A hospital CIO tells the network architect that the current network solution is not performing well. The hospital has access layer switches that support 4810/100/1000 Mbps ports and one Gigabit uplink. The hospital is seeking an upgrade to provide better performance and redundancy.
The CIO cannot provide network architect more detailed information about traffic patterns and utilization but does not want the network architect to install intelligent Management Center (IMC) and analyze the traffic.
The CIO does indicate that these applications are important:
Voice over IP (VoIP)
Scheduling and billing application
Patient data logging
Medical imaging
The network architect needs to plan an appropriate oversubscription ratio for access layer uplinks.
What is one piece of information that the architect should collect for this task?
A network architect is designing as a Multiple Spanning Tree Protocol (MSTP) solution for a network. The network architect plans to create 10 VLANs.
The network architect also wants to ensure that the best paths are selected when interoperating with other spanning tree regional.
Which guideline aids in ensuring best paths between regions?
A network architect is planning the top of the Rack (ToR) switches for a data center solution. The customer has a hot aisle/cool aisle configuration.
Which characteristic of the switch relates to this plan?
Which two requirements of a modern data center make Spanning Tree Protocol (STP) and other traditional loop elimination protocols for that
environment?
A network architect is planning a guest solution for a group of ports in a conference room. Guests should have access to the Internet only. The company wants a simple solution and prefers not to burden visitors with login requests.
Which solution would best meet the company's requirements for a gust network?
A network architect is designing a solution with HP products. A customer has the following requirements for controlling the management access for administrators:
Administrators are assigned privileges when they log in based on their identity Security policies related to password complexity and password rotation, like the company's Windows domain policies, are enforced for administrator credentials The company can easily revoke the access of administrator how have the company method
Administrator have a backdoor into the management interface in case network connectivity fails in any way
Which option meets the company's requirements?
A network architect has planned several validation tests and user acceptance tests (UATs) for a new HP solution. In order to ensure meaningful results, what is one step that the network should complete before implementing the new solution?
A network architect is choosing core switches for an enterprise data center. One potential model has CLOS hardware architecture, and the other model has a cross-bar architecture. Which customer requirement would cause the network architect to select switches with CLOS architecture?