Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Enterprise > 300-415

300-415 Implementing Cisco SD-WAN Solutions (ENSDWI) Question and Answers

Question # 4

Refer to the exhibit.

What does the BFD value of 8 represent?

A.

number of BFD sessions

B.

hello timer of BFD session

C.

poll-interval of BFD session.

D.

dead timer of BFD session

Full Access
Question # 5

What prohibits deleting a VNF image from the software repository?

A.

if the image is stored by vManage

B.

if the image is referenced by a service chain

C.

if the image is uploaded by a WAN Edge device

D.

if the image is included in a configured policy

Full Access
Question # 6

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

A.

A domain is nonexistent.

B.

A domain is block-listed.

C.

A domain is locally reachable.

D.

A domain is grey-listed.

Full Access
Question # 7

An administrator needs to configure SD-WAN to divert traffic from the company's private network to an ISP network. What action should be taken to accomplish this goal?

A.

configure the control policy

B.

configure the data policy

C.

configure the data security policy

D.

configure the application aware policy

Full Access
Question # 8

Which policy tracks path characteristics such as loss, latency, and jitter in vManage?

A.

VPN

B.

control

C.

app-route

D.

data

Full Access
Question # 9

Which two algorithms authenticate a user when configuring SNMPv3 monitoring on a WAN Edge router? (Choose two.)

A.

AES-256

B.

SHA-1

C.

AES-128

D.

MD5

E.

SHA-2

Full Access
Question # 10

Refer to the exhibit The network team must configure El GRP peering at HQ with devices in the service VPN connected to WAN Edge CSRv. CSRv is currently configured with

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 11

Which two vRoute attributes should be matched or set in vSmart policies and modified by data policies? (Choose two.)

A.

site ID

B.

preference

C.

VPN

D.

TLOC

E.

origin

Full Access
Question # 12

Which plane builds and maintains the network topology and makes decisions on traffic flows?

A.

orchestration

B.

management

C.

control

D.

data

Full Access
Question # 13

Which configuration step is taken on vManage after WAN Edge list is uploaded?

A.

Send the list to controllers

B.

Enable the ZTP process

C.

Verify the device certificate

D.

Set the device as valid

Full Access
Question # 14

Which two algorithms authenticate a user when configuring SNMPv3 monitoring on a WAN Edge router? (Choose two.)

A.

AES-256

B.

SHA-1

C.

AES-128

D.

MD5

E.

SHA-2

Full Access
Question # 15

What happens if the intelligent proxy is unreachable in the Cisco SD-WAN network?

A.

The grey-listed domains are unresolved

B.

The Cisco Umbrella Connector locally resolves the DNS request

C.

The block-listed domains are unresolved

D.

The Cisco Umbrella Connector temporarily redirects HTTPS traffic

Full Access
Question # 16

Which two products are used to deploy Cisco WAN Edge Router virtual platforms? (Choose two.)

A.

HP ProLiant DL360 Generatton10 running HP-UX

B.

Cisco ENCS 5000 Series

C.

Sun SPARC Node running AIX

D.

Cisco UCS

E.

Sun Enterprise M4000 Server running Sun Solans

Full Access
Question # 17

An engineer must automate certificate signing through Cisco. Which vManage configuration achieves this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 18

What are the default username and password for vSmart Controller when it is installed on a VMware ESXi hypervisor'?

A.

username Cisco password admin

B.

username admin password Cisco

C.

username Cisco password Cisco

D.

username admin password admin

Full Access
Question # 19

Refer to the exhibit An engineer is configuring a QoS policy to shape traffic for VLAN 100 on a subinterface Which policy configuration accomplishes the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 20

Which controller is used for provisioning and configuration in a Cisco SD-WAN solution?

A.

vBond

B.

Manage

C.

WAN Edge router

D.

vSmart

Full Access
Question # 21

An engineer must improve video quality by limiting HTTP traffic to the Internet without any failover. Which configuration in vManage achieves this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 22

Which TCP Optimization feature is used by WAN Edge to prevent unnecessary retransmissions and large initial TCP window sizes to maximize throughput and achieve a better quality?

A.

SEQ

B.

SYN

C.

RTT

D.

SACK

Full Access
Question # 23

Which device information is required on PNP/ZTP to support the zero-touch onboarding process?

A.

interface IP address

B.

system IP address

C.

public DNS entry

D.

serial and chassis numbers

Full Access
Question # 24

How is the software managed in Cisco SD-WAN?

A.

Software images must be uploaded to vManage through HTTP or FTP

B.

Software downgrades are unsupported for vManage

C.

Software images must be transferred through VPN 512 or VPN 0 of vManage

D.

Software upgrade operation in the group must include vManage. vBond, and vSmart.

Full Access
Question # 25

WAN Edge routers are configured manually to use UDP port offset to use nondefault offset values when IPsec tunnels are created. What is the offse range?

A.

1-19

B.

0-18

C.

0-19

D.

1-18

Full Access
Question # 26

Refer to the exhibit Which NAT types must the engineer configure for the vEdge router to bring up the data plane tunnels?

A.

Enable Full Cone NAT on the vEdge interface

B.

Use public color on the TLOC

C.

Use private color on the TLOC

D.

Enable Symmetric MAT on the vEdge interface

Full Access
Question # 27

Which SD-WAN component allows an administrator to manage and store software images for SD-WAN network elements?

A.

vGond controllers

B.

WAN Edge routers

C.

vSman controllers

D.

vManage NMS

Full Access
Question # 28

Drag and drop the definitions from the left to the configuration on the right.

Full Access
Question # 29

What is a requirement for a WAN Edge to reach vManage, vBond, and vSmart controllers in a data center?

A.

IGP

B.

QoS

C.

TLS

D.

OMP

Full Access
Question # 30

Refer to the exhibit.

Customer XYZ cannot provison dual connectivity on both Its routers due to budget constratnts but wants to use tnth RI and R2 interface for users behind them for load toward the hub site Which configurauon achieves this objectives?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 31

Which configuration allows users to reach YouTube from a local Internet breakout?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 32

Refer to the exhibit A WAN Edge device was recently added to vManage but a control connection could not be established Which action resolves this issue?

A.

Rectify the Rod CA certificate mismatch on WAN Edge devices

B.

Install the bootstrap code on WAN Edge and check for CSR

C.

Send the serial number to vBond from the vManage controller.

D.

Resolve the ZTP reachability and rectify smart account credentials issue

Full Access
Question # 33

What is the role of the Session Traversal Utilities for NAT server provided by the vBond orchestrator?

A.

It facilitates SD-WAN toners and controllers to discover their own mapped or translated IP addresses and port numbers

B.

It prevents SD-WAN Edge routers from forming sessions with public transports among different service providers

C.

It facilitates SD-WAN Edge routers to stay behind a NAT-enabled firewall while the transport addresses of the SD-WAN controller are unNAT-ed

D.

It allows WAN Edge routers to form sessions among MPLS TLOCs using only public IP addresses

Full Access
Question # 34

Which protocol detects path status (up/down), measures loss/latency/jitter, and measures the quality of the IPsec tunnel MTU?

A.

OMP

B.

IP-SLA

C.

BFD

D.

DTLS

Full Access
Question # 35

Refer to exhibit.

An engineer is troubleshooting tear down of control connections even though a valid Certificate Serial Number is entered Which two actions resolve the Issue? (Choose two)

A.

Enter a valid serial number on the controllers for a given device

B.

Remove the duplicate IP in the network.

C.

Enter a valid product ID (model) on the PNP portal

D.

Match the serial number file between the controllers

E.

Restore network reachability for the controller

Full Access
Question # 36

A WAN Edge device has several service VPNs with no routing protocol configured in the service VPNs The device must be configured so that all connected routes are visible in OMP for VPN 10 Which configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 37

Which vBond system configuration under VPN 0 allows for a routable public IP address even if the DNS name, hostname, or IP address of the vBond orchestrator are omitted?

A.

local

B.

vbond-only

C.

dns-name

D.

WAN

Full Access
Question # 38

An engineer must configure local redundancy on a site. Which configuration accomplish this task?

A.

vpn 0

interface interface-name

B.

tloc extension interlace name

tloc extension interface interface name

C.

vpn 0

tloc extension interface

D.

interface-flame

interface interface-name tloc-extension

Full Access
Question # 39

What are two attributes of vRoute? (Choose two)

A.

originator

B.

service

C.

encapsulation

D.

carrier

E.

domain ID

Full Access
Question # 40

Which command on a WAN Edge device displays the information about the colors present in the fabric that are learned from vSmart via OMP?

A.

show omp tlocs

B.

show omp sessions

C.

show omp peers

D.

show omp route

Full Access
Question # 41

Which type of lists are used to group related items via an application-aware routing policy under the policy lists command hierarchy on vSmart controllers?

A.

data prefix, she. and VPN

B.

OSCP value, application, and VPN

C.

data prefix, application, and SLA class

D.

DSCP value, site, and VPN

Full Access
Question # 42

Refer to the exhibit.

vManage and vSmart have an issue establishing a connection to vBond. Which configuration resolves the issue?

A.

Configure the tunnel interface on all three controllers with a color of transport.

B.

Change the timezone on the vSmart to Europe/London.

C.

Configure the (11.1.1.X/24) IP addresses on the elhO interfaces on vManage and vSmart.

D.

Reconfigure the system-ip parameter on vSmart to 11.1.1.2.

Full Access
Question # 43

Refer to the exhibit.

An engineer is troubleshooting a control connection Issue. What does "connect" mean in this how control connections output?

A.

Control connection is down

B.

Control connection is connected

C.

Control connection attempt is in progress

D.

Control connection is up

Full Access
Question # 44

Refer to the exhibit A vBond controller was added to the controller list with the same Enterprise Root CA certificate as vManage. The two controllers can reach each other via VPNO and share the same organization name, but the control connection is not initiated- Which action resolves the issue?

A.

Synchronize the WAN Edge list on vManage with controllers.

B.

Configure NTP on both controllers to establish a connection.

C.

Configure a valid systom IP on the vBond controller.

D.

Configure a valid vBond IP on vManage.

Full Access
Question # 45

Which set of platforms must he in separate VMS as of release 16.1?

A.

vSmart and WAN Edge

B.

WAN Edge and vBond

C.

vManagc and vSmart

D.

vBond and vSmart

Full Access
Question # 46

A bank is looking for improved customer experience for applications and reduce overhead related to compliance and security. Which key feature or features of the Cisco SD-WAN solution will help the bank to achieve their goals?

A.

Integration with PaaS providers to offer the best possible application experience

B.

QoS including application prioritization and meeting critical applications SLA for selecting optimal path.

C.

implementation of a modem age core banking system

D.

implementation of BGP across the enterprise routing for selecting optimal path

Full Access
Question # 47

Refer to the exhibit. An engineer must block FTP traffic coming in from a particular Service VPN on a WAN Edge device Which set of steps achieves this goal?

A.

Create a localized policy and add it to (he interface feature template

B.

Create a localized policy add it to the device template and add an ACL to the interface feature template

C.

Create a prefix tat, add it to the localized policy and add it to the interface feature template

D.

Create a localized policy add it to VPN template and add an ACL to the interface feature template

Full Access
Question # 48

Drag and drop the BFD parameters from the left onto the BFD configurations on the right.

Full Access
Question # 49

Refer to the exhibit.

The control connection is failing. Which action resolves the issue?

A.

import vSmart in vManager

B.

Validate the certificates authenticity on vSmart

C.

Upload the WAN Edge list on vManage.

D.

Restore the reachability to the vSmart

Full Access
Question # 50

Refer to the exhibit vManage and vBond have an issue establishing a connection to vSmart Which two actions does the administrator take to fix the issue? (Choose two)

Install the certificate received from the certificate server.

A.

Manually resync vManage and vBond

B.

Reconfigure the vSmart from CLI with the proper Hostname & System IP

C.

Delete and re-add vSmart Click Generate and validate CSR

D.

Request a certificate from the certificate server based on the CSR for the vSmart

Full Access
Question # 51

What is the purpose of ‘’vpn 0’’ in the configuration template when onboarding a WAN edge node?

A.

It carries control traffic over secure DTLS or TLS connections between vSmart controllers and vEdge routers, and between vSmart and vBond

B.

It carries control out-of-band network management traffic among the Viptela devices in the overlay network.

C.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vManager

D.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vBond

Full Access
Question # 52

If Smart Account Sync is not used, which Cisco SD-WAN component is used to upload an authorized serial number file?

A.

WAN Edge

B.

vManage

C.

vSmart

D.

vBond

Full Access
Question # 53

How is TLOC defined?

A.

It is represented by a unique identifier to specify a site in as SD-WAN architecture.

B.

It specifies a Cisco SD-WAN overlay in a multitenant vSMART deployment.

C.

It is a unique collection of GRE or iPsec encapsulation, link color, and system IP address.

D.

It is represented by group of QoS policies applied to a WAN Edge router.

Full Access
Question # 54

Which percentage for total memory or total CPU usage for a device is classified as normal in the WAN Edge Health pane?

A.

more than 80 percent usage

B.

less than 70 percent usage

C.

between 70 to 90 percent usage

D.

more than 90 percent usage

Full Access
Question # 55

Which platforms are managed by a single vManage dashboard?

A.

ISR4351, ASR1002HX, vEdge2000, vEdge Cloud

B.

ISR4321, ASR1001, Nexus, ENCS

C.

ISR4321, ASR1001, ENCS, ISRv

D.

ISR4351, ASR1009, vEdge2000, CSR1000v

Full Access
Question # 56

Which platform cannot provide IPS and URL filtering capabilities?

A.

Cisco CSR 1000V

B.

Cisco ISR 1000

C.

Cisco Catalyst 8300

D.

Cisco ISR 4000

Full Access
Question # 57

Refer to the exhibit Which configuration must the engineer use to form underlay connectivity for the Cisco SD-WAN network?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 58

Which logs verify when a device was upgraded?

A.

Audit

B.

Email

C.

ACL

D.

SNMP

Full Access
Question # 59

What are the two impacts of losing vManage connectivity to fabric in the Cisco SD-WAN network? (Choose two)

A.

Policy changes propagation stops

B.

Statistics collection stops

C.

BFD peering between WAN Edge devices are unestablished

D.

Creation of templates is impossible

E.

IPsec tunnels tear down for WAN Edge devices.

Full Access
Question # 60

Which Cisco SD-WAN WAN Edge platform supports LTE and Wi-Fi?

A.

vEdge2000

B.

ASR1001

C.

CSR 1000v

D.

ISR 1101

Full Access
Question # 61

When software is upgraded on a vManage NMS, which two image-adding options store images in a local vManage software repository? (Choose two.)

A.

To be downloaded over a SMTP connection

B.

To be downloaded over a SNMP connection

C.

To be downloaded over an out-of-band connection

D.

To be downloaded over a control plane connection

E.

To be downloaded over an ICMP connection

Full Access
Question # 62

An enterprise has these three WAN connections:

  • public Internet
  • business internet
  • MPLS

An engineer must configure two available links to route traffic via both links. Which configuration achieves this objective?

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 63

What is a benefit of the application aware firewall feature in the Cisco SD-WAN solution?

A.

application monitoring

B.

application malware protection

C.

application visibility

D.

control policy enforcement

Full Access
Question # 64

An engineering team must prepare a traffic engineering policy where an MPLS circuit is preferred for traffic coming from the Admin VLAN Internet should be used as a backup only. Which configuration fulfill this requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 65

An engineer configured a data policy called ROME-POLICY. Which configuration allows traffic flow from the Rome internal network toward other sites?

A.

apply-policy site-list Rome data-policy ROME-POLICY from-tunnel

B.

apply-policy site-list Rome data-policy ROME-POLICY from-service

C.

site-list Rome control-policy ROME-POLICY in

D.

site-list Rome control-policy ROME-POLICY out

Full Access
Question # 66

Which platform cannot provide IPS and URL filtering capabilities?

A.

Cisco CSR 1000V

B.

Cisco ISR 1000

C.

Cisco Catalyst 8300

D.

Cisco ISR 4000

Full Access
Question # 67

Refer to the exhibit. Which configuration extends the INET interface on R1 to be used by R2 for control and data connections?

A)

B)

C)

A.

Option A

B.

Option B

C.

Option C

Full Access
Question # 68

Which component of the Cisco SD-WAN control plane architecture facilitates the storage of certificates and configurations for network components?

A.

vSmart

B.

vBond

C.

WAN Edge

D.

vManage

Full Access
Question # 69

In which device state does the WAN edge router create control connections, but data tunnels are not created?

A.

valid

B.

backup

C.

active

D.

staging

Full Access
Question # 70

Refer to exhibit. An engineer is troubleshooting tear of control connection even though a valid CertificateSerialNumber is entered. Which two actions resolve Issue? (Choose two)

A.

Restore network reachability on the controller.

B.

Enter a valid serial cumber on the controller for a given device

C.

Enter a valid product ID (mode) on the PNP portal.

D.

Match the serial number file between the controller

E.

Remove the duplicate IP in the network

Full Access
Question # 71

Refer to the exhibit.

An engineer configured OMP with an overlay-as of 10666. What is the AS-PATH for prefix 104.104.104.104/32 on R100?

A.

100 10666

B.

100 20 104

C.

100 10666 20 104

D.

100 10666 104

Full Access
Question # 72

In which VPN is the NAT operation on an outgoing interface configured for direct Interne! access?

A.

1

B.

10

C.

512

D.

0

Full Access
Question # 73

A customer must upgrade the cisco SD-WAN devices and controllers from version 19.2 to version 20.3. The devices include WAN Edge cloud, vManage, vSmart, and vBond. Which types of image types of image files are needed for this upgrade?

A.

one file for vManage and one file for all other devices with extension tar.gz

B.

one file for vManage, one for vSmart and one for vBond + WAN Edge Cloud with extension.bin

C.

one file for vManaga, one for vSmart and one for vBond + WAN Edge Cloud with extension tar.gz

D.

one file for vManaga and one file for all other devices with extension .bin

Full Access
Question # 74

Which protocol is used to propagate multicast join requests over the Cisco SD-WAN fabric?

A.

ARP

B.

Auto-RP

C.

OMP

D.

IGMP

Full Access
Question # 75

How is the scalability of the vManage increased in Cisco SD-WAN Fabric?

A.

Increase licensing on the vManage

B.

Deploy multiple vManage controllers in a cluster

C.

Deploy more than one vManage controllers on different physical server.

D.

Increase the bandwidth of the WAN link connected to the vManage

Full Access
Question # 76

How does the replicator role function in cisco SD-WAN?

A.

WAN Edge devices advertise the rendezvous point to all the receivers through the underlay network.

B.

vSmart Controllers advertise the rendezvous point to all the receivers through the overlay network.

C.

WAN Edge devices advertise the rendezvous point to all receivers through the overlay network.

D.

vSmart Controllers advertise the rendezvous point to all the receivers through the underlay network.

Full Access
Question # 77

Refer to the exhibit.

What binding is created using the tloc-extension command?

A.

between ge 0/2.101 of port-type service and ge 0/0 of port-type service

B.

between ge 0/2.101 of port-type transport and ge 0/0 of port-type service

C.

between ge 0/2.101 of port-type service and ge 0/0 of port-type transport

D.

between ge 0/2.101 of port-type transport and ge 0/0 of port-type transport

Full Access
Question # 78

On which device is a service FW address configured to Insert firewall service at the hub?

A.

vEdge at the branch

B.

vSmart at the hub

C.

vEdge at the hub

D.

vSmart at the branch

Full Access
Question # 79

What is the behaviour of vBond orchestrator?

A.

It maintains vSmart and WAN Edge routers secure connectivity state

B.

it builds permanent connections with vSmart controllers

C.

it updates vSmart of WAN Edge routers behind NAT devices using OMP.

D.

It builds permanent connections with WAN Edge routers

Full Access
Question # 80

Which Cisco SD-WAN component the initial communication between WAN Edge devices to join the fabric?

A.

WAN Edge Router

B.

vSmart Controller

C.

vManage

D.

vBond Orchestrator

Full Access
Question # 81

What is the default value (in milliseconds) set tor the poll interval in the BFD basic configuration?

A.

300,000

B.

600,000

C.

900,000

D.

1,200,000

Full Access
Question # 82

What is the threshold to generate a warning alert about CPU or memory usage on a WAN Edge router?

A.

70 to 85 percent

B.

70 to 90 percent

C.

75 to 85 percent

D.

75 to 90 percent

Full Access
Question # 83

A customer is receiving routes via OMP from vSmart controller for a specific VPN. The customer must provide access to the W2 loopback received via OMP to the OSPF neighbor on the service-side VPN, which configuration fulfils these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 84

Which device in the SD- WAN solution receives and categorizes event reports, and generates alarms?

A.

WAN Edge routers

B.

vSmart controllers

C.

vManage NMS

D.

vBond controllers

Full Access
Question # 85

Which two actions are necessary to set the Controller Certificate Authorization mode to indicate a root certificate? (Choose two)

A.

Select the Controller Certificate Authorization mode that is recommended by Cisco

B.

Change the organization name of the Cisco SO-WAN fabric.

C.

Upload an SSL certificate to vManape,

D.

Select a private certificate signing authority instead of a public certificate signing authority

E.

Select a validity period from the drop-down menu

Full Access
Question # 86

Drag and drop the devices from the left onto the correct functions on the right.

Full Access
Question # 87

What is an attribute of TLOC’?

A.

encryption

B.

local preference

C.

tag

D.

service

Full Access
Question # 88

Drag and drop the steps from the left into the sequence on the right for a WAN Edge router after powering on for zero touch provisioning.

Full Access
Question # 89

Which pathway under Monitor > Network > Select Device is used to verify service insertion configuration?

A.

System Status

B.

Troubleshooting

C.

Real Time

D.

Events

Full Access
Question # 90

What are the default username and password for vSmart Controller when it is installed on a VMware ESXi hypervisor'?

A.

username Cisco password admin

B.

username admin password Cisco

C.

username Cisco password Cisco

D.

username admin password admin

Full Access
Question # 91

How must the application-aware enterprise firewall policies be applied within the same WAN Edge router?

A.

within and between zones

B.

between two VPN tunnels

C.

within zone pair

D.

between two VRFs

Full Access
Question # 92

An engineer must apply the configuration for certificate installation to vBond Orchestrator and vSmart Controller. Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 93

Which hardware component is involved in the Cisco SD-WAN authentication process for ISR platforms?

A.

TPMD

B.

ZTP

C.

TPC

D.

SUDI

Full Access
Question # 94

Refer to the exhibit vManage and vBond have an issue establishing a connection with each other Which action resolves the issue?

A.

Reconfigure the system IPs to belong to the same subnet

B.

Change the organization name on both controllers to match vipteta.com.

C.

Remove the encapsulation ipsec command under the tunnel interface of vBond

D.

Configure the encapsulation ipsec command under the tunnel interface on vManage

Full Access
Question # 95

How are custom application ports monitored in Cisco SD-WAN controllers?

A.

Customers add custom application ports in vAnalytics and vManage.

B.

Customers add custom application ports in vAnalytics and vSmart.

C.

Cisco adds custom application ports In vAnalytics and vManage.

D.

Cisco adds custom application ports In vAnalytics and vSmart.

Full Access
Question # 96

Which port is used for vBond under controller certificates if no alternate port is configured?

A.

12345

B.

12347

C.

12346

D.

12344

Full Access
Question # 97

A customer has MPLS and Internet as the TLOC colors An engineer must configure conlroJIers with the Internet and not with MPLS Which configuration achieves this requirement on vManage?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 98

What is an advantage of using auto mode versus static mode of power allocation when an access point is connected to a PoE switch port?

A.

It detects the device is a powered device

B.

All four pairs of the cable are used

C.

Power policing is enabled at the same time

D.

The default level is used for the access point

Full Access
Question # 99

An engineer is configuring a data policy for packets that must be captured through the policy. Which command accomplishes this task?

A.

policy > data-policy > vpn-list > sequence > default-action > drop

B.

policy > data-policy > vpn-list > sequence > action

C.

policy > data-policy > vpn-list > sequence > default-action > accept

D.

policy > data-policy > vpn-list > sequence > match

Full Access
Question # 100

An organization requires the use of integrated preventative engines, exploit protection, and the most updated and advanced signature-based antivirus with sandboxing and threat intelligence to stop malicious attachments before they reach users and get executed. Which Cisco SD-WAN solution meets the requirements?

A.

Cisco Trust Anchor module

B.

URL filtering and Umbrella DNS security

C.

Cisco AMP and Threat Grid

D.

Snort IPS

Full Access
Question # 101

Refer to the exhibit The engineering must assign tags to 3 Of its 74 server networks as soon as they are advertised to peers These server network must not be advertised AS which configuration fulfil the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 102

An engineer must deploy a QoS policy with these requirements:

• policy name: App-police

• police rate: 1000000

• burst: 1000000

• exceed: drop

Which configuration meets the requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 103

Which configuration component is used in a firewall security policy?

A.

numbered sequences of match-action pairs

B.

application match parameters

C.

URL filtering policy

D.

intrusion prevention policy

Full Access
Question # 104

Which secure tunnel type should be used to connect one WAN Edge router to other WAN Edge routers?

A.

TLS

B.

DTLS

C.

SSL VPN

D.

IPsec

Full Access
Question # 105

Which protocol is used for the vManage to connect to the vSmart Controller hosted in Cloud?

A.

PnP Server

B.

ZTP

C.

NETCONF

D.

HTTP

Full Access
Question # 106

Refer to the exhibit Which command allows traffic through the IPsec tunnel configured in VPN 0?

A.

service local

B.

service FW address 1.1.1.1

C.

service netsvc1 vpn 1

D.

service netsvc1 address 1.1.1.1

Full Access
Question # 107

What is a benefit of the application-aware firewall?

A.

It blocks traffic by MAC address

B.

It blocks traffic by MTU of the packet.

C.

It blocks traffic by application.

D.

It blocks encrypted traffic

Full Access