Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

HPE7-A08 Questions and Answers

Question # 6

You have attempted to configure DHCP snooping, but it is not working as expected. Based on the output below, what do you need to configure?

A.

Configure an authorized DHCP server

B.

Configure a DHCP trusted interface

C.

Enable dhcpv4-snooping on VLAN 100

D.

Enable dhcpv4-snooping globally

Full Access
Question # 7

You are reviewing the configuration of a VSX LAG and have noticed the command LACP fallback. Why might this have been configured?

A.

For operation using a single partner LACP interface.

B.

For backward compatibility with LACP v1.

C.

To support provisioning a gateway without LACP.

D.

To allow operation with active or passive LACP.

Full Access
Question # 8

Company A has an existing HPE Aruba Networking CX 8325 VSX. It has acquired Company B and must merge its networks onto the same VSX switch configuration as Company A. Both Company A and Company B share the same 10.100.100.1/21 subnet.

What is the correct order for creating a configuration allowing overlapping networks in the setup?

Full Access
Question # 9

Refer to the partial exhibit from HPE Aruba Networking CX 8325:

If a new CX 8325 is to be deployed, which switch profile should be used to provide gateway and routing services?

A.

L3-core profile should be selected instead of the factory default

B.

Spine profile should be used, which is the factory default

C.

Leaf profile should be selected instead of the factory default

D.

The L3-apg profile should be selected instead of using the factory default

Full Access
Question # 10

You are remotely connected to an HPE Aruba Networking CX 6200F switch using SSH to change the Control Plane ACL, allowing only defined subnets to access the switch. Which AOS-CX command allows you to roll back your change if the ACL change is wrongly formed and you can no longer log in to the switch?

A.

Use the checkpoint commit command after you commit the change.

B.

Use the checkpoint auto command before you commit the change.

C.

Use the checkpoint auto command after you commit the change.

D.

Use the checkpoint commit command before you commit the change.

Full Access
Question # 11

You need to configure BGP on an HPE Aruba Networking switch using AS 65010. What is required when establishing peering with neighboring devices using eBGP that are not directly connected?

A.

Use of next-hop-self

B.

Use of ebgp-multihop

C.

Use of route-reflector

D.

Use of address-family ipv4 external

Full Access
Question # 12

Your customer has an existing gateway cluster that they are using to tunnel traffic from APs and would like to configure the same for their CX switches. Which tunneling option should you recommend?

A.

UBT

B.

IPSec

C.

GRE

D.

VNBT

Full Access
Question # 13

An HPE Aruba Networking CX switch is configured with IGMP using the given output:

Which statement is true about the possible supported message types?

A.

Leave and Report

B.

Join, Leave, Query and Report

C.

Query and Report

D.

Join and Query

Full Access
Question # 14

Refer to the exhibit:

The customer would like to utilize Dynamic Segmentation for wired users in Building B. Which statement is true about the scenario?

A.

The CX 6100 switches need to have a GRE tunnel to the HPE Aruba Networking 9200.

B.

The CX 6100 switches need to have a static VXLAN tunnel to the HPE Aruba Networking CX 8325.

C.

The CX 6100 switches would need to be replaced with CX 6300 models.

D.

The CX 6100 switches need to have the CX Advanced license applied to support the requirement.

Full Access
Question # 15

Which statement is valid when enabling ARP protection features on HPE Aruba Networking CX switches?

A.

Once you enable DHCP snooping, you can enable ARP protection, and you will have full information to mitigate security risks.

B.

In an active network, you should generally wait at least a week after enabling DHCP snooping to enable ARP protection.

C.

Client lease time on the DHCP server should be at least 3600s before enabling ARP protection.

D.

DHCP server utilization is required for IP to MAC binding to enable ARP protection.

Full Access
Question # 16

Refer to the exhibit:

Both switches, Core-1 and Core-2, are configured with default spanning-tree priorities. Both switches appear as primary root bridges. What must be done to have only one spanning tree domain?

A.

Create MST instances 1 and 2 on Core-2.

B.

Create matching MST configuration on Core-2.

C.

Set the spanning tree priority to 1 on Core-1.

D.

Set the spanning tree priority to 1 on Core-2.

Full Access
Question # 17

You are planning a 1 Gbps link between two CX switches. Which type of SFP port will be required?

A.

SFP28

B.

SFP+

C.

SFP

D.

QSFP+

Full Access
Question # 18

Refer to the exhibit:

A senior network architect has created the configuration above. You are implementing the setup in Building A and C. The actual fiber distance between the building locations is 200m / 656ft utilizing OM4 cabling.

What needs to be changed in the configuration based on the actual environmental conditions to complete the installation and 7 other CX 6300 VSF stack connections in the future?

A.

Replace the 25GR optics with 10SR

B.

Replace the 25GR optics with 25LR

C.

Replace the 25GR optics with 10LR

D.

Replace the 25GR optics with 25SR

Full Access
Question # 19

A customer wants to prevent 'man-in-the-middle' attacks based on Layer 2 addressing. What will help address that concern?

A.

Enable ARP inspection in the VLAN interface context

B.

Enable ARP inspection in the VLAN context

C.

Enable ARP inspection in the global context

D.

Enable ARP inspection in interface-level context

Full Access
Question # 20

Your company needs to run BGP in a multi-homed configuration to two ISPs, advertising a block of public address space you own. Which AS number would be an example of a suitable number?

A.

64813

B.

63472

C.

65535

D.

65218

Full Access
Question # 21

A multicast configuration on an HPE Aruba Networking CX 6300 VSF is used for a group address 239.0.0.1. The configuration is having issues, and the video streaming clients are not receiving the stream.

What would be a possible root cause for the problems experienced?

A.

The IGMP-snooping is using version 2 configured for the SVI.

B.

The selected multicast address will overlay with Link-Local Multicast address scope.

C.

The selected multicast address will overlay with PIM-SM discovery address.

D.

The IGMP is enabled on the VLANs without any multicast traffic.

Full Access
Question # 22

Your customer's CISO would like to deploy colorless ports across the network. Which will you need to configure to meet this requirement?

A.

VRRP

B.

VNBT

C.

VSF

D.

VRF

Full Access