Pass the Brocade BCFP 143-085 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

You have allocated the correct number of buffers for your distance and speed on an extended distance link over dark fiber. However, you notice a latency issue being reported and the port is repeatedly starved for buffer credits.

What causes this to happen?

Options:

A.

The front-end port de-bounce of 100 ms is too low.


B.

The total allocated credits are divided between the VCs.


C.

There is a large number of frames with small payload size.


D.

There is a large number of frames with full or near full payload size.


Questions # 22:

You want to provision an additional FCIP tunnel between your data centers. You have FCP acceleration features enabled on the tunnels.

What must you do?

Options:

A.

Configure IPsec.


B.

Configure TI Zones.


C.

Configure Adaptive Rate Limiting.


D.

Configure the same committed rate on both circuits.


Questions # 23:

A customer wants to connect an ISL between a Brocade DCX 8510 and a Brocade 5300 which are located 20 km apart at 8 Gbps through a DWDM.

Which two changes are required to the ports to enable error correction and communication between the devices? (Choose two.)

Options:

A.

Enable ARB fill words on the Brocade 5300 E_Port.


B.

Enable ARB fill words on the Brocade DCX 8510 E_Port.


C.

Enable FEC on the DCX 8510 E_Port.


D.

Enable FEC on the Brocade 5300 E_Port.


Questions # 24:

You have configured ports 0-2 on your Brocade 6520 to a distance of 50 km at 16 Gbps. As shown in the exhibit, port 2 was allocated more buffer credits than the other ports.

Question # 24

What is the reason for this happening?

Options:

A.

Credit recovery is enabled.


B.

Forward error correction is enabled.


C.

Quality of Service is enabled.


D.

Trunking is enabled.


Questions # 25:

Which feature is used when connecting a Brocade 6510 in Access Gateway mode to different fabrics while maintaining device-to-fabric consistency?

Options:

A.

Advanced Device Security


B.

port grouping


C.

failover


D.

port mapping


Questions # 26:

Which action is performed by an Access Gateway (AG) during the N_Port login process?

Options:

A.

N_Ports perform the PLOGI command and the acceptance sequence with the fabric.


B.

FDISC is used by the host to discover the AG.


C.

FLOGI from the AG connected host is converted to FDISC by the AG.


D.

FDISC is used by the AG device to discover the attached fabric.


Questions # 27:

You must restrict which storage arrays can connect to your Gen 5 fabric.

Which security policy satisfies this requirement?

Options:

A.

FCS


B.

DCC


C.

SCC


D.

IPFILTER


Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions