HP Implementing HP Network Technologies Sample Questions:
1. A network administrator attempts to access the console port of an HP Comware switch. The network administrator is immediately prompted for a username and password, but cannot remember the correct account information. The network administrator then reboots the switch and accesses the Extended BootROM menu, where this information displays: Which option can the network administrator choose to get access to User and System Views from the switch's console port?
A) Option 4
B) Option 8
C) Option 5
D) Option 6
2. A network administrator has installed IMC and the appropriate licenses. The network administrator is attempting to import the HP Comware and HP Provision switches into IMC but are experiencing problems importing the Comware switches. The network administrator verifies the SNMFV2c configuration on both sets of switches and the SNMP configuration in IMC. The SNMP parameters are correct.
What is the cause of the import problem?
A) Comware switches are not fully supported by IM
B) Comware switches implement SNMFV3 by default.
C) Comware switches require SSH to be configured for remote CLI access.
D) Comware switches do not have telnet fully configured
3. Which Software-Defined Network (SDN) layer includes HP Provision and HP Comware switches?
A) application
B) control
C) operational
D) infrastructure
4. A network administrator is building two IRF domains:
-One domain for the two distribution layer switches -One domain for the access layer switches
Each access layer switch should have a connection to each distribution layer switch. In this
design, how many access switches can the administrator have in the access layer IRF domain before spanning tree is required to remove loops between the two IRF domains?
A) 12
B) 2
C) 8
D) 6
E) 4
5. What is the function of HP Intelligent Provisioning?
A) Deploys, configures, and maintains HP ProLiant Gen8 servers
B) Enables quick and secure implementation of a wireless network
C) Uses application templates to configure virtual networks, servers, and storage using industry best practices
D) Secures access control at the edge of a network so that guest users are isolated
Solutions:
Question # 1 Answer: B | Question # 2 Answer: C | Question # 3 Answer: D | Question # 4 Answer: E | Question # 5 Answer: A |