New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Brocade > Converged > 170-010

170-010 Brocade Certified vRouter Engineer Question and Answers

Question # 4

You are running a Brocade Vyatta vRouter as a virtual machine, and the upgrade system image command tells you that you must perform a manual upgrade.

Which three steps are part of the manual upgrade process? (Choose three.)

A.

Copy the new template to your VM hypervisor.

B.

Save the current configuration to an external location.

C.

Enter the add system image command.

D.

Delete the MAC addresses for all interfaces.

E.

Delete the hardware IDs for all interfaces

Full Access
Question # 5

Your device is about to transmit a packet from host 10.1.1.1 to destination 172.16.22.33.

What will be the source address after the packet is transmitted?

A.

172.24.42.51

B.

1.2.3.4

C.

172.24.42.99

D.

10.1.1.1

Full Access
Question # 6

Which command disables hello packets on an OSPF interface?

A.

set protocols ospf parameters passive-interface

B.

set protocols ospf passive-interface

C.

set interface ip ospf passive

D.

set interface ip ospf disable-hellos

Full Access
Question # 7

Given the address 172.16.99.1 and a mask of 255.255.252.0, what is the subnet number?

A.

/20

B.

/22

C.

/26

D.

/38

Full Access
Question # 8

Which command line will configure the OSPF router ID?

A.

edit protocols ospf

B.

edit protocols ospf area

C.

edit protocols ospf parameters

D.

edit protocols ospf options

Full Access
Question # 9

What is the purpose of the TCP three-way handshake?

A.

to establish a reliable connection between two network peers

B.

to exchange information about transmission windows

C.

to determine the Layer 4 ports used for the connection

D.

to set the priority for handing the data exchange

Full Access
Question # 10

Which two command lines can you use to search the Brocade Vyatta vRouter log files? (Choose two.)

A.

show log | grep

B.

show log | match

C.

search log

D.

more -s log

Full Access
Question # 11

Which three commands display whether a firewall rule has been matched by traffic? (Choose three.)

A.

show firewall

B.

show log

C.

show firewall name statistics

D.

show firewall statistics

E.

show firewall log

Full Access
Question # 12

What are three characteristics of TCP? (Choose three.)

A.

connectionless

B.

uses sequence numbers

C.

uses a sliding window for flow control

D.

no congestion control

E.

retransmission of missing/bad segment

Full Access