (Choose two.)
A. Redistribute directly connected routes in OSPF on Router B.B. Change the gateway on IP route entry 3 on Router C from 10.5.5.1 to 10.0.0.1.C. Change the cost on IP route entry 3 on Router C from 1 to 10.D. Add a static route on Router C with destination 10.0.0.0/24
with gateway 10.5.5.1.Correct Answer: ADSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q71Referring to the exhibit, why are interfaces 1/3, 1/5 and 1/7 blocked on Switch C?
A. Switch A is the root bridge.B. Switch B is the root bridge.C. Switch C is the root bridge.D. Path cost for interfaces 1/3, ly5 and 1/7 are unequal.Correct Answer: ASection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q72Referring to the exhibit, which command must be entered to make the LAG function on a
Brocade NetIron MLXe?
A. deployB. enableC. forward-IacpD. Iacp-cfg-det-disCorrect Answer: A
Section: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q73Fiber optic cabling is immune to which type of signal degradation?
A. attenuation
B. noiseC. EMID. leakageCorrect Answer: CSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q74
Which type of transceiver would be used to support a 1 km multi-mode fiber 1 Gbps connection?
A. SFPB. SFP+C. TwinaxD. QSFPCorrect Answer: ASection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q75A customer wants to use a cable that provides maximum EMI protection. Which type of cable should be used?
A. UTPB. STPC. CAT3D. copperCorrect Answer: B
Section: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q76What is the minimum cabling requirement for PoE+?
A. Category 2B. Category 3
C. Category 4D. Category 5Correct Answer: DSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q77Which two Brocade products are recommended for use in a
campus access environment?
(Choose two.)
A. BrocadeMLXeB. Brocade TurboIron 24XC. Brocade FCXD. BrocadelCX6430Correct Answer: CDSection: (none)ExplanationExplanation/Reference:
Explanation:
Answer:
Q78Which two Brocade products are recommended for core/aggregation use? (Choose two.)
A. BrocadeMLXeB. Brocade FastIron WSC. Brocade NetIron CER 2000D. Brocade FastIron SX
Correct Answer: ADSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q79Which two statements about ICL links in Brocade Multi-Chassis Trunk (MCT) implementations are true? (Choose two.)
A. ICL links connect the two MCT chassis and allows MCT clients to see both devices as a single device.B. ICL links connect the MCT client devices to the MCT logical chassis.C. ICL links are necessary for the two devices to form an MCT cluster.D. ICL links allow the MCT logical chassis to communicate with a non-MCT device.Correct Answer: ACSection: (none)ExplanationExplanation/Reference:
Explanation:
Answer:
Q80Which two features are implemented using Brocade IronStack technology? (Choose two.)
A. You can use any port on the switches to create your IronStack.B. You can mix devices running different software images in the same stack group.
C. You can manage multiple physical switches in an IronStack as a single logical switch.D. You can perform a hitless stack failover without impacting Layer 2 and Layer 3 unicast traffic.Correct Answer: CDSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q81A client had ports 1/3/1 and 1/3/2 on the Brocade FCX go down because of errors being received from the upstream switch. The client repaired the upstream switch but the ports of the FCX are still down.
Referring to the command output shown above, what does the client need to do to bring up the links?
A. Enable the ports.B. Restart spanning tree.C. Restart the routing protocol.D. Reseat the cables for each port.Correct Answer: ASection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q82Which two enhanced spanning tree features help prevent rogue hijacking of a spanning tree root bridge? (Choose two.)
A. SSTPB. Root GuardC. PVSTD. BPDU GuardCorrect Answer: BDSection: (none)ExplanationExplanation/Reference:
Explanation:
Answer:
Q83What are two characteristics of an IEEE 802.ID root bridge? (Choose two.)
A. The lowest bridge ID has the highest priority for root bridge selection.B. The root bridge must be enabled on Brocade Layer 2 code.C. The bridge ID for root bridge selection is a combination of
the bridge priority and MAC address.D. The root bridge calculates the path cost to all other switches to determine which ports will be used and which will be blocked.Correct Answer: ACSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q84In the exhibit, the network is running Spanning Tree 802.ID. Which port will be placed in a blocked state?
A. Switch 1 port 1B. Switch 1 port 2C. Switch 2 port 1D. Switch 2 port 2Correct Answer: DSection: (none)ExplanationExplanation/Reference:
Explanation:
Answer:
Q85What happens to Ethernet frames that enter a switch with MAC learning disabled on all interfaces?
A. AII incoming frames will be dropped.B. AII incoming frames will be flooded.C. Unicast frames will be dropped; multicast and broadcast frames will be flooded.
D. Multicast and broadcast frames will be dropped; unicast frames will be flooded.Correct Answer: BSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q86Referring to the exhibit, an Ethernet frame enters Switch A, port
e1 with destination address:
0005.3392.a30d.
What describes how Switch A will process the frame?
A. The frame will be sent out port e2.B. The frame will be sent out port e3.C. The frame will be sent out ports e2 and e3.D. The frame will be trapped to the CPU and the destination address changed to 0005.1e00.000c.Correct Answer: B
Section: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q87What are three types of private VLANs supported on a Brocade Fastlron? (Choose three.)
A. primary
B. isolatedC. communityD. broadcastE. managedCorrect Answer: ABCSection: (none)ExplanationExplanation/Reference:Explanation:Exam
Answer:
Q88Which IPv6 address is correctly formatted?
A. 2001:0000:130F:0000:0000:00A2:987B:12FCB. 2001::130F::00A2:987B:12FCC. 2001:0000:130F:0000:00CD:0000:00A2:987B:12FCD. 2001:0000:130F:0000:00A2:987B:12FCCorrect Answer: ASection: (none)ExplanationExplanation/Reference:
Explanation:
Answer:
Q89Exhibit as:
Which technology allows a service provider the ability to connect customer sites with duplicate tagged VLAN configurations across the same circuit as shown in the exhibit?
A. dual-modeB. 802.1qC. untaggedD. Q-in-QCorrect Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:
Answer:
Q90What are two uses for port-based VLANs? (Choose two.)
A. Create separate broadcast domains inside a single Layer 2 network.B. Segregate traffic at Layer 3.C. Eliminate the need for routers between different subnets.
D. Separate user traffic into different logical network segments based on department.Correct Answer: ADSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q91OU need to improve redundancy in your LAN as well as
increase bandwidth between switches using a Layer 2 protocol.
Which feature will provide this?
A. LLDPB. LACPC. VRRPD. SSTPCorrect Answer: BSection: (none)ExplanationExplanation/Reference:
Explanation:
Answer:
Q92What are two methods that a Brocade device can be configured for load sharing? (Choose two.)
A. per portB. per packetC. hash basedD. per second
Correct Answer: BCSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q93A workstation wants to send a packet to a destination that is not on the same network. Which
destination MAC address will the workstation use to send the packet?
A. destination MAC addressB. gateway's MAC addressC. multicast addressD. broadcast addressCorrect Answer: BSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q94Which three network ranges did IETF allocate to be used as IPv4 private networks? (Choose three.)
A. 10.0.0.0/3B. 192.168.0.0/16C. 172.16.0.0/16D. 172.16.0.0/12E. 192.168.0.0/24
Correct Answer: ABDSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q95Which three statements are true about RIPv2 and OSPF? (Choose three.)
A. RIPv2 is a distance vector and OSPF is a link state protocol.B. OSPF supports VLSM and RIPv2 does not.C. RIPv2 and OSPF support MD5 authentication.D. RIPv2 advertises its entire routing table and OSPF sends only updates.E. RIPv2 and OSPF use neighbor statements to configure peers.Correct Answer: ACDSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q96What are three ways that VRRP is different from VRRP-E? (Choose three.)
A. VRRP is a standards-based protocol described in RFC 2338; VRRP-E is a proprietary Brocade protocol.B. VRRP-E is a standards-based protocol described in RFC 2338; VRRP is a proprietary Brocade protocol.C. In VRRP, there is no "owner" router.D. In VRRP-E, there is no restriction on which the router can be
the default master.E. VRRP-E sends multicast hello packets to the "all routers" multicast address 224.0.0.2.Correct Answer: ADESection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q97
What are two benefits achieved by using a loopback interface on a Brocade router? (Choose two.)
A. The router ID does not change.B. It allows remote connectivity to a router.C. It provides next-hop for neighbors.D. It does not belong to a physical interface.Correct Answer: ADSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q98You are requested to design a network that requires a minimum of five subnets with a minimum of 16 hosts per subnet.
With the class C network of 200.101.192.0, which subnet mask would be used to fulfill these requirements?
A. /25B. /26
C. /27D. /28Correct Answer: CSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q99What is the CIDR notation for the IP address range: 192.115.0.0
-192.115.3.255?
A. 192.115.0.0/22B. 192.115.0.0/24C. 192.115.0.1/22D. 192.115.0.1/24Correct Answer: ASection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q100What is the default administrative distance for RIP?
A. 1B. 110C. 115D. 120Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:
Answer:
Q101Which OSPF area is created when the area 51 stub no-summary command is issued?
A. normal areaB. not so stubby areaC. stub area
D. totally stubby areaCorrect Answer: DSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q102When is an OSPF virtual link used?
A. When an area has no direct connection to the backbone area.B. When an area needs access to an ASBR.C. When an area is configured as a stub area.D. When an area needs to connect to a non-backbone area.Correct Answer: ASection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q103What are two functions of an OSPF Autonomous System Boundary Router (ASBR)? (Choose two.)
A. The router can run multiple routing protocols.B. The router redistributes routes between OSPF areas within an AS.C. The router redistributes non-OSPF routes into an OSPF AS.D. The router connects one or more OSPF areas to the OSPF backbone.Correct Answer: ACSection: (none)
ExplanationExplanation/Reference:Explanation:
Answer:
Q104You are implementing an OSPF network with five defined areas. You want to configure OSPF area route sharing to other specified OSPF areas.
Which router will you need to configure to share area routes
with other area routes?
A. ABR routerB. BDR routerC. DR routerD. BGP routerCorrect Answer: ASection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q105What are the two ways that IGMP is used? (Choose two.)
A. It can be sent by a host to indicate its interest of joining a specific multicast group.B. It can be sent among routers to exchange multicast routing information.C. It can be used to specify packet forwarding methods for a specific multicast group.D. It can be sent by a router to query multicast listeners on a
given subnet for all multicast groups.Correct Answer: ADSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q106What is the default implicit behavior at the end of an ACL?
A. logB. permit anyC. deny anyD. remarkCorrect Answer: CSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q107A customer uses an access control list (ACL) to restrict access to servers on their network. The
ACL properly restricts traffic. However, the customer has no visibility to which IP addresses were denied by the ACL. Which word added to the end of the ACL statement would solve this problem?
A. logB. permitC. snmp
D. syslogCorrect Answer: ASection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q108Which two statements about ingress extended ACLs are correct? (Choose two.)
A. They use extended ACL IDs 200 - 299.B. They save network resources by reducing traffic.C. They eliminate denial of service (DoS) attacks.D. They block unwanted traffic or users.Correct Answer: BDSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q109Which statement is true of an access control list (ACL) on a Brocade IP device?
A. Only outbound ACLs can be used on any Brocade IP device.B. The ACL takes effect immediately after being applied to an interface.C. An ACL is immediately applied to all physical interfaces once the ACL is configured.D. Standard ACLs can be used to control traffic inbound or outbound based on source and destination addresses.
Correct Answer: BSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q110When 802.lp priority override is enabled on the primary port of a trunk group, which other ports of the trunk group will be affected?
A. all ports except the primary trunk portB. some of the trunk portsC. only the primary port of the trunk groupD. all ports of the trunk groupCorrect Answer: DSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q111What are the three available QoS scheduling algorithms available on Brocade NetIron and FastIron products? (Choose three.)
A. weighted round robinB. strict priorityC. first-in-first-outD. hybridE. deficit round robinCorrect Answer: ABD
Section: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q112Which QoS mechanism would you use to set the DSCP value specified of an outgoing packet?
A. dscp-cos-mapping
B. dscp-matchingC. dscp-markingD. internal-priority-markingCorrect Answer: CSection: (none)ExplanationExplanation/Reference:Explanation:
Answer:
Q113
sFlow uses which method to send data to a collector?
A. multicastB. broadcastC. TCP port 6343D. UDP port 6343Correct Answer: DSection: (none)ExplanationExplanation/Reference:Explanation:
Answer: