Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A host and target pair are using over 50 percent of a 16 Gbps ISL. You want to prevent this pair from impacting the performance of other flows and proactively avoid congestion.

Which two methods would accomplish this goal? (Choose two.)

A.

Limit the traffic flow through the initiator port using Ingress Rate Limiting.

B.

Limit the traffic flow through the initiator port using Target Rate Limiting on the HBA.

C.

Limit the traffic flow through the target using Ingress Rate Limiting.

D.

Use Traffic Isolation Zones.

Full Access
Question # 5

Refer to the exhibit.

You must configure an FCIP circuit between the devices shown in the exhibit using the addresses shown. Local subnet connectivity has been verified and functional, but the circuit has failed to come online.

Which statement is true?

A.

Physical port speed must match on both ends of the link.

B.

FCIP tunnels require both nodes to be on the same subnet.

C.

VLAN Tagging must be configured.

D.

An IP route must be configured.

Full Access
Question # 6

You have an ISL that is oversubscribed. You clear the port statistics and run the porterrshow command.

Which output would you expect to see?

A.

CRC errors incrementing with no enc_out errors

B.

enc_in errors incrementing with no CRC errors

C.

enc_out errors incrementing with no disc_c3 errors

D.

disc_c3 errors incrementing with no CRC errors

Full Access
Question # 7

You are configuring FC-FC routing between two DCX 8510-8 switches. You plan on using the ICL ports for your EX_Ports.

Which two requirements must be met? (Choose two.)

A.

Virtual Fabrics must be enabled on the chassis.

B.

Virtual Fabrics must be disabled on the chassis.

C.

The ICL ports must be a member of the default logical switch.

D.

The ICL ports must be a member of the base logical switch.

Full Access
Question # 8

Refer to the exhibit.

In the exhibit, the server and the storage are communicating in an operational metaSAN.

Which two statements are true? (Choose two.)

A.

A phantom front domain will appear in the backbone fabric.

B.

The port on FC Router 2 connecting to the storage is an EX_Port.

C.

A proxy device representing the server will appear in the backbone fabric.

D.

A proxy device representing the storage will appear in the edge fabric A.

Full Access
Question # 9

Refer to the exhibit.

Referring to the exhibit from Brocade Network Advisor, how would you ensure that all of the switches in the backbone fabric are using the policy with the lowest thresholds?

A.

Modify the DCX2 policy to the "dflt_moderate_policy".

B.

Modify the DCX1 policy to the "dflt_aggressive_policy".

C.

Modify the DCX2 policy to the "dflt_aggressive_policy".

D.

Modify the DCX1 policy to the "dflt_moderate_policy".

Full Access
Question # 10

As a SAN administrator, you are asked to proactively monitor your fabric and fence ports when specified error conditions are met.

Which two features satisfy both these requirements? (Choose two.)

A.

Ingress Rate Limiting

B.

Fabric Watch

C.

Flow Vision

D.

Monitoring and Alerting Policy Suite (MAPS)

Full Access
Question # 11

You need to implement an FCIP solution with one 10 Gbps FCIP tunnel.

Which Brocade product will provide the solution?

A.

Brocade DCX 8510-4 with an FC6-10 blade

B.

Brocade DCX with an FX8-24 blade

C.

Brocade 7800 Extension Switch

D.

Brocade DCX 8510-8 with an FCoE10-24 blade

Full Access
Question # 12

A customer wants to connect an ISL between a Brocade DCX 8510 and a Brocade 5300 which are located 20 km apart at 8 Gbps through a DWDM.

Which two changes are required to the ports to enable error correction and communication between the devices? (Choose two.)

A.

Enable ARB fill words on the Brocade 5300 E_Port.

B.

Enable ARB fill words on the Brocade DCX 8510 E_Port.

C.

Enable FEC on the DCX 8510 E_Port.

D.

Enable FEC on the Brocade 5300 E_Port.

Full Access
Question # 13

Which action is performed by an Access Gateway (AG) during the N_Port login process?

A.

N_Ports perform the PLOGI command and the acceptance sequence with the fabric.

B.

FDISC is used by the host to discover the AG.

C.

FLOGI from the AG connected host is converted to FDISC by the AG.

D.

FDISC is used by the AG device to discover the attached fabric.

Full Access