Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

150-130 Sample Questions Answers

Questions 4

A customer work group notifies you that they are trying to reach a custom application on a server. The server is in a different IP domain. You have verified that the application is up. You can successfully run ping and traceroute to the server from the workgroup workstations. What would you look for next?

Options:

A.

a MTU mismatch problem

B.

a mis-configured router port

C.

a blocked UDP/TCP port

D.

a corrupt TCP session

Buy Now
Questions 5

You want to classify and mark traffic at the edge of your network before it is sent to the core and routed where Layer 3 QoS is trusted and enabled. Which type of marking should you configure to ensure your application traffic is serviced correctly in the core of your network?

Options:

A.

Mark the 802.lp field according to application priority

B.

Mark the PCP field according to application priority

C.

Mark the EXP field according to application priority

D.

Mark the DSCP field according to application priority

Buy Now
Questions 6

Brocade support has requested that you gather supportsave data for troubleshooting an issue on a Brocade FastIron ICX. Which service is required to transfer the files?

Options:

A.

A server with SFTP that is reachable by the Brocade FastIron ICX.

B.

An FTP server that is reachable by the Brocade FastIron ICX.

C.

A TFTP server that is reachable by the Brocade FastIron ICX.

D.

A RADIUS server that is reachable by the Brocade FastIron ICX.

Buy Now
Questions 7

Which two multicast routing protocols are supported on Brocade FastIron devices? (Choose two.)

Options:

A.

DVMRP

B.

PIM

C.

MBGP

D.

MOSPF

Buy Now
Questions 8

A powered device connected to a Brocade FastIron device has been auto discovered and classified as a class-3 PoE device. However, its power consumption is only 10 watts. Which command would be used on the FastIron to reallocate power back to the available power budget, while still providing all the necessary power to the powered device?

Options:

A.

no legacy-inline-power

B.

inline power power-by-class 2

C.

inline power priority 2

D.

inline power power-limit 11000

Buy Now
Questions 9

You have just configured a new Multi-Chassis Trunk between two Brocade MLXe chassis.

Which protocol information will be distributed across this link?

Options:

A.

IPv6

B.

BGP

C.

RIPv2

D.

STP

Buy Now
Questions 10

Which statement is true of an access control list (ACL) on a Brocade IP device?

Options:

A.

Only outbound ACLs can be used on any Brocade IP device.

B.

The ACL takes effect immediately after being applied to an interface.

C.

An ACL is immediately applied to all physical interfaces once the ACL is configured.

D.

Standard ACLs can be used to control traffic inbound or outbound based on source and destination addresses.

Buy Now
Questions 11

You have been asked to implement a standards-based Layer 2 loop avoidance protocol with a typical convergence time of 3 seconds or less. Which Layer 2 loop avoidance protocol should you use?

Options:

A.

802.1q

B.

802.1D

C.

MRP

D.

RSTP

Buy Now
Questions 12

An engineer wants to implement Policy Based Routing (PBR). The IP address block to be matched is 100.100.100.128/25. Which ACL would match the traffic affected by PBR?

Options:

A.

access-list 51 permit 100.100.100.128 0.0.0.127

B.

access-list 51 deny 100.100.100.128 0.0.0.127

C.

access-list 51 permit 100.100.100.0 0.0.0.127

D.

access-list 51 deny 100.100.100.0 0.0.0.127

Buy Now
Questions 13

In the exhibit,

Which port is responding to a change in the network topology?

Options:

A.

port 1

B.

port 2

C.

port 3

D.

port4

Buy Now
Questions 14

OU need to improve redundancy in your LAN as well as increase bandwidth between switches using a Layer 2 protocol.

Which feature will provide this?

Options:

A.

LLDP

B.

LACP

C.

VRRP

D.

SSTP

Buy Now
Questions 15

Which technology allows a service provider the ability to connect customer sites with duplicate tagged VLAN configurations across the same circuit as shown in the exhibit?

Options:

A.

dual-mode

B.

802.1q

C.

untagged

D.

Q-in-Q

Buy Now
Questions 16

What are the three available QoS scheduling algorithms available on Brocade NetIron and FastIron products? (Choose three.)

Options:

A.

weighted round robin

B.

strict priority

C.

first-in-first-out

D.

hybrid

E.

deficit round robin

Buy Now
Questions 17

Which type of transceiver would be used to support a 1 km multi-mode fiber 1 Gbps connection?

Options:

A.

SFP

B.

SFP+

C.

Twinax

D.

QSFP

Buy Now
Questions 18

What are two supported stacking topologies for the Brocade IronStack technology? (Choose two.)

Options:

A.

ring

B.

linear

C.

bus

D.

star

Buy Now
Questions 19

Which two access control list (ACL) types will match on TCP/UDP ports? (Choose two.)

Options:

A.

numbered standard ACLs

B.

numbered extended ACLs

C.

named standard ACLs

D.

named extended ACLs

Buy Now
Questions 20

You have a mission-critical application on your network that you know by IP address. You want this traffic to be serviced before all other traffic on the network. Which two features should you implement to ensure that this mission-critical application traffic is identified and serviced correctly? (Choose two.)

Options:

A.

Configure an access control list to classify the traffic.

B.

Configure RADIUS to authenticate the traffic going over the network.

C.

Configure rate shaping for the ports across which the traffic is traveling.

D.

Configure strict priority for the queue in which the traffic resides.

Buy Now
Questions 21

Which two features enable discovery of network switches? (Choose two.)

Options:

A.

LLDP

B.

UDLD

C.

FDP

D.

LFS

Buy Now
Questions 22

What is the minimum cabling requirement for PoE+?

Options:

A.

Category 2

B.

Category 3

C.

Category 4

D.

Category 5

Buy Now
Questions 23

When is an OSPF virtual link used?

Options:

A.

When an area has no direct connection to the backbone area.

B.

When an area needs access to an ASBR.

C.

When an area is configured as a stub area.

D.

When an area needs to connect to a non-backbone area.

Buy Now
Questions 24

When 802.lp priority override is enabled on the primary port of a trunk group, which other ports of the trunk group will be affected?

Options:

A.

all ports except the primary trunk port

B.

some of the trunk ports

C.

only the primary port of the trunk group

D.

all ports of the trunk group

Buy Now
Questions 25

The traffic volume received by your network clients is higher than desired.

Which two features will help reduce the amount of unwanted traffic? (Choose two,)

Options:

A.

ACL

B.

VRRP-E

C.

BPDU Guard

D.

IGMP Snooping

Buy Now
Questions 26

What are two uses for port-based VLANs? (Choose two.)

Options:

A.

Create separate broadcast domains inside a single Layer 2 network.

B.

Segregate traffic at Layer 3.

C.

Eliminate the need for routers between different subnets.

D.

Separate user traffic into different logical network segments based on department.

Buy Now
Questions 27

During the discovery process, to which registered multicast IP address does OSPF send a hello packet?

Options:

A.

224.0.0.5

B.

224.0.0.100

C.

224.0.0.2

D.

224.0.0.6

Buy Now
Questions 28

Users connected to Switch1 are unable to access a database server connected to Switch2.

Referring to the exhibit, what are three explanations? (Choose three.)

Options:

A.

Port 1/1/1 on Switch2 is administratively disabled.

B.

Port 1/1/1 on Switch1 is administratively disabled.

C.

One of the switches has a defective port.

D.

The cable between the two switches is damaged.

E.

Port 1/1/1 on Switch1 has Spanning Tree disabled.

Buy Now
Questions 29

Which three statements are true when configuring virtual routing interfaces? (Choose three.)

Options:

A.

A single virtual interface can be used to route traffic between all VLANs within the same switch.

B.

Each VLAN on a switch requires its own virtual interface.

C.

A virtual interface can be a member of multiple VLANs.

D.

A virtual interface can have multiple IP addresses.

E.

Hosts in a VLAN can use the IP address of the virtual interface as their default gateway.

Buy Now
Questions 30

Which two Layer 2 network discovery protocols are used to detect PoE power requirements?

(Choose two.)

Options:

A.

FDP

B.

LLDP-MED

C.

LACP

D.

CDP

Buy Now
Questions 31

Referring to the exhibit, port eth 1 on Switch-A is connected to port eth 1 on Switch-B.

Switch-A#show int eth 1

GigabitEthernet1 is up, line protocol is up

Hardware is GigabitEthernet, address is 748e.f821.3ad3 (bia 748e.f821.3aeb)

Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx

Configured mdi mode AUTO, actual MDI

Member of L2 VLAN ID 1, port is untagged, port state is FORWARDING

BPDU guard is Disabled, ROOT protect is Disabled

STP configured to ON, priority is level0

Flow Control is config enabled, oper enabled, negotiation disabled

mirror disabled, monitor disabled

Not member of any active trunks

Internet address is 192.168.5.2/24, IP MTU 9198 bytes, encapsulation ethernet

<>

Switch-B#show int eth 1

GigabitEthernet1 is up, line protocol is up

Hardware is GigabitEthernet, address is 748e.f821.443a (bia 748e.f821.4453)

Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx

Configured mdi mode AUTO, actual MDI

Member of L2 VLAN ID 1, port is untagged, port state is FORWARDING

BPDU guard is Enabled, ROOT protect is Disabled

STP configured to ON, priority is level0

Flow Control is config enabled, oper enabled, negotiation disabled

mirror disabled, monitor disabled

Not member of any active trunks

Internet address is 192.168.5.3/24, IP MTU 1000 bytes, encapsulation ethernet

<>

You notice high packet loss between the two devices communicating over this link.

What is causing high packet loss over this link?

Options:

A.

BPDU Guard is enabled on Switch-A but disabled on Switch-B.

B.

The two ports are not a member of any active trunks.

C.

The port on Switch-A is 10 GbE while the port on Switch-B is 1 GbE.

D.

The MTU values on Switch-A and Switch-B do not match.

Buy Now
Questions 32

You have to implement a security protocol that encrypts all traffic between the Brocade device and the authentication server.

Which security protocol would you use to support this requirement?

Options:

A.

TACACS+

B.

TACACS

C.

RADIUS

D.

AAA

Buy Now
Questions 33

Which OSPF area is created when the area 51 stub no-summary command is issued?

Options:

A.

normal area

B.

not so stubby area

C.

stub area

D.

totally stubby area

Buy Now
Exam Code: 150-130
Exam Name: Brocade Certified Network Engineer 2012
Last Update: Nov 29, 2024
Questions: 113
$66  $164.99
$50  $124.99
$42  $104.99
buy now 150-130