Halloween Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Brocade > Interworking > 150-130

150-130 Brocade Certified Network Engineer 2012 Question and Answers

Question # 4

During the discovery process, to which registered multicast IP address does OSPF send a hello packet?

A.

224.0.0.5

B.

224.0.0.100

C.

224.0.0.2

D.

224.0.0.6

Full Access
Question # 5

What are three ways that VRRP is different from VRRP-E? (Choose three.)

A.

VRRP is a standards-based protocol described in RFC 2338; VRRP-E is a proprietary Brocade protocol.

B.

VRRP-E is a standards-based protocol described in RFC 2338; VRRP is a proprietary Brocade protocol.

C.

In VRRP, there is no "owner" router.

D.

In VRRP-E, there is no restriction on which the router can be the default master.

E.

VRRP-E sends multicast hello packets to the "all routers" multicast address 224.0.0.2.

Full Access
Question # 6

You have configured your Brocade device as shown in the exhibit.

Brocade#sh ip

Switch IP address: 10.200.128.116

Subnet mask: 255.255.255.0

Default router address: 10.200.128.1

TFTP server address: 10.200.46.57

Configuration filename: Brocade

Image filename: None

IP MTU: 1500

Brocade#traceroute 10.200.128.1

Type Control-c to abort

Tracing the route to IP node 10.200.128.1 from 1 to 30 hops

1 <1 ms <1 ms <1 ms 10.200.128.1

Which statement is correct regarding interface Ethernet 10 on this device having inbound traffic from 172.17.1.1/24 to 172.17.2.1/24 on port 21?

A.

It would be permitted.

B.

It would be denied by the implicit deny statement.

C.

It would be denied by FTP port 21.

D.

This ACL only applies to outbound traffic.

Full Access
Question # 7

Referring to the exhibit,

Why are interfaces 1/3, 1/5 and 1/7 blocked on Switch C?

A.

Switch A is the root bridge.

B.

Switch B is the root bridge.

C.

Switch C is the root bridge.

D.

Path cost for interfaces 1/3, ly5 and 1/7 are unequal.

Full Access
Question # 8

An engineer wants to implement Policy Based Routing (PBR). The IP address block to be matched is 100.100.100.128/25. Which ACL would match the traffic affected by PBR?

A.

access-list 51 permit 100.100.100.128 0.0.0.127

B.

access-list 51 deny 100.100.100.128 0.0.0.127

C.

access-list 51 permit 100.100.100.0 0.0.0.127

D.

access-list 51 deny 100.100.100.0 0.0.0.127

Full Access
Question # 9

Which IPv6 address is correctly formatted?

A.

2001:0000:130F:0000:0000:00A2:987B:12FC

B.

2001::130F::00A2:987B:12FC

C.

2001:0000:130F:0000:00CD:0000:00A2:987B:12FC

D.

2001:0000:130F:0000:00A2:987B:12FC

Full Access
Question # 10

You want to classify and mark traffic at the edge of your network before it is sent to the core and routed where Layer 3 QoS is trusted and enabled. Which type of marking should you configure to ensure your application traffic is serviced correctly in the core of your network?

A.

Mark the 802.lp field according to application priority

B.

Mark the PCP field according to application priority

C.

Mark the EXP field according to application priority

D.

Mark the DSCP field according to application priority

Full Access
Question # 11

What are two characteristics of an IEEE 802.ID root bridge? (Choose two.)

A.

The lowest bridge ID has the highest priority for root bridge selection.

B.

The root bridge must be enabled on Brocade Layer 2 code.

C.

The bridge ID for root bridge selection is a combination of the bridge priority and MAC address.

D.

The root bridge calculates the path cost to all other switches to determine which ports will be used and which will be blocked.

Full Access
Question # 12

What are two supported stacking topologies for the Brocade IronStack technology? (Choose two.)

A.

ring

B.

linear

C.

bus

D.

star

Full Access
Question # 13

Fiber optic cabling is immune to which type of signal degradation?

A.

attenuation

B.

noise

C.

EMI

D.

leakage

Full Access
Question # 14

What are two functions of an OSPF Autonomous System Boundary Router (ASBR)? (Choose two.)

A.

The router can run multiple routing protocols.

B.

The router redistributes routes between OSPF areas within an AS.

C.

The router redistributes non-OSPF routes into an OSPF AS.

D.

The router connects one or more OSPF areas to the OSPF backbone.

Full Access
Question # 15

Why would the IP SSH port command be used?

A.

This command is used to restrict certain port numbers from being used with SSH.

B.

This command is used to change the default port number used by SSH.

C.

This command is required before SSH will respond to any port.

D.

This command is used to set a range of port numbers to be used by SSH.

Full Access
Question # 16

What are two methods that a Brocade device can be configured for load sharing? (Choose two.)

A.

per port

B.

per packet

C.

hash based

D.

per second

Full Access