which ports does the switch forward the packet?
A network that handles IPv6 multicasts and the hosts that have joined particular IPv6 multicast
groups is shown in Exhibit 1. Routing switch B is acting as the MLD querier, and routing switch A
implements MLD snooping, as shown in Exhibit 2.
An IPv6 multicast packet for FF14::1 arrives on routing switch A on port B1. On which ports does
the switch forward the packet?
Which action might this switch take?
A company’s HP Provision ASIC switches are configured to use PIM-SM mode to provide
multicast services. When an HP Provision ASIC switch receives a multicast stream, it determines
that the best path to the multicast source is not through the Rendezvous Point (RP). Which action
might this switch take?
which traffic is dropped?
If you use the MAC lockout feature to block a specific MAC address on an HP 3500zl switch,
which traffic is dropped?
how can the network administrator ensure that this traffic is never blocked while leaving the current protecti
A network administrator has activated connection rate filtering on an HP 8200 zl Series switch with
the throttle action and medium sensitivity. However, a server connected to port A1 in VLAN 10 (IP
address 10.1.10.10) needs to establish many connections with other backend servers as part of its
typical behavior. The ports that this server uses are TCP 50000-50020.
Based on the information provided in the exhibit, how can the network administrator ensure that
this traffic is never blocked while leaving the current protections in effect?
hown in the exhibit, does the Comware switch drop or permit each frame as it arrives on port GigigabitEthernet
Which security protocol introduces vulnerabilities because the password is sent in plaintext and can be interc
Which security protocol introduces vulnerabilities because the password is sent in plaintext and
can be intercepted and easily read?
Which security protocol requires the servers to use digital certificates?
Which security protocol requires the servers to use digital certificates?
How should the network administrator complete this task?
An HP Provision ASIC switch implements connection rate filtering. When an endpoint violates the
connection rate policy, its traffic is filtered for less than 30 seconds. The company wants violator
traffic to be filtered for about one minute.
How should the network administrator complete this task?
Which technology should be used to tunnel multicast traffic securely across a network?
Which technology should be used to tunnel multicast traffic securely across a network?
What must the administrator verify when configuring IMC to discover the switches?
A network administrator plans to use HP Intelligent Management Center (IMC) to manage a
network with thousands of HP switches. The administrator wants to use IMC for functions such as
configuring ACLs and VLANs on multiple switches at once.
What must the administrator verify when configuring IMC to discover the switches?