hown in the exhibit, does the Comware switch drop or permit each frame as it arrives on port GigigabitEthernet
how can the network administrator ensure that this traffic is never blocked while leaving the current protecti
View the exhibit.
A network administrator has activated connection rate filtering on an HP 8200 zl Series switch with the throttle
action and medium sensitivity. However, a server connected to port A1 in VLAN 10 (IP address 10.1.10.10)
needs to establish many connections with other backend servers as part of its typical behavior. The ports that
this server uses are TCP 50000-50020. Based on the information provided in the exhibit, how can the network
administrator ensure that this traffic is never blocked while leaving the current protections in effect?
which traffic is dropped?
If you use the MAC lockout feature to block a specific MAC address on an HP 3500zl switch, which traffic is
dropped?
Which action might this switch take?
A company’s HP Provision ASIC switches are configured to use PIM-SM mode to provide multicast services.
When an HP Provision ASIC switch receives a multicast stream, it determines that the best path to the
multicast source is not through the Rendezvous Point (RP). Which action might this switch take?
which ports does the switch forward the packet?
View the exhibit.
A network that handles IPv6 multicasts and the hosts that have joined particular IPv6 multicast groupsis
shown in Exhibit 1. Routing switch B is acting as the MLD querier, and routing switch A implements MLD
snooping, as shown in Exhibit 2. An IPv6 multicast packet for FF14::1 arrives on routing switch A on port B1.
On which ports does the switch forward the packet?
What must the administrator verify when configuring IMC to discover the switches?
A network administrator plans to use HP IntelligentManagement Center (IMC) to manage a network with
thousands of HP switches. The administrator wants to use IMC for functions such as configuring ACLs and
VLANs on multiple switches at once. What must the administrator verify when configuring IMC to discover the
switches?
Which technology should be used to tunnel multicasttraffic securely across a network?
Which technology should be used to tunnel multicasttraffic securely across a network?
How should the network administrator complete this task?
An HP Provision ASIC switch implements connection rate filtering. When an endpoint violates the connection
rate policy, its traffic is filtered for less than 30 seconds. The company wants violator traffic to be filtered for
about one minute. How should the network administrator complete this task?
Which security protocol requires the servers to usedigital certificates?
Which security protocol requires the servers to usedigital certificates?
Which security protocol introduces vulnerabilities because the password is sent in plaintext and can be interc
Which security protocol introduces vulnerabilities because the password is sent in plaintext and can be
intercepted and easily read?