Limited Time Discount Offer
30% Off - Ends in 02:00:00

X

HP HP0-Y47 Dumps

verified by experts

  • Verified by experts

HP0-Y47 Premium File

  • 55 Questions & Answers

$21.41

$14.99
HP
Deploying HP FlexNetwork Core Technologies
HP
Deploying HP FlexNetwork Core Technologies

Files

File Name
Views
Size
Downloads

143

3 MB

153

Files

Views

143

Size

3 MB

Downloads

153

Questions & Answers for HP HP0-Y47

Showing 1-15 of 55 Questions

Question #1

Match the characteristic to the routing protocol.

Question #2

Refer to the exhibit.

A network administrator is checking the Quality of Service (QoS) settings on an HP
ProVision Switch.
This frame arrives on the switch:
✑ Ingress port: A1
✑ No 802.1Q tag
✑ Source IP address = 10.1.2.10
✑ Destination IP address = 10.1.4.4
✑ DSCP = 48
✑ Destination TCP port = 5060
To which priority queue will the switch assign this frame? (Queues are numbered 0-7)

A. 0

B. 1

C. 4

D. 6

Explanation: The DestinationTCP port number (5060) matches and dscp is set to 32.
Qscp is mapped to priority 4.
Note:If more than oneglobalclassification criteria, theyare searched inthe following
order:TCP / UDPport numberIP-address ofthe sender and receiverIP
precedencevalueDSCP valueMinutes ofthe thirdlevelVLAN
numberIncomingportswitchMarkings onthe data link layer802.1pWhena packet is
matchedby several criteria, themarkingis appliedonly for thefirst matched by the order

Question #3

Refer to the exhibit.


The switch with the ACL shown in the exhibit has IP address 10.1.4/24 on VLAN 4. It is the
default router for 10.1.0/24. A client in VLAN 4 broadcast a DHCP discovery request, and
the request arrives on this switch.
What happens?

A. The ACL processes the packet, and the packet is permitted and then switched.

B. The switch routes the packet out of VLAN 4 to the VLAN with the DHCP server.

C. The ACL processes the packet, and the packet is dropped.

D. The switch floods the broadcast in VLAN 4.

Question #4

A company is determining whether HP IMC User Access manager (UAM) meets its needs
for a RADIUS server. The company requires a solution for dynamic access control lists
based on user identity and location (connected switch ID). Which statement correctly
describes UAM support for this requirement?

A. Administrator can use UAM service and access rules to apply identity-based ACLs. The location-based component is configured in individual switch CLIs.

B. UAM can only meet these requirements if it is synchronized with Microsoft Active Directory (AD).

C. UAM can meet these requirements if the company adds Endpoint Admission Defense (EAD) to the solution.

D. Administrator can configure UAM service policies, scenarios, and access rules to meet these requirements.

Explanation: Endpoint Admission Defensecandynamically deploy ACLs to access devices
for dynamic access control.
Endpoint Admission Defensee requires that a fullylicensed version of the HP IMC User
Access Management (UAM) software module be installed.
Reference:HP IMC Endpoint AdmissionDefense Software
http://h20195.www2.hp.com/V2/GetPDF.aspx/4AA3-0700ENW.pdf

Question #5

Refer to the exhibit.

This HP 10500 Switch Series is receiving an average of 1 Gbps of HTTP traffic from
10.1.4.0/24. The switch starts to receive an additional 1 Gbps of HTTP traffic from
10.1.4.0/24. How does the switch handle the traffic?

A. It drops the traffic

B. It forwards the traffic but marks it yellow (for a higher drop precedence)

C. It forwards the traffic without remarking it in any way

D. It forwards the traffic but marks it for forwarding in a lower priority queue

Explanation:
Parameters
: Specifies the committed information rate (CIR) in kbps.
: Specifies the committed burst size (CBS) in bytes. The
argument ranges from 4000 to 16000000, the default is 4000.
argument ranges from 0 to 16000000, the default is 4000.
: Specifies the peak information rate (PIR) in kbps.
: Specifies the action to be conducted for the traffic conforming to CIR. The
argument can be:
discard: Drops the packets.
pass: Forwards the packets.
: Marks the packets with a new DSCP precedence and
argument is in the range 0 to 63.
By default, packets conforming to CIR are forwarded.
: Specifies the action to be conducted for the traffic conforms to neither CIR nor
argument can be:
discard: Drops the packets.
pass: Forwards the packets.
: Marks the packets with a new DSCP precedence and
argument is in the range 0 to 63.
By default, packets conforming to neither CIR nor PIR are dropped.
: Specifies the action to be conducted for the traffic conforms to PIR but does
argument can be:
discard: Drops the packets.
pass: Forwards the packets.
: Marks the packets with a new DSCP precedence and
argument is in the range 0 to 63.
By default, packets conforming to PIR but not conforming to CIR are forwarded.

Question #6

HP Comware Switch 1 connects to switch 2 on GigabitEthernet 1/0/1. Switch 2 implements
an inbound rate limit of 600 Mbps. The network administrator wants switch 1 to buffer traffic
that exceeds the Switch 2 rate limit of 600 Mbps and send the traffic at 600 Mbps. All traffic
has the same 802.1p priority and is forwarded in priority queue 2.
What should the administrator apply to the Switch 1 interface GigabitEthernet 1/0/1?

A. A line rate limit of 600 Mbps on queue 2

B. A QoS policy with a classifier that matches all traffic and a CAR behavior that sets a CIR of 600 Mbps

C. A weighted random early discard (WRED) table with a limit of 600 for queue 2

D. A traffic shaping rate limit of 600 Mbps on queue 2

Explanation: The line rate of a physical interface specifies the maximum rate of incoming
packets or outgoing packets.
Note:Configuring the line rate
Perform the following steps:
✑ Enter system view by using the following command:
system-view
✑ Enter interface view.
interface interface-type interface-number
✑ Configure the line rate for the interface. Use the following command:
qos lr outbound cir committed-informationrate [ cbs committed-burst-size [ ebs
excessburst- size ] ]
Reference:HP 6600 Router Series - Configuring Traffic Policing/Traffic Shaping/Line Rate
http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-
c03146192&sp4ts.oid=5179297#N101D6

Question #7

Refer to the exhibit.

Switch 3 runs Rapid Per-VLAN Spanning Tree Plus (RPVST+), which is enabled on VLANs
1-4. Select the correct number for each of these parameters.

Question #8

Refer to the exhibit.

Which route to 203.0.13.0/24 will the switch BGP process propose to the routing table?

A. A null route

B. A route through 192.0.2.2

C. A route through 198.5.100.1

D. A route through 198.5.100.1 and 192.0.2.1

Explanation: The NextHop for Network 203.0.13.0 is 192.0.2.2.

Question #9

A company needs a simple authenticate solution for guests. The HP Comware access
layer switches will implement portal authentication (or Web-Auth). The network
administrator wants the switch to host the login web page on an IP address that not used
for any other purpose.
What should the administrator do to accomplish this goal?

A. Set the IP address when defining the local portal server, and create a loopback interface for the address

B. Create RADIUS scheme that specifies this IP address for the authentication server. Select this scheme for portal authentication in the default domain

C. Create a layer 3 interface for the guest VLAN and assign the desired IP address. Activate local portal authentication on this interface.

D. Set the IP address when defining the local portal server, and the switch automatically begins using that address.

Explanation: *Enable portal server on Onboarding VLAN Interface, this will activate the
default Portal ACL (deny all, redirect tcp port 80 to TCP-Cheat)
[comware5]interface Vlan-interface 21
[comware5-Vlan-interface21]portal server uam method layer3
[comware5-Vlan-interface21]quit
[comware5]
*how the Portal redirect works. These are the basic steps:
✑ Admin enables Portal authentication on the Onboarding VLAN L3 Interface, this
will effectively block all traffic (default portal ACL)
✑ User connects and “should” get an address through DHCP/DHCP Relay.
✑ User opens browser, tries to access http://www.hp.com
✑ User Device will send dns request for http://www.hp.com (to DNS IP Provided by
DHCP server)
✑ DNS “should” respond with public IP of http://www.hp.com (default Portal ACL will
block this by default!)
Reference:Comware Portal Redirect for BYOD use
http://abouthpnetworking.com/2014/01/30/comware-portal-redirect-for-byod-use/

Question #10

Refer to the exhibit.

Switch 1 and switch 2 run open Shortest Path First (OSPF) on all VLANs. Both switches
establish an OSPF adjacency to a router at the main data center. Exhibit shows shoes
some virtual Routing Redundancy Protocol (VRRP) and OSPF settings on Switch 1 during
normal operation.
How can a network administrator increase the resiliency of this solution?

A. Implement Bidirectional Forwarding Detection (BFD) on the peer keep alive link between the core switches.

B. Change the VLAN 10 subnet to a /24 subnet and enable VRRP on it. Place Switch 2s link to the main data center in this subnet.

C. Make sure that, in each VRRP instance, each switch has a VRRP preempt delay of several minutes.

D. Configure Switch 1 as an OSPF graceful restart helper in VLAN 11 and Switch 2 as a helper in VLAN 10

Explanation: Today many Internet routers implement a separation of control and
forwarding functions. Certain processors are dedicated to control
and management tasks such as OSPF routing, while other processors
perform the data forwarding tasks. This separation creates the
possibility of maintaining a router's data forwarding capability
while the router's control software is restarted/reloaded. We call
such a possibility "graceful restart" or "non-stop forwarding".
Reference: RFC 3623,Graceful OSPF Restart
https://tools.ietf.org/html/rfc3623

Question #11

Refer to the exhibit.

These three routers are currently configured for BGP. They do not apply any routing policy
in terms of BGP on routes or attributes advertised to an received from peers. How can the
network administrator for Router 1 cause Router 1 to advertise 192.0.2.0/24 to Router 2
and Router 3?

A. Enable BGP routing on RAGG1

B. Add a null route to 192.0.2.0/24

C. Apply route policy 1 as an inbound policy for both peers

D. Apply route policy 1 as an outbound policy for both peers

Explanation: You can associate a route policy to a BGP peer. Route policies use route
maps to control or modify the routes that BGP recognizes. You can configure a route policy
for inbound or outbound route updates.
Incorrect:
Not B:Null 0 routing is used to prevent routing loops in some conditions as if any packet is
destinated for some specific route in that subnet which is not available for an example is
down due to any reason instead of going through the default route and packet reaching
somewhere else packet destined for that specific route within that subnet must be dropped.
So basically NULL 0 createsa block hole where if packets are matched is dropped.
Reference:Configuring Advanced BGP
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-
os/unicast/configuration/guide/l3_cli_nxos/l3_advbgp.html

Question #12

An HP Provision switch port is implementing MAC Authentication (MAC-Auth) to a RADIUS
server. A device connects to the port, and the switch submits a RADIUS Access-Request
to the server. What correctly describes how the switch determines the username and
password for the request?

A. Depending on the configuration, the switch sends the device MAC address for the username or a configured username. It sends the device MAC address for the password or a configured password

B. The switch always sends the device MAC address as the username. It always sends "provision" for the password, and this password cannot be reconfigured.

C. The switch always sends the device MAC address as the username. Depending on the configuration, the password is the device MAC address or a configured password.

D. The switch always sends the device MAC address as the username and the password, and this behavior cannot be reconfigured.

Explanation: Additional Information for Configuring the RADIUS Server To Support MAC
Authentication
On the RADIUS server, configure the client device authentication in the same
way that you would any other client, except:
* Configure the client devices (hexadecimal) MAC address as both username and
password.
Reference: Web and MAC Authentication for the Series 2600/2600-PWR and 2800
Switches
http://ftp.hp.com/pub/networking/software/Security-Oct2005-59906024-Chap03-
WebMacAuth.pdf

Question #13

Refer to the exhibit.

The current software on the Intelligent Resilient Framework (IRF) virtual device shown in
the exhibit is version 1104. The network administrator wants to upgrade to software version
1105.
What will happen when the administrator attempts to use In-Service Software Upgrade
(ISSU) for this upgrade?

A. The IRF virtual device will not accept the ISSU commands. It will output various error messages.

B. When the administrator executes the switch over to the new master, a rollback will occur, causing the software to revert to the previous version.

C. The process can complete successfully. Some links might go down, causing temporary failovers within link aggregation groups.

D. When the administrator executes the switchover to the new master, an outage will occur while this master reboots.

Explanation:
During the member reboot, link-aggregation failover will ensure minimal (sub second)
downtime:
Reference:Comware5 ISSU:
Compatiblehttp://abouthpnetworking.com/2014/03/24/comware5-issu-compatible/
Reference:Comware5 ISSU: Incompatible
http://abouthpnetworking.com/2014/03/24/comware5-issu-incompatible/

Question #14

Refer to the exhibit.

A company has a functional multicast routing solution, which routes multicasts from the
data center users in VLAN3 and VLAN4. Users in VLAN 3 and VLAN 4 sometimes register
for some of the same multicast. The network administrator wants to prevent duplicate
multicasts on the link between the core IRF virtual switch and the access layer IRF virtual
switches.
What should the administrator do to accomplish this goal?

A. Enable IGMP snooping on VLAN 3 and VLAN4 (Layer 2) on the core switch and on the access layer switches.

B. Create Layer 3 interfaces for VLAN 3 and VLAN 4 on the access layer switches, and enable IGMP on the interfaces.

C. Enable Multicast VLAN and IGMP snooping on VLAN 3 on the access layer switches, and associate VLAN 4 as a sub-VLAN.

D. Create Layer 3 interfaces for VLAN 3 and VLAN 4 on the access layer switches, and enable PIM on the interfaces.

Explanation: IGMP snooping is designed to prevent hosts on a local network from
receiving traffic for a multicast group they have not explicitly joined. It provides switches
with a mechanism to prune multicast traffic from links that do not contain a multicast
listener (an IGMP client).
IGMP snooping is the process of listening to Internet Group Management Protocol (IGMP)
network traffic. The feature allows a network switch to listen in on the IGMP conversation
between hosts and routers. By listening to these conversations the switch maintains a map
of which links need which IP multicast streams. Multicasts may be filtered from the links
which do not need them and thus controls which ports receive specific multicast traffic.
Reference:https://en.wikipedia.org/wiki/IGMP_snooping

Question #15

Match the Comware quality of service (QoS) scheduling mechanism to its use case.

×