hp0-y47 passing guarantee exam 2015

9
HP HP0-Y47 Deploying HP FlexNetwork Core Technologies Click the Link Below To Get Full Version http://www.certifyguide.com/exam/HP0-Y47/

Upload: rosie-hayward

Post on 16-Dec-2015

7 views

Category:

Documents


1 download

DESCRIPTION

CertifyGuide is your ultimate choice for IT exams preparation with 100% success rate in terms of pdf files which are supported at any platform Laptop, PC, Tablets, SmartPhones etc. Microsoft IBM, HP, EMC, Cisco, CompTIA, Avaya, Adobe and Apple exams material are available with us.If you need any help to get information about Microsoft IBM, HP, EMC, Cisco, CompTIA, Avaya, Adobe and Apple exams you can visit www.CertifyGuide.com/

TRANSCRIPT

  • HP HP0-Y47

    Deploying HP FlexNetwork Core Technologies

    Click the Link Below To Get Full Version

    http://www.certifyguide.com/exam/HP0-Y47/

  • http://www.certifyguide.com/exam/HP0-Y47/ Page2

    Question: 1 Refer to the exhibit.

    The switch with the ACL shown in the exhibit has IP address 10.1.4/24 on VLAN 4. It is the default router for 10.1.0/24. A client in VLAN 4 broadcast a DHCP discovery request, and the request arrives on this switch. What happens? A. The ACL processes the packet, and the packet is permitted and then switched. B. The switch routes the packet out of VLAN 4 to the VLAN with the DHCP server. C. The ACL processes the packet, and the packet is dropped. D. The switch floods the broadcast in VLAN 4.

    Answer: D

  • http://www.certifyguide.com/exam/HP0-Y47/ Page3

    Question: 2 For which use case is a basic or standard access control list (ACL) appropriate? A. Controlling which devices can access other devices based on the MAC addresses B. Controlling which devices can access other devices based on the IP protocol number C. Controlling which devices can access other devices based on the IP addresses D. Controlling which devices can access other devices based on the source VLAN tag

    Answer: C Access control lists (ACLs) enable you to permit or deny packets based on source and destination IP address, IP protocol information, or TCP or UDP protocol information. Reference: Chapter 3 Using Access Control Lists (ACLs) http://www.hp.com/rnd/support/manuals/pdf/release_06628_07110/Bk2_Ch3_ACL.pdf

    Question: 3 A network administrator is completing an In-Service Software Upgrade (ISSU) for an Intelligent Resilient Framework (IRF) virtual devices. The device has two members. Each member has one management module. Member1 is currently the master. The administrator has initiated a rollback time for this upgrade. When should the administrator accept the upgrade? A. After upgrading both members of the IRF virtual device B. After checking the new softwares ISSU compatibility but before upgrading either member C. After upgrading member 1 but before switching over to and upgrading member 2 D. After upgrading and switching over to member 2 but before upgrading member 1

    Answer: A Performing an ISSU for a multi-member IRF fabric ISSU for a multi-member IRF fabric should be performed as per member in two steps: first upgrade a subordinate member, and then upgrade the master and the other subordinate members. Explanation: 08-ISSU configuration http://www.h3c.com/portal/Technical_Support___Documents/Technical_Documents/Switches/H3C_S12500_Series_Switches/Configuration/Operation_Manual/H3C_S12500_CG-Release7128-6W710/01/201301/772597_1285_0.htm

  • http://www.certifyguide.com/exam/HP0-Y47/ Page4

    Question: 4 HOTSPOT Match each characteristic to the connect multicast routing protocol. If both protocols exhibit characteristic, you must select both.

    Answer: Explanation:

    * PIM-SM and PIM-DM

  • http://www.certifyguide.com/exam/HP0-Y47/ Page5

    Both PIM-SM and PIM-DM use IGMP. * PIM-SM PIM Sparse Mode (PIM-SM) explicitly builds unidirectional shared trees rooted at a rendezvous point (RP) per group, and optionally creates shortest-path trees per source. PM-DM does not use RPs: PIM-DM differs from PIM-SM in two essential ways: 1) There are no periodic joins transmitted, only explicitly triggered prunes and grafts. 2) There is no Rendezvous Point (RP). * PIM-DM Multicast Routing Information Base (MRIB) This is the multicast topology table, which is typically derived from the unicast routing table, or from routing protocols such as MBGP that carry multicast-specific topology information. PIM-DM uses the MRIB to make decisions regarding RPF interfaces. Reference: https://en.wikipedia.org/wiki/Protocol_Independent_Multicast

    Question: 5 A company is determining whether HP IMC User Access manager (UAM) meets its needs for a RADIUS server. The company requires a solution for dynamic access control lists based on user identity and location (connected switch ID). Which statement correctly describes UAM support for this requirement? A. Administrator can use UAM service and access rules to apply identity-based ACLs. The location-based component is configured in individual switch CLIs. B. UAM can only meet these requirements if it is synchronized with Microsoft Active Directory (AD). C. UAM can meet these requirements if the company adds Endpoint Admission Defense (EAD) to the solution. D. Administrator can configure UAM service policies, scenarios, and access rules to meet these requirements.

    Answer: D Endpoint Admission Defense can dynamically deploy ACLs to access devices for dynamic access control. Endpoint Admission Defense e requires that a fully licensed version of the HP IMC User Access Management (UAM) software module be installed. Reference: HP IMC Endpoint Admission Defense Software http://h20195.www2.hp.com/V2/GetPDF.aspx/4AA3-0700ENW.pdf

    Question: 6 Refer to the exhibit.

  • http://www.certifyguide.com/exam/HP0-Y47/ Page6

    A company wants to implement a portal authentication solution for guests (such a solution is also called Web-Auth). Guest belong to VLAN4, as shown in the exhibit. The intelligent Management Center (IMC) User Access Manager (UAM) will provide authentication and the Web Portal. Where should the network administrator enable portal authentication? A. On the VLAN 4 interface on the core IRF virtual switch B. On the ports with membership for VLAN 4 on the access layer IRF virtual switches C. On the ports with membership for VLAN 4 on the core IRF virtual switch D. On VLAN 4 on the core IRF virtual switch

    Answer: B Creating a VLAN Interface for the Web-Auth VLAN The Wireless Edge Services xl Module requires an IP address on the static VLAN to which the Web-Auth WLAN maps. This VLAN must be accessible to the guests, so it should be the VLAN on the access layer IRF virtual switches. Reference: Web Authentication for Mobile Users ftp://ftp.hp.com/pub/networking/software/08-C05-WebAuth.pdf

    Question: 7 Refer to the exhibit.

  • http://www.certifyguide.com/exam/HP0-Y47/ Page7

    Switch 1 and switch 2 run open Shortest Path First (OSPF) on all VLANs. Both switches establish an OSPF adjacency to a router at the main data center. Exhibit shows shoes some virtual Routing Redundancy Protocol (VRRP) and OSPF settings on Switch 1 during normal operation. How can a network administrator increase the resiliency of this solution? A. Implement Bidirectional Forwarding Detection (BFD) on the peer keep alive link between the core switches. B. Change the VLAN 10 subnet to a /24 subnet and enable VRRP on it. Place Switch 2s link to the main data center in this subnet. C. Make sure that, in each VRRP instance, each switch has a VRRP preempt delay of several minutes. D. Configure Switch 1 as an OSPF graceful restart helper in VLAN 11 and Switch 2 as a helper in VLAN 10

    Answer: D Today many Internet routers implement a separation of control and forwarding functions. Certain processors are dedicated to control and management tasks such as OSPF routing, while other processors perform the data forwarding tasks. This separation creates the possibility of maintaining a router's data forwarding capability while the router's control software is restarted/reloaded. We call such a possibility "graceful restart" or "non-stop forwarding". Reference: RFC 3623, Graceful OSPF Restart https://tools.ietf.org/html/rfc3623

    Question: 8 A network administrator wants to configure Open Shortest Path (OSPF) MD5 authentication on VLAN 100 on an HP ProVision switch. The administrator has created a global MD5 key chain with an ID and key string that matches the neighbors. which additional step must the administrator complete to accomplish this?

  • http://www.certifyguide.com/exam/HP0-Y47/ Page8

    A. Set OSPF authentication to MD5 mode in the OSPF area settings B. Activate MD5 key rotation globally C. Enable MD5 key rotation globally D. Assign this MD5 key to OSPF VLAN 100

    Answer: D Authentication-key: OSPF supports three methods of authentication for each interfacenone, simple password, and MD5. Only one method of authentication can be active on an interface at a time. The MD5 method of authentication requires you to configure a key ID and an MD5 Key Reference: Chapter 8, Configuring OSPF http://www.hp.com/rnd/support/manuals/pdf/release_06628_07110/Bk2_Ch8_OSPF.pdf

    Question: 9 Refer to the exhibit.

    A user connects a device to GigabitEthernet 1/0/1 on switch. The device does not have an 802.1X supplicant. One minute passes. How does the switch port handle the client? A. It blocks the client B. It assigns the client to VLAN2 C. It assigns the client to VLAN3 D. It assigns the client to VLAN4

    Answer: D

  • http://www.certifyguide.com/exam/HP0-Y47/ Page9

    HP HP0-Y47

    Deploying HP FlexNetwork Core Technologies

    Click the Link Below To Get Full Version

    http://www.certifyguide.com/exam/HP0-Y47/

    Thanks for Using Our Product

    We Accept