Which options meets the company’s requirements?
A network architect is designing a solution with HP products. A customer has the following
requirements for controlling the management access for administrators:
Administrators are assignedprivileges whenthey loginbased on their identity.
Security policies related topasswordcompatibility and passwordrotation, likethe
company’swindows domain policies, areenforced foradministrator credentials
The company can easily resolvethe access of administratorswho leave the company
Administrators have a backdoorinto the management interfacein case network connectivityfails
in any way.
Which options meets the company’s requirements?
What distinguishes user acceptance tests (UATs) from validation tests?
What distinguishes user acceptance tests (UATs) from validation tests?
Which stakeholder should the network architect ask for information?
A network architect is working with a customer and needs to understand the regulatory
compliance, contractual agreements, and service-level agreements (SLAs) that apply to the
company. The customer has the general IT roles in the options.
Which stakeholder should the network architect ask for information?
What should the network architect do?
A network architect is planning a solution for a customer’s campus LAN. The customer has a
existing network that consists of three tiers. The new HP switches are being deployed at the
access layer, and the existing network infrastructure is using Cisco Per-VLAN Spanning Tree
(PVST+) between the access layer and the distribution layer.
The customer has listed support for PVST+ as a top requirement for the solution, and the
customer network managers are somewhat hostile to the idea of adding HP switches.
What should the network architect do?
Which guideline aids in this effort?
A network architect is designing a Multiple Spanning Tree Protocol (MSTP) solution for a network.
The network architect plans to create two MSTP instances for 10 VLANs. The network architect
also wants to ensure that the best paths are selected when interoperating with other spanning tree
regions.
Which guideline aids in this effort?
What is the bandwidth requirement for the continuous backup?
A customer has a solution that continuously backs up date for critical services to a disaster
recovery site. The customer requires a one hour recovery point objective (RPO) and a 90 minute
—-recovery time objective (RTO). The network architect is scoping the bandwidth requirements and
has used perfmon to analyze the write throughput for the critical service over a month. The results
are:
Peak throughput= 2000 Mbps
Average throughput = 500 Mbps
Highest average throughput in hour increments =1000 Mbps
High average throughputin 90 minuteincrements =750 Mbps
What is the bandwidth requirement for the continuous backup?
How can a network architect adjust this solution to prevent this issue in the future?
The exhibit shows a network with HP 3500 yI Series switches at the access layer and HP 8206 zI
switches at the core.
The customer with solution has logged several support calls. Which were eventually tracked down
to spanning tree issues.
How can a network architect adjust this solution to prevent this issue in the future?
What should the network architect do to ensure that the redundant link design is truly resilient?
How should the network architect change the proposed design to meet the customer requirements?
The exhibit shows a proposed design for a data center network infrastructure. The exhibit only
shows two racks for simplicity. The data center will actually include more racks.
The customer has these key requirements:
The customer can scale anyapplication and easilyinstall new hardwarethat supports the
application.
The networksupports vMotionfor live migration of virtual machines (VMs).
How should the network architect change the proposed design to meet the customer
requirements?
How can the network architect ensures that the solution meets the customer needs and also follows best practic
A network architect is designing the logical topology for a campus LAN networking solution. The
customer requires support for 2400 edge ports, which is provided by 10 intelligent Resilient
Framework (IRF) groups at the access layer. This customer does not have a wireless network nor
applications adding one in the next two years. However, the customer does want to authenticate
users 802.1X and use the network RADIUS server to divide users from different groups into
different VLANs. The customer has three user groups, each of which includes between 600 and
900 users.
Additionally, the customer understands that the RADIUS server will require several policies but
wants to keep these policies as simple and easy to maintain as possible.
How can the network architect ensures that the solution meets the customer needs and also
follows best practices?