11.11 Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Enterprise > 300-415

300-415 Implementing Cisco SD-WAN Solutions (300-415 ENSDWI) Question and Answers

Question # 4

What is the main purpose of using TLOC extensions in WAN Edge router configuration?

A.

creates hardware-level transport redundancy at the local site

B.

creates an IPsec tunnel from WAN Edge to vBond Orchestrator

C.

transports control traffic to a redundant vSmart Controller

D.

transports control traffic w remote-site WAN Edge routers

Full Access
Question # 5

A large retail organization decided to move some of the branch applications to the AWS cloud. How does the network architect extend the in-house Cisco SD-WAN branch to cloud network into AWS?

A.

Create virtual WAN Edge devices Cloud through the AWS online software store

B.

Create virtual instances of vSmart Cloud through the AWS online software store

C.

Create GRE tunnels to AWS from each branch over the Internet

D.

Install the AWS Cloud Router in the main data center and provide the connectivity from each branch

Full Access
Question # 6

Refer to the exhibit, which configuration configures IPsec tunnels in active and standby?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 7

Drag and drop the actions from the left into the correct sequence on the right to create a data policy to direct traffic to the Internet exit.

Full Access
Question # 8

Refer to the exhibit Which configuration must the engineer use to form underlay connectivity for the Cisco SD-WAN network?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 9

An engineer must configure two branch WAN Edge devices where an Internet connection is available and the controllers are in the headquarters. The requirement is to have IPsec VPN tunnels established between the same colors. Which configuration meets the requirement on both WAN Edge devices?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 10

Refer to the exhibit. Which configuration ensures that OSPP routes learned from Site2 are reachable at Stein and vice-versa?

A.

B.

C.

Full Access
Question # 11

Refer to the exhibit. An enterprise decides to use the Cisco SD-WAN Cloud onRamp for SaaS feature and utilize H.Q site Biz iNET to reach SaaS Cloud for branch C. currently reaching SaaS Cloud directly. Which role must be assigned to devices at both sites in vManage Cloud Express for this solution to work?

A.

H.Q to be added as Gateway and Branch as DIA.

B.

Branch to be added as Client Sites and H.Q as DIA.

C.

Branch to be added as DIA and H.Q as Client Site.

D.

H.Q to be added as Gateway and Branch as Client Site.

Full Access
Question # 12

An engineer is adding a tenant with location ID 399533345 in vManage. What is the maximum number of alphanumeric characters that is accepted in the tenant name filed?

A.

64

B.

128

C.

256

D.

8

Full Access
Question # 13

Which feature builds transport redundancy by using the cross link between two redundant WAN Edge routers?

A.

OMP

B.

zero-touch provisioning

C.

quality of service

D.

TLOC extension

Full Access
Question # 14

Which two advanced security features are available on the Cisco SD-WAN WAN Edge (vEdge) device? (Choose two.)

A.

URL filtering

B.

snort intrusion prevention system

C.

Cisco Umbrella DNS Security

D.

Cisco AMP and AMP Threat Grid

E.

Enterprise Firewall

Full Access
Question # 15

Refer to the exhibit. Company ABC has a hub-and-spoke topology in place and currently is load balancing their data traffic at the hub site over MPLS and the public Internet. The leased circuit must be preferred over the shared circuit. Which configuration meets the requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 16

An engineer must advertise OSPF-learned routes and modify the update interval for route filtering by TLOC color to 300 on an SD-WAN device. Which configuration accomplishes this

task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 17

Refer to the exhibit. A user in the branch is connecting to Office 365 for the first time. Over which path does the branch WAN Edge router traffic follow?

A.

routing table of the branch WAN Edge router

B.

DIA exit of the branch WAN Edge router

C.

forwarded to the gateway site

D.

dropped because the minimum vQoE score has not been met

Full Access
Question # 18

What is the ZTP workflow for Cisco IOS XE-based devices?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 19

Refer to the exhibit The network team must configure ElGRP peering at HQ with devices in the service VPN connected to WAN Edge CSRv. CSRv is currently configured with

Which configuration on the WAN Edge meets the requiremnet

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 20

Which two virtualized environments are available for a company to install the controllers using the on-premises model? (Choose two )

A.

VMware vSphere ESXi

B.

VMware Workstation

C.

kernel-based virtual machine

D.

OpenStack

E.

Microsoft Hyper-V

Full Access
Question # 21

How is the software managed in Cisco SD-WAN?

A.

Software images must be uploaded to vManage through HTTP or FTP

B.

Software downgrades are unsupported for vManage

C.

Software images must be transferred through VPN 512 or VPN 0 of vManage

D.

Software upgrade operation in the group must include vManage. vBond, and vSmart.

Full Access
Question # 22

Refer to the exhibit. A network administrator is configuring OSPF advanced configuration parameters from a template using the vManager GUI for a branch WAN Edge router to calculate the cost of summary routes to an ASBR. Which action achieves this configuration?

A.

Enable Originate.

B.

Disable Originate.

C.

Enable RFC 1583 Compatible.

D.

Disable RFC 1583 Compatible.

Full Access
Question # 23

Which SD-WAN component is configured to enforce a policy to redirect branch-to-branch traffic toward a network service such as a firewall or IPS?

A.

vBond

B.

WAN Edge

C.

vSmart

D.

Firewall

Full Access
Question # 24

An engineer is configuring a data policy for packets that must be captured through the policy. Which command accomplishes this task?

A.

policy > data-policy > vpn-list > sequence > default-action > drop

B.

policy > data-policy > vpn-list > sequence > action

C.

policy > data-policy > vpn-list > sequence > default-action > accept

D.

policy > data-policy > vpn-list > sequence > match

Full Access
Question # 25

What does forward error correction addresses in Cisco SO-WAN?

A.

inefficient traffic forwarding caused oy inbound shapers

B.

reduced application performance degradation rotated to service degradation

C.

applications with occasional invalid data input and poor performance

D.

traffic flows with increased delay over a particular transport

Full Access
Question # 26

Refer to the exhibit.

The Cisco SD-WAN network is configured with a default full-mesh topology. An engineer wants Paris WAN Edge to use the Internet HOC as the preferred TLOC for MSN Messenger and AOL Messenger traffic. Which policy achieves this goal?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 27

An enterprise deployed a Cisco SD-WAN solution with hub-and-spoke topology using MPLS as the preferred network over the Internet. A network engineer must implement an application-aware routing policy to allow ICMP traffic to be load-balanced over both the available links. Which configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 28

Drag and drop the attributes from the left that make each transport location unique onto the right. Not all options are used.

Full Access
Question # 29

When VPNs are grouped to create destination zone in Zone-Based Firewall, how many zones can a single VPN be part of?

A.

two

B.

four

C.

one

D.

three

Full Access
Question # 30

What is a benefit of the application aware firewall feature in the Cisco SD-WAN solution?

A.

application monitoring

B.

application malware protection

C.

application visibility

D.

control policy enforcement

Full Access
Question # 31

Which alarm setting is configured to monitor serious events that affect but do not shut down, the operation of a network function?

A.

Minor

B.

Major

C.

Medium

D.

Critical

Full Access
Question # 32

A customer has MPLS and Internet as the TLOC colors An engineer must configure conlroJIers with the Internet and not with MPLS Which configuration achieves this requirement on vManage?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 33

Which two criteria ate supported to filter traffic on a Cisco Umbrella Cloud-delivered firewall? (Choose two )

A.

tunnels

B.

site ID

C.

URL

D.

geolocation

E.

protocol

Full Access
Question # 34

Which multicast component is irrelevant when defining a multicast replicator outside the local network without any multicast sources or receivers?

A.

PIM interfaces

B.

TLOC

C.

overlay BFD

D.

OMP

Full Access
Question # 35

A policy is created to influence routing in the network using a group of prefixes. What policy application will achieve this goal when applied to a site list?

A.

Vpn-membership policy

B.

Control-policy

C.

cflowd-template

D.

App-route policy

Full Access
Question # 36

Which policy blocks TLOCs from remotes and allows TLOCs from the data center to form hub-and-spoke peering?

A.

localized control policy

B.

localized data policy

C.

centralized data policy

D.

centralized control policy

Full Access
Question # 37

Refer to the exhibit.

An enterprise has hub and spoke topology where it has several VPNs. An engineer must allow users in VPN91 to reach users in VPN92 and VPN10 to reach VPN91 and VPN92. Which configuration meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 38

How are policies deployed on cloud-tiosted Cisco SD-WAN controllers?

A.

Policies are created on vSmart and enforced by vSmart

B.

Policies are created on vSmart and enforced by vManage

C.

Policies are created on vManage and enforced by vManage.

D.

Policies are created on vManage and enforced by vSman

Full Access
Question # 39

Which two platforms for the Cisco SD-WAN architecture are deployable in a hypervisor on-premises or in IAAS Cloud? (Choose two.)

A.

CSR 1000v

B.

vEdge 100c

C.

vEdge Cloud

D.

vEdge 2000

E.

ISR 4431

Full Access
Question # 40

Refer to the exhibit Which configuration ensures that OSPF routes learned from Site2 are reachable at Sitel and vice-versa?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 41

Refer to the exhibit.

Which shaping-rate does the engineer use to shape traffic at 9 Mbps?

A.

9

B.

9000

C.

90000

D.

9000000

Full Access
Question # 42

Refer to the exhibit.

Customer XYZ cannot provison dual connectivity on both Its routers due to budget constratnts but wants to use tnth RI and R2 interface for users behind them for load toward the hub site Which configurauon achieves this objectives?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 43

Drag and drop the alarm states from the left onto the corresponding alarm descriptions on the right.

Full Access
Question # 44

How is lhe software managed in Cisco SD-WAN?

A.

Software upgrade operation in the group must include vManage. vBond. and vSmart.

B.

Software downgrades are unsupported for vManage

C.

Software images must be uploaded to vManage through HTTP or FTP.

D.

Software images must be transferred through VPN 512 or VPN 0 of vManage.

Full Access
Question # 45

Drag and drop the definitions from the left to the configuration on the right.

Full Access
Question # 46

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

A.

A domain is nonexistent.

B.

A domain is block-listed.

C.

A domain is locally reachable.

D.

A domain is grey-listed.

Full Access
Question # 47

An engineer creates this data policy for DIA for VPN 10:

Which policy sequence enables DIA for external networks?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 48

Which two metrics must a cloud Edge router use to pick the optimal path for a SaaS application reachable via a gateway site? (Choose two.)

A.

HTTP loss and latency metrics to the SaaS application

B.

ICMP loss and latency metrics to the SaaS application

C.

BFD loss and latency metrics to the gateway site

D.

BFD loss and latency metrics to the SaaS application

E.

HTTP loss and latency metrics to the gateway site

Full Access
Question # 49

Which port is used for vBond under controller certificates if no alternate port is configured?

A.

12345

B.

12347

C.

12346

D.

12344

Full Access
Question # 50

What are two benefits of installing Cisco SD-WAN controllers on cloud-hosted services? (Choose two.)

A.

utilizes well-known cloud services such as Azure. AWS. and GCP

B.

accelerates Cisco SD-WAN deployment

C.

allows integration of the WAN Edge devices In the cloud

D.

installs the controllers in two cloud regions in a primary and backup setup

E.

automatically Implements zone-based firewalling on the controllers

Full Access
Question # 51

On which device is a service FW address configured to Insert firewall service at the hub?

A.

vEdge at the branch

B.

vSmart at the hub

C.

vEdge at the hub

D.

vSmart at the branch

Full Access
Question # 52

A voice packet requires a latency of 50 msec. Which policy is configured to ensure that a voice packet is always sent on the link with less than a 50 msec delay?

A.

centralized control

B.

localized data

C.

localized control

D.

centralized data

Full Access
Question # 53

An organization wants to discover monitor and track the applications running on the WAN Edge device on the LAN Which configuration achieves this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 54

Which platform cannot provide IPS and URL filtering capabilities?

A.

Cisco CSR 1000V

B.

Cisco ISR 1000

C.

Cisco Catalyst 8300

D.

Cisco ISR 4000

Full Access
Question # 55

How is TLOC defined?

A.

It is represented by a unique identifier to specify a site in as SD-WAN architecture.

B.

It specifies a Cisco SD-WAN overlay in a multitenant vSMART deployment.

C.

It is a unique collection of GRE or iPsec encapsulation, link color, and system IP address.

D.

It is represented by group of QoS policies applied to a WAN Edge router.

Full Access
Question # 56

Refer to exhibit. An engineer is troubleshooting tear of control connection even though a valid CertificateSerialNumber is entered. Which two actions resolve Issue? (Choose two)

A.

Restore network reachability on the controller.

B.

Enter a valid serial cumber on the controller for a given device

C.

Enter a valid product ID (mode) on the PNP portal.

D.

Match the serial number file between the controller

E.

Remove the duplicate IP in the network

Full Access
Question # 57

Refer to the exhibit.

A customer wants to implement primary and secondary Cisco SD-WAN overlay routing for prefixes that are advertised for both data centers. The east data center (TLOC 101.101.101.101) is primary for east sites, and the west data center (TLOC 100.100.100.100) is primary for west sites. Which configuration change achieves this objective?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 58

What is a key element used in a vBond Orchestrator redundancy topology?

A.

fully qualified domain name

B.

DHCP server

C.

load-balancer with health probes

D.

stun server

Full Access
Question # 59

Refer to the exhibit An engineer must configure a QoS policy between me hub and site A (spoke) over a standard internet circuit where traffic shaping is adjusted automatically based on evaiiabk» bandwidth Which configuration meets the requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 60

Which action is performed during the onboarding process when a WAN Edge router is connected to ZTP server ztp.viptela com?

A.

The router is connected to WAN Edge Cloud Center

B.

The router is synced with vSmart Controller via an IPsec tunnel

C.

The router receives its vBond Orchestrator information

D.

The router is connected 10 vSmart Controller via a DTLSTLS tunnel

Full Access
Question # 61

Drag and drop the Cisco SD-WAN components from the left onto their functions on the right.

Full Access
Question # 62

Which Cisco SD-WAN WAN Edge platform supports LTE and Wi-Fi?

A.

vEdge2000

B.

ASR1001

C.

CSR 1000v

D.

ISR 1101

Full Access
Question # 63

What problem happens on a device with two serial numbers, a unique device identifier (UDI), and secure unique device identifier (SUDI) when an engineer provisions ISR 4000 by PnP using only a UDI?

A.

It encounters spanning tree issues

B.

It faces interface buffer overflow patterns

C.

It encounters redirection problems.

D.

It encounters memory overload problems

Full Access
Question # 64

An engineer is tasked to improve throughput for connection-oriented traffic by decreasing round-trip latency. Which configuration will achieve this goal?

A.

turn on "Enable TCP Optimization"

B.

turn off "Enhance ECMP Keying"

C.

turn off "Enable TCP Optimization"

D.

turn on "Enhance ECMP Keying"

Full Access
Question # 65

An enterprise has these three WAN connections:

public Internet

business internet

MPLS

An engineer must configure two available links to route traffic via both links. Which configuration achieves this objective?

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 66

How many vManage NMSs should be installed in each domain to achieve scalability and redundancy?

A.

two instances

B.

two clusters

C.

three or more in a cluster

D.

two or more in a cluster

Full Access
Question # 67

An engineer must avoid routing loops on the SD-WAN fabric for routes advertised between data center sites Which BGP loop prevention attribute must be configured on the routers to meet this requirement?

A.

same OMP overlay-as on WAN Edge routers of all data centers

B.

static routing on al WAN Edge routers instead of BGP

C.

same BGP AS between all WAN Edge routers and CE routers

D.

same BGP AS between all CE and PE routers

Full Access
Question # 68

Which SD-WAN devices require multicast PIM and IGMP configurations when setting up SD-WAN multicast?

A.

branch devices with multicast receivers

B.

branch devices with unicast traffic

C.

data center replicator devices

D.

data center devices with multicast sources

Full Access
Question # 69

An administrator is configuring the severity level on the vManage NMS for events that indicate that an action must be taken immediately. Which severity level must be configured?

A.

warning

B.

error

C.

critical

D.

alert

Full Access
Question # 70

What is the behaviour of vBond orchestrator?

A.

It maintains vSmart and WAN Edge routers secure connectivity state

B.

it builds permanent connections with vSmart controllers

C.

it updates vSmart of WAN Edge routers behind NAT devices using OMP.

D.

It builds permanent connections with WAN Edge routers

Full Access
Question # 71

Which Cisco SD-WAN configuration provides the advantages of day-zero deployment and reusable configuration components?

A.

CLI-based templates

B.

configuration groups

C.

configuration via the vBond controller

D.

configuration through a Cisco Prime server

Full Access
Question # 72

Refer to the exhibit.

Which command-line configuration on a WAN Edge device achieves these results?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 73

Which percentage for total memory or total CPU usage for a device is classified as normal in the WAN Edge Health pane?

A.

more than 80 percent usage

B.

less than 70 percent usage

C.

between 70 to 90 percent usage

D.

more than 90 percent usage

Full Access
Question # 74

What are the two protocols redistributed into OMP? (Choose two.)

A.

OSPF

B.

RIP

C.

LDP

D.

RSVP

E.

EIGRP

Full Access
Question # 75

What is the default value (in milliseconds) set tor the poll interval in the BFD basic configuration?

A.

300,000

B.

600,000

C.

900,000

D.

1,200,000

Full Access
Question # 76

An engineer is creating a policy for VPN1 users. Their scavenger traffic at site 101 must pass through a firewall. Which two match conditions must be selected to enable this policy? (Choose two.)

A.

destination port

B.

source data prefix

C.

packet length

D.

protocol

E.

application/application family list

Full Access
Question # 77

Which device in the SD- WAN solution receives and categorizes event reports, and generates alarms?

A.

WAN Edge routers

B.

vSmart controllers

C.

vManage NMS

D.

vBond controllers

Full Access
Question # 78

Which component of the Cisco SD-WAN secure extensible network provides a single pane of glass approach to network monitoring and configuration?

A.

APIC-EM

B.

vSmart

C.

vManage

D.

vBond

Full Access
Question # 79

Which value is verified in the certificates to confirm the identity of the physical WAN Edge device?

A.

Serial Number

B.

OTP

C.

System-IP

D.

Chassis-ID

Full Access
Question # 80

What is the advantage of instating the controller on-premises?

A.

ease of deployment and management

B.

full control of the data piano and the control plane

C.

automatic geographical redundancy and security

D.

scalability and a cost-saving

Full Access
Question # 81

An administrator must deploy the controllers using the On-Prem method while vManage can access the PnP portal from inside How are the two WAN Edge authorized allowed lists to be made available to vManage? (Choose two)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 82

What is the order of operations for software upgrades of Cisco SD-WAN nodes'?

A.

vBond vManage vSmart WAN Edge

B.

vManage vBond WAN Edge. vSmart

C.

vManage vSmart, vBond, WAN Edge

D.

vManage vBond vSraart WAN Edge

Full Access
Question # 83

What is the purpose of ‘’vpn 0’’ in the configuration template when onboarding a WAN edge node?

A.

It carries control traffic over secure DTLS or TLS connections between vSmart controllers and vEdge routers, and between vSmart and vBond

B.

It carries control out-of-band network management traffic among the Viptela devices in the overlay network.

C.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vManager

D.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vBond

Full Access
Question # 84

A network administrator configures SNMFV3 on a Cisco WAN Edge router from CL I for monitoring purposes How many characters are supported by the snmp user username command?

A.

from 1 to 8

B.

from 1 to 16

C.

from 1 to 32

D.

from 1 to 48

Full Access
Question # 85

What is the default value for the number of paths advertised per prefix in the OMP feature template?

A.

4

B.

8

C.

12

D.

16

Full Access
Question # 86

How is multicast routing enabled on devices in the Cisco SD-WAN overlay network?

A.

The WAN Edge routers originate multicast service routes to the vSmart controller via OMP, which then forwards joins for requested multicast groups based on IGMP v1 or v2 toward the source or PIM-RP as specified m the original PIM join message.

B.

The vSmart controller originates multicast service routes to the WAN Edge routers via OMP, which then forwards joins for requested multicast groups cased on IGMP v1 or v2 toward the source or PlM-RP as specified m the original PIM join message

C.

The vSmart controller originates multicast service routes to the WAN Edge routers via OMP, which then forwards joins (or requested multicast groups based on IGMP v2 or v3 toward the source or PIM-RP as specified in the original PIM join message

D.

The WAN Edge routers originate multicast service routes to the vSmart controller via OMP. which then forwards joins for requested multicast groups based on iGMP v2 or v3 toward the source or PIM-RP as specified in the original PIM join message

Full Access
Question # 87

Refer to the exhibit. An engineer configures a hub-and-spoke SD-WAN topology with the requirement that traffic from router A branch to router B branch is guaranteed to flow through the network hub, router C. Which configuration meets the requirement for router A?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 88

Exhibit.

The SD-WAN network is configured with a default full-mash topology. An engineer wants Barcelona and Paris to communicate to each other through the London site using a control Which control policy configuration accomplishes the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 89

Which two mechanisms are used to guarantee the integrity of data packets in the Cisco SD-WAN architecture data plane? {Choose two)

A.

transport locations

B.

authentication headers

C.

certificates

D.

TPM chip

E.

encapsulation security payload

Full Access
Question # 90

What are two attributes of vRoute? (Choose two)

A.

originator

B.

service

C.

encapsulation

D.

carrier

E.

domain ID

Full Access
Question # 91

Which policy allows communication between TLOCs of data centers and spokes and blocks communication between spokes?

A.

centralized data policy

B.

centralized control policy

C.

localized control policy

D.

localized data policy

Full Access
Question # 92

How is vBond reachability resolved by vManage?

A.

OMP

B.

DNS

C.

BGP

D.

IPsec

Full Access
Question # 93

An engineer configures policing with a rate of 125 Bps and a burst rate of 8000 bits, as shown here:

Which configuration completes this task?

A.

Configure 125 for rate and 1000 for burst.

B.

Configure 1000 for rate and 64000 for burst

C.

Configure 125 for rate and 8000 for burst

D.

Configure 1000 for rate and 1000 for burst

Full Access
Question # 94

Refer to the exhibit. A Cisco SD-WAN network carries traffic for several departments and over 1200 users with several applications at site A and site B branches over the MPLS1 circuit. An engineer is provisioning a higher bandwidth on-demand metro circuit as a backup connection. Which two configurations must the engineer apply to implement the on-demand tunnels? (Choose two.)

A.

B.

C.

D.

E.

Full Access
Question # 95

Which configuration step is taken on vManage after WAN Edge list is uploaded?

A.

Send the list to controllers

B.

Enable the ZTP process

C.

Verify the device certificate

D.

Set the device as valid

Full Access
Question # 96

Which protocol is used by the REST API to communicate with network devices in the Cisco SD-WAN network?

A.

SSL

B.

IPsec

C.

SSH

D.

HTTP

Full Access
Question # 97

Which component of the Cisco SD-WAN network assures that only valid customer nodes are participating in the overlay network?

A.

vBond

B.

vManage

C.

vSmart

D.

WAN Edge

Full Access
Question # 98

What are the default username and password for vSmart Controller when it is installed on a VMware ESXi hypervisor'?

A.

username Cisco password admin

B.

username admin password Cisco

C.

username Cisco password Cisco

D.

username admin password admin

Full Access
Question # 99

Which table is used by the vSmart controller to maintain service routes of the WAN Edge routers in the hub and local branches?

A.

RIB

B.

FIB

C.

OMP

D.

TLOC

Full Access
Question # 100

Refer to the exhibit.

What does the BFD value of 8 represent?

A.

number of BFD sessions

B.

hello timer of BFD session

C.

poll-interval of BFD session.

D.

dead timer of BFD session

Full Access
Question # 101

Refer to the exhibit An engineer is configuring a QoS policy to shape traffic for VLAN 100 on a subinterface Which policy configuration accomplishes the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 102

An engineer must configure local redundancy on a site. Which configuration accomplish this task?

A.

vpn 0interface interface-name

B.

tloc extension interlace nametloc extension interface interface name

C.

vpn 0tloc extension interface

D.

interface-flameinterface interface-name tloc-extension

Full Access
Question # 103

Which policy tracks path characteristics such as loss, latency, and jitter in vManage?

A.

VPN

B.

control

C.

app-route

D.

data

Full Access
Question # 104

Refer to the exhibit. The ge0/0 interface connects to a 30-MB link. A network administrator wants to always have 10 MB available for high priority traffic. When lower-priority traffic busts exceed 20 MB. Traffic should be redirected to the second WAN interface ge0/1. Which set of configurations accomplishes this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 105

Refer to the exhibit. An administrator is configuring a policy in addition to an existing hub-and-spoke policy for two sites that should directly communicate with each other. How is this policy configured?

A.

hub-and-spoke

B.

mesh

C.

import existing topology

D.

custom control (route and TLOC)

Full Access
Question # 106

Which component of the Cisco SD-WAN control plane architecture should be located in a public Internet address space and facilitates NAT-traversal?

A.

vBond

B.

WAN Edge

C.

vSmart

D.

vManage

Full Access
Question # 107

An engineer wants to track tunnel characteristics within an SLA-based policy for convergence. Which policy configuration will achieve this goal?

A.

App-route policy

B.

VPN membership policy

C.

Control policy

D.

Data policy

Full Access
Question # 108

Refer to the exhibit. An engineer must configure the Overlay Management Protocol route preference so that when B2 tries to reach host routes advertised by B1 it always chooses the MPLS circuit. Which two match conditions must be configured to accomplish this task? (Choose two.)

A.

VPN

B.

prefix list

C.

originator

D.

color list

E.

path type

Full Access
Question # 109

Drag and drop the REST API calls from the left onto the functions on the right.

Full Access
Question # 110

A customer has 1 to 100 service VPNs and wants to restrict outbound updates for VPN1 Which control policy configuration restricts these updates?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 111

An engineer wants to automate the onboarding process for a WAN Edge router with vManage. Which command will accomplish this?

A.

request vedge-cloud activate chassis-number serial

B.

request vedge-cloud activate chassis-number token

C.

request vedge-cloud activate serial token

D.

request vedge-cloud activate chassis-number organization

Full Access
Question # 112

Refer to the exhibit.

An organization is testing a Cisco SD-WAN solution and decided to have the control plane established first and not the data plane at the time of migration. Which configuration achieves this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 113

Which template configures the out-of-band management VPN?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 114

Which OMP route is selected for equal OMP route preference values on WAN Edge routers?

A.

route with higher TLOC preference value

B.

route with origin type of connected

C.

route with origin type of static

D.

route with lower TLOC preference value

Full Access
Question # 115

Refer to the exhibit.

An engineer is troubleshooting an issue where vManage and vSmart have a problem establishing a connection to vBond. Which action fixes the issue?

A.

Reconfigure the vBond command on the vBond as vBond 150.5.1.3 local

B.

Configure the tunnel interface on all three controllers with a color of transport

C.

Remove the encapsulation IPsec command under the tunnel interface of vBond.

D.

Configure encapsulation as IPsec under the tunnel interface of vManage and vSmart

Full Access
Question # 116

An engineer must apply the configuration for certificate installation to vBond Orchestrator and vSmart Controller. Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 117

Which VPN must be present on at least one interface to install Cisco vManage and integrate it with WAN Edge devices in an overlay network site ID:S4307T7E78F29?

A.

VPN 512

B.

any VPN number selected

C.

services VPN range 0-511

D.

VPNO

Full Access
Question # 118

Which scheduling method is configured by default for the eight queues in the cloud vEdge router1?

A.

low latency queue

B.

priority queue

C.

weighted random early detection

D.

weighted round robin

Full Access
Question # 119

Which type of lists are used to group related items via an application-aware routing policy under the policy lists command hierarchy on vSmart controllers?

A.

data prefix, she. and VPN

B.

OSCP value, application, and VPN

C.

data prefix, application, and SLA class

D.

DSCP value, site, and VPN

Full Access
Question # 120

Refer to the exhibit vManage and vBond have an issue establishing a connection with each other Which action resolves the issue?

A.

Reconfigure the system IPs to belong to the same subnet

B.

Change the organization name on both controllers to match vipteta.com.

C.

Remove the encapsulation ipsec command under the tunnel interface of vBond

D.

Configure the encapsulation ipsec command under the tunnel interface on vManage

Full Access
Question # 121

When the VPN membership policy is being controlled at the vSmart controller, which policy disallows VPN 1 at sites 20 and 30?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 122

Which on-the-box security feature supported by the Cisco ISR 4451 SD-WAN device and not on vEdge?

A.

Cloud Express service

B.

Enterprise Firewall with Application Awareness

C.

reverse proxy

D.

IPsec/GRE cloud proxy

Full Access
Question # 123

Which storage format Is used when vManage Is deployed as a virtual machine on a KVM hypervisor?

A.

.iso

B.

.qcow2

C.

.ova

D.

.tgz

Full Access
Question # 124

Refer to the exhibit.

Which QoS treatment results from this configuration after the access list acl-guest is applied inbound on the vpn1 interface?

A.

A UDP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted

B.

A TCP packet sourcing from 172.16.10.1 and destined to 172.16.20.1 is dropped

C.

A UDP packet souring from 172.16.10.1 and destined to 172.16.20.1 is dropped.

D.

A TCP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted

Full Access
Question # 125

Which set of elements are verified by the controller to confirm the identity of edge devices?

A.

certificates, organization name and serial number of the device

B.

organization name serial number and system IP of the device

C.

certificates, organization name, and vBond domain

D.

certificates, system IP, and vBond domain

Full Access
Question # 126

Drag and drop the BFD parameters from the left onto the BFD configurations on the right.

Full Access
Question # 127

Which policy configuration must be used to classify traffic as it enters the branch WAN Edge router to be put into the desired output queue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 128

Drag and drop the vManage policy configuration procedures from the left onto the correct definitions on the right.

Full Access
Question # 129

An engineer is troubleshooting a vEdge router and identifies a “DCONFAIL – DTLS connection failure” message. What is the problem?

A.

certificate mismatch

B.

organization mismatch

C.

memory issue

D.

connectivity issue

Full Access
Question # 130

What is the maximum number of IPsec that are temporarily created and converged on a new set if IPsec Sas in the pairwise keys process during a simultaneous rekey?

A.

2

B.

4

C.

6

D.

8

Full Access
Question # 131

An engineer must use data prefixes to configure centralized data policies using the vManage policy configuration wizard. What is the first step to accomplish this task?

A.

Create groups of interest

B.

Configure network topology.

C.

Configure traffic rules.

D.

Apply policies to sites and VPNs.

Full Access
Question # 132

Drag and drop the devices from the left into order on the right to upgrade the software from version 19 to version 20.

Full Access