Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Enterprise > 300-415

300-415 Implementing Cisco SD-WAN Solutions (300-415 ENSDWI) Question and Answers

Question # 4

Which VManage dashboard is used to monitor the next-hop reachability between two devices traversing through OMP for a service VPN’

A.

Troubleshooting > App Route Visualization

B.

Troubleshooting > Tunnel Health

C.

Troubleshooting > Simulate Flows

D.

Troubleshooting > Packet Capture

Full Access
Question # 5

Which policy configures an application-aware routing policy under Configuration > Policies?

A.

Localized policy

B.

Centralized policy

C.

Data policy

D.

Control policy

Full Access
Question # 6

What is a description of vManage NMS?

A.

It is accessible only from VPN 512 (the management VPN).

B.

A cluster requires device templates to be created on and attached to the same server

C.

It is a software process on a dedicated WAN Edge router in the network.

D.

A cluster consists of a minimum of two vManage NMSs

Full Access
Question # 7

What is the OMP graceful restart default value on vSmart controllers and WAN Edge routers?

A.

21,600 seconds

B.

43,200 seconds

C.

86,400 seconds

D.

604,800 seconds

Full Access
Question # 8

Drag and drop the attributes from the left that make each transport location unique onto the right. Not all options are used.

Full Access
Question # 9

What is the maximum number of IPsec that are temporarily created and converged on a new set if IPsec Sas in the pairwise keys process during a simultaneous rekey?

A.

2

B.

4

C.

6

D.

8

Full Access
Question # 10

Refer to the exhibit.

A customer wants to implement primary and secondary Cisco SD-WAN overlay routing for prefixes that are advertised for both data centers. The east data center (TLOC 101.101.101.101) is primary for east sites, and the west data center (TLOC 100.100.100.100) is primary for west sites. Which configuration change achieves this objective?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 11

An engineer is troubleshooting a certificate issue on vEdge. Which command is used to verify the validity of the certificates?

A.

show control local-properties

B.

show control summary

C.

show certificate installed

D.

show certificate status

Full Access
Question # 12

Refer to the exhibit.

Customer XYZ cannot provison dual connectivity on both Its routers due to budget constratnts but wants to use tnth RI and R2 interface for users behind them for load toward the hub site Which configurauon achieves this objectives?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 13

Which configuration allows users to reach YouTube from a local Internet breakout?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 14

Which two sets of identifiers does OMP carry when it advertises TLOC routes between WAN Edge routers? (Choose two.)

A.

TLOC public and private address, carrier, and preference

B.

source and destination IP address, MAC, and site ID

C.

system IP address, link color, and encapsulation

D.

VPN ID, local site network, and BGP next-hop IP address

E.

TLOC public and private address, tunnel ID, and performance

Full Access
Question # 15

A network engineer must configure all branches to communicate with each other through the Service Chain Firewall located at the headquarters site. Which configuration allows the engineer to accomplish this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 16

What are the two components of an application-aware firewall? (Choose two.)

A.

zone pair

B.

sequence

C.

lists

D.

default action

E.

sequence action

F.

firewall policy

Full Access
Question # 17

Refer to the exhibit.

Which command-line configuration on a WAN Edge device achieves these results?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 18

Drag and drop the steps from the left into the sequence on the right for a WAN Edge router after powering on for zero touch provisioning.

Full Access
Question # 19

A network administrator is configuring VRRP to avoid a traffic black hole when the transport side of the network is down on the master device. What must be configured to get the fastest failover to standby?

A.

lower timer interval

B.

prefix-list tracking

C.

higher group ID number

D.

OMP tracking

Full Access
Question # 20

A network is configured with IP connectivity, and the routing protocol between devices started having problems right after the maintenance window to implement network changes. Troubleshoot and resolve to a fully functional network to ensure that:

R4

R5

Full Access
Question # 21

Which Cisco SD-WAN configuration provides the advantages of day-zero deployment and reusable configuration components?

A.

CLI-based templates

B.

configuration groups

C.

configuration via the vBond controller

D.

configuration through a Cisco Prime server

Full Access
Question # 22

An engineering team must prepare a traffic engineering policy where an MPLS circuit is preferred for traffic coming from the Admin VLAN Internet should be used as a backup only. Which configuration fulfill this requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 23

Refer to the exhibit.

Customer XYZ cannot provision dual connectivity on both of its routers due to budget constraints but wants to use both R1 and R2 interlaces for users behind them for load balancing toward the hub site. Which configuration achieves this objective?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 24

Refer to the exhibit. A customer wants to deploy service insertion at site1. Which traffic from VPN 10 must route to this site through a firewall. A policy must be in place to route VPN 10 traffic from all sites toward this firewall. Which configuration must be on the vSmart controller to meet this requirement?

A.

B.

B.

C.

C.

D.

D.

Full Access
Question # 25

Drag and drop the actions from the left into the correct sequence on the right to create a data policy to direct traffic to the Internet exit.

Full Access
Question # 26

Which timer specifies information in the cache after all OMP sessions are lost at location S0123T4E56F78?

A.

advertisement interval

B.

EOR timer

C.

graceful restart timer

D.

hold time

Full Access
Question # 27

An administrator wants to create a policy to add a traffic policer called "politer-ccnp" to police data traffic on the WAN Edge. Which configuration accomplishes this task in vSmart?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 28

An engineer must configure VRRP for redundancy on WAN Edge router1 running an earlier version than 20.6, considering WAN Edge router2 is configured correctly. Which configuration meets the requirement?

A.

B.

B.

C.

C.

D.

D.

Full Access
Question # 29

How are custom application ports monitored in Cisco SD-WAN controllers?

A.

Customers add custom application ports in vAnalytics and vManage.

B.

Customers add custom application ports in vAnalytics and vSmart.

C.

Cisco adds custom application ports In vAnalytics and vManage.

D.

Cisco adds custom application ports In vAnalytics and vSmart.

Full Access
Question # 30

A company must avoid downtime at the remote sites and data plane to continue forwarding traffic between WAN Edge devices if the branch router loses connectivity to its OMP peers Which configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 31

How is the scalability of the vManage increased in Cisco SD-WAN Fabric?

A.

Increase licensing on the vManage

B.

Deploy multiple vManage controllers in a cluster

C.

Deploy more than one vManage controllers on different physical server.

D.

Increase the bandwidth of the WAN link connected to the vManage

Full Access
Question # 32

Which two protocols are supported for software image delivery when images are hosted on a remote server? (Choose two.)

A.

HTTPS

B.

SSL

C.

HTTP

D.

TFTP

E.

FTP

Full Access
Question # 33

Which multicast component is irrelevant when defining a multicast replicator outside the local network without any multicast sources or receivers?

A.

PIM interfaces

B.

TLOC

C.

overlay BFD

D.

OMP

Full Access
Question # 34

An administrator must configure an ACL for traffic coming in from the service-side VPN on a specific WAN device with circuit ID 391897770. Which policy must be used to configure this ACL?

A.

local data policy

B.

central data policy

C.

app-aware policy

D.

central control policy

Full Access
Question # 35

Refer to the exhibit.

The network design team has advised to use private IP addresses and private colors over the SP circuit for the data plane connections. The Public IP should be used for control connections. Which configuration should be applied at SiteA to achieve this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 36

An engineer configured a data policy called ROME-POLICY. Which configuration allows traffic flow from the Rome internal network toward other sites?

A.

apply-policy site-list Rome data-policy ROME-POLICY from-tunnel

B.

apply-policy site-list Rome data-policy ROME-POLICY from-service

C.

site-list Rome control-policy ROME-POLICY in

D.

site-list Rome control-policy ROME-POLICY out

Full Access
Question # 37

Refer to the exhibit.

What does the BFD value of 8 represent?

A.

number of BFD sessions

B.

hello timer of BFD session

C.

poll-interval of BFD session.

D.

dead timer of BFD session

Full Access
Question # 38

Which routing protocol has the highest default administrative distance?

A.

OMP

B.

external EIGRP

C.

IS-IS

D.

IBGP

Full Access
Question # 39

Which two different states of a WAN Edge certificate are shown on vManage? (Choose two.)

A.

inactive

B.

active

C.

staging

D.

invalid

E.

provisioned

Full Access
Question # 40

Which policy tracks path characteristics such as loss, latency, and jitter in vManage?

A.

VPN

B.

control

C.

app-route

D.

data

Full Access
Question # 41

Which device information is required on PNP/ZTP to support the zero-touch onboarding process?

A.

interface IP address

B.

system IP address

C.

public DNS entry

D.

serial and chassis numbers

Full Access
Question # 42

How do WAN Edge devices operate when vSmart is inaccessible or fails to be reached by the WAN Edge?

A.

They cease to forward traffic in the data plane.

B.

They continue operation normally.

C.

They continue to receive reachability updates.

D.

They continue operating normally for a configurable time.

Full Access
Question # 43

Which control policy assigned to Drenches in the out direction establishes a strict hub-and-spoke topology tor VPN2?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 44

An engineer must apply the configuration for certificate installation to vBond Orchestrator and vSmart Controller. Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 45

Refer to the exhibit Cisco SD-WAN is deployed with controllers hosted in a data center All branches have WAN Edge devices with dual connections to the data center one via Internet and the other using MPLS Three branches out of 20 have issues with their control connections on MPLS circuit The local error refers to Control Connection Failure Which action resolves the issue*?

A.

Rectify any issues with the underlay routing configuration

B.

Match the TLOC color on the controllers and all WAN Edge devices

C.

Match certificates for the DTLS connection and Root CA must be installed first on WAN Edge devices

D.

Update the system IP on vManage and then resend it to the controllers

Full Access
Question # 46

When VPNs are grouped to create destination zone in Zone-Based Firewall, how many zones can a single VPN be part of?

A.

two

B.

four

C.

one

D.

three

Full Access
Question # 47

A network administrator is configuring a centralized control policy based on match action pairs for multiple conditions, which order must be configured to prefer Prefix List over TLOC and TLOC over Origin?

A.

highest to lowest sequence number

B.

nonsequential order

C.

deterministic order

D.

lowest to highest sequence number

Full Access
Question # 48

What is a key element used in a vBond Orchestrator redundancy topology?

A.

fully qualified domain name

B.

DHCP server

C.

load-balancer with health probes

D.

stun server

Full Access
Question # 49

Which OMP route is selected for equal OMP route preference values on WAN Edge routers?

A.

route with higher TLOC preference value

B.

route with origin type of connected

C.

route with origin type of static

D.

route with lower TLOC preference value

Full Access
Question # 50

What is the order of operations for software upgrades of Cisco SD-WAN nodes'?

A.

vBond vManage vSmart WAN Edge

B.

vManage vBond WAN Edge. vSmart

C.

vManage vSmart, vBond, WAN Edge

D.

vManage vBond vSraart WAN Edge

Full Access
Question # 51

What problem happens on a device with two serial numbers, a unique device identifier (UDI), and secure unique device identifier (SUDI) when an engineer provisions ISR 4000 by PnP using only a UDI?

A.

It encounters spanning tree issues

B.

It faces interface buffer overflow patterns

C.

It encounters redirection problems.

D.

It encounters memory overload problems

Full Access
Question # 52

In which Cisco SD-WAN deployment scenario does Cisco Umbrella SIG deliver the most value?

A.

when a centralized Internet breakout solution is implemented

B.

when resource-intensive security operations are offloaded from entry-level WAN Edge devices

C.

when the identity of several WAN Edge devices is verified throughout the networkthroughout the network

Full Access
Question # 53

Drag and drop the components from the left onto the corresponding Cisco NFV infrastructure Building Blocks on the right. Not all options are used.

Full Access
Question # 54

Which two vRoute attributes should be matched or set in vSmart policies and modified by data policies? (Choose two.)

A.

site ID

B.

preference

C.

VPN

D.

TLOC

E.

origin

Full Access
Question # 55

Refer to the exhibit A small company was acquired by a large organization As a result, the new organization decided to update information on their Enterprise RootCA and generated a new certificate using openssl Which configuration updates the new certificate and issues an alert in vManage Monitor | Events Dashboard?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 56

Which policy is configured to ensure that a voice packet is always sent on the link with less than a 50 msec delay?

A.

localized data policy

B.

localized control policy

C.

centralized data policy

D.

centralized control policy

Full Access
Question # 57

Which device information is requited on PNP/ZTP to support the zero-touch onboarding process?

A.

serial and chassis numbers

B.

interface IP address

C.

public DNS entry

D.

system IP address

Full Access
Question # 58

Refer to the exhibit. The ge0/0 interface connects to a 30-MB link. A network administrator wants to always have 10 MB available for high priority traffic. When lower-priority traffic busts exceed 20 MB. Traffic should be redirected to the second WAN interface ge0/1. Which set of configurations accomplishes this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 59

An engineer is applying QoS policy for the transport-side tunnel interfaces to enable scheduling and shaping for a WAN Edge cloud router Which command accomplishes the task?

A.

cloud-qos-service-side

B.

qos-scheduler QOS_0

C.

qos-map QOS

D.

rewrite-rule QOS-REWRITE

Full Access
Question # 60

An engineer must improve video quality by limiting HTTP traffic to the Internet without any failover. Which configuration in vManage achieves this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 61

What does forward error correction addresses in Cisco SO-WAN?

A.

inefficient traffic forwarding caused oy inbound shapers

B.

reduced application performance degradation rotated to service degradation

C.

applications with occasional invalid data input and poor performance

D.

traffic flows with increased delay over a particular transport

Full Access
Question # 62

Drag and drop the vManage policy configuration procedures from the left onto the correct definitions on the right.

Full Access
Question # 63

Refer to the exhibit.

Which two configurations are needed to get the WAN Edges registered with the controllers when certificates are used? (Choose two)

A.

Generate a CSR manually within vManage server

B.

Generate a CSR manually on the WAN Edge

C.

Request a certificate manually from the Enterprise CA server

D.

Install the certificate received from the CA server manually on the WAN Edge

E.

Install the certificate received from the CA server manually on the vManage

Full Access
Question # 64

A network administrator is creating an OMP feature template from the vManage GUI to be applied to WAN edge routers. Which configuration attribute will avoid the redistribution of the routes back into the OMP from the LAN side?

A.

configure "Number of Paths Advertised per Prefix"

B.

configure "Overlay AS Number"

C.

configure "Send Backup Paths"

D.

configure "ECMP limit"

Full Access
Question # 65

An enterprise needs DIA on some of its branches with a common location ID: A041:B70C: D78E::18 Which WAN Edge configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 66

Refer to the exhibit.

Which configuration change is needed to configure the tloc-extention on Branch1-Edge1?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 67

Refer to the exhibit.

The SD-WAN network is configured with a default full-mesh topology. The SD-WAN engineer wants the Barcelona WAN Edge to use MPLS TLOC as the preferred TLOC when communicating with Rome site. Which configuration must the engineer use to create a list to select MPLS color toward the Rome TLOC?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 68

An engineer provisions a WAN Edge router. Which command should be used from the WAN Edge router to activate it with vManage?

A.

request vedge-cloud activate serial token

B.

request vedge-cloud activate chassis-number organization

C.

request vedge-cloud activate chassis-number token

D.

request vedge-cloud activate chassis-number serial <:serial>

Full Access
Question # 69

The Cisco SD-WAN engineer is configuring service chaining for a next-generation firewall located at the headquarters. Which configuration creates the service?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 70

Which TLOC color is used for site-to-site communication in a Google Cloud integration with Cisco SD-WAN?

A.

Private1

B.

private2

C.

private3

D.

private4

Full Access
Question # 71

A network administrator is configuring an application-aware firewall between inside zones to an outside zone on a WAN edge router using vManage GUI. What kind of Inspection is performed when the ‘’inspect’’ action is used?

A.

stateful inspection for TCP and UDP

B.

stateful inspection for TCP and stateless inspection of UDP

C.

IPS inspection for TCP and-Layer 4 inspection for UDP

D.

Layer 7 inspection for TCP and Layer 4 inspection for UDP

Full Access
Question # 72

In a Cisco SD-WAN network, which component is responsible for distributing route and policy information via the OMP?

A.

vManage

B.

vSmart Controler

C.

vBond Orchestrator

D.

WAN Edge Router

Full Access
Question # 73

An engineer creates this data policy for DIA for VPN 10:

Which policy sequence enables DIA for external networks?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 74

Two sites have one WAN Edge each WAN Edge has two public TLOCs with no restriction configured. There is full reachability between the TLOCs. How many data tunnels are formed on each Edge router?

A.

2

B.

8

C.

6

D.

4

Full Access
Question # 75

Drag and drop the BFD parameters from the left onto the BFD configurations on the right.

Full Access
Question # 76

An engineer is adding a tenant with location ID 399533345 in vManage. What is the maximum number of alphanumeric characters that is accepted in the tenant name filed?

A.

64

B.

128

C.

256

D.

8

Full Access
Question # 77

What do receivers request to join multicast streams in a Cisco SO-WAN network?

A.

IGMP membership reports directly with a multicast router.

B.

Multicast service routes with the vSmart controller

C.

IGMP membership reports directly with the vBond orchestrator.

D.

PIM messages with the nearest neighboring multicast router.

Full Access
Question # 78

How is an event monitored and reported for an individual device in the overlay network at site ID:S4300T6E43F36?

A.

The device sends event notifications to vManage.

B.

The device sends notifications to vSmart that sends them to vManage.

C.

The device sends a critical alarm of events to vManage.

D.

The device sends a critical alarm to vSmart that sends it to vManage.

Full Access
Question # 79

Which two products that perform lifecycle management for virtual instances are supported by WAN Edge cloud routers? (Choose two.)

A.

OpenStack

B.

AWS

C.

VMware vCenter

D.

Azure

E.

IBM Cloud

Full Access
Question # 80

Refer to the exhibit.

The network team must configure branch B WAN Edge device 103 to establish dynamic full-mesh IPsec tunnels between all colors with branches over MPLS and Internet circuits. The branch ts configured with:

Which configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 81

Exhibit.

The SD-WAN network Is configured with a default full-mesh topology. The network engineer wants the Rome WAN Edge to use the MPLS TLOC as the preferred TLOC when ….. Telnet traffic as long as me MPLS Ink has these, characteristics:

Loss: 5%

Latency: 100ms

Jitter: 100 ms

Which configuration must the network engineer use to create a list that that classifies the MPLS link characteristics?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 82

Which port is used for vBond under controller certificates if no alternate port is configured?

A.

12345

B.

12347

C.

12346

D.

12344

Full Access
Question # 83

A Cisco SD-WAN customer has a requirement to calculate the SHA value for files as they pass through the device to see the returned disposition and determine if the file is good, unknown or malicious. The customer also wants to perform real-time traffic analysis and generate alerts when threats are detected Which two Cisco SD-WAN solutions meet the requirements? (Choose two.)

A.

Cisco Trust Anchor Module

B.

Cisco Threat Grid

C.

Cisco Snort IPS

D.

Cisco AMP

E.

Cisco Secure Endpoint

Full Access
Question # 84

Which command disables the logging of syslog messages to the local disk?

A.

no system logging disk enable

B.

no system logging disk local

C.

system logging disk disable

D.

system logging server remote

Full Access
Question # 85

An administrator needs to configure SD-WAN to divert traffic from the company's private network to an ISP network. What action should be taken to accomplish this goal?

A.

configure the control policy

B.

configure the data policy

C.

configure the data security policy

D.

configure the application aware policy

Full Access
Question # 86

An engineer modifies a data policy for DIA in VPN 200 to meet the requirements for traffic destined to these locations:

* external networks; must be translated

* external networks; must use a public TLOC color

* syslog servers, must use a private TLOC color

Here is the existing data policy configuration:

Which policy configuration sequence set meets the requirements?

A.

B.

B.

C.

C.

Full Access
Question # 87

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

A.

A domain is nonexistent.

B.

A domain is block-listed.

C.

A domain is locally reachable.

D.

A domain is grey-listed.

Full Access
Question # 88

How does the replicator role function in cisco SD-WAN?

A.

WAN Edge devices advertise the rendezvous point to all the receivers through the underlay network.

B.

vSmart Controllers advertise the rendezvous point to all the receivers through the overlay network.

C.

WAN Edge devices advertise the rendezvous point to all receivers through the overlay network.

D.

vSmart Controllers advertise the rendezvous point to all the receivers through the underlay network.

Full Access
Question # 89

Refer to the exhibit. The network administrator has configured a centralized topology policy that results in the displayed routing table at a branch office. Which two configurations are verified by the output? [Choose two.)

A.

The routing table is for the transport VPN.

B.

The default route is learned via OMP.

C.

This routing table is from a cEdge router.

D.

The default route is configured locally.

E.

The configured policy is adding a route tag of 300 to learned routes.

Full Access
Question # 90

What is a benefit of the application-aware firewall?

A.

It blocks traffic by MAC address

B.

It blocks traffic by MTU of the packet.

C.

It blocks traffic by application.

D.

It blocks encrypted traffic

Full Access
Question # 91

Refer to the exhibit An engineer must configure a QoS policy between me hub and site A (spoke) over a standard internet circuit where traffic shaping is adjusted automatically based on evaiiabk» bandwidth Which configuration meets the requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 92

An administrator is configuring the severity level on the vManage NMS for events that indicate that an action must be taken immediately. Which severity level must be configured?

A.

warning

B.

error

C.

critical

D.

alert

Full Access
Question # 93

An engineer is configuring a list that matches all IP prefixes with lengths from /1 to /16 in a centralized control policy. Which list accomplishes this task?

A.

0.0.0.0/1 le 16

B.

0.0.0.0/0 ge 1

C.

0.0.0.0/0 le l6

D.

0.0.0.0/16 ge 1

Full Access
Question # 94

Which Cisco router provides a distributed multicore architecture optimized for SD-WAN branch support?

A.

Cisco 1000 ISR series

B.

Cisco 2900 ISR series

C.

Cisco Catalyst 3850 series

D.

Cisco 3900 ISR series

Full Access
Question # 95

Which two hardware platforms support Cisco IOS XE SD-WAN images'' (Choose two)

A.

ASR1000 series

B.

ISR9300 series

C.

vEdge-1000 series

D.

ASR9000 series

E.

ISR4000 series

Full Access
Question # 96

Which component of the Cisco SD-WAN control plane architecture should be located in a public Internet address space and facilitates NAT-traversal?

A.

vBond

B.

WAN Edge

C.

vSmart

D.

vManage

Full Access
Question # 97

Refer to the exhibit.

An enterprise has hub and spoke topology where it has several VPNs. An engineer must allow users in VPN91 to reach users in VPN92 and VPN10 to reach VPN91 and VPN92. Which configuration meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 98

Refer to the exhibit. An ongineer configured OMP with an ovorlay-as of 10666. What is tho AS-PATH for prefix 104.104.104.104/32 on R1007?

A.

100 10666 104

B.

100 10666

C.

100 10666 20 104

D.

100 20 104

Full Access
Question # 99

A customer has 1 to 100 service VPNs and wants to restrict outbound updates for VPN1 Which control policy configuration restricts these updates?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 100

Which configuration allows VPN 10 traffic to have direct internet access locally from the WAN Edge device?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 101

Drag and drop the alarm slates from the left onto the corresponding alarm descriptions on the right.

Full Access
Question # 102

If Smart Account Sync is not used, which Cisco SD-WAN component is used to upload an authorized serial number file?

A.

WAN Edge

B.

vManage

C.

vSmart

D.

vBond

Full Access
Question # 103

Which encryption algorithm is used for encrypting SD-WAN data plane traffic?

A.

Triple DES

B.

IPsec

C.

AES-128

D.

AES-256 GCM

Full Access
Question # 104

Which configuration step is taken on vManage after WAN Edge list is uploaded?

A.

Send the list to controllers

B.

Enable the ZTP process

C.

Verify the device certificate

D.

Set the device as valid

Full Access
Question # 105

Refer to the exhibit.

An organization is testing a Cisco SD-WAN solution and decided to have the control plane established first and not the data plane at the time of migration. Which configuration achieves this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 106

Which actions must be taken to allow certain departments to require firewall protection when interacting with data center network without including other departments? (Choose two.)

A.

Use classification policing and marking

B.

Apply data policies at vEdge.

C.

Deploy a service-chained firewall service per VPN

D.

The regional hub advertises the availability of the firewall service

E.

Advertise lo vSmart controllers

Full Access
Question # 107

Which two virtualized environments are available for a company to install the controllers using the on-premises model? (Choose two )

A.

VMware vSphere ESXi

B.

VMware Workstation

C.

kernel-based virtual machine

D.

OpenStack

E.

Microsoft Hyper-V

Full Access
Question # 108

Drag and drop the devices from the left into order on the right to upgrade the software from version 19 to version 20.

Full Access
Question # 109

Which component is responsible for routing protocols such as BGP and OSPF in a Cisco SD-WAN solution?

A.

vSmart Controller

B.

vBond Orchestrator

C.

vManage

D.

WAN Edge Router

Full Access
Question # 110

Which third-party Enterprise CA server must be used (or a cloud-based vSmart controller?

A.

RootCert

B.

Microsoft

C.

RADIUS

D.

VeriSign

Full Access
Question # 111

Refer to exhibit. An engineer is troubleshooting tear of control connection even though a valid CertificateSerialNumber is entered. Which two actions resolve Issue? (Choose two)

A.

Restore network reachability on the controller.

B.

Enter a valid serial cumber on the controller for a given device

C.

Enter a valid product ID (mode) on the PNP portal.

D.

Match the serial number file between the controller

E.

Remove the duplicate IP in the network

Full Access
Question # 112

Refer to the exhibit The network team must configure application-aware routing for the Service VPN 50.0.0.0/16 The SLA must prefer MPLS for video traffic but the remaining traffic must use a public network What must be defined other than applications before the application-aware policy is create?

A.

SLA Class, Site VPN. Prefix

B.

Data Prefix, Site VPN TLOC

C.

Application, SLA VPN. Prefix

D.

Color, SLA Class, Sue, VPN

Full Access
Question # 113

In which device state does the WAN edge router create control connections, but data tunnels are not created?

A.

valid

B.

backup

C.

active

D.

staging

Full Access
Question # 114

How many concurrent sessions does a vManage REST API have before it invalidates the least recently used session if the maximum concurrent session number is reached?

A.

150

B.

200

C.

250

D.

300

Full Access
Question # 115

The network administrator is configuring a QoS scheduling policy on traffic received from transport side tunnels on WAN Edge 5000 routers at location 406141498 Which command must be configured on these devices?

A.

cloud-qos

B.

service qos

C.

cloud-mis qos

D.

mis qos

Full Access
Question # 116

Which two REST API functions are performed for Cisco devices in an overlay network? (Choose two)

A.

distributing a Snort image among devices

B.

attaching a device configuration template

C.

managing connections for smart licensing

D.

monitoring device certificates

E.

querying a device and aggregating statistics

Full Access
Question # 117

Refer to the exhibit. An engineer is troubleshooting a control connection issue on a WAN Edge device that shows socket errors. The packet capture shows some ICMP packets dropped between the two devices. Which action resolves the issue?

A.

Recover the vManage controller that is down m a high availability cluster

B.

Change the system IP or restart the VWN Edge 4 the system IP is changed

C.

Remove IP duplication in the network and configure a unique IP address

D.

Recover vBond or wart for the controller to reload which could be caused by a reset

Full Access
Question # 118

When redistribution is configured between OMP and BGP at two Data Center sites that have Direct Connection interlink, which step avoids learning the same routes on WAN Edge routers of the DCs from LAN?

A.

Define different VRFs on both DCs

B.

Set same overlay AS on both DC WAN Edge routers

C.

Set down-bit on Edge routers on DC1

D.

Set OMP admin distance lower than BGP admin distance

Full Access
Question # 119

Which two criteria ate supported to filter traffic on a Cisco Umbrella Cloud-delivered firewall? (Choose two )

A.

tunnels

B.

site ID

C.

URL

D.

geolocation

E.

protocol

Full Access
Question # 120

Which two products are used to deploy Cisco WAN Edge Router virtual platforms? (Choose two.)

A.

HP ProLiant DL360 Generatton10 running HP-UX

B.

Cisco ENCS 5000 Series

C.

Sun SPARC Node running AIX

D.

Cisco UCS

E.

Sun Enterprise M4000 Server running Sun Solans

Full Access
Question # 121

Drag and drop the devices from the left onto the correct functions on the right.

Full Access