Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Cisco 300-415 Implementing Cisco SD-WAN Solutions (300-415 ENSDWI) Exam Practice Test

Page: 1 / 41
Total 405 questions

Implementing Cisco SD-WAN Solutions (300-415 ENSDWI) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$49  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$42  $119.99
Question 1

Which policy blocks TLOCs from remotes and allows TLOCs from the data center to form hub-and-spoke peering?

Options:

A.

localized control policy

B.

localized data policy

C.

centralized data policy

D.

centralized control policy

Question 2

Which two image formats are supported for controller codes? (Choose two.)

Options:

A.

.nxos

B.

.qcow2

C.

.ova

D.

.bin

E.

Tgz

Question 3

Which configuration component is used in a firewall security policy?

Options:

A.

numbered sequences of match-action pairs

B.

application match parameters

C.

URL filtering policy

D.

intrusion prevention policy

Question 4

A customer has MPLS and Internet as the TLOC colors An engineer must configure conlroJIers with the Internet and not with MPLS Which configuration achieves this requirement on vManage?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 5

Which pathway under Monitor > Network > Select Device is used to verify service insertion configuration?

Options:

A.

Real Time

B.

System Status

C.

ACL Logs

D.

Events

Question 6

Refer to the exhibit vManage and vBond have an issue establishing a connection to vSmart Which two actions does the administrator take to fix the issue? (Choose two)

Install the certificate received from the certificate server.

Options:

A.

Manually resync vManage and vBond

B.

Reconfigure the vSmart from CLI with the proper Hostname & System IP

C.

Delete and re-add vSmart Click Generate and validate CSR

D.

Request a certificate from the certificate server based on the CSR for the vSmart

Question 7

Customer has two branch silos with overlapping IPs How must the data policy be configured to establish communication between the sites and server to avoid overlapping?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 8

Which API call retrieves a list of all devices in the network?

Options:

A.

https://vmanage_IP_address/dataservice/system/device/{{model}}

B.

http://vmanage_IP_address/dataservice/system/device/{{model}}

C.

http://vmanage_IP_address/api-call/system/device/{{model}}

D.

https://vmanage_IP_address/api-call/system/device/{{model}}

Question 9

Which two architectural components are part of an SD-WAN high availability vManage cluster? (Choose two.)

Options:

A.

WAN Edge router

B.

network configuration system

C.

NAT router

D.

messaging server

E.

application server

Question 10

Which two protocols are supported for software image delivery when images are hosted on a remote server? (Choose two.)

Options:

A.

HTTPS

B.

SSL

C.

HTTP

D.

TFTP

E.

FTP

Question 11

Which two features does the application firewall provide? (Choose two.)

Options:

A.

classification of 1400+ layer 7 applications

B.

blocks traffic by application or application-family

C.

numbered sequences of match-action pairs

D.

classification of 1000+ layer 4 applications

E.

application match parameters

Question 12

Which routing protocol is used to exchange control plane information between vSmart controllers and WAN Edge routers in the Cisco SD-WAN secure extensible network?

Options:

A.

BGP

B.

OSPF

C.

BFD

D.

OMP

Question 13

Which two requirements must be met for DNS inspection when integrating with cisco umbrella? (Choose two)

Options:

A.

Upload the WAN Edge serial allow list to the Umbrella portal.

B.

Attach security policy to the device template.

C.

Configure the Umbrella token on the vManage

D.

Create and attach a System feature template with the Umbrella registration credentials.

E.

Register and configure the vManage public IP and serial number in the Umbrella portal.

Question 14

Which third-party Enterprise CA server must be used (or a cloud-based vSmart controller?

Options:

A.

RootCert

B.

Microsoft

C.

RADIUS

D.

VeriSign

Question 15

Which data policy configuration influences BGP routing traffic flow from LAN to WAN?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 16

What must an engineer conewef when decoying an SD-WAN on-pfemlses architecture based on ESXi hypervisor?

Options:

A.

Cisco must provision the backup and snapshots platform lor ihe SD-WAN arctoecture

B.

The managed service provider must provision controllars with their appropriate cerHwcatsi

C.

The IT team a required to provision the SO-WAN controllers and Is responsAte lor backups and disaster recovery implementation

D.

The IT team will be given access by Cisco to a vManage for configuration If templates and policies coeigmalim

Question 17

Which device information is requited on PNP/ZTP to support the zero-touch onboarding process?

Options:

A.

serial and chassis numbers

B.

interface IP address

C.

public DNS entry

D.

system IP address

Question 18

Refer to the exhibit.

Customer XYZ cannot provision dual connectivity on both of its routers due to budget constraints but wants to use both R1 and R2 interlaces for users behind them for load balancing toward the hub site. Which configuration achieves this objective?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 19

An engineer must deploy a QoS policy with these requirements:

• policy name: App-police

• police rate: 1000000

• burst: 1000000

• exceed: drop

Which configuration meets the requirements?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 20

Refer to the exhibit. An engineer is troubleshooting a control connection issue on a WAN Edge device that shows socket errors. The packet capture shows some ICMP packets dropped between the two devices. Which action resolves the issue?

Options:

A.

Recover the vManage controller that is down m a high availability cluster

B.

Change the system IP or restart the VWN Edge 4 the system IP is changed

C.

Remove IP duplication in the network and configure a unique IP address

D.

Recover vBond or wart for the controller to reload which could be caused by a reset

Question 21

How many vCPUs and how much RAM are recommended to run the vSmart controller on the KVM server for 251 to 1000 devices in software version 20.4.x?

Options:

A.

4vCPUs. 16 GB

B.

4 vCPUs. 8 GB

C.

8vCPUs. 16 GB

D.

2vCPUs.4GB

Question 22

Refer to the exhibit A WAN Edge device was recently added to vManage but a control connection could not be established Which action resolves this issue?

Options:

A.

Rectify the Rod CA certificate mismatch on WAN Edge devices

B.

Install the bootstrap code on WAN Edge and check for CSR

C.

Send the serial number to vBond from the vManage controller.

D.

Resolve the ZTP reachability and rectify smart account credentials issue

Question 23

Drag and drop the BFD parameters from the left onto the BFD configurations on the right.

Options:

Question 24

An engineer is configuring a list that matches all IP prefixes with lengths from /1 to /16 in a centralized control policy. Which list accomplishes this task?

Options:

A.

0.0.0.0/1 le 16

B.

0.0.0.0/0 ge 1

C.

0.0.0.0/0 le l6

D.

0.0.0.0/16 ge 1

Question 25

Which Cisco router provides a distributed multicore architecture optimized for SD-WAN branch support?

Options:

A.

Cisco 1000 ISR series

B.

Cisco 2900 ISR series

C.

Cisco Catalyst 3850 series

D.

Cisco 3900 ISR series

Question 26

Which type of connection is created between a host VNet and a transit VNet when configuring Cloud OnRamp for laaS?

Options:

A.

Azure private endpoint

B.

GRE tunnel

C.

IPsec tunnel

D.

Azure peer link

Question 27

An enterprise is continuously adding new sites to its Cisco SD-WAN network. It must configure any cached routes flushed when OMP peers have lost adjacency Which configuration allows the cached OMP routes to be flushed after every 24 hours from its routing table?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 28

How are custom application ports monitored in Cisco SD-WAN controllers?

Options:

A.

Customers add custom application ports in vAnalytics and vManage.

B.

Customers add custom application ports in vAnalytics and vSmart.

C.

Cisco adds custom application ports In vAnalytics and vManage.

D.

Cisco adds custom application ports In vAnalytics and vSmart.

Question 29

What happens if the intelligent proxy is unreachable in the Cisco SD-WAN network?

Options:

A.

The grey-listed domains are unresolved

B.

The Cisco Umbrella Connector locally resolves the DNS request

C.

The block-listed domains are unresolved

D.

The Cisco Umbrella Connector temporarily redirects HTTPS traffic

Question 30

What is the OMP graceful restart default value on vSmart controllers and WAN Edge routers?

Options:

A.

21,600 seconds

B.

43,200 seconds

C.

86,400 seconds

D.

604,800 seconds

Question 31

A large retail organization decided to move some of the branch applications to the AWS cloud. How does the network architect extend the in-house Cisco SD-WAN branch to cloud network into AWS?

Options:

A.

Create virtual WAN Edge devices Cloud through the AWS online software store

B.

Create virtual instances of vSmart Cloud through the AWS online software store

C.

Create GRE tunnels to AWS from each branch over the Internet

D.

Install the AWS Cloud Router in the main data center and provide the connectivity from each branch

Question 32

Which set of elements are verified by the controller to confirm the identity of edge devices?

Options:

A.

certificates, organization name and serial number of the device

B.

organization name serial number and system IP of the device

C.

certificates, organization name, and vBond domain

D.

certificates, system IP, and vBond domain

Question 33

Which protocol is used for the vManage to connect to the vSmart Controller hosted in Cloud?

Options:

A.

PnP Server

B.

ZTP

C.

NETCONF

D.

HTTP

Question 34

What is the size of SGT data in the metadata header?

Options:

A.

8 bits

B.

16 bits

C.

24 bits

D.

32 bits

Question 35

Refer to the exhibit. The network administrator has configured a centralized topology policy that results in the displayed routing table at a branch office. Which two configurations are verified by the output? [Choose two.)

Options:

A.

The routing table is for the transport VPN.

B.

The default route is learned via OMP.

C.

This routing table is from a cEdge router.

D.

The default route is configured locally.

E.

The configured policy is adding a route tag of 300 to learned routes.

Question 36

Where on vManage does an engineer find the details of control node failure?

Options:

A.

Alarms

B.

Events

C.

Audit log

D.

Network

Question 37

Refer to the exhibit. An administrator is configuring a policy in addition to an existing hub-and-spoke policy for two sites that should directly communicate with each other. How is this policy configured?

Options:

A.

hub-and-spoke

B.

mesh

C.

import existing topology

D.

custom control (route and TLOC)

Question 38

Which device should be configured with the service chain IP address to route intersite traffic through a firewall?

Options:

A.

vSmart

B.

firewall

C.

spoke WAN Edge

D.

hub WAREdge

Question 39

An engineer is adding a tenant with location JD 306432373 in vManage. What is the maximum number of alphanumeric characters that are accepted in the tenant name field?

Options:

A.

64

B.

128

C.

256

D.

8

Question 40

Refer to the exhibit. A user in the branch is connecting to Office 365 for the first time. Over which path does the branch WAN Edge router traffic follow?

Options:

A.

routing table of the branch WAN Edge router

B.

DIA exit of the branch WAN Edge router

C.

forwarded to the gateway site

D.

dropped because the minimum vQoE score has not been met

Question 41

Drag and drop the actions from the left into the correct sequence on the right to create a data policy to direct traffic to the Internet exit.

Options:

Question 42

Which command disables the logging of syslog messages to the local disk?

Options:

A.

no system logging disk enable

B.

no system logging disk local

C.

system logging disk disable

D.

system logging server remote

Question 43

Which action is performed during the onboarding process when a WAN Edge router is connected to ZTP server ztp.viptela com?

Options:

A.

The router is connected to WAN Edge Cloud Center

B.

The router is synced with vSmart Controller via an IPsec tunnel

C.

The router receives its vBond Orchestrator information

D.

The router is connected 10 vSmart Controller via a DTLSTLS tunnel

Question 44

How should the IP addresses be assigned for all members of a Cisco vManage cluster located in the same data center?

Options:

A.

in the same subnet

B.

in overlapping IPs

C.

in each controller with a /32 subnet

D.

in different subnets

Question 45

A network administrator is configuring a tunnel interface on a branch Cisco IOS XE router to run TLOC extensions. Which configuration will extend a TLOC over a GRE tunnel to another router in the branch?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 46

A network is configured with CoPP to protect the CORE router route processor for stability and DDoS protection. As a company policy, a class named class-default is preconfigured and must not be modified or deleted. Troubleshoot CoPP to resolve the issues introduced during the maintenance window to ensure that:

WAN

CORE

MGMT

Options:

Question 47

Which feature allows reachability to an organization’s internally hosted application for an active DNS security policy on a device?

Options:

A.

local domain bypass

B.

DHCP option 6

C.

DNSCrypt configurator

D.

data pokey with redirect

Question 48

A Cisco SD-WAN customer has a requirement to calculate the SHA value for files as they pass through the device to see the returned disposition and determine if the file is good, unknown or malicious. The customer also wants to perform real-time traffic analysis and generate alerts when threats are detected Which two Cisco SD-WAN solutions meet the requirements? (Choose two.)

Options:

A.

Cisco Trust Anchor Module

B.

Cisco Threat Grid

C.

Cisco Snort IPS

D.

Cisco AMP

E.

Cisco Secure Endpoint

Question 49

What are the default username and password for vSmart Controller when it is installed on a VMware ESXi hypervisor'?

Options:

A.

username Cisco password admin

B.

username admin password Cisco

C.

username Cisco password Cisco

D.

username admin password admin

Question 50

Which VPNs must be configured outside the workflow to complete the SD-WAN overlay setup when using the Quick Connect workflow?

Options:

A.

service and transport VPNs

B.

service VPNs

C.

transport VPNs

D.

management VPNs

Question 51

Which hardware component is involved in the Cisco SD-WAN authentication process for ISR platforms?

Options:

A.

TPMD

B.

ZTP

C.

TPC

D.

SUDI

Question 52

Which two virtualized environments are available for a company to install the controllers using the on-premises model? (Choose two )

Options:

A.

VMware vSphere ESXi

B.

VMware Workstation

C.

kernel-based virtual machine

D.

OpenStack

E.

Microsoft Hyper-V

Question 53

An engineer modifies a data policy for DIA in VPN 200 to meet the requirements for traffic destined to these locations:

* external networks; must be translated

* external networks; must use a public TLOC color

* syslog servers, must use a private TLOC color

Here is the existing data policy configuration:

Which policy configuration sequence set meets the requirements?

Options:

A.

B.

B.

C.

C.

Question 54

Refer to the exhibit.

A customer wants to implement primary and secondary Cisco SD-WAN overlay routing for prefixes that are advertised for both data centers. The east data center (TLOC 101.101.101.101) is primary for east sites, and the west data center (TLOC 100.100.100.100) is primary for west sites. Which configuration change achieves this objective?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 55

A network administrator is configuring VRRP to avoid a traffic black hole when the transport side of the network is down on the master device. What must be configured to get the fastest failover to standby?

Options:

A.

lower timer interval

B.

prefix-list tracking

C.

higher group ID number

D.

OMP tracking

Question 56

A customer must upgrade the cisco SD-WAN devices and controllers from version 19.2 to version 20.3. The devices include WAN Edge cloud, vManage, vSmart, and vBond. Which types of image types of image files are needed for this upgrade?

Options:

A.

one file for vManage and one file for all other devices with extension tar.gz

B.

one file for vManage, one for vSmart and one for vBond + WAN Edge Cloud with extension.bin

C.

one file for vManaga, one for vSmart and one for vBond + WAN Edge Cloud with extension tar.gz

D.

one file for vManaga and one file for all other devices with extension .bin

Question 57

An administrator must deploy the controllers using the On-Prem method while vManage can access the PnP portal from inside How are the two WAN Edge authorized allowed lists to be made available to vManage? (Choose two)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 58

Which encryption algorithm secures binding exchanges Between Cisco TrustSec SXP peers?

Options:

A.

SEAL

B.

3DES

C.

AES

D.

MD5

Question 59

Which port is used for vBond under controller certificates if no alternate port is configured?

Options:

A.

12345

B.

12347

C.

12346

D.

12344

Question 60

An engineering team must prepare a traffic engineering policy where an MPLS circuit is preferred for traffic coming from the Admin VLAN Internet should be used as a backup only. Which configuration fulfill this requirement?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 61

How many subnets are necessary in Azure VNet for a WAN Edge device to function in the cloud deployment?

Options:

A.

CSR is the WAN Edge device that is supported in the Microsoft cloud. The Microsoft underlay cloud fabric performs the management function.

B.

There must be three subnets in VNet: management, public, and services.

C.

One public subnet is required in VNet. The Microsoft underlay cloud fabric performs all of the routing functions for WAN Edge.

D.

Public and services subnets are required in VNet. The Microsoft underlay cloud fabric performs the management function.

Question 62

The SD-WAN network is configured ­­­with a default full-mesh topology. The SD-WAN engineer wants the Barcelona WAN Edge to use the MPLS TLOC when forwarding Telnet traffic based on a configured SLA class list. Which configured must the engineer use to create a policy to call the SLA class and set the preferred color to MPLS?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 63

Drag and drop the attributes from the left that make each transport location unique onto the right. Not all options are used.

Options:

Question 64

Refer to the exhibit The Cisco SD-WAN network is configured with a default full-mesh topology. Islamabad HQ and Islamabad WAN Edges must be used as the hub sites. Hub sites MPLS TLOC must be preferred when forwarding FTP traffic based on a configured SLA class list. Which policy configuration does the network engineer use to call the SLA class and set the preferred color to MPLS?

Options:

A.

Localized Policy, Route Policy

B.

Centralized Policy, Traffic Policy

C.

Localized Policy, Forwarding Class

D.

Centralized Policy Topology

Question 65

How do WAN Edge devices operate when vSmart is inaccessible or fails to be reached by the WAN Edge?

Options:

A.

They cease to forward traffic in the data plane.

B.

They continue operation normally.

C.

They continue to receive reachability updates.

D.

They continue operating normally for a configurable time.

Question 66

In a customer retail network with multiple data centers, what does the network administrator use to create a regional hub topology?

Options:

A.

control policy on vManage

B.

control policy on vSmart

C.

data policy on vSmart

D.

app route policy on vSmart

Question 67

An engineer wants to change the configuration of the certificate authorization mode from manual to automated. Which GUI selection will accomplish this?

Options:

A.

Maintenance > Security

B.

Configuration > Certificates

C.

Administration > Settings

D.

Tools > Operational Commands

Question 68

What do receivers request to join multicast streams in a Cisco SO-WAN network?

Options:

A.

IGMP membership reports directly with a multicast router.

B.

Multicast service routes with the vSmart controller

C.

IGMP membership reports directly with the vBond orchestrator.

D.

PIM messages with the nearest neighboring multicast router.

Question 69

What is the result during a WAN Edge software upgrade process if the version of the WAN Edge software is higher than the one running on a controller device?

Options:

A.

The upgrade button is greyed out

B.

The upgrade proceeds with no warning message.

C.

The upgrade fails with a warning message

D.

The upgrade proceeds with a warning message

Question 70

Refer to the exhibit. An engineer must configure the Overlay Management Protocol route preference so that when B2 tries to reach host routes advertised by B1 it always chooses the MPLS circuit. Which two match conditions must be configured to accomplish this task? (Choose two.)

Options:

A.

VPN

B.

prefix list

C.

originator

D.

color list

E.

path type

Question 71

Which attributes are configured to uniquely Identify and represent a TLOC route?

Options:

A.

system IP address, link color, and encapsulation

B.

firewall, IPS, and application optimization

C.

site ID, tag, and VPN

D.

origin, originator, and preference

Question 72

Refer to the exhibit.

The control connection is failing. Which action resolves the issue?

Options:

A.

import vSmart in vManager

B.

Validate the certificates authenticity on vSmart

C.

Upload the WAN Edge list on vManage.

D.

Restore the reachability to the vSmart

Question 73

Which two products are used to deploy Cisco WAN Edge Router virtual platforms? (Choose two.)

Options:

A.

HP ProLiant DL360 Generatton10 running HP-UX

B.

Cisco ENCS 5000 Series

C.

Sun SPARC Node running AIX

D.

Cisco UCS

E.

Sun Enterprise M4000 Server running Sun Solans

Question 74

Which storage format Is used when vManage Is deployed as a virtual machine on a KVM hypervisor?

Options:

A.

.iso

B.

.qcow2

C.

.ova

D.

.tgz

Question 75

What is a requirement for a WAN Edge to reach vManage, vBond, and vSmart controllers in a data center?

Options:

A.

IGP

B.

QoS

C.

TLS

D.

OMP

Question 76

Which secure tunnel type should be used to connect one WAN Edge router to other WAN Edge routers?

Options:

A.

TLS

B.

DTLS

C.

SSL VPN

D.

IPsec

Question 77

Refer to the exhibit The network team must configure El GRP peering at HQ with devices in the service VPN connected to WAN Edge CSRv. CSRv is currently configured with

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 78

Which combination of platforms are managed by vManage?

Options:

A.

ISR4321, ASR1001, ENCS, lSRv

B.

ISR4351, ASR1002HX, vEdge2000, vEdge Cloud

C.

ISR4321, ASR1001, Nexus, ENCS

D.

lSR435l, ASRl009, vEdge2000, CSR1000v

Question 79

Which logs verify when a device was upgraded?

Options:

A.

Audit

B.

Email

C.

ACL

D.

SNMP

Question 80

Refer to the exhibit. A network administrator is setting the queueing value for voice traffic for one of the WAN Edge routers using vManager GUI. Which queue value must be set to accomplish this task?

Options:

A.

0

B.

1

C.

2

D.

3

Question 81

Refer to the exhibit. The Cisco SD-VYAN is deployed using the default topology. The engineer v/ants to configure a service insertion policy such that all data traffic between Rome to Paris is forwarded through the NGFW located in London. Which configuration fulfills this requirement, assuming that the Sen/ice VPN ID is 1?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 82

What is the advantage of instating the controller on-premises?

Options:

A.

ease of deployment and management

B.

full control of the data piano and the control plane

C.

automatic geographical redundancy and security

D.

scalability and a cost-saving

Question 83

In a Cisco SD-WAN architecture, what is the role of the WAN Edge?

Options:

A.

It provides orchestration to assist in automatic provisioning of WAN Edge routers and overlay

B.

It is the management plane responsible for centralized configuration and monitoring

C.

It is the control plane that builds and maintains network topology

D.

It is the data plane that is responsible for forwarding traffic

Question 84

Refer to the exhibit.

Customer XYZ cannot provison dual connectivity on both Its routers due to budget constratnts but wants to use tnth RI and R2 interface for users behind them for load toward the hub site Which configurauon achieves this objectives?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 85

A customer is receiving routes via OMP from vSmart controller for a specific VPN. The customer must provide access to the W2 loopback received via OMP to the OSPF neighbor on the service-side VPN, which configuration fulfils these requirements?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Question 86

Refer to the exhibit.

What does the BFD value of 8 represent?

Options:

A.

number of BFD sessions

B.

hello timer of BFD session

C.

poll-interval of BFD session.

D.

dead timer of BFD session

Question 87

Which pathway under Monitor > Network > Select Device is used to verify service insertion configuration?

Options:

A.

System Status

B.

Troubleshooting

C.

Real Time

D.

Events

Question 88

What is the purpose of ‘’vpn 0’’ in the configuration template when onboarding a WAN edge node?

Options:

A.

It carries control traffic over secure DTLS or TLS connections between vSmart controllers and vEdge routers, and between vSmart and vBond

B.

It carries control out-of-band network management traffic among the Viptela devices in the overlay network.

C.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vManager

D.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vBond

Question 89

Which timer specifies information in the cache after all OMP sessions are lost at location S0123T4E56F78?

Options:

A.

advertisement interval

B.

EOR timer

C.

graceful restart timer

D.

hold time

Question 90

Refer to the exhibit. A network administrator is configuring OSPF advanced configuration pararmeters from a template using the vManager GUI for a branch WAN Edge router to calculate the cost of summary routes to an ASBR. Which action achieves this configuration?

Options:

A.

Disable RFC 1583 Compatiblt

B.

Enable Originate

C.

Enable RFC 1M3 Compatible

D.

Disable Original

Question 91

An engineer must automate certificate signing through Cisco. Which vManage configuration achieves this task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 92

An engineer is configuring the branch office with a 172.16.0.0/16 subnet to use DIA for Internet traffic. All other traffic must flow to the central site or branches using the MPLS circuit Which configuration meets the requirement?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 93

Drag and drop the steps from the left into the order on the right to upload software on vManage repository that is accessible from maintenance > Software Repository.

Options:

Question 94

Which two performance data details are provided by Cisco SO-WAN vAnalytics? (Choose two)

Options:

A.

jitter loss and latency for data tunnels

B.

application quality of experience score from zero to ten

C.

detail on total cost of ownership for the fabric

D.

certificate authority status (health and expiration dates) for all controllers

E.

view devices connected to a vManage NMS

Question 95

Drag and drop the security terminologies from the left onto the PCI-compliant network features and devices on the right.

Options:

Question 96

What is the role of the Session Traversal Utilities for NAT server provided by the vBond orchestrator?

Options:

A.

It facilitates SD-WAN toners and controllers to discover their own mapped or translated IP addresses and port numbers

B.

It prevents SD-WAN Edge routers from forming sessions with public transports among different service providers

C.

It facilitates SD-WAN Edge routers to stay behind a NAT-enabled firewall while the transport addresses of the SD-WAN controller are unNAT-ed

D.

It allows WAN Edge routers to form sessions among MPLS TLOCs using only public IP addresses

Question 97

Which device in the SD- WAN solution receives and categorizes event reports, and generates alarms?

Options:

A.

WAN Edge routers

B.

vSmart controllers

C.

vManage NMS

D.

vBond controllers

Question 98

An engineer configures policing with a rate of 125 Bps and a burst rate of 8000 bits, as shown here:

Which configuration completes this task?

Options:

A.

Configure 125 for rate and 1000 for burst.

B.

Configure 1000 for rate and 64000 for burst

C.

Configure 125 for rate and 8000 for burst

D.

Configure 1000 for rate and 1000 for burst

Question 99

Which policy configures an application-aware routing policy under Configuration > Policies?

Options:

A.

Localized policy

B.

Centralized policy

C.

Data policy

D.

Control policy

Question 100

An engineer builds a three-node vManage cluster and then realizes that multiple nodes are unnecessary for the size of the company. How should the engineer revert the setup to a single vManage?

Options:

A.

Remove two rode from the three-node vManage duster

B.

Use the cluster conversion utility lo convert to standalone vManage

C.

Restore vManage from the backup VM snapshot

D.

Leave the duller as & and point to one vManage

Question 101

What is the ZTP workflow for Cisco IOS XE-based devices?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 102

Which two services are critical for zero touch provisioning on-boarding? (Choose two)

Options:

A.

SNMP

B.

DNS

C.

DHCP

D.

AAA

E.

EMAIL

Question 103

Refer to the exhibit Which configuration must the engineer use to form underlay connectivity for the Cisco SD-WAN network?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 104

Which two criteria ate supported to filter traffic on a Cisco Umbrella Cloud-delivered firewall? (Choose two )

Options:

A.

tunnels

B.

site ID

C.

URL

D.

geolocation

E.

protocol

Question 105

At which layer does the application-aware firewall block applications on a WAN Edge?

Options:

A.

3

B.

7

C.

5

D.

2

Question 106

Which protocol Is used by the REST API to communicate with network services in the Cisco SO-WAN network?

Options:

A.

SSL

B.

HTTP

C.

iPsec

D.

SSM

Question 107

Company E wants to deploy Cisco SD-WAN with controllers in AWS The company's existing WAN is on private MPLS without Internet access to controllers m AWS An Internet circuit is added to a site in addition to the existing MPLS circuit. Which interface template establishes BFD neighbors over both transports?

A)

B)

C)

Miss

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 108

A company must avoid downtime at the remote sites and data plane to continue forwarding traffic between WAN Edge devices if the branch router loses connectivity to its OMP peers Which configuration meets the requirement?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 109

What is an advantage of using auto mode versus static mode of power allocation when an access point is connected to a PoE switch port?

Options:

A.

It detects the device is a powered device

B.

All four pairs of the cable are used

C.

Power policing is enabled at the same time

D.

The default level is used for the access point

Question 110

Which two sets of identifiers does OMP carry when it advertises TLOC routes between WAN Edge routers? (Choose two.)

Options:

A.

TLOC public and private address, carrier, and preference

B.

source and destination IP address, MAC, and site ID

C.

system IP address, link color, and encapsulation

D.

VPN ID, local site network, and BGP next-hop IP address

E.

TLOC public and private address, tunnel ID, and performance

Question 111

Refer to the exhibit. An enterprise decides to use the Cisco SD-WAN Cloud onRamp for SaaS feature and utilize H.Q site Biz iNET to reach SaaS Cloud for branch C. currently reaching SaaS Cloud directly. Which role must be assigned to devices at both sites in vManage Cloud Express for this solution to work?

Options:

A.

H.Q to be added as Gateway and Branch as DIA.

B.

Branch to be added as Client Sites and H.Q as DIA.

C.

Branch to be added as DIA and H.Q as Client Site.

D.

H.Q to be added as Gateway and Branch as Client Site.

Question 112

Which two REST API functions are performed for Cisco devices in an overlay network? (Choose two)

Options:

A.

distributing a Snort image among devices

B.

attaching a device configuration template

C.

managing connections for smart licensing

D.

monitoring device certificates

E.

querying a device and aggregating statistics

Question 113

Refer to the exhibit. An engineer must block FTP traffic coming in from a particular Service VPN on a WAN Edge device Which set of steps achieves this goal?

Options:

A.

Create a localized policy and add it to (he interface feature template

B.

Create a localized policy add it to the device template and add an ACL to the interface feature template

C.

Create a prefix tat, add it to the localized policy and add it to the interface feature template

D.

Create a localized policy add it to VPN template and add an ACL to the interface feature template

Question 114

What is a benefit of the application-aware firewall?

Options:

A.

It blocks traffic by MAC address

B.

It blocks traffic by MTU of the packet.

C.

It blocks traffic by application.

D.

It blocks encrypted traffic

Question 115

Which IP address must be reachable by a WAN Edge device for the ZIP process to work?

Options:

A.

10.1.1.1

B.

4.4 4.4

C.

172.16.1.1

D.

8.8.8.8

Question 116

What is the default value (in milliseconds) set tor the poll interval in the BFD basic configuration?

Options:

A.

300,000

B.

600,000

C.

900,000

D.

1,200,000

Question 117

Which component of the Cisco SD-WAN control plane architecture facilitates the storage of certificates and configurations for network components?

Options:

A.

vSmart

B.

vBond

C.

WAN Edge

D.

vManage

Question 118

An administrator is configuring the severity level on the vManage NMS for events that indicate that an action must be taken immediately. Which severity level must be configured?

Options:

A.

warning

B.

error

C.

critical

D.

alert

Question 119

Which two actions are necessary to set the Controller Certificate Authorization mode to indicate a root certificate? (Choose two)

Options:

A.

Select the Controller Certificate Authorization mode that is recommended by Cisco

B.

Change the organization name of the Cisco SO-WAN fabric.

C.

Upload an SSL certificate to vManape,

D.

Select a private certificate signing authority instead of a public certificate signing authority

E.

Select a validity period from the drop-down menu

Question 120

Which protocol advertises WAN edge routes on the service side?

Options:

A.

EIGRP

B.

OSPF

C.

BGP

D.

ISIS

Question 121

What is a description of vManage NMS?

Options:

A.

It is accessible only from VPN 512 (the management VPN).

B.

A cluster requires device templates to be created on and attached to the same server

C.

It is a software process on a dedicated WAN Edge router in the network.

D.

A cluster consists of a minimum of two vManage NMSs

Page: 1 / 41
Total 405 questions