Labour Day - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

150-130 Brocade Certified Network Engineer 2012 Questions and Answers

Questions 4

Which two protocols would be used to back up a Brocade device configuration? (Choose two.)

Options:

A.

FTP

B.

SCP

C.

TFTP

D.

FTPS (FTP-SSL)

Buy Now
Questions 5

You need to expedite a case to Brocade support for troubleshooting. What information is needed? (Choose three.)

Options:

A.

topology diagram

B.

recent changes

C.

show tech-support output

D.

error dump output

E.

RAS log

Buy Now
Questions 6

Why would the IP SSH port command be used?

Options:

A.

This command is used to restrict certain port numbers from being used with SSH.

B.

This command is used to change the default port number used by SSH.

C.

This command is required before SSH will respond to any port.

D.

This command is used to set a range of port numbers to be used by SSH.

Buy Now
Questions 7

You want to classify and mark traffic at the edge of your network before it is sent to the core and routed where Layer 3 QoS is trusted and enabled. Which type of marking should you configure to ensure your application traffic is serviced correctly in the core of your network?

Options:

A.

Mark the 802.lp field according to application priority

B.

Mark the PCP field according to application priority

C.

Mark the EXP field according to application priority

D.

Mark the DSCP field according to application priority

Buy Now
Questions 8

Your Brocade network monitoring solution includes the requirements for random sampling of packets and time-based sampling of counters.

You have been asked to determine an appropriate solution.

What will fulfill the specified requirements?

Options:

A.

sFlow

B.

RMON1

C.

RMON2

D.

Netflow

Buy Now
Questions 9

You have been informed that you will need to implement 802.IX on all Brocade switches and routers.

Which three are required to support this request? (Choose three.)

Options:

A.

applicant

B.

supplicant

C.

authenticator

D.

authentication server

E.

supplicant server

Buy Now
Questions 10

Which QoS mechanism would you use to set the DSCP value specified of an outgoing packet?

Options:

A.

dscp-cos-mapping

B.

dscp-matching

C.

dscp-marking

D.

internal-priority-marking

Buy Now
Questions 11

Which two statements about LAGs are true? (Choose two.)

Options:

A.

A LAG provides load-sharing.

B.

A LAG provides sub-microsecond failover,

C.

A LAG can contain links of different speeds.

D.

A LAG is treated as a single logical link by the switch.

Buy Now
Questions 12

What are two Brocade products that are designed for use in a service provider network? (Choose two.)

Options:

A.

BrocadeFastIronSX

B.

Brocade MLXe

C.

BrocadeNetIronCER 2000

D.

Brocade FCX

Buy Now
Questions 13

The traffic volume received by your network clients is higher than desired.

Which two features will help reduce the amount of unwanted traffic? (Choose two,)

Options:

A.

ACL

B.

VRRP-E

C.

BPDU Guard

D.

IGMP Snooping

Buy Now
Questions 14

You have been informed a group of remote employees are unable to authenticate with the RADIUS server. From the Brocade FCX router, you enable the debug dot1x events command.

Which three events will be viewed? (Choose three.)

Options:

A.

authentications failed

B.

authentications succeeded

C.

ACLs requested by the RADIUS server.

D.

standard ACL requests

E.

extended ACL requests

Buy Now
Questions 15

You have a mission-critical application on your network that you know by IP address. You want this traffic to be serviced before all other traffic on the network. Which two features should you implement to ensure that this mission-critical application traffic is identified and serviced correctly? (Choose two.)

Options:

A.

Configure an access control list to classify the traffic.

B.

Configure RADIUS to authenticate the traffic going over the network.

C.

Configure rate shaping for the ports across which the traffic is traveling.

D.

Configure strict priority for the queue in which the traffic resides.

Buy Now
Questions 16

Which two statements about ingress extended ACLs are correct? (Choose two.)

Options:

A.

They use extended ACL IDs 200 - 299.

B.

They save network resources by reducing traffic.

C.

They eliminate denial of service (DoS) attacks.

D.

They block unwanted traffic or users.

Buy Now
Exam Code: 150-130
Exam Name: Brocade Certified Network Engineer 2012
Last Update: Apr 22, 2024
Questions: 113

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now 150-130 testing engine

PDF (Q&A)

$35  $99.99
buy now 150-130 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 28 Apr 2024