Download Architecting HP FlexNetwork Solutions.HP0-Y50.PracticeTest.2017-12-11.133q.vcex

Vendor: HP
Exam Code: HP0-Y50
Exam Name: Architecting HP FlexNetwork Solutions
Date: Dec 11, 2017
File Size: 7 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Refer to the exhibit.  
   
The exhibit shows a proposed design for a data center network infrastructure. The exhibit shows two racks for simplicity. The data center will actually include more racks. 
The customer has these key requirements:
  • The customer can scale any application and easily install new hardware that supports that application 
  • The network supports vMotion for live migration of virtual machine (VMs) 
How should the network architect change the proposed design to meet the customer requirements?
  1. Replace the rack servers with blade enclosures
  2. Add more links between the servers and the access layer
  3. Remove routing from the access layer and extend VLANs to multiple racks
  4. Add a distribution layer between the access layer and the core
Correct answer: D
Question 2
Refer to the exhibit. 
   
The exhibit shows the topology for an enterprise LAN with an on-site data center. The intelligent Resilient Framework (IRF) group of HP 5500 Series switches supports a group of computers that require very high availability to the data center. Therefore, the customer has requested a backup gigabit fiber link implement Open Shortest Path First (OSPF) in a single area. 
Which tasks should the network architect complete to ensure that the HP 5500 IRF group selects the correct path to the data center during normal operation?
  1. Change the reference bandwidth on the VLAN 100 interfaces to 20000
  2. Set the cost on the VLAN 100 interfaces to 2 Set the cost for the VLAN 101 interfaces to 80
  3. Change the reference bandwidth on the VLAN 101 interfaces to 1000
  4. Change the VLAN 101 interfaces as silent interfaces
  5. Change the reference bandwidth to 80000 on all routing devices
Correct answer: B
Question 3
A customer has Voice IP (VoIP) phones that support Link Layer Discovery Protocol Media Endpoint Discovery (LLDP-MED). The phase need to receive their VLAN ID using this protocol. The network architect is proposing HP 5500-48G-PoE+EI switches. Each user computer connects to the phone, which then connects to the Ethernet jack. LLDP is enabled on the switch. Each Edge port is trunk port that permits VLAN 10 (the user VLAN) and VLAN 20 (the voice VLAN). 
Which other setting recommended on the edge port?
  1. The voice VLAN is enabled
  2. The PVID is set to VLAN 20
  3. LLDP Cisco Discovery Protocol (CDP) compliance enabled
  4. The LLDP voice VLAN ID is set to 20
Correct answer: C
Question 4
A customer wants a simple solution for deploying virtual services at a branch. Which devices support modules running a VMware ESXi hypervisor? (Select two)
  1. HP 2920 Switch Series
  2. HP MSR30 Router Series
  3. HP 5400 zl Switch Series
  4. HP 7500 Switch Series
  5. HP VSR1000 Virtual Services Routers
Correct answer: BC
Question 5
What correctly describes one trend that is changing how network architects must design the data center network infrastructure?
  1. Applications are drawing on more and more locally stored data, which causes customers to favor blade servers and blade enclosures
  2. Applications are considering on single, highly available mainframes, driving the need for 10G connections to the server edge
  3. Applications are increasingly virtualized, which requires architects to implement routing at the access layer to segment each rack into its own VLAN
  4. Applications are scaling out across multiple servers, increasing communications between servers distributed across the data center
Correct answer: D
Question 6
A network architect is planning an intelligent Resilient Framework (IRF) group. What should the network architect implement to protect against a split IRF group?
  1. Distributed Trunking (DT)
  2. Virtual Router Redundancy Protocol (VRRP)
  3. Multi-Active Detections (MAD)
  4. Rapid Ring Protection Protocol (RRPP)
Correct answer: C
Question 7
What is the preferred time for completing racking and labeling of equipment for a new implementation?
  1. After the scheduled outage has begun and initial tests have indicated success
  2. Before the scheduled outage
  3. At any time between the beginning of the scheduled outage and the point of no return
  4. At the beginning of the scheduled outage
Correct answer: B
Question 8
A network architect has collected data on link utilization. When analyzing link utilization, what is the general guideline?
  1. You upgrade a link that is often used at more than 50 percent utilization
  2. You upgrade a link when it reaches 100 percent utilization
  3. You upgrade a link if it sometimes peaks at more than 50 percent utilization
  4. You upgrade a link when it reaches 25 to 30 percent utilization
Correct answer: A
Explanation:
upgrading links when they reach 50 percent average utilization Reference:  http://www.cisco.com/c/en/us/products/collateral/routers/wan-automation-engine/white_paper_c11-728551.html
upgrading links when they reach 50 percent average utilization 
Reference:  http://www.cisco.com/c/en/us/products/collateral/routers/wan-automation-engine/white_paper_c11-728551.html
Question 9
What are information technology Service Management (ITSM) framework, such as the infrastructure Technology Infrastructure Library (ITILv3) and The Open Group Architecture Framework (TOGAF)?
  1. They are Internet Engineering Task Force (IETF) standards that provide evolving guidelines and best practices for IT design and management
  2. They are high-level approaches that provide recommendations and best practices for IT design management
  3. They are industry-wide standards that provide guidelines for enterprise design and management
  4. They are Internet Engineering Task Force (IETF) standards that define proper network design
Correct answer: B
Question 10
If a network architect is planning a secure device management policy, why would administrators need to generate SSH keys on network infrastructure devices?
  1. To authenticate managers with a more secure method than passwords
  2. To encrypt management traffic and also authenticate managers with asymmetric
  3. To authenticate managers and assign them privileges according to their identity
  4. To encrypt management traffic related to the CLI
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!