What are information technology Service Management (ITSM) framework, such as the infrastructure Technology Infrastructure Library (ITILv3) and The Open Group Architecture Framework (TOGAF)?
If a network architect is planning a secure device management policy, why would administrators need to generate SSH keys on network infrastructure devices?
A network architect is planning an update of the server access layer in a data center. Currently, the access layer switches have 10G links to distribution layer switches. In the new solution, HP 5930 Switches act as top of rack (ToR) switches with 40G links to core switches.
Which factor must the network architect consider when designing solution?
A customer requires high availability, so the network architect is planning two area border (ABRs) for each non-backbone area in the Open Shortest Path First (OSPF) solution. What ensures a loop-free routing environment that meets the customer needs?
A company is upgrading a data center network solution in phases. The first phase involves updating the top of rack (ToR) switches in one rack. Other switches will be updated in their phases.
What is one benefit of this approach?
A network architect is explaining the differences between deploying two switches in an HP Intelligent Resiliency Framework (IRF) virtual switch and deploying two switches that implement standard Virtual Routing Redundancy Protocol (VRRP). Which statement correctly describes an advantage of IRF?
A customer has Voice IP (VoIP) phones that support Link Layer Discovery Protocol Media Endpoint Discovery (LLDP-MED). The phase need to receive their VLAN ID using this protocol. The network architect is proposing HP 5500-48G-PoE+EI switches. Each user computer connects to the phone, which then connects to the Ethernet jack. LLDP is enabled on the switch. Each Edge port is trunk port that permits VLAN 10 (the user VLAN) and VLAN 20 (the voice VLAN).
Which other setting recommended on the edge port?
A network architect is planning an intelligent Resilient Framework (IRF) group. What should the network architect implement to protect against a split IRF group?