Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Brocade 150-130 Exam -

Free 150-130 Sample Questions:

Q: 1
You are implementing an OSPF network with five defined areas. You want to configure OSPF area route sharing to other specified OSPF areas.
Which router will you need to configure to share area routes with other area routes?
A. ABR router
B. BDR router
C. DR router
D. BGP router
Answer: A

Q: 2
What are the two ways that IGMP is used? (Choose two.)
A. It can be sent by a host to indicate its interest of joining a specific multicast group.
B. It can be sent among routers to exchange multicast routing information.
C. It can be used to specify packet forwarding methods for a specific multicast group.
D. It can be sent by a router to query multicast listeners on a given subnet for all multicast groups.
Answer: A,D

Q: 3
What is the default implicit behavior at the end of an ACL?
A. log
B. permit any
C. deny any
D. remark
Answer: C

Q: 4
A customer uses an access control list (ACL) to restrict access to servers on their network. The ACL properly restricts traffic. However, the customer has no visibility to which IP addresses were denied by the ACL. Which word added to the end of the ACL statement would solve this problem?
A. log
B. permit
C. snmp
D. syslog
Answer: A

Q: 5
Which two statements about ingress extended ACLs are correct? (Choose two.)
A. They use extended ACL IDs 200 - 299.
B. They save network resources by reducing traffic.
C. They eliminate denial of service (DoS) attacks.
D. They block unwanted traffic or users.
Answer: B,D

Q: 6
Which statement is true of an access control list (ACL) on a Brocade IP device?
A. Only outbound ACLs can be used on any Brocade IP device.
B. The ACL takes effect immediately after being applied to an interface.
C. An ACL is immediately applied to all physical interfaces once the ACL is configured.
D. Standard ACLs can be used to control traffic inbound or outbound based on source and destination addresses.
Answer: B

Q: 7
When 802.lp priority override is enabled on the primary port of a trunk group, which other ports of the trunk group will be affected?
A. all ports except the primary trunk port
B. some of the trunk ports
C. only the primary port of the trunk group
D. all ports of the trunk group
Answer: D

Q: 8
What are the three available QoS scheduling algorithms available on Brocade NetIron and FastIron products? (Choose three.)
A. weighted round robin
B. strict priority
C. first-in-first-out
D. hybrid
E. deficit round robin
Answer: A,B,D

Q: 9
Which QoS mechanism would you use to set the DSCP value specified of an outgoing packet?
A. dscp-cos-mapping
B. dscp-matching
C. dscp-marking
D. internal-priority-marking
Answer: C

Q: 10
sFlow uses which method to send data to a collector?
A. multicast
B. broadcast
C. TCP port 6343
D. UDP port 6343
Answer: D

© 2014, All Rights Reserved