option
Cuestiones
ayuda
daypo
buscar.php

AFC

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
AFC

Descripción:
Prueba de concepto

Fecha de Creación: 2025/03/05

Categoría: Otros

Número Preguntas: 132

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

You cannot apply a Network Time Protocol (NTP) configuration to entire fabrics, which includes all switches in the fabrics, or to a selection of switches. True or False?. True. False.

Which of the following statements describe the Snapshots feature of Pensando PSM UI? (Select three). Configuration snapshot file can be downloaded for offline storage. "Save a Config Snapshot" option captures the current configuration of the PSM environment. "Restore config" option restores the PSM to the selected snapshot's configuration. User can restore only the latest snapshot captured. Configuration snapshots are not backward compatible.

AMD Pensando Policy Services Manager contributes which capability to the CX 10000 switch?. Integration with HPE iLO. Amplifier Fabric discovery and automation. Fabric monitoring. Stateful firewall policy configuration on pensando DPUs.

After a switch is discovered, you can verify that it was discovered and displayed in the Switches page (Configuration > Maintenance > Switches). True or False?. False. True.

Which hypervisors support the deployment of HPE Aruba Networking Fabric Composer as a Virtual Machine (VM)? (Select three). Linux KVM. VMware vSphere. Nutanix AHV. Microsoft Hyper-V. Citrix XenServer.

Match the following components of the data fabric of HPE Aruba Networking Fabric Composer with their role in the network. Match QuestionsPossible Answers. Border leaf switches. Leaf switches. Spine switches.

The HPE Aruba Networking Fabric Composer UI Guided Setup displays two configuration elements:__________________ and _____________. (Select two). Network Setup. Cluster Setup. Distributed Services Setup. Firewall Setup.

In the CX 10000 category of switches, it is required to manually update the VMWare host information in HPE Aruba Networking Fabric Composer in order to take advantage of the network pipeline functionality. True or False?. True. False.

Which method should be used to verify the successful installation of HPE Aruba Networking Fabric Composer?. Using AMD Pensando PSM dashboard. By logging into the virtual machine. Through HPE Aruba Networking Central. Using HPE Aruba Networking Fabric Composer Web URL.

It is a best practice to configure redundant ToR (leaf) switches as: VSX pairs. Clusters. Tenants. Ports.

You can use Hosts Visualizations option of HPE Aruba Networking Fabric Composer to __________. (Select three). Determine if a host is correctly connected to the network. Determine whether a switch is a spine, leaf, or border leaf. View information for neighbors of a switch. Examine if the hosts, VMs, or VMKernel Adapters can pass traffic. Troubleshoot issues within a host operating system.

Which capability of HPE Aruba Networking Fabric Composer's architecture provides a high performing network that can support the highly demanding east-west traffic?. Creating a convergence of the in-band data network and Storage network. Having an Out-of-Band network for administrators to manage critical devices by building a parallel network. Providing loop-free networks with multiple active links for maximum bandwidth and high availability for server-to-server traffic. Interconnecting shared pools of data storage devices to servers through a dedicated Storage network.

An ____________________ is a virtual network that is built on top of underlying network infrastructure. OSPF. Overlay Network. Orchestrator. Underlay routing.

Which status is indicated by a red colored switch symbol in the Networks Visualization of HPE Aruba Networking Fabric Composer?. Degraded. Critical. Disabled. Healthy.

HPE Aruba Networking Fabric Composer empowers CX 10000 switches by providing __________. (Select two). Global security policy. Unified infrastructure management. Microsegmentation orchestration. Deep Packet Inspection. Diagnostics using flow logs.

Some of the maintenance activities on switches using the options available from the Actions button are:_____________, __________, and ______________. (Select three). DSM. Audits. Save Configuration. Reconcile.

When deploying an HPE Aruba Networking Fabric Composer cluster for high availability, which IP address should be used to manage the cluster?. Second Fabric Composer server in the cluster. First Fabric Composer server in the cluster. Third Fabric Composer server in the cluster. Cluster VIP.

Which statements outline the features of the CX 10000 stateful firewalls? (Select three). Need a large number of ports to be open to facilitate smooth communication. Log and store important aspects of network connections. Support distributed firewall policy. Detect when illicit data is being used to infiltrate the network. Do not store information related to past threats or attacks.

Which configuration is recommended in HPE Aruba Networking Fabric Composer VM to ensure accurate time synchronization between the Fabric Composer and the switches?. A valid DNS domain name. Static IPv4 address. Available NTP servers from local network environment. Hostname for HPE Aruba Networking Fabric Composer VM.

The Metrics option of the Monitoring menu of AMD Pensando Policy Service Manager UI enables creation of custom charts for desired switch statistics. True or False?. False. True.

The Advanced Search capability of Pensando PSM UI allows you to search based on _________, __________, or __________. Object Category. Tag. App. Profile Kind.

Which option from the Pensando PSM UI allows you to define specific protocols and ports for a particular use case? (Select two). VRF. Security Policies. Firewall Export Policies. Apps.

Which building block of policies refers to a collection of networks with attached hosts that have some relationship with one another?. Endpoint Group. Application. Service Quilifier. Rule.

The Statistics Visualization option of HPE Aruba Networking Fabric Composer UI presents views of switches and paths between the fabric switches. True or False?. True. False.

Through which option can you define Object-Based Alert Policies in AMD Pensando Policy Service Manager UI?. Monitoring > Alerts & Events. Tenants > Security Policies. Tenants > Firewall Export Policies. Monitoring > Metrics.

Stateful firewalls track each connection state. True or False?. True. False.

Which options from the Pensando PSM UI's Monitoring menu create a request for generation of a log archive file? (Select two). Metrics. Audit Events. Archive Logs. Statistics. Alerts & Events.

Which of the following statements are true about VXLAN? (Select three). VXLAN technology is most advantageous in a campus environment since traditional data center networks do not experience the issues that VXLAN resolves. A VXLAN is a virtual Layer 2 network (the overlay network) built on top of an existing physical Layer 3 network (the underlay network). VXLAN encapsulates Layer 2 Ethernet frames in Layer 3 UDP packets. VXLAN is an IP-Based Layer 2 overlay technology.

The Cluster view of the Pensando PSM UI displays the average utilization of the CPU, memory, and storage of the nodes. True or False?. True. False.

By default, the HPE Aruba Networking Fabric Composer OVA file is configured for which size of fabric?. Extra-Large. Large. Small.

Which backup options are available through HPE Aruba Networking Fabric Composer Maintenance menu? (Select three). Restore the last deleted backup image. Create multiple copies of backup in the same instance. Schedule a backup. Create an on-demand backup. Set the retention period for backup.

Which drop-down menu options are available on the HPE Aruba Networking Fabric Composer dashboard? (Select three). Visualizations. Configurations. Devices. Maintenance. Users.

Which physical ports are available on the front side of CX 10000 switch? (Select three). 1 Console port. 48 ports 1G/10G/25GbE (SFP/SFP+/SFP28). 24 40/100GbE ports. 1 USB port. 6 ports 40G/100GbE (QSFP+/QSFP28). 1 Ethernet MGMT port.

While setting up NAT policies from AMD Pensando PSM dashboard, which value should be used for external facing ports?. Pensona Ingress. Persona Uplink. Persona Access. Persona Egress.

Which of the following methods allow you to perform authentication of an entity accessing PSM platforms? (Select three). LDAP. RADIUS. Local users. OpenID. Kerberos.

Rules can allow one of two actions - Allow or Drop. True or False?. True. False.

__________ option of the Networks Visualization of HPE Aruba Networking Fabric Composer allows you to select which connections you want to visualize. The search bar. The drag-and-drop. The filter panel. The right-click menu of a symbol.

Which of the following statements is true regarding the data retention policy of AMD Pensando Policy Services Manager (PSM)? (Select three). Firewall logs are retained for 30 days. Events are retained for 10 days. Oldest firewall logs are overwritten in case of disc space unavailability. Metrics are not retained by PSM. Audit logs are retained for 90 days.

The Cluster view of the Pensando PSM UI displays the average utilization of the CPU, memory, and storage of the nodes. True or False?. False. True.

Stateful firewalls simplify the configuration since the network admin does not need to create rules for each traffic direction and connection state manually. True or False?. False. True.

Which menu option of the HPE Aruba Networking Fabric Composer UI allows you to view logged messages in the form of events or alarms?. Maintenance > Support Bundles. Configuration > System. Maintenance > Audits. Configuration > Administration.

You can add a DNS configuration to the fabric or edit an existing NTP configuration if DNS is configured by DHCP. True or False?. False. True.

The dual Pensando Data Processing Units (DPU) of CX 10000 allow for __________ Gbps of stateful services bandwidth. 3200. 400. 800. 1600.

Match the types of VLANs with their definitions. Match QuestionsPossible Answers. Isolated VLAN. Primary VLAN. Community VLAN.

What are the three main components of the CX 10000 Switch?. AOS-CX Switch, Fabric Composer, Data Center Network. AOS-CX Switch, Fabric Composer, Pensando Policy and Services Manager. Fabric Composer, Pensando Policy and Services Manager, HPE Aruba Networking Central.

Where is the policy enforced on a Distributed Services Solution?. On each leaf, ToR, where it inspects inside or between racks. At the perimeter of the network. With service agents installed throughout the servers and workload.

HPE Aruba Networking Fabric Composer can be downloaded from HPE Aruba Networking Support Portal in an OVA file, which is good for VMWare environments and large size fabrics?. True. False.

By installing Fabric Composer using the ISO file, there is no option to deploy Fabric Composer for a small fabric. True. False.

Which of the following are true regarding Fabric Composer licensing model?. Is necessary one license per switch. Licenses are valid for a period ranging from 1to 10 years. Licenses are also required for customers to get access to the HPE Aruba Networking Support (TAC). Allofthe Above.

If needed, you can change the Pensando PSM Cluster Node IP Addresses after bootstrapping. True. False.

The Visualizations Statistics page allows monitoring more than one statistic data of one interface simultaneously. True. False.

Customizing the Fabric Composer dashboard will the affect the dashboard for all users. True. False.

What are the three roles available to apply to a user?. Manager, User, Viewer. Administrator, User, Visitor. Administrator, Operator, Viewer.

DNS and NTP configurations done using the wizard are automatically applied to all fabric and switches managed by Fabric Composer. True. False.

You can configure as many as 10 VMWare vSphere Integrations on Fabric Composer. True. False.

Fabric Composer is the primary tool where traffic is inspected, and policy is implemented. True. False.

A benefit of a Stateful Firewall is that it only inspects packets to determine if it satisfies existing security rules and it uses ACL2 and L2, as well as not saving sessions. True. False.

.- If the Pensando APP library does not contain what you need, you are able to manually create your own in the following location: System> Cluster > Events. Tenants> Apps< Add App. Workloads.

The workflow to create and apply security policy in Pensando is as follows: Create Security Policy, Add Network and Apply to Network, and Create VRF. Add Network, Create Security Policy, Apply Security Policy to DSS. Create VRF, Add Network, Create Security Policy, Apply Security Policy to the network.

You can find the details of your DSS, such as the DSS-ID, SKU, Phase and Condition within the Systems > DSS menu?. True. False.

Select the correct application where you are able to create custom metrics to monitor specific components and data. HPE Aruba Networking Fabric Composer. Pensando PSM.

When adding a Firewall Export Policy in PSM, or Firewall Log in Fabric Composer, you must toggle the switch to enable PSM target for the Firewall Log to display in PSM. True. False.

Arrange the following network components in the order in which they need to be upgraded when upgrading a fabric. HPE Aruba Networking Fabric Composer. CX 10000 switches. PSM Cluster nodes.

Arrange the tabs to be configured to create a local user through HPE Aruba Networking Fabric Composer UI in the correct order. Identification. Role. Session. Summary.

Which of the following are major components in the HPE Aruba Networking CX 10000 Series? (Select two.). Aruba AirWave. Distributed Services Card (DSC). Aruba ClearPass. ArubaOS-CX.

Which component in the HPE Aruba Networking CX 10000 Series is responsible for accelerating security and network functions?. ArubaOS-CX. Pensando Distributed Services Card (DSC). Virtual Switching Framework (VSF). Aruba AirWave.

What is a key differentiator of the HPE Aruba Networking CX 10000 compared to traditional switches?. It supports centralized firewall policies only. It integrates distributed security and network services. It requires an external security appliance for deep packet inspection. It does not support VXLAN overlays.

What is the role of the Pensando Distributed Services Card (DSC) in the CX 10000 switch?. Provides centralized security services. Enables distributed security and network services at the edge. Functions as a separate firewall appliance. Handles only Layer 2 switching.

Which network architecture best describes the CX 10000's approach to security?. Centralized security model. Distributed services architecture. Core-based security enforcement. Edge-based centralized filtering.

What advantage does the distributed services architecture of the CX 10000 provide?. Reduces the need for external security appliances. Centralizes security processing in the data center. Limits scalability of security services. Only supports Layer 2 security policies.

Which feature does the CX 10000 provide for security and network service implementation?. Stateless firewall policies. Distributed micro-segmentation. External IPS/IDS integration only. Software-defined routing.

Which security function is NOT natively supported by the Pensando DSC in the CX 10000?. Stateful firewalling. Distributed denial-of-service (DDoS) mitigation. Web Application Firewall (WAF). Zero Trust Network Segmentation.

How does the CX 10000 improve security compared to traditional network switches?. It uses a centralized firewalling model. It allows distributed enforcement of security policies. It removes the need for access control lists (ACLs). It uses software-defined networking (SDN) only for security.

Which protocol does the CX 10000 use for policy enforcement across network devices?. Open Shortest Path First (OSPF). Border Gateway Protocol (BGP). Virtual Extensible LAN (VXLAN). Generic Routing Encapsulation (GRE).

What is a primary benefit of using distributed firewalling in the CX 10000?. Increases network congestion. Reduces latency by processing security policies locally. Requires a separate security appliance for enforcement. Centralizes security enforcement.

What key feature allows the CX 10000 to enhance performance and security at the network edge?. AI-driven security analytics. Distributed enforcement using Pensando DSC. Hardware-based traffic mirroring. Network packet duplication.

Which of the following are key attributes of the CX 10000 switch? (Select two.). Hardware-accelerated distributed firewalling. Requires a centralized security appliance. Reduces traffic hairpinning. Limited to Layer 2 switching.

How does the CX 10000 integrate with existing security tools?. It requires custom API development. It does not support third-party security tools. It supports seamless integration with security ecosystems. It only works with proprietary security tools.

What function does the Pensando DSC enable on the CX 10000?. AI-driven analytics. Secure access service edge (SASE). Distributed services such as firewalling and segmentation. Cloud-native SD-WAN.

Which security service is natively provided by the CX 10000’s distributed architecture?. Network Access Control (NAC). Intrusion Detection System (IDS). Micro-segmentation. Secure Web Gateway.

Which of the following best describes the Pensando DSC’s role in security enforcement?. Offloads security processing to external appliances. Implements distributed firewalling within the switch. Handles centralized security analytics only. Works as a dedicated VPN concentrator.

What is a key benefit of using the HPE Aruba Networking CX 10000 for east-west traffic security?. All security policies are managed by a cloud controller. It allows real-time traffic inspection without external appliances. Requires tunneling all traffic to a centralized firewall. Supports only ACL-based filtering.

Which feature of the CX 10000 enhances both security and performance?. Packet mirroring for deep packet inspection. Hardware-accelerated policy enforcement. Software-based traffic redirection. Cloud-based security analytics only.

How does the CX 10000 reduce the need for traditional perimeter firewalls?. It replaces all security appliances in a data center. It enforces security policies directly at the switch level. It integrates with perimeter security but cannot enforce policies. It requires an external controller for policy enforcement.

What is a key advantage of using the CX 10000 over traditional firewalls?. Offloads security processing to cloud-based services. Provides security enforcement within the switch fabric. Requires dedicated firewall hardware for each segment. Uses only software-based security policies.

Which of the following functions is handled natively by the CX 10000 with Pensando DSC? (Select two.). Stateful firewalling. Data loss prevention (DLP). Micro-segmentation. Web filtering.

How does the CX 10000 enhance Zero Trust security?. It allows dynamic per-application segmentation. It only inspects north-south traffic. It replaces all existing security appliances. It enforces access control lists (ACLs) only.

Which role does the Pensando DSC play in improving security within the CX 10000 switch?. Acts as a centralized security controller. Enforces security policies at the network edge. Provides out-of-band traffic analytics. Functions only as a packet forwarding engine.

Which of the following best describes how the CX 10000 reduces security bottlenecks?. It redirects all traffic to perimeter firewalls for inspection. It processes security policies directly within the switch. It requires a dedicated firewall for each VLAN. It only supports ACL-based security enforcement.

Which of the following security policies can be enforced by the CX 10000? (Select two.). Granular user-based firewalling. Web application filtering. Distributed denial-of-service (DDoS) mitigation. Email security filtering.

What benefit does the Pensando DSC provide in terms of security processing?. Centralizes all security functions at the data center. Offloads security tasks from CPUs to hardware acceleration. Requires additional software for security policy enforcement. Eliminates the need for network segmentation.

Which method does the CX 10000 use to apply security policies dynamically?. Static ACLs only. Stateful firewall policies. VLAN-based rule enforcement. Cloud-based traffic filtering.

What is a major benefit of the CX 10000's distributed firewalling?. Requires additional security appliances. Eliminates the need for role-based policies. Reduces traffic congestion and latency. Centralizes security at the network core.

Which technology does the CX 10000 use for network segmentation?. Virtual Extensible LAN (VXLAN). Spanning Tree Protocol (STP). Open Shortest Path First (OSPF). Generic Routing Encapsulation (GRE).

What advantage does hardware acceleration provide in the CX 10000?. Speeds up security policy enforcement. Limits the number of firewall rules per switch. Requires additional software licensing. Only works in cloud environments.

Which feature ensures real-time policy enforcement in the CX 10000?. Cloud-based security updates. Hardware-accelerated firewalling. Packet mirroring for external analysis. Post-traffic filtering.

What is a key reason organizations deploy the CX 10000 in data centers?. To manage physical security. To implement distributed firewalling and segmentation. To act as an SD-WAN gateway. To enforce centralized perimeter security only.

What is the primary purpose of Pensando DSC’s built-in DDoS mitigation?. To detect and filter out malicious traffic at the switch level. To redirect traffic to external security appliances. To block all network traffic in case of an attack. To notify external firewalls about attacks.

How does the CX 10000 improve east-west traffic security in a data center?. It forces all traffic through a centralized firewall. It applies security policies at the switch level. It only supports VLAN-based segmentation. It depends on external IDS for analysis.

Which challenge does distributed firewalling in the CX 10000 help address?. High latency from centralized security enforcement. Lack of Layer 3 routing support. Inability to integrate with security ecosystems. Dependence on hardware-based firewalls only.

Which security capability makes the CX 10000 ideal for Zero Trust implementations?. Role-based micro-segmentation. Centralized traffic filtering. Packet duplication for external analysis. Out-of-band security policy enforcement.

Which of the following are supported installation options for HPE Aruba Fabric Composer? (Select two.). OVA deployment on VMware ESXi. Containerized deployment on Kubernetes. Bare-metal installation on physical servers. ISO-based installation on a virtual machine.

Which deployment model provides high availability for Fabric Composer?. Single-node deployment. Multi-node cluster deployment. Cloud-based deployment. Docker container deployment.

Which protocol is used for Fabric Composer communication with managed devices?. SSH. REST API. SNMP. NETCONF.

During an OVA installation, what must be configured for network access?. IP address and subnet mask. Username and password. SSL certificate and firewall rules. VLAN tagging and QoS settings.

Which security measure must be applied when setting up Fabric Composer?. Enable two-factor authentication. Use an encrypted boot partition. Restrict API access to authorized users. Configure role-based access control (RBAC).

How does Fabric Composer achieve redundancy in a high-availability setup?. By using active-passive failover. By using a single central controller. By integrating with external cloud storage. By enabling multicast routing.

What primary function does Fabric Composer provide in an HPE Aruba CX 10000 environment?. Managing firewall policies. Orchestrating and automating network fabric. Monitoring wireless network performance. Enforcing endpoint security policies.

Which component of the Pensando architecture integrates with Fabric Composer?. Pensando Policy Service Manager (PSM). Pensando Secure Web Gateway. Pensando IDS/IPS. Pensando Threat Analytics Engine.

Which deployment best practice should be followed when installing Fabric Composer?. Use a dedicated VLAN for management traffic. Deploy Fabric Composer on a shared virtualized environment. Allow unrestricted API access from any IP. Install Fabric Composer on a Layer 2 switch.

Which network service is required for the Fabric Composer installation process?. Dynamic Host Configuration Protocol (DHCP). Network Time Protocol (NTP). Lightweight Directory Access Protocol (LDAP). Domain Name System (DNS).

Which network connectivity option is recommended for high availability Fabric Composer deployment?. Single network interface with DHCP. Redundant links with link aggregation. USB-based network adapter. IPv6-only network connectivity.

Which step is required before deploying Fabric Composer from an ISO file?. Format the disk using NTFS. Configure RAID 5 storage. Assign static IP settings. Enable VLAN tagging on all interfaces.

How does Fabric Composer improve network automation?. By using software-defined networking (SDN) principles. By replacing all existing network controllers. By enforcing hardware-based security policies only. By limiting dynamic network adjustments.

Which database does Fabric Composer use for storing configuration data?*. MySQL. PostgreSQL. Cassandra. MongoDB.

What should be configured during the initial setup of Fabric Composer? (Select two.). Management IP address. Administrator password. Firewall rules for web filtering. Endpoint detection system.

What type of traffic does Fabric Composer manage in an Aruba CX 10000 environment?. Only north-south traffic. Only east-west traffic. Both north-south and east-west traffic. Only encrypted traffic.

Which protocol is used by Fabric Composer for automated device discovery?. LLDP. STP. BGP. DHCP.

Which license type is required for full Fabric Composer functionality?. Foundation License. Standard License. Advanced License. Enterprise License.

Which feature is only available with an Enterprise License for Fabric Composer?. Basic network monitoring. Distributed firewalling policies. Multi-site management and orchestration. Role-based access control.

Which license is required to enable Pensando DSC-based security services on CX 10000?. Basic Firewall License. Zero Trust License. Security Services License. Data Protection License.

What happens if a Fabric Composer license expires?. The entire system stops working. Only basic networking functions remain operational. Security policies are automatically disabled. All switch configurations are lost.

How is Fabric Composer licensing typically managed?. Perpetual licensing model. Subscription-based model. One-time activation key. Free for all users.

What is the recommended minimum storage size for Pensando PSM deployment?. 50GB. 100GB. 200GB. 500GB.

Which storage format should be used for the Pensando PSM installation?. Ext4. FAT32. NTFS. ZFS.

Which storage redundancy method is recommended for Pensando PSM?. RAID 0. RAID 1. RAID 5. RAID 10.

What is a critical factor when designing data retention policies for Pensando PSM?. Storage capacity and logging frequency. Number of network interfaces. Type of firewall rules configured. VLAN configuration.

Which method ensures high availability for Pensando PSM storage?. Single-disk deployment. External USB backup. Clustered storage with replication. Cloud-only backup.

What is the benefit of enabling log compression in Pensando PSM?. Reduces storage consumption. Increases logging speed. Improves log accuracy. Enhances firewall rule enforcement.

Which network service is critical for Pensando PSM storage management?. DHCP. NTP. Syslog. DNS.

Which storage type is preferred for Pensando PSM deployments in high-performance environments?. HDD. NVMe SSD. SATA SSD. USB storage.

Which action should be taken to prevent log overflow in Pensando PSM?. Reduce network traffic. Implement a log rotation policy. Disable firewall logging. Increase the number of CPU cores.

Denunciar Test