What must be allowed through a firewall located at the HQ site to ensure master and local controller communication?

A network has one master controller and two local controllers. The local controllers are located in remote branch offices with a WAN link to the HQ site. The master controller is located at the HQ site. There are 802.1X employee and captive portal guest SSIDs supported on APs in both...

March 22, 2019 No Comments READ MORE +

Which of the HPE Transformation Areas should the architect discuss when the customer’s concerns span backup and recovery, high availability, and disaster recovery?

Which of the HPE Transformation Areas should the architect discuss when the customer’s concerns span backup and recovery, high availability, and disaster recovery?A . Transform to a hybrid infrastructure.B . Empower the data-driven organization.C . Protect the digital enterprise.D . Enable workplace productivity.View AnswerAnswer: C

March 22, 2019 No Comments READ MORE +

supported on this device?

A tablet is a single stream client with one radio and one antennA. What 802.11 features is definitely not supported on this device? A. MIMO (Multiple-Input/Multiple-Output) B. DRS (Dynamic Rate Switching) C. Authentication D. AssociationView AnswerAnswer: A

March 22, 2019 No Comments READ MORE +

Which tool is used to capture inputs for the IBM virtual tape library performance tool?

A customer wants to replace a physical tape environment with a virtual tape library in its open systems environment and is concerned about performance. The solution architect needs to validate performance requirements for a proposed solution. Which tool is used to capture inputs for the IBM virtual tape library performance...

March 22, 2019 No Comments READ MORE +

Which solution should the architect propose to protect the customer from this threat?

A customer requests a proposal for an HPE Apollo 4530 system. The customer reports that it has experienced problems in the past with boot time malware attacks within its environment. Which solution should the architect propose to protect the customer from this threat?A . Use encrypted drives.B . Use Smart...

March 22, 2019 No Comments READ MORE +

What are the two most important certificates in communicating with other devices/entities?

Session Manager uses five unique certificates for TLS connections. What are the two most important certificates in communicating with other devices/entities? (Choose two.)A . SIP certificatesB . Sal Agent certificatesC . WebSphereD . HTIPS certificatesE . Management certificatesView AnswerAnswer: A,E

March 22, 2019 No Comments READ MORE +

What is a selection criterion that applies to DIY?

As a cloud architect you are working with an organization to choose between a DIY or packaged PaaS Solution. What is a selection criterion that applies to DIY?A . Has a higher cost of licensing and supportB . Is a more stable platformC . Has built-in governance policiesD . Supports...

March 22, 2019 No Comments READ MORE +

Which three products comprise the Collaboration Bundle? (Choose three.)

Which three products comprise the Collaboration Bundle? (Choose three.)A . Avaya Session Border Controller for Enterprise (SBCE).B . Avaya Aura® Media Server (AAMS).C . Avaya Scopia SolutionD . Avaya Aura® Conferencing (AAC)E . Avaya Aura® Application Enablement ServicesView AnswerAnswer: B, C, D

March 22, 2019 No Comments READ MORE +

Knowing the language in which an encrypted message was originally produced might help a cryptanalyst to perform a

Knowing the language in which an encrypted message was originally produced might help a cryptanalyst to perform aA . clear-text attack.B . known cipher attack.C . frequency analysis.D . stochastic assessment.View AnswerAnswer: C

March 22, 2019 No Comments READ MORE +