Download Deploying HP FlexNetwork Core Technologies.HP0-Y47.CertDumps.2017-12-17.55q.vcex

Vendor: HP
Exam Code: HP0-Y47
Exam Name: Deploying HP FlexNetwork Core Technologies
Date: Dec 17, 2017
File Size: 15 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Refer to the exhibit. 
    
  
The switch with the ACL shown in the exhibit has IP address 10.1.4/24 on VLAN 4. It is the default router for 10.1.0/24. A client in VLAN 4 broadcast a DHCP discovery request, and the request arrives on this switch. What happens?
  1. The ACL processes the packet, and the packet is permitted and then switched.
  2. The switch routes the packet out of VLAN 4 to the VLAN with the DHCP server.
  3. The ACL processes the packet, and the packet is dropped.
  4. The switch floods the broadcast in VLAN 4.
Correct answer: D
Question 2
For which use case is a basic or standard access control list (ACL) appropriate?
  1. Controlling which devices can access other devices based on the MAC addresses
  2. Controlling which devices can access other devices based on the IP protocol number
  3. Controlling which devices can access other devices based on the IP addresses
  4. Controlling which devices can access other devices based on the source VLAN tag
Correct answer: C
Explanation:
Access control lists (ACLs) enable you to permit or deny packets based on source and destination IP address, IP protocol information, or TCP or UDP protocol information.  Reference: Chapter 3 Using Access Control Lists (ACLs)http://www.hp.com/rnd/support/manuals/pdf/release_06628_07110/Bk2_Ch3_ACL.pdf
Access control lists (ACLs) enable you to permit or deny packets based on source and destination IP address, IP protocol information, or TCP or UDP protocol information.  
Reference: Chapter 3 Using Access Control Lists (ACLs)
http://www.hp.com/rnd/support/manuals/pdf/release_06628_07110/Bk2_Ch3_ACL.pdf
Question 3
A network administrator is completing an In-Service Software Upgrade (ISSU) for an Intelligent Resilient Framework (IRF) virtual devices. The device has two members. Each member has one management module. Member1 is currently the master. The administrator has initiated a rollback time for this upgrade. 
When should the administrator accept the upgrade?
  1. After upgrading both members of the IRF virtual device
  2. After checking the new software’s ISSU compatibility but before upgrading either member
  3. After upgrading member 1 but before switching over to and upgrading member 2
  4. After upgrading and switching over to member 2 but before upgrading member 1
Correct answer: A
Explanation:
Performing an ISSU for a multi-member IRF fabric ISSU for a multi-member IRF fabric should be performed as per member in two steps: first upgrade a subordinate member, and then upgrade the master and the other subordinate members. 08-ISSU configuration http://www.h3c.com/portal/Technical_Support___Documents/Technical_Documents/Switches/H3C_S12500_Series_Switches/Configuration/Operation_Manual/H3C_S12500_CG-Release7128-6W710/01/201301/772597_1285_0.htm
Performing an ISSU for a multi-member IRF fabric 
ISSU for a multi-member IRF fabric should be performed as per member in two steps: first upgrade a subordinate member, and then upgrade the master and the other subordinate members. 
08-ISSU configuration 
http://www.h3c.com/portal/Technical_Support___Documents/Technical_Documents/Switches/H3C_S12500_Series_Switches/Configuration/Operation_Manual/H3C_S12500_CG-Release7128-6W710/01/201301/772597_1285_0.htm
Question 4
Match each characteristic to the connect multicast routing protocol. If both protocols exhibit characteristic, you must select both. 
Correct answer: To display the answer, ProfExam Simulator is required.
Explanation:
* PIM-SM and PIM-DM Both PIM-SM and PIM-DM use IGMP. * PIM-SM PIM Sparse Mode (PIM-SM) explicitly builds unidirectional shared trees rooted at a rendezvous point (RP) per group, and optionally creates shortest-path trees per source. PM-DM does not use RPs:PIM-DM differs from PIM-SM in two essential ways: 1) There are no    periodic joins transmitted, only explicitly triggered prunes and  grafts.   2) There is no Rendezvous Point (RP). * PIM-DM     Multicast Routing Information Base (MRIB)      This is the multicast topology table, which is typically derived from the unicast routing table, or from routing protocols such as MBGP that carry multicast-specific topology information.  PIM-DM      uses the MRIB to make decisions regarding RPF interfaces. Reference: https://en.wikipedia.org/wiki/Protocol_Independent_Multicast
* PIM-SM and PIM-DM 
Both PIM-SM and PIM-DM use IGMP. 
* PIM-SM 
PIM Sparse Mode (PIM-SM) explicitly builds unidirectional shared trees rooted at a rendezvous point (RP) per group, and optionally creates shortest-path trees per source. 
PM-DM does not use RPs:
PIM-DM differs from PIM-SM in two essential ways:
1) There are no    periodic joins transmitted, only explicitly triggered prunes and  grafts.   
2) There is no Rendezvous Point (RP). 
* PIM-DM  
   Multicast Routing Information Base (MRIB) 
     This is the multicast topology table, which is typically derived from the unicast routing table, or from routing protocols such as MBGP that carry multicast-specific topology information.  PIM-DM      uses the MRIB to make decisions regarding RPF interfaces. 
Reference: https://en.wikipedia.org/wiki/Protocol_Independent_Multicast
Question 5
A company is determining whether HP IMC User Access manager (UAM) meets its needs for a RADIUS server. The company requires a solution for dynamic access control lists based on user identity and location (connected switch ID). Which statement correctly describes UAM support for this requirement?
  1. Administrator can use UAM service and access rules to apply identity-based ACLs. The location-based component is configured in individual switch CLIs.
  2. UAM can only meet these requirements if it is synchronized with Microsoft Active Directory (AD).
  3. UAM can meet these requirements if the company adds Endpoint Admission Defense (EAD) to the solution.
  4. Administrator can configure UAM service policies, scenarios, and access rules to meet these requirements.
Correct answer: D
Explanation:
Endpoint Admission Defense can dynamically deploy ACLs to access devices for dynamic access control. Endpoint Admission Defense e requires that a fully licensed version of the HP IMC User Access Management (UAM) software module be installed. Reference: HP IMC Endpoint Admission Defense Softwarehttp://h20195.www2.hp.com/V2/GetPDF.aspx/4AA3-0700ENW.pdf
Endpoint Admission Defense can dynamically deploy ACLs to access devices for dynamic access control. 
Endpoint Admission Defense e requires that a fully licensed version of the HP IMC User Access Management 
(UAM) software module be installed. 
Reference: HP IMC Endpoint Admission Defense Software
http://h20195.www2.hp.com/V2/GetPDF.aspx/4AA3-0700ENW.pdf
Question 6
Refer to the exhibit. 
  
A company wants to implement a portal authentication solution for guests (such a solution is also called Web-Auth). Guest belong to VLAN4, as shown in the exhibit. The intelligent Management Center (IMC) User Access Manager (UAM) will provide authentication and the Web Portal. 
Where should the network administrator enable portal authentication?
  1. On the VLAN 4 interface on the core IRF virtual switch
  2. On the ports with membership for VLAN 4 on the access layer IRF virtual switches
  3. On the ports with membership for VLAN 4 on the core IRF virtual switch
  4. On VLAN 4 on the core IRF virtual switch
Correct answer: B
Explanation:
Creating a VLAN Interface for the Web-Auth VLAN The Wireless Edge Services xl Module requires an IP address on the static VLAN to which the Web-Auth WLAN maps. This VLAN must be accessible to the guests, so it should be the VLAN on the access layer IRF virtual switches. Reference: Web Authentication for Mobile Usersftp://ftp.hp.com/pub/networking/software/08-C05-WebAuth.pdf
Creating a VLAN Interface for the Web-Auth VLAN 
The Wireless Edge Services xl Module requires an IP address on the static VLAN to which the Web-Auth WLAN maps. This VLAN must be accessible to the guests, so it should be the VLAN on the access layer IRF virtual switches. 
Reference: Web Authentication for Mobile Users
ftp://ftp.hp.com/pub/networking/software/08-C05-WebAuth.pdf
Question 7
Refer to the exhibit. 
  
Switch 1 and switch 2 run open Shortest Path First (OSPF) on all VLANs. Both switches establish an OSPF adjacency to a router at the main data center. Exhibit shows shoes some virtual Routing Redundancy Protocol (VRRP) and OSPF settings on Switch 1 during normal operation. 
How can a network administrator increase the resiliency of this solution?
  1. Implement Bidirectional Forwarding Detection (BFD) on the peer keep alive link between the core switches.
  2. Change the VLAN 10 subnet to a /24 subnet and enable VRRP on it. Place Switch 2’s link to the main data center in this subnet.
  3. Make sure that, in each VRRP instance, each switch has a VRRP preempt delay of several minutes.
  4. Configure Switch 1 as an OSPF graceful restart helper in VLAN 11 and Switch 2 as a helper in VLAN 10
Correct answer: D
Explanation:
Today many Internet routers implement a separation of control and forwarding functions.  Certain processors are dedicated to control and management tasks such as OSPF routing, while other processors perform the data forwarding tasks. This separation creates the possibility of maintaining a router's data forwarding capability while the router's control software is restarted/reloaded. We call such a possibility "graceful restart" or "non-stop forwarding". Reference: RFC 3623, Graceful OSPF Restarthttps://tools.ietf.org/html/rfc3623
Today many Internet routers implement a separation of control and forwarding functions.  Certain processors are dedicated to control and management tasks such as OSPF routing, while other processors perform the data forwarding tasks. This separation creates the possibility of maintaining a router's data forwarding capability while the router's control software is restarted/reloaded. We call such a possibility "graceful restart" or "non-stop forwarding". 
Reference: RFC 3623, Graceful OSPF Restart
https://tools.ietf.org/html/rfc3623
Question 8
A network administrator wants to configure Open Shortest Path (OSPF) MD5 authentication on VLAN 100 on an HP ProVision switch. The administrator has created a global MD5 key chain with an ID and key string that matches the neighbor’s. which additional step must the administrator complete to accomplish this?
  1. Set OSPF authentication to MD5 mode in the OSPF area settings
  2. Activate MD5 key rotation globally
  3. Enable MD5 key rotation globally
  4. Assign this MD5 key to OSPF VLAN 100
Correct answer: D
Explanation:
Authentication-key: OSPF supports three methods of authentication for each interface—none, simple password, and MD5. Only one method of authentication can be active on an interface at a time.  The MD5 method of authentication requires you to configure a key ID and an MD5 Key Reference: Chapter 8, Configuring OSPFhttp://www.hp.com/rnd/support/manuals/pdf/release_06628_07110/Bk2_Ch8_OSPF.pdf
Authentication-key: OSPF supports three methods of authentication for each interface—none, simple password, and MD5. Only one method of authentication can be active on an interface at a time.  
The MD5 method of authentication requires you to configure a key ID and an MD5 Key 
Reference: Chapter 8, Configuring OSPF
http://www.hp.com/rnd/support/manuals/pdf/release_06628_07110/Bk2_Ch8_OSPF.pdf
Question 9
Refer to the exhibit. 
   
A user connects a device to GigabitEthernet 1/0/1 on switch. The device does not have an 802.1X supplicant. 
One minute passes. How does the switch port handle the client?
  1. It blocks the client
  2. It assigns the client to VLAN2
  3. It assigns the client to VLAN3
  4. It assigns the client to VLAN4
Correct answer: D
Explanation:
VLAN4 is configured to be a guest vlan. Reference: ProCurve Network Security solutions, Guest VLANs: the interim solutionhttp://www.hp.com/rnd/pdf_html/guest_vlan_paper.htm#interim_solution
VLAN4 is configured to be a guest vlan. 
Reference: ProCurve Network Security solutions, Guest VLANs: the interim solution
http://www.hp.com/rnd/pdf_html/guest_vlan_paper.htm#interim_solution
Question 10
A company uses 802.1X authentication to force users to connect to the network. The company uses access layer switches to enforce the 802.1X authentication and HP IMC User Access manager (UAM) as the RADIUS server. 
The customer requires switches to apply a specific settings to contractor use connections. The network administrator checks the switch documentation and determines that this settings uses a vendor-specific attribute (VSA). The administrator check UAN and verifies that it has this VSA defined on it. 
How does administrator configure UAM to apply the correct setting?
  1. Define IP port groups on the access devices that need to receive the settings. Configure the VSA and its settings within these groups
  2. Add the settings to the VSA definition and then activate the VSA globally
  3. Create a scenario with the VSA and its settings: apply this scenario to the access devices that need to receive the settings
  4. Create a proprietary attribute policy with the VSA and its settings; apply this policy in the service policy for the contractor users
Correct answer: C
Explanation:
HP IMC User Access Management customizable portal pages for smart devices based on access scenarios provide a unique and personalized client experience. Reference: HP IMC User Access Manager Software Module with 50-user E-LTUhttp://www8.hp.com/us/en/products/network-management/product-detail.html?oid=5443912
HP IMC User Access Management customizable portal pages for smart devices based on access scenarios 
provide a unique and personalized client experience. 
Reference: HP IMC User Access Manager Software Module with 50-user E-LTU
http://www8.hp.com/us/en/products/network-management/product-detail.html?oid=5443912
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!