Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Enterprise > 300-415

300-415 Implementing Cisco SD-WAN Solutions (300-415 ENSDWI) Question and Answers

Question # 4

Refer to the exhibit. The Cisco SD-WAN is deployed using the default topology. The engineer wants to configure a service insertion policy such that all data traffic between Rome to Paris is forwarded through the NGFW located in London. Which configuration fulfills this requirement, assuming that the Service VPN ID is 1?

A.

B.

C.

D.

Full Access
Question # 5

A company deploys a Cisco SD-WAN solution but has an unstable Internet connection. When the link to vSmart comes back up, the WAN Edge router routing table is not refreshed, and some traffic to the destination network is dropped. The headquarters is the hub site, and it continuously adds new sites to the SD-WAN network. An engineer must configure route refresh between WAN Edge and vSmart within 2 minutes. Which configuration meets this requirement?

A.

Option A

B.

B

C.

Option B

D.

E.

Option C

F.

Option D

Full Access
Question # 6

When the VPN membership policy is being controlled at the vSmart controller, which policy disallows VPN 1 at sites 20 and 30?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 7

Refer to the exhibit.

An engineer is troubleshooting an issue where vManage and vSmart have a problem establishing a connection to vBond. Which action fixes the issue?

A.

Reconfigure the vBond command on the vBond as vBond 150.5.1.3 local

B.

Configure the tunnel interface on all three controllers with a color of transport

C.

Remove the encapsulation IPsec command under the tunnel interface of vBond.

D.

Configure encapsulation as IPsec under the tunnel interface of vManage and vSmart

Full Access
Question # 8

An engineer creates a data policy to prevent communication from the 172.20.21.0/24 network to the 172.20.41.0/24 network. Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 9

Refer to the exhibit. Which configuration extends the INET interface on R1 to be used by R2 for control and data connections?

A)

B)

C)

A.

Option A

B.

Option B

C.

Option C

Full Access
Question # 10

An enterprise has several sites with multiple VPNs that are isolated from each other A new requirement came where users in VPN 73 must be able to talk to users in VPN 50 Which configuration meets this requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 11

Which component of the Cisco SD-WAN control plane architecture should be located in a public Internet address space and facilitates NAT-traversal?

A.

vBond

B.

WAN Edge

C.

vSmart

D.

vManage

Full Access
Question # 12

An engineer must apply the configuration for certificate installation to vBond Orchestrator and vSmart Controller. Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 13

On which device is a service FW address configured to Insert firewall service at the hub?

A.

vEdge at the branch

B.

vSmart at the hub

C.

vEdge at the hub

D.

vSmart at the branch

Full Access
Question # 14

What are the two components of an application-aware firewall? (Choose two.)

A.

zone pair

B.

sequence

C.

lists

D.

default action

E.

sequence action

F.

firewall policy

Full Access
Question # 15

Which plane builds and maintains the network topology and makes decisions on traffic flows?

A.

orchestration

B.

management

C.

control

D.

data

Full Access
Question # 16

Which two performance data details are provided by Cisco SO-WAN vAnalytics? (Choose two)

A.

jitter loss and latency for data tunnels

B.

application quality of experience score from zero to ten

C.

detail on total cost of ownership for the fabric

D.

certificate authority status (health and expiration dates) for all controllers

E.

view devices connected to a vManage NMS

Full Access
Question # 17

Which two virtualized environments are available for a company to install the controllers using the on-premises model? (Choose two )

A.

VMware vSphere ESXi

B.

VMware Workstation

C.

kernel-based virtual machine

D.

OpenStack

E.

Microsoft Hyper-V

Full Access
Question # 18

Which TCP Optimization feature is used by WAN Edge to prevent unnecessary retransmissions and large initial TCP window sizes to maximize throughput and achieve a better quality?

A.

SEQ

B.

SYN

C.

RTT

D.

SACK

Full Access
Question # 19

Which protocol Is used by the REST API to communicate with network services in the Cisco SO-WAN network?

A.

SSL

B.

HTTP

C.

iPsec

D.

SSM

Full Access
Question # 20

Which encryption algorithm is used for encrypting SD-WAN data plane traffic?

A.

Triple DES

B.

IPsec

C.

AES-128

D.

AES-256 GCM

Full Access
Question # 21

Which two platforms for the Cisco SD-WAN architecture are deployable in a hypervisor on-premises or in IAAS Cloud? (Choose two.)

A.

CSR 1000v

B.

vEdge 100c

C.

vEdge Cloud

D.

vEdge 2000

E.

ISR 4431

Full Access
Question # 22

An administrator needs to configure SD-WAN to divert traffic from the company's private network to an ISP network. What action should be taken to accomplish this goal?

A.

configure the control policy

B.

configure the data policy

C.

configure the data security policy

D.

configure the application aware policy

Full Access
Question # 23

What is an advantage of using auto mode versus static mode of power allocation when an access point is connected to a PoE switch port?

A.

It detects the device is a powered device

B.

All four pairs of the cable are used

C.

Power policing is enabled at the same time

D.

The default level is used for the access point

Full Access
Question # 24

Which table is used by the vSmart controller to maintain service routes of the WAN Edge routers in the hub and local branches?

A.

RIB

B.

FIB

C.

OMP

D.

TLOC

Full Access
Question # 25

An engineer must use data prefixes to configure centralized data policies using the vManage policy configuration wizard. What is the first step to accomplish this task?

A.

Create groups of interest

B.

Configure network topology.

C.

Configure traffic rules.

D.

Apply policies to sites and VPNs.

Full Access
Question # 26

What is the result during a WAN Edge software upgrade process if the version of the WAN Edge software is higher than the one running on a controller device?

A.

The upgrade button is greyed out

B.

The upgrade proceeds with no warning message.

C.

The upgrade fails with a warning message

D.

The upgrade proceeds with a warning message

Full Access
Question # 27

Which feature allows reachability to an organization’s internally hosted application for an active DNS security policy on a device?

A.

local domain bypass

B.

DHCP option 6

C.

DNSCrypt configurator

D.

data pokey with redirect

Full Access
Question # 28

Refer to the exhibit. The Cisco SD-VYAN is deployed using the default topology. The engineer v/ants to configure a service insertion policy such that all data traffic between Rome to Paris is forwarded through the NGFW located in London. Which configuration fulfills this requirement, assuming that the Sen/ice VPN ID is 1?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 29

An engineer modifies a data policy for DIA in VPN 200 to meet the requirements for traffic destined to these locations:

* external networks; must be translated

* external networks; must use a public TLOC color

* syslog servers, must use a private TLOC color

Here is the existing data policy configuration:

Which policy configuration sequence set meets the requirements?

A.

B.

C.

Full Access
Question # 30

Drag and drop the route verification output from show omp tlocs from the left onto the correct explanations on the right.

Full Access
Question # 31

How many cloud gateway instance(s) can be created per region when provisioning Cloud OnRamp for Multicloud from AWS in a multiregion environment?

A.

one

B.

two

C.

three

D.

four

Full Access
Question # 32

Drag and drop the definitions from the left to the configuration on the right.

Full Access
Question # 33

An engineer wants to change the configuration of the certificate authorization mode from manual to automated. Which GUI selection will accomplish this?

A.

Maintenance > Security

B.

Configuration > Certificates

C.

Administration > Settings

D.

Tools > Operational Commands

Full Access
Question # 34

What are the two advantages of configuration groups in a Cisco SD-WAN deployment? (Choose two.)

A.

Individual devices are associated with a configuration group and a device template.

B.

Individual devices are added to multiple groups.

C.

Individual devices are grouped based on a shared configuration.

D.

A subset of devices is identified with tags.

E.

An individual device has multiple tag rules.

Full Access
Question # 35

What does forward error correction addresses in Cisco SO-WAN?

A.

inefficient traffic forwarding caused oy inbound shapers

B.

reduced application performance degradation rotated to service degradation

C.

applications with occasional invalid data input and poor performance

D.

traffic flows with increased delay over a particular transport

Full Access
Question # 36

Which two mechanisms are used to guarantee the integrity of data packets in the Cisco SD-WAN architecture data plane? {Choose two)

A.

transport locations

B.

authentication headers

C.

certificates

D.

TPM chip

E.

encapsulation security payload

Full Access
Question # 37

In Cisco SD-WAN, what protocol is used for control connections between SD-WAN devices?

A.

DTLS

B.

OMP

C.

BGP

D.

OSPF

Full Access
Question # 38

An engineer must configure the SD-WAN Edge router to identify DSCP 26 traffic coming from the router's local site and then change the DSCP value to DSCP 18 before sending it over to the SD-WAN fabric. What are the two ways to create the required configuration? (Choose two).

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 39

An engineer creates this data policy for DIA for VPN 10:

Which policy sequence enables DIA for external networks?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 40

Refer to the exhibit.

vManage and vSmart have an issue establishing a connection to vBond. Which configuration resolves the issue?

A.

Configure the tunnel interface on all three controllers with a color of transport.

B.

Change the timezone on the vSmart to Europe/London.

C.

Configure the (11.1.1.X/24) IP addresses on the elhO interfaces on vManage and vSmart.

D.

Reconfigure the system-ip parameter on vSmart to 11.1.1.2.

Full Access
Question # 41

An engineer is configuring a WAN Edge router for DIA based on matching QoS parameters. Which two actions accomplish this task? (Choose two.)

A.

Apply a QoS map policy.

B.

Configure a control policy.

C.

Configure a centralized data policy.

D.

Configure NAT on the transport interface.

E.

Apply a data policy on WAN interface.

Full Access
Question # 42

Which command on a WAN Edge device displays the information about the colors present in the fabric that are learned from vSmart via OMP?

A.

show omp tlocs

B.

show omp sessions

C.

show omp peers

D.

show omp route

Full Access
Question # 43

A network administrator is tasked to make sure that an OMP peer session is closed after missing three consecutive keepalive messages in 3 minutes. Additionally, route updates must be sent every minute. If a WAN Edge router becomes unavailable, the peer must use last known information to forward packets for 12 hours. Which set of configuration commands accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 44

Refer to the exhibit.

Which command-line configuration on a WAN Edge device achieves these results?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 45

How are custom application ports monitored in Cisco SD-WAN controllers?

A.

Customers add custom application ports in vAnalytics and vManage.

B.

Customers add custom application ports in vAnalytics and vSmart.

C.

Cisco adds custom application ports In vAnalytics and vManage.

D.

Cisco adds custom application ports In vAnalytics and vSmart.

Full Access
Question # 46

Refer to the exhibit.

Which two configurations are needed to get the WAN Edges registered with the controllers when certificates are used? (Choose two)

A.

Generate a CSR manually within vManage server

B.

Generate a CSR manually on the WAN Edge

C.

Request a certificate manually from the Enterprise CA server

D.

Install the certificate received from the CA server manually on the WAN Edge

E.

Install the certificate received from the CA server manually on the vManage

Full Access
Question # 47

Drag and drop the Cisco SD-WAN components from the left onto their functions on the right.

Full Access
Question # 48

Which configuration step is taken on vManage after WAN Edge list is uploaded?

A.

Send the list to controllers

B.

Enable the ZTP process

C.

Verify the device certificate

D.

Set the device as valid

Full Access
Question # 49

Which policy is configured to ensure that a voice packet is always sent on the link with less than a 50 msec delay?

A.

localized data policy

B.

localized control policy

C.

centralized data policy

D.

centralized control policy

Full Access
Question # 50

An application team is getting ready to deploy a new business-critical application to the network. To protect the traffic, the network team must add another queue to the QoS map and then deploy the map to fabric Which configuration slop must be completed prior to adding the queue to the QoS map and applying If

A.

The relationship between die new QoS class and the hardware queue must be configured from the 'lists' page of the Local Policy section of vManage. The QoS map is then applied to the WAN interface

B.

The relationship between The new QoS class and the hardware queue must be configured from the 'lists' page of the Local Policy section of vManage. The QoS map is then applied to the service-side interface.

C.

The relationship between the new QoS class and the hardware queue must be configured from the "lisla" page of the Centralized Policy section of vManage. The QoS map is then applied to the WAN interface.

D.

The relationship between the new QoS class and the hardware queue must be configured from the "lists" page of the Centralized Policy section of vManage. The QoS map is then applied to the service-side interface.

Full Access
Question # 51

Refer to the exhibit. An engineer must block FTP traffic coming in from a particular Service VPN on a WAN Edge device Which set of steps achieves this goal?

A.

Create a localized policy and add it to (he interface feature template

B.

Create a localized policy add it to the device template and add an ACL to the interface feature template

C.

Create a prefix tat, add it to the localized policy and add it to the interface feature template

D.

Create a localized policy add it to VPN template and add an ACL to the interface feature template

Full Access
Question # 52

A network administrator is bringing up one WAN Edge for branch connectivity. Which types of tunnels form when the WAN edge router connects to the SD-WAN fabric?

A.

DTLS or TLS tunnel with vBond controller and IPsec tunnel with vManage controller.

B.

DTLS or TLS tunnel with vBond controller and IPsec tunnel with other WAN Edge routers.

C.

DTLS or TLS tunnel with vSmart controller and IPsec tunnel with other Edge routers.

D.

DTLS or TLS tunnel with vSmart controller and IPsec tunnel with vBond controller.

Full Access
Question # 53

An engineer must avoid routing loops on the SD-WAN fabric for routes advertised between data center sites Which BGP loop prevention attribute must be configured on the routers to meet this requirement?

A.

same OMP overlay-as on WAN Edge routers of all data centers

B.

static routing on al WAN Edge routers instead of BGP

C.

same BGP AS between all WAN Edge routers and CE routers

D.

same BGP AS between all CE and PE routers

Full Access
Question # 54

A network administrator is configuring VRRP to avoid a traffic black hole when the transport side of the network is down on the master device. What must be configured to get the fastest failover to standby?

A.

lower timer interval

B.

prefix-list tracking

C.

higher group ID number

D.

OMP tracking

Full Access
Question # 55

An engineer configures policing with a rate of 125 Bps and a burst rate of 8000 bits, as shown here:

Which configuration completes this task?

A.

Configure 125 for rate and 1000 for burst.

B.

Configure 1000 for rate and 64000 for burst

C.

Configure 125 for rate and 8000 for burst

D.

Configure 1000 for rate and 1000 for burst

Full Access
Question # 56

How do WAN Edge devices operate when vSmart is inaccessible or fails to be reached by the WAN Edge?

A.

They cease to forward traffic in the data plane.

B.

They continue operation normally.

C.

They continue to receive reachability updates.

D.

They continue operating normally for a configurable time.

Full Access
Question # 57

An engineer is modifying an existing data policy for VPN 115 to meet these additional requirements:

    When browsing government websites, the traffic must use direct internet access.

    The source address of the traffic leaving the site toward the government websites must be set to an IP range associated with the country itself, a particular TLOC.

The policy configuration is as follows:

Which policy sequence meets the requirements without interfering with other destinations?

A.

sequence 30

match

destination-data-prefix-list GOVERNMENT-WEBSITES

!

action accept

set

local-tloc-list

color biz-internet

B.

sequence 25

match

destination-data-prefix-list GOVERNMENT-WEBSITES

action accept

nat use-vpn 0

C.

sequence 15

match

source-data-prefix-list GOVERNMENT-WEBSITES

action accept

set

local-tloc-list

color private1

D.

sequence 15

match

destination-data-prefix-list GOVERNMENT-WEBSITES

!

action accept

set

local-tloc-list

color biz-internet

Full Access
Question # 58

What is a benefit of the application aware firewall feature in the Cisco SD-WAN solution?

A.

application monitoring

B.

application malware protection

C.

application visibility

D.

control policy enforcement

Full Access
Question # 59

A network administrator is configuring a tunnel interface on a branch Cisco IOS XE router to run TLOC extensions. Which configuration will extend a TLOC over a GRE tunnel to another router in the branch?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 60

An engineer must configure a centralized policy on a site in which all HTTP traffic should use the Public Internet circuit if the loss on this circuit is below 10%. otherwise MPLS should be used Which configuration wizard fulfils this requirement?

A.

Create Applications or Groups of Interest > Configure Traffic Rules > Apply Policies to Sites and VPNs

B.

Configure VPN Membership > Apply Policies to Sites and VPNs

C.

Create Applications or Groups of interest > Configure Traffic Data > Apply Policies to Sites and VPNs

D.

Configure Topology > Apply Policies to Sites and VPNs

Full Access
Question # 61

Drag and drop the REST API calls from the left onto the functions on the right.

Full Access
Question # 62

When redistribution is configured between OMP and BGP at two Data Center sites that have Direct Connection interlink, which step avoids learning the same routes on WAN Edge routers of the DCs from LAN?

A.

Define different VRFs on both DCs

B.

Set same overlay AS on both DC WAN Edge routers

C.

Set down-bit on Edge routers on DC1

D.

Set OMP admin distance lower than BGP admin distance

Full Access
Question # 63

Refer to the exhibit. An engineer must configure the Overlay Management Protocol route preference so that when B2 tries to reach host routes advertised by B1 it always chooses the MPLS circuit. Which two match conditions must be configured to accomplish this task? (Choose two.)

A.

VPN

B.

prefix list

C.

originator

D.

color list

E.

path type

Full Access
Question # 64

How does the replicator role function in cisco SD-WAN?

A.

WAN Edge devices advertise the rendezvous point to all the receivers through the underlay network.

B.

vSmart Controllers advertise the rendezvous point to all the receivers through the overlay network.

C.

WAN Edge devices advertise the rendezvous point to all receivers through the overlay network.

D.

vSmart Controllers advertise the rendezvous point to all the receivers through the underlay network.

Full Access
Question # 65

WAN Edge routers are configured manually to use UDP port offset to use nondefault offset values when IPsec tunnels are created. What is the offse range?

A.

1-19

B.

0-18

C.

0-19

D.

1-18

Full Access
Question # 66

How is the scalability of the vManage increased in Cisco SD-WAN Fabric?

A.

Increase licensing on the vManage

B.

Deploy multiple vManage controllers in a cluster

C.

Deploy more than one vManage controllers on different physical server.

D.

Increase the bandwidth of the WAN link connected to the vManage

Full Access
Question # 67

How many subnets are necessary in Azure VNet for a WAN Edge device to function in the cloud deployment?

A.

CSR is the WAN Edge device that is supported in the Microsoft cloud. The Microsoft underlay cloud fabric performs the management function.

B.

There must be three subnets in VNet: management, public, and services.

C.

One public subnet is required in VNet. The Microsoft underlay cloud fabric performs all of the routing functions for WAN Edge.

D.

Public and services subnets are required in VNet. The Microsoft underlay cloud fabric performs the management function.

Full Access
Question # 68

Refer to the exhibit vManage and vBond have an issue establishing a connection to vSmart Which two actions does the administrator take to fix the issue? (Choose two)

A.

Install the certificate received from the certificate server.

B.

Manually resync vManage and vBond

C.

Reconfigure the vSmart from CLI with the proper Hostname & System IP

D.

Delete and re-add vSmart Click Generate and validate CSR

E.

Request a certificate from the certificate server based on the CSR for the vSmart

Full Access
Question # 69

Drag and drop the steps from the left Into the order on the right to delete a software image for a WAN Edge router starting with Maintenance > Software Upgrade > Device list on vManage.

Full Access
Question # 70

An administrator wants to create a policy to add a traffic policer called "politer-ccnp" to police data traffic on the WAN Edge. Which configuration accomplishes this task in vSmart?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 71

Which policy allows communication between TLOCs of data centers and spokes and blocks communication between spokes?

A.

centralized data policy

B.

centralized control policy

C.

localized control policy

D.

localized data policy

Full Access
Question # 72

Which two metrics must a cloud Edge router use to pick the optimal path for a SaaS application reachable via a gateway site? (Choose two.)

A.

HTTP loss and latency metrics to the SaaS application

B.

ICMP loss and latency metrics to the SaaS application

C.

BFD loss and latency metrics to the gateway site

D.

BFD loss and latency metrics to the SaaS application

E.

HTTP loss and latency metrics to the gateway site

Full Access
Question # 73

What is the default value (in milliseconds) set tor the poll interval in the BFD basic configuration?

A.

300,000

B.

600,000

C.

900,000

D.

1,200,000

Full Access
Question # 74

What are the two requirements for plug-and-play provisioning on Cisco IOS XE SD-WAN devices? (Choose two.)

A.

The gateway router for the WAN Edge device must be able to reach devicehelper.cisco.com.

B.

The gateway router for the WAN Edge device must be able to reach public DNS servers.

C.

The gateway router for the WAN Edge device must be able to reach ztp.viptela.com.

D.

Devices at branch offices must be able to reach the Cisco SD-WAN vSmart controller at the headquarters site.

E.

The WAN Edge device must have a valid certificate.

Full Access
Question # 75

Refer to the exhibit. Which configuration value is used to change the administrative distance of iBGP routes to 20?

A.

Configure internal Routes Distance to 20

B.

Configure Propagate AS Path to off

C.

Configure Local Distance to 20

D.

Configure External routes distance 20

Full Access
Question # 76

What are two benefits of installing Cisco SD-WAN controllers on cloud-hosted services? (Choose two.)

A.

utilizes well-known cloud services such as Azure. AWS. and GCP

B.

accelerates Cisco SD-WAN deployment

C.

allows integration of the WAN Edge devices In the cloud

D.

installs the controllers in two cloud regions in a primary and backup setup

E.

automatically Implements zone-based firewalling on the controllers

Full Access
Question # 77

What is the behaviour of vBond orchestrator?

A.

It maintains vSmart and WAN Edge routers secure connectivity state

B.

it builds permanent connections with vSmart controllers

C.

it updates vSmart of WAN Edge routers behind NAT devices using OMP.

D.

It builds permanent connections with WAN Edge routers

Full Access
Question # 78

Refer to the exhibit.

An SD-WAN customer has 23 sites connected to its hub site, where a pair of WAN Edge devices and controllers are placed. All other branches have a single WAN Edge device connected to multiprotocol label switching (MPLS) and public internet circuits. An engineer must configure application-aware routing for a branch that has MPLS and public internet circuits provisioned using feature templates. The requirements for application-aware routing are:

    All types of traffic prefers using public-internet circuit.

    If the average latency reaches 100 ms, jitter 85 ms, and packet loss 5%, then video and voice traffic switches to the MPLS circuit.

Which feature template must be configured or modified in addition to configuring a centralized policy?

A.

OMP

B.

VPN interface ethernet

C.

BFD

D.

VPN

Full Access
Question # 79

Which encryption algorithm secures binding exchanges Between Cisco TrustSec SXP peers?

A.

SEAL

B.

3DES

C.

AES

D.

MD5

Full Access
Question # 80

I

In which file format is a critical severity report downloaded from the MONITOR I ALARM tab in the vManage GUI?

A.

.txt

B.

.pdf

C.

csv

D.

xIsx

Full Access
Question # 81

An administrator must configure an ACL for traffic coming in from the service-side VPN on a specific WAN device with circuit ID 391897770. Which policy must be used to configure this ACL?

A.

local data policy

B.

central data policy

C.

app-aware policy

D.

central control policy

Full Access
Question # 82

Which secure connection should be used to access the REST APIs through the Cisco vManage web server?

A.

HTTP inspector interface

B.

authenticated HTTPS

C.

authenticated DTLS

D.

JSON Inspector interface

Full Access
Question # 83

Which device information is required on PNP/ZTP to support the zero-touch onboarding process?

A.

interface IP address

B.

system IP address

C.

public DNS entry

D.

serial and chassis numbers

Full Access
Question # 84

What prohibits deleting a VNF image from the software repository?

A.

if the image is stored by vManage

B.

if the image is referenced by a service chain

C.

if the image is uploaded by a WAN Edge device

D.

if the image is included in a configured policy

Full Access
Question # 85

A network administrator configures SNMFV3 on a Cisco WAN Edge router from CL I for monitoring purposes How many characters are supported by the snmp user username command?

A.

from 1 to 8

B.

from 1 to 16

C.

from 1 to 32

D.

from 1 to 48

Full Access
Question # 86

Refer to the exhibit.

An organization is testing a Cisco SD-WAN solution and decided to have the control plane established first and not the data plane at the time of migration. Which configuration achieves this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 87

Which routes are similar to the IP route advertisements when the routing information of WAN Edge routers is learned from the local site and local routing protocols?

A.

service

B.

BGP

C.

TLOC

D.

OMP

Full Access
Question # 88

A customer is receiving routes via OMP from vSmart controller for a specific VPN. The customer must provide access to the W2 loopback received via OMP to the OSPF neighbor on the service-side VPN, which configuration fulfils these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 89

What problem happens on a device with two serial numbers, a unique device identifier (UDI), and secure unique device identifier (SUDI) when an engineer provisions ISR 4000 by PnP using only a UDI?

A.

It encounters spanning tree issues

B.

It faces interface buffer overflow patterns

C.

It encounters redirection problems.

D.

It encounters memory overload problems

Full Access
Question # 90

Refer to the exhibit.

The network design team has advised to use private IP addresses and private colors over the SP circuit for the data plane connections. The Public IP should be used for control connections. Which configuration should be applied at SiteA to achieve this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 91

A customer has MPLS and Internet as the TLOC colors An engineer must configure conlroJIers with the Internet and not with MPLS Which configuration achieves this requirement on vManage?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 92

A network engineer must configure all branches to communicate with each other through the Service Chain Firewall located at the headquarters site. Which configuration allows the engineer to accomplish this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 93

An enterprise needs DIA on some of its branches with a common location ID: A041:B70C: D78E::18 Which WAN Edge configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 94

Which two services are critical for zero touch provisioning on-boarding? (Choose two)

A.

SNMP

B.

DNS

C.

DHCP

D.

AAA

E.

EMAIL

Full Access
Question # 95

Refer to the exhibit. A network administrator is configuring OSPF advanced configuration pararmeters from a template using the vManager GUI for a branch WAN Edge router to calculate the cost of summary routes to an ASBR. Which action achieves this configuration?

A.

Disable RFC 1583 Compatiblt

B.

Enable Originate

C.

Enable RFC 1M3 Compatible

D.

Disable Original

Full Access
Question # 96

In the Cisco SD_WAN solution, vSmart controller is responsible for which two actions? (Choose two.)

A.

Distribute crypto key information among vEdge routers

B.

Configure and monitor vEdge routers.

C.

Authenticate and authorize vEdge routers.

D.

Distribute the IP address from DHCP server to vEdge routers.

E.

Distribute route and policy information via OMP.

Full Access
Question # 97

An engineer is configuring a list that matches all IP prefixes with lengths from /1 to /16 in a centralized control policy. Which list accomplishes this task?

A.

0.0.0.0/1 le 16

B.

0.0.0.0/0 ge 1

C.

0.0.0.0/0 le l6

D.

0.0.0.0/16 ge 1

Full Access
Question # 98

Which queue must an engineer configure for control and BFD traffic for convergence on a WAN Edge router?

A.

queue 0

B.

queue 1

C.

queue 2

D.

queue 7

Full Access
Question # 99

Which configuration allows VPN 10 traffic to have direct internet access locally from the WAN Edge device?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 100

Which data policy configuration influences BGP routing traffic flow from LAN to WAN?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 101

A bank is looking for improved customer experience for applications and reduce overhead related to compliance and security. Which key feature or features of the Cisco SD-WAN solution will help the bank to achieve their goals?

A.

Integration with PaaS providers to offer the best possible application experience

B.

QoS including application prioritization and meeting critical applications SLA for selecting optimal path.

C.

implementation of a modem age core banking system

D.

implementation of BGP across the enterprise routing for selecting optimal path

Full Access
Question # 102

Which value of the IPsec rekey timer must be set by the engineer for an OMP graceful restart value set for 24 hours?

A.

6 hours

B.

12 hours

C.

36 hours

D.

48 hours

Full Access
Question # 103

What is a benefit of using REST APIs?

A.

predefined automation and orchestration platform for event management and logging

B.

user-defined automation and integration into other orchestration systems or tools

C.

vAnalytics to simplify operational services integration and real-time event monitoring

D.

predefined SD-WAN controller with other platform integration for event management and logging

Full Access
Question # 104

Which website allows access to visualize the geography screen from vManager using the internet?

A.

*.opcnstreetmaps.org

B.

*.fullstreetmaps.org

C.

*.callstreelmaps.org

D.

*.globaistreetmaps.org

Full Access
Question # 105

The Cisco SD-WAN engineer is configuring service chaining for a next-generation firewall located at the headquarters. Which configuration creates the service?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 106

Which type of connection is created between a host VNet and a transit VNet when configuring Cloud OnRamp for laaS?

A.

Azure private endpoint

B.

GRE tunnel

C.

IPsec tunnel

D.

Azure peer link

Full Access
Question # 107

How is vBond reachability resolved by vManage?

A.

OMP

B.

DNS

C.

BGP

D.

IPsec

Full Access
Question # 108

Which two vRoute attributes should be matched or set in vSmart policies and modified by data policies? (Choose two.)

A.

site ID

B.

preference

C.

VPN

D.

TLOC

E.

origin

Full Access
Question # 109

Refer to the exhibit A WAN Edge device was recently added to vManage but a control connection could not be established Which action resolves this issue?

A.

Rectify the Rod CA certificate mismatch on WAN Edge devices

B.

Install the bootstrap code on WAN Edge and check for CSR

C.

Send the serial number to vBond from the vManage controller.

D.

Resolve the ZTP reachability and rectify smart account credentials issue

Full Access
Question # 110

REST applications communicate over HTTP or HTTPS to make calls between network devices. Which two HTTPS standard methods are included? (Choose two.)

A.

Array

B.

DELETE

C.

POST

D.

Scalar

E.

Object

Full Access
Question # 111

An engineer is adding a tenant with location JD 306432373 in vManage. What is the maximum number of alphanumeric characters that are accepted in the tenant name field?

A.

64

B.

128

C.

256

D.

8

Full Access
Question # 112

Which type of route represents prefixes received from a local site via an SD-WAN Edge router in a Cisco SD-WAN architecture?

A.

TLOC routes

B.

Service routes

C.

Multicast routes

D.

vRoutes

Full Access
Question # 113

What are the two functions of vSmart? (Choose two)

A.

It orchestrates connectivity between WAN Edge routers using policies to create network topology

B.

It ensures that valid WAN Edge routers can build the control pane connectivity

C.

It uses TLOCs to uniquely identify the circuit interface to control plane and data plane information

D.

It validates that the WAN Edge trying to join the overlay is authorized to join.

E.

It builds control plane connections with WAN Edge routers using ILS or UILS

Full Access
Question # 114

Which service VPN must be reachable from all WAN Edge devices and the controllers?

A.

VPN0

B.

VPN10

C.

VPN215

D.

VPN512

Full Access
Question # 115

Refer to the exhibit. A network administrator is setting the queueing value for voice traffic for one of the WAN Edge routers using vManager GUI. Which queue value must be set to accomplish this task?

A.

0

B.

1

C.

2

D.

3

Full Access
Question # 116

Refer to the exhibit.

An enterprise has enabled load balancing over MPLS and Internet links. Which feature from the monitoring tool does an engineer use to visualize the available links utilized by the data traffic between Service VPNs?

A.

Simulate Flows

B.

App Route Visualization

C.

Top Talkers

D.

Control Connections (Live View)

Full Access
Question # 117

What is the function of colocation in Cloud OnRamp SaaS?

A.

Cloud OnRamp incorporates regional colocation facilities by choosing between cloud access points at the remote site and regional cloud access points at the colocation facilities.

B.

The Cloud OnRamp for colocation solution restricts the creation of different VNF service chains orchestrated in Cisco vManage and deployed on a cluster in a colocation facility.

C.

In Cloud OnRamp. colocation supports the capability of virtualizing access-only locations and using colocation centers that require the customer to extend to the cloud.

D.

With colocation facility in Cloud OnRamp. the customer faces challenges to virtualize the security and optimization infrastructure that influence traffic through network elements.

Full Access
Question # 118

If Smart Account Sync is not used, which Cisco SD-WAN component is used to upload an authorized serial number file?

A.

WAN Edge

B.

vManage

C.

vSmart

D.

vBond

Full Access
Question # 119

Refer to the exhibit. Which configuration stops Netconf CLI logging on WAN Edge devices during migration?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 120

How must the application-aware enterprise firewall policies be applied within the same WAN Edge router?

A.

within and between zones

B.

between two VPN tunnels

C.

within zone pair

D.

between two VRFs

Full Access
Question # 121

What are the two impacts of losing vManage connectivity to fabric in the Cisco SD-WAN network? (Choose two)

A.

Policy changes propagation stops

B.

Statistics collection stops

C.

BFD peering between WAN Edge devices are unestablished

D.

Creation of templates is impossible

E.

IPsec tunnels tear down for WAN Edge devices.

Full Access
Question # 122

How is a TLOC uniquely identified from a WAN Edge router to the SD-WAN transport network?

A.

system IP address

B.

VPN ID

C.

OMP

D.

SD-WAN site ID

Full Access
Question # 123

Which two products that perform lifecycle management for virtual instances are supported by WAN Edge cloud routers? (Choose two.)

A.

OpenStack

B.

AWS

C.

VMware vCenter

D.

Azure

E.

IBM Cloud

Full Access
Question # 124

Which command verifies a policy that has been pushed to the vEdge router?

A.

vEdge# show running-config data policy

B.

vEdge# show policy from-vsmart

C.

vSmart# show running-config policy

D.

vSmart# show running-config apply-policy

Full Access
Question # 125

Which protocol is used for the vManage to connect to the vSmart Controller hosted in Cloud?

A.

PnP Server

B.

ZTP

C.

NETCONF

D.

HTTP

Full Access
Question # 126

Refer to the exhibit. A Cisco SD-WAN network carries traffic for several departments and over 1200 users with several applications at site A and site B branches over the MPLS1 circuit. An engineer is provisioning a higher bandwidth on-demand metro circuit as a backup connection. Which two configurations must the engineer apply to implement the on-demand tunnels? (Choose two.)

A.

B.

C.

D.

E.

Full Access
Question # 127

Refer to the exhibit. The ge0/0 interface connects to a 30-MB link. A network administrator wants to always have 10 MB available for high priority traffic. When lower-priority traffic busts exceed 20 MB. Traffic should be redirected to the second WAN interface ge0/1. Which set of configurations accomplishes this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 128

Drag and drop the actions from the left into the correct sequence on the right to create a data policy to direct traffic to the Internet exit.

Full Access
Question # 129

Which vBond system configuration under VPN 0 allows for a routable public IP address even if the DNS name, hostname, or IP address of the vBond orchestrator are omitted?

A.

local

B.

vbond-only

C.

dns-name

D.

WAN

Full Access
Question # 130

Which feature template configures OMP?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 131

Drag and drop the alarm states from the left onto the corresponding alarm descriptions on the right.

Full Access
Question # 132

The network administrator is configuring a QoS scheduling policy on traffic received from transport side tunnels on WAN Edge 5000 routers at location 406141498 Which command must be configured on these devices?

A.

cloud-qos

B.

service qos

C.

cloud-mis qos

D.

mis qos

Full Access
Question # 133

A policy is created to influence routing in the network using a group of prefixes. What policy application will achieve this goal when applied to a site list?

A.

Vpn-membership policy

B.

Control-policy

C.

cflowd-template

D.

App-route policy

Full Access