Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Brocade 143-080 Exam -

Free 143-080 Sample Questions:

Q: 1
Which feature is used when connecting a Brocade 6510 in Access Gateway mode to different fabrics while maintaining device-to-fabric consistency?
A. Advanced Device Security
B. port mapping
C. failover
D. port grouping
Answer: D

Q: 2
You notice that some N_Ports on a Brocade 6510 in Access Gateway mode are heavily used while others are not. You want to balance the utilization.
Which feature enhances performance for the N_Ports?
A. Advanced Performance Monitoring
B. F_Port Trunking
C. E_Port Trunking
D. Port Grouping
Answer: B

Q: 3
Which two statements about Access Gateway mode are true? (Choose two.)
A. It can connect NPIV-enabled HBAs.
B. It can aggregate multiple hosts to a connected F_Port uplink to a core fabric.
C. It can aggregate multiple targets to a connected F_Port uplink to a core fabric.
D. It can aggregate multiple hosts onto a single N_Port uplink to a core fabric.
Answer: A,D

Q: 4
Which three advantages does trunking provide when in Access Gateway mode? (Choose three.)
A. It allows for quick reassignments of the port ID when N_Ports go offline.
B. It allows teaming to be enabled on Brocade HBAs.
C. It allows transparent failover and failback within the trunk.
D. It maximizes link utilization within the trunk.
E. It maintains in-order delivery when a link fails.
Answer: C,D,E

Q: 5
Which two statements are true about Brocade trunking when connected to a Brocade switch in Access Gateway (AG) mode? (Choose two.)
A. The Trunking license must be installed on the AG mode switch.
B. The trunking occurs on N_Ports from the AG mode switch.
C. The trunk area is assigned on the AG mode switch to address the trunk port.
D. The trunk Area_ID is automatically assigned by the AG mode switch.
Answer: A,B

Q: 6
Which three devices are supported by a switch in Access Gateway mode? (Choose three.)
A. FICON channel
B. FCP initiators
C. FCP targets
D. fabric switches
E. iSCSI initiators
Answer: B,C,D

Q: 7
Which two initialization stages must be completed to allow a host connected to an Access Gateway (AG) device to send data frames through the fabric connected port? (Choose two.)
A. N_Ports perform the FLOGI command and the acceptance sequence with the fabric.
B. FDISC is used by the host to discover the AG.
C. FLOGI from the AG connected host is converted to FDISC by the AG.
D. FDISC is used by the AG device to discover the attached fabric.
Answer: A,C

Q: 8
You are planning to install Brocade Network Advisor Server in your corporate intranet to manage a medium-size fabric. You are also installing the client on your desk system. It is a highly secure installation. You have selected a server with dual processors and a 2.8 GHz clock rate with 8 GBs of RAM and a 100 GB disk.
What must you do to ensure the Brocade Network Advisor operates correctly?
A. Verify the ports between your client and server and open the required ones.
B. Increase the clock rate of the server to greater than 3.2 GHz.
C. Increase the disk size to greater than 160 GB.
D. Increase server to a quad-core processor.
Answer: A

Q: 9
Which two statements are true about Brocade Network Advisor? (Choose two.)
A. It can directly download firmware to storage arrays.
B. It can directly download firmware to Brocade CNAs.
C. It can directly update a third-party FC adapter device driver.
D. It can directly call home to Brocade support.
Answer: B,D

Q: 10
You have been using Web Tools for configuring and monitoring your medium-size SAN. Management is requiring you to improve security in your data center.
What must you do?
A. Disable Web Tools.
B. Configure the switch for Secure Socket Layer and use HTTPS to launch Web Tools.
C. Use a Keyboard Video Mouse (KVM) IP connected switch to connect to the serial ports on your SAN switches.
D. Use a Brocade-branded cross-over USB cable to connect from the SAN switch to your management server.
Answer: B

© 2014, All Rights Reserved