Question 161: What does HPE GreenLake Central bring to the GreenLake program?
A. Unified cloud-like experience for all applications and data
B. More control over GreenLake systems
C. Deeper insights into their workloads
D. Continuous monitoring
E. All of the above
F. None of the above
Correct Answer: E. All of the above
Explanation: GreenLake Central is an online service that provides a centralized portal for managing and optimizing on-premises GreenLake systems. By offering insight into an organization’s hybrid cloud environment, GreenLake Central, in essence, delivers an integrated management control plane across GreenLake program customers’ entire hybrid IT estate. GreenLake Central does this by delivering point-and-click access to both high-level and detailed views of data center, edge environment and public cloud costs, capacity, consumption and compliance information.
Question 162: True or false: HPE tailors the GreenLake Central portal experience to specific roles.
A. True
B. False
Correct Answer: A. True
Explanation: By tailoring access to specific roles within an organization, the GreenLake Central portal gives users quick and easy access to only the information and tools they need. IT professionals can monitor a range of KPIs, for example, while DevOps teams provision, monitor and manage workloads, data stewards view governance and compliance data and details, and CFOs can access real-time information about technology spending overall and across their organization by users, teams or business units.
Question 163: What two methods can be used to construct device templates?
A. CLI
B. Feature templates
C. Directly on the device
D. Multiple CLI Templates
E. Both A and B
F. Both B and D
Correct Answer: E. Both A and B
Explanation: Device templates can either use feature templates or CLI templates, but not a mixture of both. When a CLI template is used, it must be the full configuration of the device.
Question 164: What are the three device value types that can be used with feature templates?
A. Global
B. Default
C. Automatic
D. Imported
E. Variables
F. A, C and D
G. A, B and E
Correct Answer: G. A, B and E
Explanation: Feature templates have three different types of values that can be set. When global is used, the value of that field will be the same wherever that template is applied. The default value will use whatever the default value is for the field. Variables allow the network administrator the flexibility to set a parameter on a per-device basis, without the need for an additional template.
Question 165: Device templates support multiple different device types.
A. True
B. False
Correct Answer: B. False
Explanation: Device templates are specific to certain device types. Separate device templates will need to be used for different product versions.
Question 166: CLI templates can be used in a modular format and achieve the same flexibility of feature templates.
A. False
B. True
Correct Answer: A. False
Explanation: CLI templates do not provide the same flexibility as feature templates. A CLI template must contain the full CLI configuration.
Question 167: Which automatic provisioning method uses HTTPS for communication?
A. Plug and Play
B. Zero Touch Provisioning
C. NAT traversal
Correct Answer: A. Plug and Play
Explanation: The Plug and Play process uses HTTPS for communication to the PnP server.
Question 168: Which three things must a device have for automatic provisioning to be successful?
A. IP address and DNS server via DHCP
B. Be able to resolve ZTP/PNP domain name
C. Connectivity to ZTP or PNP server
D. IPsec tunnel
E. Connectivity to data center
F. A, D and E
G. A, B and C
Correct Answer: G. A, B and C
Explanation: For automatic provisioning to be successful, a device must receive an IP address and DNS server via DHCP. Once the device has this information, it needs to be able to resolve ztp.viptela.com or devicehelper.cisco.com and have connectivity to them.
Question 169: IoT edge computing is processing raw data at the boundaries of the network, as far away from the points of data creation as possible.
A. True
B. False
Correct Answer: B. False
Explanation: IoT edge computing is processing data where it is created or as close as possible, which, in this case, is at the edge of a network. In the case of IoT deployments, the data can be processed on the devices themselves or on edge gateways. IT pros may also come across the term fog computing and still debate whether it is the same thing as edge computing. Some pros distinguish fog computing as taking place in processing areas such as gateways, not at the machines creating the data nor in the cloud. Tied to this definition of fog computing, IT pros would define edge computing more narrowly as data processing that takes place directly on the machines creating the data.
Question 170: Which of the following is a challenge of IoT edge computing?
A. Increased security risks
B. Inconsistent industry standards and regulations
C. Lack of support for new devices
D. All of the above
Correct Answer: D. All of the above
Explanation: IoT deployments typically spread beyond traditional IT infrastructure, which creates more entry points for a cyberattack. The lack of IoT standards not only makes management of IoT devices on the edge more difficult for administrators, it also make them vulnerable. When IoT developers design devices with different communication protocols or even operating systems, administrators will have trouble applying updates across the board. In addition to the spread of IoT devices, the number of IoT devices is also growing, making it even more vital that administrators have a way to keep track of all devices. Without knowing what devices are in use and how much data is collected and transmitted, edge computing can cause security risks and create latency issues. Although security can open more opportunities for malicious acts, there are also aspects of edge computing that make it more secure than sending and keeping data in a centralized cloud.