An architect is writing a response to a Request for Proposal (RFP). The customer has requested financial information on the monetary amount by which assets are valued in business records.
Which value does the architect need to consider?
A. total cost of acquisition (TCA)
B. net investment value (NIV)
C. net book value (NBV)
D. fair market value (FMV)
An architect is designing a data center solution that contains an HPE BladeSystem for the virtual application, infrastructure, and VDI environment. It also contains an HPE Moonshot for the web servers.
In which parts of the HPE Transformation Area does this solution fit?
A. empower and protect
B. transform and empower
C. enable and empower
D. transform and protect
A customer is considering upgrading from a BL460c Gen8 to a BL460c Gen9 server. The customer needs to retain the ESXI V5.5 boot volumes and enable UEFI secure boot mode on the new BL460c Gen 9 server.
What should the architect explain to the customer?
A. The ESXI V5.5 volume will not boot in UEFI mode.
B. The server must be configured to support GPT boot drives.
C. ESXI V5.5 needs to be patched up to ESXI V6.
D. Secure boot mode must be enabled and certificate installed.
1.A customer has a Hadoop big data and analytics solution. The customer needs a server upgrade to improve performance for this solution and plans to add more solutions that draw on the data, such as a Cassandra NoSQL database. The customer is interested in a flexible HPE Big Data Reference Architecture approach.
Which solution meets the customer’s needs?
A. HPE Moonshot 1500 Systems with m700 cartridges for co-located compute and storage nodes
B. HPE Apollo 4530 Systems for co-located compute and storage nodes
C. HPE Apollo 8000 Systems for the compute nodes and HPE Superdome X Systems for the storage nodes
D. HPE Moonshot 1500 Systems with m710 cartridges for the compute nodes and HPE Apollo 4200 Systems for the storage nodes
A customer has an HPE Integrity Superdome X system with an nPartition that has been provisioned with a supported OS and application.
What first detects data corruption caused by an installed DIMM module?
A. the XNC2 controller in the internal fabric
B. the application using the data
C. the OS installed on the nPartition
D. the Superdome X firmware
An architect is proposing a solution that has two HPE Moonshot 1500 chassis, each of which is full of m700 cartridges. The customer needs the solution to quickly deploy the OS to cartridges, back up a golden node image. and clone the image.
The customer is concerned about cost and is not interested in managing or monitoring performance of the solution,
Which solution meets these requirements?
A. HPE Insight Cluster Management Utility (CMU)
B. HPE Intelligent Provisioning (IP)
C. HPE OneView 2.0
D. HPE InsightControl server provisioning (ICsp)
A customer plans to purchase some c7000 blade enclosures equipped with Virtual Connect FlexFabric modules to support its development and test team. The customer is concerned about frequent changes to the server blade connectivity. In the initial proposal, an architect included HPE OneView, and now the customer wants to learn how HPE OneView will address their concern.
Which HPE OneView functionality should the architect explain to the customer?
A. all external connectivity changes will be automatically discovered and server profiles will be automatically updated to reflect the change.
B. the customer can use different plugins to visualize network and storage connectivity, and change them by using the drag and drop method.
C. the customer can create profile templates, deploy server profiles from the template, and, if necessary, use the same method to update server connectivity.
D. the customer can access HPE Virtual Connect Enterprise Manager and perform connectivity changes for all servers in the same Virtual Connect Domain Group.
A customer’s Gen9 web server resides behind a firewall.
What is the most secure and efficient method to monitor this server?
A. Use Intelligent Provisioning.
B. Use Agentless Management.
C. Create Firewall rules and install System Management Homepage in Protected Mode.
D. Create Firewall rules and install WBEM.
An architect finds several vulnerabilities with a customer’s digital enterprise that could lead to data loss on a third-party storage system for critical business segments.
Which solution should the architect propose to help the customer to protect their digital enterprise?
A. an HPE StoreOnce solution configured to take backups of the critical data from the third-party storage
B. an HPE StoreAll solution configured to migrate the critical data to object-based storage
C. an HPE StoreVirtual solution configured as a secondary node to replicate the critical data on the third-party storage
D. an HPE 3PAR StoreServ solution configured to peer persistence with the third-party storage to protect the critical data