Professional Documents
Culture Documents
170 010
170 010
170 010
Exam 170-010
Brocade Certified vRouter Engineer
Total Questions: 85 Q&A's
Web URL: http://www.becertify.com/170-010-exam-training-48503.htm
Question: 1 Question: 1
Answer: A
Question: 2
Which command will display information about when your license expires?
A. show entitlement
B. show system image
C. show license
D. show system commit
You are concerned that you may be running out of disk space on a Brocade Vyatta
vRouter.
Which command will confirm this?
A. show system storage
B. show system image
C. show system disk
D. show system /dev/sda1
Answer: A
Question: 3
You are experiencing slow system throughput and suspect that you are running out
of
system memory.
Which command would you use to confirm this?
A. show system
B. show system
C. show system
D. show system
Answer: C
Question: 4
buffers
kernel-messages
memory
processes
Answer: D
Question: 5
Answer: D
Question: 5
Which command will display the revision of software installed?
A. show entitlement
B. show system image
C. show revision
D. show version
A user has read-write access to a Brocade Vyatta vRouter.
Which two commands will display the current device configuration? (Choose two.)
A. vyatta@vyatta:~$ show configuration
B. vyatta@vyatta# show
C. vyatta@vyatta# sh conf
D. vyatta@vyatta# show config
Answer: A,B
Question: 6
Which key do you use for CLI command completion?
A. !
B. tab
C. space
D. right arrow
Answer: B
Question: 7
Which three statements about the configuration file are true? (Choose three.)
collision domain
broadcast domain
subnet
full-duplex domain
Answer: A
Question: 14
Answer: A
Question: 14
Answer: C
Question: 15
You want to capture all traffic traversing an Ethernet switch on your workstatio
n for protocol
monitoring.
What must you do?
A. Connect your workstation to a VLAN trunk port on the switch.
B. Place the card on your workstation into promiscuous mode.
C. Connect your workstation to an analyzer port on the switch.
D. Configure the switch to forward all traffic to your switch port.
Which three configuration parameters are auto-detected on a vRouter Ethernet por
t?
(Choose three.)
A. speed
B. mac
C. hw-id
D. mtu
E. duplex
Answer: A,C,E
Question: 16
VLAN 10 is configured on ethernet 0.
Which command line will display operational statistics for the VLAN?
A.
B.
C.
D.
show
show
show
show
interfaces
interfaces
interfaces
interfaces
ethernet
ethernet
ethernet
ethernet
eth0
eth0.10
eth0 vif 10
eth0 statistics
Answer: B
Question: 17
Answer: B
Question: 17
Answer: B
Question: 18
Which term is a definition of a VLAN?
A. a collision domain
B. a broadcast domain
C. a routing domain
D. a switching domain
VLAN-tagged frames are visible on which ports on a switch?
A. workstation
B. trunk
C. server
D. VLAN
Answer: B
Question: 19
Which two statements regarding Ethernet link aggregation are true? (Choose two.)
A. You can combine links of different speeds.
B. All links in the aggregate group must be up for the interface to be up.
C. If you delete a bonding interface, all configuration information related to t
hat bond
interface is also deleted.
D. You can configure multiple IP addresses and VIFs on a bonding interface.
Answer: A,D
Question: 20 Question: 20
Answer: B,D
Question: 21
Which two statements regarding Ethernet link aggregation are true? (Choose two.)
A. Aggregated links must be the same speed.
B. The interface will stay up even if a link in the aggregate group fails.
C. If you delete a bonding interface, all configuration information related to t
hat bond
interface is also deleted.
D. You can configure multiple IP addresses on a bonding interface.
What are two characteristics of UDP? (Choose two.)
A. connectionless
B. uses sequence numbers
C. uses a sliding window for flow control
D. no congestion control
Answer: A,D
Question: 22
What is the purpose of the TCP three-way handshake?
A. to establish a reliable connection between two network peers
B. to exchange information about transmission windows
C. to determine the Layer 4 ports used for the connection
D. to set the priority for handing the data exchange
Answer: A
Question: 23
Answer: B,C,E
Question: 24
Answer: B,C,E
Question: 24
What are three characteristics of TCP? (Choose three.)
A. connectionless
B. uses sequence numbers
C. uses a sliding window for flow control
D. no congestion control
E. retransmission of missing/bad segment
Given the address 172.16.99.1 and a mask of 255.255.252.0, what is the subnet nu
mber?
A. /20 B. /22
C. /26
D. /38
Answer: B
Question: 25
Given the address 172.16.99.65 and a mask of 255.255.240.0, what is the subnet n
umber?
A. /20
B. /26
C. /28
D. /32
Answer: C
Question: 26
What is the maximum number of domain names a vRouter can advertise using Dynamic
DNS?
A. 8
B. 63
C. 255
D. unlimited
Answer: D
Question: 27
What do you need to configure to meet the translation requirements shown?
A. three source NAT rules using the exclude parameter
B. one source NAT rule using the ! parameter
C. three source NAT rules using the ! parameter
D. one source NAT rules using the include parameter
Answer: A
Question: 28
Which two steps are required to enable logging of NAT traffic? (Choose two.)
A.
B.
C.
D.
Enable
Enable
Ensure
Enable
Answer: A,C
Question: 29
Answer: A,C
Question: 29
What information does a router need to add an entry to its routing table? (Choos
e two.)
A. IP address of the next-hop router
B. destination network and mask
C. destination IP address
D. MAC address of next-hop router
Answer: A,B
Question: 30
Which two statements about static routes are true? (Choose two.)
A. Static routes require no maintenance.
B. Static routes and dynamic routing cannot be used together.
C. Static routes are less CPU-intensive than dynamic routes.
D. Static routes are simple to configure.
Answer: C,D
Question: 31
Which command line will display configured static routes only?
A. show
B. show
C. show
D. show
Answer:
ip route static
route static
static route
ip route filter static
A
Question: 32 Question: 32
Answer: D
Question: 33
You want to configure a backup static route for a route learned through OSPF.
What is the lowest value you can use for administrative distance for this to wor
k?
A.
B.
C.
D.
If
1
2
110
120
all interfaces are active, which route would be preferred?
A. 10.1.1.0/24,
B. 10.1.1.0/24,
C. 10.1.1.0/24,
D. 10.1.1.0/24,
Answer: B
Question: 34
Which operation
ed traffic
automatically?
administrative
administrative
administrative
administrative
distance
distance
distance
distance
A. statefulness
B. application layer gateway
C. access list
D. allow related traffic
Answer: B
Question: 35
Answer: B,C
Question: 36
Answer: B,C
Question: 36
You've configured a destination port in your firewall rule.
Which two additional elements are required in the rule? (Choose two.)
A. source port
B. action
C. protocol
D. destination address
Which two elements are required in a firewall rule? (Choose two.)
A. source address
B. destination address
C. number
D. action
Answer: C,D
Question: 37
Which command displays the headers of packets matching firewall rules?
A. show firewall | match name <name>
B. show firewall statistics
C. show firewall name <name>
D. show log | match fw-name
Answer: D
Question: 38
Which three commands can display rule details, such as protocols and ports? (Cho
ose
three.)
A. show firewall
B. show firewall name <name>
C. show firewall statistics
D. show firewall name <name> statistics
E. show firewall name <name> rule <num>
Answer: A,B,E
Question: 39
Which three commands display whether a firewall rule has been matched by traffic
?
(Choose three.)
A. show firewall
B. show log
C. show firewall name <name> statistics
D. show firewall statistics
E. show firewall log
Answer: A,C,D
Question: 40
Which three commands should be used to modify a firewall rulebase? (Choose three
.)
A. edit
B. set
C. rename
D. delete
E. modify
Answer: B,C,D
Question: 41
vyatta@training:~$ show system commit 0 2013-05-03 21:07:54 by root via boot-con
figloader
1 2013-05-03 00:05:32 by vyatta via cli 2 2013-05-02 23:15:23 by vyatta via cli
3
2013-04-08 17:57:48 by root via boot-config-loader 4 2013-03-12 18:08:45 by vyat
ta via cli 5
2013-01-22 22:56:04 by vyatta via cli 6 2012-11-04 02:36:36 by root via boot-con
fig-loader 7
2012-10-12 16:15:36 by vyatta via cli 8 2012-10-11 16:23:08 by vyatta via cli 9
2012-09-10
18:51:06 by vyatta via cli 10 2012-09-04 23:56:28 by vyatta via cli 11 2012-08-3
1 23:25:35
by vyatta via cli 12 2012-08-31 23:08:05 by vyatta via cli 13 2012-08-31 23:07:3
2 by vyatta
via cli 14 2012-08-31 23:06:56 by vyatta via cli 15 2012-08-31 03:38:53 by vyatt
a via cli 16
2012-08-31 03:37:15 by vyatta via cli 17 2012-08-31 03:03:53 by vyatta via cli 1
8 2012-0622
04:58:47 by vyatta via cli 19 2012-06-20 19:48:08 by vyatta via cli vyatta@train
ing:~$
Which two configuration elements are required in a source NAT masquerade rule? (
Choose
two.)
A. source address
B. protocol
C. translation address
D. outbound interface
Answer: C,D
Question: 42
Which two elements are required in a source NAT rule? (Choose two.)
A. set source address <ip-addr>
B. set translation address [<ip-addr> | masquerade]
C. set protocol number
D. set outbound-interface <interface>
Answer: B,D
Question: 43
You have configured a destination port in your NAT rule.
Which two additional elements are required in the rule? (Choose two.)
A. source port
B. translation address
C. source address
D. protocol
Answer: B,D
Question: 44 Question: 44
Which statement about NAT is true?
A. You have to configure NAT in both directions in order for translation to work
properly.
B. NAT states can be maintained between redundant vRouter devices.
C. You must configure a separate NAT rule list for each direction of NAT traffic
.
D. You must configure a separate NAT rules list for each interface you want to u
se for NAT.
Answer: B
Question: 45
Your device receives a mail packet from host 10.1.1.1 to 1.2.3.4 on port eth0.
Which rule will the packet match?
A. 10
B. 20
C. 30
D. 40
Answer: A
Question: 46
Your device is about to transmit a mail packet from host 172.24.42.99 to destina
tion 2.3.4.5
on eth0.
Which rule will the packet match?
A.
B.
C.
D.
10
20
30
40
Answer: C
Question: 47
Answer: C
Question: 47
Which two show commands will verify that a Brocade Vyatta vRouter upgrade comple
ted
successfully? (Choose two.)
A. configuration
B. version
C. system image
D. entitlement
Answer: B,C
Question: 48
When verifying a new Brocade Vyatta vRouter installation on a hypervisor, which
action
must be taken with the configuration file?
A. You must verify that the install process found all of the device interfaces.
B. You must verify the hardware addresses of the device interfaces.
C. You must confirm the root login and password.
D. You must confirm the administrator login and password.
Answer: B
Question: 49
You are running a Brocade Vyatta vRouter as a virtual machine, and the upgrade s
ystem
image command tells you that you must perform a manual upgrade.
Which three steps are part of the manual upgrade process? (Choose three.)
A.
B.
C.
D.
E.
Answer: A,B,E
Question: 50
Answer: A,B,E
Question: 50
Which two elements must be configured on your Brocade Vyatta vRouter to use the
upgrade
system image command? (Choose two.)
A. an active IP interface
B. a system DNS server
C. your Brocade support credentials
D. your Brocade Vyatta repository credentials
Answer: A,B
Question: 51
Which two elements must you configure in your Brocade Vyatta vRouter to register
your
software license? (Choose two.)
A. service assignment
B. repository username/password
C. license key
D. entitlement key
Answer: B,D
Question: 52
Some of your internal users are complaining that they can't get to the mail serv
er at
10.6.7.22.
Answer: B
Question: 53
Answer: B
Question: 53
Looking at the firewall rulebase in the exhibit, what is the problem?
A. You don't have a rule allowing traffic to the host at 10.6.7.22.
B. Rule 20 blocks traffic from an internal subnet to hosts on 10.6.7.0/24.
C. No traffic has matched rule 30.
D. You don't have a rule allowing mail traffic to subnet 10.6.7.0/24.
Your device is about to transmit a packet from host 10.1.1.1 to destination 172.
16.22.33.
Enable
Enable
Enable
Enable
BeCertify.com
Answer: B,C
Question: 55
Which show command displays the most recent entries in the local device log?
A. show log tail
B. show log end
C. show log -10
D. show log | grep <today's date>
Answer: A
Question: 56
Which command line displays the output of an OSPF protocol monitoring session on
your
screen?
A. set system syslog facility console level debugging
B. show log
C. debug protocol ospf
D. monitor protocol ospf enable
Answer: B
Question: 57
Which two command lines can you use to search the Brocade Vyatta vRouter log fil
es?
(Choose two.)
A. show log | grep <string>
B. show log | match <string>
C. search log <string>
D. more -s <string> log
Answer: A,B
Question: 58 Question: 58
When you enable OSPF protocol monitoring, where is the protocol data stored?
A. in /var/log/messages
B. in the protocol log
C. in /syslog/logs
D. on the syslog server
Answer: A
Question: 59
By default, what information is stored in the Brocade Vyatta vRouter system log?
(Choose
two.)
A. firewall information
B. NAT information
C. interface state information
D. system state information
Answer: C,D
Question: 60
You are configuring a static route to the Internet on RouterA:
What is the correct next-hop address?
A. 172.16.1.1
B. 172.16.1.2
C. 192.168.42.2
D. 192.168.42.1
vyatta@Vyatta1:~$ show firewall name PublicServers statistics IPv4 Firewall
"PublicServers": Active on (eth0,IN) rule packets bytes action source destinatio
n
10 210 15960 ACCEPT 10.2.3.0/24 10.6.7.0/24 20 40827 2731049 ACCEPT 10.4.5.0/24
10.6.7.0/24 30 69381 4192375 REJECT 10.4.5.0/24 10.6.7.0/24 40 89538 5366257
ACCEPT 0.0.0.0/0 10.6.7.0/24 10000 82866 5289591 DROP 0.0.0.0/0 0.0.0.0/0
Based on the output shown, which statement is true about this firewall configura
tion?
A. This configuration is correct.
B. Rules 20 and 30 are capturing the same traffic.
C. Rule 30 must be at the top of the list.
D. This configuration is invalid.
Answer: B
Question: 61
Answer: A
Question: 62
vyatta@vyatta:~$ show system login users Username Type Tty From Last login opera
tor
vyatta hvc0 Mon Jun 17 18:34:25 2013 vyatta vyatta pts/0 10.224.7.101 Wed Jun 19
20:47:39 2013 vyatta@vyatta:~$
Based on the output, which statement is true?
A. User operator last connected through the device console.
B. User vyatta is currently logged in to the system.
C. User vyatta last connected using SSH.
D. User operator has read-only privileges.
Answer: B
Question: 63
ospf
ospf
ospf
ospf
area
area
area
area
0
0
0
0
network
network
network
network
172.16.0.0/16
172.16.32.0/24
172.16.32.99/32
172.16.32.99/24
If you were to view a frame at the point indicated in the exhibit, what would th
e source MAC
address be?
A. 1122:3344:5566
B. 1122:3377:8899
C. 1122:33dd:eeff
D. ffee.dd11.2233
Answer: B
Question: 75
Data is being transmitted from host A to host B.
If you were to capture a frame at the point indicated in the exhibit, what would
the source
MAC address be?
A.
B.
C.
D.
1122:33aa:bbcc
1122:3344:5566
1122:3377:8899
ffee:ddcc:bbaa
Answer: C
Question: 76
Answer: C
Question: 76
vyatta@vyatta:~$ show dhcp server leases
IP address Hardware Address Lease expiration Pool Client Name
10.224.7.40 00:04:f2:02:84:49 2013/06/22 17:46:20 ClientLAN
10.224.7.41 d4:be:d9:1b:ed:9e 2013/06/22 20:27:26 ClientLAN PC-HR-34
vyatta@vyatta:~$ show interfaces
Codes: S -State, L -Link, u -Up, D -Down, A -Admin Down
Interface IP Address S/L Description eth0 192.168.200.254/24 u/u eth1 192.168.10
0.1/24
u/u eth2 10.224.7.1/25 u/u eth3 172.24.42.1/24 u/u lo 127.0.0.1/8 u/u
::1/128
Based on the output shown, which statement is true?
A. DHCP is configured on eth2.
B. PC-HR-34 is the first device connected to eth2.
Data is being transmitted from host A to host B.
If you were to view a frame at the point indicated in the exhibit, what would th
e destination IP
address be?
A. 10.1.1.1
B. 10.2.2.2
C. 10.3.3.1
D. 10.3.3.10
Answer: D
Question: 77
Question: 80 Question: 80
vyatta@vyatta:~$ show interfaces Codes: S -State, L -Link, u -Up, D -Down, A -Ad
min
Down Interface IP Address S/L Description
eth0 172.24.42.52/24 u/u eth1 192.168.12.2/24 u/u eth2 192.168.23.2/24 u/u eth3
192.168.128.2/24 u/u lo 127.0.0.1/8 u/u
::1/128
vyatta@vyatta:~$ show dns forwarding nameservers
Nameservers configured for DNS forwarding
172.24.42.1 available via 'system'
216.134.160.13 available via 'system'
Based on the output shown, which two statements are true? (Choose two.)
A. The vRouter is forwarding DNS requests from users on interface eth0.
B. The vRouter is using system-configured DNS servers.
C. The vRouter is forwarding DNS requests on a round-robin basis.
D. DNS servers at 172.24.42.1 and 216.134.160.13 are responding to DNS requests.
vyatta@vyatta:~$ show dhcp client leases interface : eth1 last update : Wed Jun
19 00:06:00
GMT 2013 reason : FAIL vyatta@vyatta:~$
Based on the output shown, which two statements are true? (Choose two.)
A. Interface eth1 is configured to acquire an address through DHCP.
B. Interface eth1 has failed.
C. Interface eth1 is disconnected.
D. Interface eth1 does not have an IP address.
Answer: A,D
Question: 81
Answer: B,D
Question: 82
vyatta@vyatta:~$ show dns forwarding statistics
Cache statistics
Cache size: 150 Queries forwarded: 20 Queries answered locally: 1 Total DNS entr
ies
inserted into cache: 58 DNS entries removed from cache before expiry: 0
Nameserver statistics