Which statement is correct?
Your IP phone sends a DSCP value of 47. You want the value to be placed in 802.1p queue 5 on
a Brocade FastIron FCX. Which statement is correct?
What must you do first to ensure the QoS parameters are recognized by the switch?
You want your Brocade FastIron switch to recognize DSCP, TOS, 802.1p, and IP precedence bits
from an IP phone. What must you do first to ensure the QoS parameters are recognized by the
switch?
which two ways will priority be forced?
When configuring QoS, in which two ways will priority be forced? (Choose two.)
Which two statements are true?
You are deploying security methods to allow authorized IP addresses to access your network.
Which two statements are true? (Choose two.)
Which two steps are required within the appropriate devices to achieve this goal?
You have a customer who wants to separate their user’s traffic based on credentials.
Which two steps are required within the appropriate devices to achieve this goal? (Choose two.)
Which two actions should be taken to allow this?
Your security department requests that you enable access to a secure resource on a per-user
basis. These users can log in from multiple devices on the network.
Which two actions should be taken to allow this? (Choose two.)
Which two access methods can be restricted?
You want to restrict access to the management functions of your Brocade devices using an IP
ACL. Which two access methods can be restricted? (Choose two.)
Which two statements are true when limiting access?
Your company is developing applications and wants to limit traffic to its development teams. The
applications should work with both IPv4 and IPv6.
Which two statements are true when limiting access? (Choose two.)
What are two implicit results?
You are configuring IPv6 ACLs.
What are two implicit results? (Choose two.)
What will happen?
You are deploying 802.1x authentication to all your company’s devices and edge switches. A
visitor connects their non-802.1x enabled device to your network.
What will happen?