Pass the Brocade BCFP 143-085 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Refer to the exhibit.

Question # 11

Referring to the exhibit, which two statements are true regarding FC-FC routing? (Choose two.)

Options:

A.

Switch 3 can have a maximum of two front domains.


B.

Switch 3 can have a maximum of two translate domains.


C.

LSAN zones on Switch 2 and Switch 3 must have the same name.


D.

Switch 1 and Switch 4 fabric IDs must match.


Questions # 12:

Refer to the exhibit.

Question # 12

In the exhibit, the server and the storage are communicating in an operational metaSAN.

Which two statements are true? (Choose two.)

Options:

A.

A phantom front domain will appear in the backbone fabric.


B.

The port on FC Router 2 connecting to the storage is an EX_Port.


C.

A proxy device representing the server will appear in the backbone fabric.


D.

A proxy device representing the storage will appear in the edge fabric A.


Questions # 13:

Refer to the exhibit.

Question # 13

You need to enable Flow Mirror for a specific frame type between an initiator and a target.

Referring to the exhibit, where would you insert the Flow Mirror?

Options:

A.

1


B.

2


C.

3


D.

4


Questions # 14:

Your existing fabric has Brocade switches using Fabric OS v7.1 with Fabric Watch and Advanced Performance Monitor licenses already installed. You want to upgrade to v7.2 and run Flow Vision.

Which statement is true?

Options:

A.

You will need to install the Fabric Vision license in addition to the existing licenses on all switches in the fabric.


B.

You will need to install the Fabric Vision license only on the switches which are the source and destination for the flow.


C.

You do not need a Fabric Vision license on the switches.


D.

The existing Fabric Watch and Advanced Performance Monitor licenses on the switches will be deprecated after the upgrade.


Questions # 15:

You want to monitor traffic between a virtual host and a specified LUN. Additionally, you want to have the switch send an e-mail to the administrator if the transmit bandwidth exceeds a certain threshold.

Which two steps will accomplish this task? (Choose two.)

Options:

A.

Create a bidirectional flow between the host and storage and specify the LUN number.


B.

Create a unidirectional flow between the host and storage and specify the LUN number.


C.

Configure e-mail alerts in Flow Vision.


D.

Configure e-mail alerts in MAPS.


Questions # 16:

A host and target pair are using over 50 percent of a 16 Gbps ISL. You want to prevent this pair from impacting the performance of other flows and proactively avoid congestion.

Which two methods would accomplish this goal? (Choose two.)

Options:

A.

Limit the traffic flow through the initiator port using Ingress Rate Limiting.


B.

Limit the traffic flow through the initiator port using Target Rate Limiting on the HBA.


C.

Limit the traffic flow through the target using Ingress Rate Limiting.


D.

Use Traffic Isolation Zones.


Questions # 17:

You want to capture real-time performance data for every port in the SAN.

Which tool would accomplish this task?

Options:

A.

Brocade Network Advisor


B.

Flow Vision


C.

Web Tools


D.

Fabric Watch


Questions # 18:

You have just run SAN Health Diagnostics Capture and SAN Health Professional.

Which three critical tasks can you perform based on this report? (Choose three.)

Options:

A.

Take inventory of devices, directors, and switches.


B.

Display flows identified by Top Talkers.


C.

Display end-to-end monitor results.


D.

Capture and display historical performance data.


E.

Assess performance statistics and error conditions.


Questions # 19:

You are monitoring a flow using MAPS in Brocade Network Advisor.

Question # 19

Referring to the exhibit, which two flows would be imported into MAPS? (Choose two.)

Options:

A.

flow1


B.

flow2


C.

flow3


D.

flow4


Questions # 20:

You need to collect encrypted data from your Brocade 6520.

Which two protocols would be used to do this task? (Choose two.)

Options:

A.

SNMPv3


B.

SSHv2


C.

L2TP


D.

IPsec


Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions