A customer work group notifies you that they are trying to reach a custom application on a server. The server is in a different IP domain. You have verified that the application is up. You can successfully run ping and traceroute to the server from the workgroup workstations. What would you look for next?
You want to classify and mark traffic at the edge of your network before it is sent to the core and routed where Layer 3 QoS is trusted and enabled. Which type of marking should you configure to ensure your application traffic is serviced correctly in the core of your network?
Brocade support has requested that you gather supportsave data for troubleshooting an issue on a Brocade FastIron ICX. Which service is required to transfer the files?
Which two multicast routing protocols are supported on Brocade FastIron devices? (Choose two.)
A powered device connected to a Brocade FastIron device has been auto discovered and classified as a class-3 PoE device. However, its power consumption is only 10 watts. Which command would be used on the FastIron to reallocate power back to the available power budget, while still providing all the necessary power to the powered device?
You have just configured a new Multi-Chassis Trunk between two Brocade MLXe chassis.
Which protocol information will be distributed across this link?
Which statement is true of an access control list (ACL) on a Brocade IP device?
You have been asked to implement a standards-based Layer 2 loop avoidance protocol with a typical convergence time of 3 seconds or less. Which Layer 2 loop avoidance protocol should you use?
An engineer wants to implement Policy Based Routing (PBR). The IP address block to be matched is 100.100.100.128/25. Which ACL would match the traffic affected by PBR?
OU need to improve redundancy in your LAN as well as increase bandwidth between switches using a Layer 2 protocol.
Which feature will provide this?
Which technology allows a service provider the ability to connect customer sites with duplicate tagged VLAN configurations across the same circuit as shown in the exhibit?
What are the three available QoS scheduling algorithms available on Brocade NetIron and FastIron products? (Choose three.)
Which type of transceiver would be used to support a 1 km multi-mode fiber 1 Gbps connection?
What are two supported stacking topologies for the Brocade IronStack technology? (Choose two.)
Which two access control list (ACL) types will match on TCP/UDP ports? (Choose two.)
You have a mission-critical application on your network that you know by IP address. You want this traffic to be serviced before all other traffic on the network. Which two features should you implement to ensure that this mission-critical application traffic is identified and serviced correctly? (Choose two.)
When 802.lp priority override is enabled on the primary port of a trunk group, which other ports of the trunk group will be affected?
The traffic volume received by your network clients is higher than desired.
Which two features will help reduce the amount of unwanted traffic? (Choose two,)
During the discovery process, to which registered multicast IP address does OSPF send a hello packet?
Users connected to Switch1 are unable to access a database server connected to Switch2.
Referring to the exhibit, what are three explanations? (Choose three.)
Which three statements are true when configuring virtual routing interfaces? (Choose three.)
Which two Layer 2 network discovery protocols are used to detect PoE power requirements?
(Choose two.)
Referring to the exhibit, port eth 1 on Switch-A is connected to port eth 1 on Switch-B.
Switch-A#show int eth 1
GigabitEthernet1 is up, line protocol is up
Hardware is GigabitEthernet, address is 748e.f821.3ad3 (bia 748e.f821.3aeb)
Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx
Configured mdi mode AUTO, actual MDI
Member of L2 VLAN ID 1, port is untagged, port state is FORWARDING
BPDU guard is Disabled, ROOT protect is Disabled
STP configured to ON, priority is level0
Flow Control is config enabled, oper enabled, negotiation disabled
mirror disabled, monitor disabled
Not member of any active trunks
Internet address is 192.168.5.2/24, IP MTU 9198 bytes, encapsulation ethernet
<
Switch-B#show int eth 1
GigabitEthernet1 is up, line protocol is up
Hardware is GigabitEthernet, address is 748e.f821.443a (bia 748e.f821.4453)
Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx
Configured mdi mode AUTO, actual MDI
Member of L2 VLAN ID 1, port is untagged, port state is FORWARDING
BPDU guard is Enabled, ROOT protect is Disabled
STP configured to ON, priority is level0
Flow Control is config enabled, oper enabled, negotiation disabled
mirror disabled, monitor disabled
Not member of any active trunks
Internet address is 192.168.5.3/24, IP MTU 1000 bytes, encapsulation ethernet
<
You notice high packet loss between the two devices communicating over this link.
What is causing high packet loss over this link?
You have to implement a security protocol that encrypts all traffic between the Brocade device and the authentication server.
Which security protocol would you use to support this requirement?