The exhibit shows the topology for an enterprise customer LAN with an on-site data center. The Intelligent Resilient Framework (IRF) group switches supports a group of computers that very high availability to the data center. Therefore the customer has requested a backup that extends directly between the IRF group and the data center core. All of the VLAN interfaces and routed link aggregations that are shown implement Open Shortest Path First (OSPF) in a single area.
Which tasks should the network architect complete to ensure that the HP 5500 IRF group selects the correct path to the data center during (Select two).
A. Change the reference bandwidth to 80000 on all routing devices.
B. Configure the VLAN 101 interfaces as silent interfaces.
C. Change the reference bandwidth on the VLAN 101 interfaces to 1000.
D. Set the cost on the VLAN 100 interfaces to 2Set the cost for the VLAN 101 interfaces to 80.
E. Change the reference bandwidth on the VLAN 100 interfaces to 20000.
What are information technology Service Management (ITSM) framework, such as the infrastructure Technology Infrastructure Library (ITILv3) and The Open Group Architecture Framework (TOGAF)?
A. They are Internet Engineering Task Force (IETF) standards that provide evolving guidelines and best practices for IT design and management
B. They are high-level approaches that provide recommendations and best practices for IT design management
C. They are industry-wide standards that provide guidelines for enterprise design and management
D. They are Internet Engineering Task Force (IETF) standards that define proper network design
An architect is planning an HP Wired-WLAN solution for an office with approximately 4000 users who will use the wireless network rather heavily and also need to roam seamlessly. The solution will have 256 MSM 460 access points (APs). What is one reason for using two Hp Wired-WLAN controllers for this solution?
A. Each Wired-WLAN controller can only support 128 APs
B. The customer needs fast roaming, which requires a mobility solution between two controllers
C. Each Wired-WLAN controller can only support 2000 users
D. The controller can be licensed and configured to provide redundancy for each other
A network architect is explaining the differences between deploying two switches in an HP Intelligent Resiliency Framework (IRF) virtual switch and deploying two switches that implement standard Virtual Routing Redundancy Protocol (VRRP). Which statement correctly describes an advantage of IRF?
A. IRF failover occurs in 3 to 4 seconds, whereas VRPF failover occurs in 10 or more seconds
B. Unlike VRRP, which requires as least two addresses to be listed. Dynamic Host Configuration Protocol (DHCP) scopes list a single IP address for the default gateway
C. The IRF virtual switch runs a separate routing in each member, which enhances the redundancy and reliability of the overall solution
D. Multiple IRF members can actively route traffic for the same subnet and use the same IP address and routing control plane
Which exhibit shows the better Open Shortest Path First (OSPF) area scheme and for which reason?
A. Exhibit 1 because it allows the application of access control lists (ACLs) between users and the data center
B. Exhibit 1 because the campus and data are separate areas
C. Exhibit 2 because every area has similar numbers of routers
D. Exhibit 1 because every area has fewer than 50 routers
E. Exhibit 2 because every area has fewer than 35 routers
A network architect is designing a redundancy solution for a customer and has learned that there is a single link between two critical network components. During the past 4000 hours of operation, the link has failed twice. The customer estimates that each failure has taken two hours to resolve.
Given this information, what is the availability that this link currently provides?
A. Less than 99.99%
B. 99.9%
C. 99.99%
D. 99.999%
Which two requirements of a modern data center make Spanning Tree Protocol (STP) and other traditional loop elimination protocols for that environment?
A. Requirement to implement routing clustering virtual machines
B. Need to consolidate traffic on a single path thorough the network
C. Greater reliance on direct attached storage
D. Need for faster convergence times
E. Need to support delay-sensitive applications
Refer to the exhibit.
A network architect is proposing this solution to a customer. The customer network manager has a preference for Cisco VLAN Spanning Tree Plus (PVST+) because this protocol provides for fast convergence when a link fails and also provides per-VLAN load- sharing over links.
How would the network architect explain why the solution fits these requirements?
A. The MSTP component of the solution fulfills the same needs as PVST+ MSTP simply balances traffic per instance rather than per-VLAN
B. The redundant links between the switches are protected by MSTP and the built-in loop guard on HP-3800 switches. MSTP provides load-sharing and loop guard provides resiliency
C. The solution as shown provides the same load-sharing benefits as PVST+. To achieve the same resiliency benefits, the architect can add smart link to the meshed stack
D. The link aggregation between tiers provide even better resiliency and load-sharing than PVST+ while MSTP protects against accidental loops
Refer to the exhibit.
A network architect has designed the topology shown in the exhibit. The Gigabit links between distribution layer and the core uses OM3 grade multi-mode fiber between 100m and 150m long.
The solution is for an enterprise customer whose employees use mostly HTTP-based applications and have medium utilization needs.
What should the network architect do to resolve a potential issue?
A. Add more bandwidth between each pair of distribution layer switches
B. Add more links between each modular switch at the access layer and its distribution layer switch
C. Replace the modular switches at the access layer with switches that support stacked meshing
D. Remove the distribution layer since it is not needed in this environment
A company experienced a denial of service attack when an infected employee device connected to the network. Which secret devices and prevents them from accessing the network?
A. Authentication solution
B. Data security solution
C. Network Based Anomaly Detection (NBAD)
D. Endpoint integrity solution