Summer Special Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

300-415 Questions and Answers

Question # 6

When VPNs are grouped to create destination zone in Zone-Based Firewall, how many zones can a single VPN be part of?

A.

two

B.

four

C.

one

D.

three

Full Access
Question # 7

Which port is used for vBond under controller certificates if no alternate port is configured?

A.

12345

B.

12347

C.

12346

D.

12344

Full Access
Question # 8

In a Cisco SD-WAN architecture, what is the role of the WAN Edge?

A.

It provides orchestration to assist in automatic provisioning of WAN Edge routers and overlay

B.

It is the management plane responsible for centralized configuration and monitoring

C.

It is the control plane that builds and maintains network topology

D.

It is the data plane that is responsible for forwarding traffic

Full Access
Question # 9

An administrator wants to create a policy to add a traffic policer called "politer-ccnp" to police data traffic on the WAN Edge. Which configuration accomplishes this task in vSmart?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 10

An engineer is configuring a shaping rate of 1 Mbps on the WAN link of a WAN Edge router Which configuration accomplishes this task’?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 11

A network administrator configures SNMPv3 on a Cisco WAN Edge router from CLI for monitoring purposes How many characters are supported by the snmp user command?

A.

from 1 to 8

B.

from 1 to 16

C.

from 1 to 32

D.

from 1 to 48

Full Access
Question # 12

Refer to exhibit. An engineer is troubleshooting tear of control connection even though a valid CertificateSerialNumber is entered. Which two actions resolve Issue? (Choose two)

A.

Restore network reachability on the controller.

B.

Enter a valid serial cumber on the controller for a given device

C.

Enter a valid product ID (mode) on the PNP portal.

D.

Match the serial number file between the controller

E.

Remove the duplicate IP in the network

Full Access
Question # 13

An enterprise needs DIA on some of its branches with a common location ID: A041:B70C: D78E::18 Which WAN Edge configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 14

What is the maximum number of IPsec that are temporarily created and converged on a new set if IPsec Sas in the pairwise keys process during a simultaneous rekey?

A.

2

B.

4

C.

6

D.

8

Full Access
Question # 15

Drag and drop the steps from the left into the sequence on the right for a WAN Edge router after powering on for zero touch provisioning.

Full Access
Question # 16

Drag and drop the REST API calls from the left onto the functions on the right.

Full Access
Question # 17

Refer to the exhibit vManage and vBond have an issue establishing a connection to vSmart Which two actions does the administrator take to fix the issue? (Choose two)

Install the certificate received from the certificate server.

A.

Manually resync vManage and vBond

B.

Reconfigure the vSmart from CLI with the proper Hostname & System IP

C.

Delete and re-add vSmart Click Generate and validate CSR

D.

Request a certificate from the certificate server based on the CSR for the vSmart

Full Access
Question # 18

How does the replicator role function in cisco SD-WAN?

A.

WAN Edge devices advertise the rendezvous point to all the receivers through the underlay network.

B.

vSmart Controllers advertise the rendezvous point to all the receivers through the overlay network.

C.

WAN Edge devices advertise the rendezvous point to all receivers through the overlay network.

D.

vSmart Controllers advertise the rendezvous point to all the receivers through the underlay network.

Full Access
Question # 19

Which platforms are managed by a single vManage dashboard?

A.

ISR4351, ASR1002HX, vEdge2000, vEdge Cloud

B.

ISR4321, ASR1001, Nexus, ENCS

C.

ISR4321, ASR1001, ENCS, ISRv

D.

ISR4351, ASR1009, vEdge2000, CSR1000v

Full Access
Question # 20

Which component of the Cisco SD-WAN architecture oversees the control plane of overlay network to establish, adjust, and maintain the connections between the WAN Edge devices that form the Cisco SD-WAN fabric?

A.

APIC-EM

B.

vManage

C.

vSmart

D.

vBond

Full Access
Question # 21

How are custom application ports monitored in Cisco SD-WAN controllers?

A.

Customers add custom application ports in vAnalytics and vManage.

B.

Customers add custom application ports in vAnalytics and vSmart.

C.

Cisco adds custom application ports In vAnalytics and vManage.

D.

Cisco adds custom application ports In vAnalytics and vSmart.

Full Access
Question # 22

A network administrator is creating an OMP feature template from the vManage GUI to be applied to WAN edge routers. Which configuration attribute will avoid the redistribution of the routes back into the OMP from the LAN side?

A.

configure "Number of Paths Advertised per Prefix"

B.

configure "Overlay AS Number"

C.

configure "Send Backup Paths"

D.

configure "ECMP limit"

Full Access
Question # 23

How many concurrent sessions does a vManage REST API have before it invalidates the least recently used session if the maximum concurrent session number is reached?

A.

150

B.

200

C.

250

D.

300

Full Access
Question # 24

Which action is performed during the onboarding process when a WAN Edge router is connected to ZTP server ztp.viptela com?

A.

The router is connected to WAN Edge Cloud Center

B.

The router is synced with vSmart Controller via an IPsec tunnel

C.

The router receives its vBond Orchestrator information

D.

The router is connected 10 vSmart Controller via a DTLSTLS tunnel

Full Access
Question # 25

Which routing protocol is used to exchange control plane information between vSmart controllers and WAN Edge routers in the Cisco SD-WAN secure extensible network?

A.

BGP

B.

OSPF

C.

BFD

D.

OMP

Full Access
Question # 26

An enterprise has these three WAN connections:

  • public Internet
  • business internet
  • MPLS

An engineer must configure two available links to route traffic via both links. Which configuration achieves this objective?

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 27

Which protocol is used to measure loss latency, Jitter, and liveliness of the tunnel between WAN Edge router peers?

A.

OMP

B.

IP SLA

C.

NetFlow

D.

BFD

Full Access
Question # 28

A network administrator is configuring a centralized control policy based on match action pairs for multiple conditions, which order must be configured to prefer Prefix List over TLOC and TLOC over Origin?

A.

highest to lowest sequence number

B.

nonsequential order

C.

deterministic order

D.

lowest to highest sequence number

Full Access
Question # 29

Refer to the exhibit.

What does the BFD value of 8 represent?

A.

number of BFD sessions

B.

hello timer of BFD session

C.

poll-interval of BFD session.

D.

dead timer of BFD session

Full Access
Question # 30

Which two hardware platforms support Cisco IOS XE SD-WAN images'' (Choose two)

A.

ASR1000 series

B.

ISR9300 series

C.

vEdge-1000 series

D.

ASR9000 series

E.

ISR4000 series

Full Access
Question # 31

A network administrator is configuring an application-aware firewall between inside zones to an outside zone on a WAN edge router using vManage GUI. What kind of Inspection is performed when the ‘’inspect’’ action is used?

A.

stateful inspection for TCP and UDP

B.

stateful inspection for TCP and stateless inspection of UDP

C.

IPS inspection for TCP and-Layer 4 inspection for UDP

D.

Layer 7 inspection for TCP and Layer 4 inspection for UDP

Full Access
Question # 32

Which plane builds and maintains the network topology and makes decisions on traffic flows?

A.

orchestration

B.

management

C.

control

D.

data

Full Access
Question # 33

Which two services are critical for zero touch provisioning on-boarding? (Choose two)

A.

SNMP

B.

DNS

C.

DHCP

D.

AAA

E.

EMAIL

Full Access
Question # 34

Refer to the exhibit, Which configuration routes Site 2 through the firewall in Site 1?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 35

Which OSPF command makes the WAN Edge router a less preferred exit from a site with a dual WAN Edge design?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 36

An engineer is configuring the branch office with a 172.16.0.0/16 subnet to use DIA for Internet traffic. All other traffic must flow to the central site or branches using the MPLS circuit Which configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 37

Which protocol is used to propagate multicast join requests over the Cisco SD-WAN fabric?

A.

ARP

B.

Auto-RP

C.

OMP

D.

IGMP

Full Access
Question # 38

Which SD-WAN component is configured to enforce a policy to redirect branch-to-branch traffic toward a network service such as a firewall or IPS?

A.

vBond

B.

WAN Edge

C.

vSmart

D.

Firewall

Full Access
Question # 39

Refer to the exhibit An engineer must configure a QoS policy between me hub and site A (spoke) over a standard internet circuit where traffic shaping is adjusted automatically based on evaiiabk» bandwidth Which configuration meets the requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 40

Which two resource data types are used to collect information for monitoring using REST API in Cisco SD-WAN? (Choose two.)

A.

POST

B.

DELETE

C.

scalar

D.

array

E.

PUT

Full Access
Question # 41

Which two metrics must a cloud Edge router use to pick the optimal path for a SaaS application reachable via a gateway site? (Choose two.)

A.

HTTP loss and latency metrics to the SaaS application

B.

ICMP loss and latency metrics to the SaaS application

C.

BFD loss and latency metrics to the gateway site

D.

BFD loss and latency metrics to the SaaS application

E.

HTTP loss and latency metrics to the gateway site

Full Access
Question # 42

Refer to the exhibit The network team must configure ElGRP peering at HQ with devices in the service VPN connected to WAN Edge CSRv. CSRv is currently configured with

Which configuration on the WAN Edge meets the requiremnet

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 43

Refer to the exhibit.

The network team must configure branch B WAN Edge device 103 to establish dynamic full-mesh IPsec tunnels between all colors with branches over MPLS and Internet circuits. The branch ts configured with:

Which configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 44

A bank is looking for improved customer experience for applications and reduce overhead related to compliance and security. Which key feature or features of the Cisco SD-WAN solution will help the bank to achieve their goals?

A.

Integration with PaaS providers to offer the best possible application experience

B.

QoS including application prioritization and meeting critical applications SLA for selecting optimal path.

C.

implementation of a modem age core banking system

D.

implementation of BGP across the enterprise routing for selecting optimal path

Full Access
Question # 45

Refer to the exhibit. An engineer is troubleshooting a control connection issue on a WAN Edge device that shows socket errors. The packet capture shows some ICMP packets dropped between the two devices. Which action resolves the issue?

A.

Recover the vManage controller that is down m a high availability cluster

B.

Change the system IP or restart the VWN Edge 4 the system IP is changed

C.

Remove IP duplication in the network and configure a unique IP address

D.

Recover vBond or wart for the controller to reload which could be caused by a reset

Full Access
Question # 46

At which layer does the application-aware firewall block applications on a WAN Edge?

A.

3

B.

7

C.

5

D.

2

Full Access
Question # 47

What is a benefit of the application-aware firewall?

A.

It blocks traffic by MAC address

B.

It blocks traffic by MTU of the packet.

C.

It blocks traffic by application.

D.

It blocks encrypted traffic

Full Access
Question # 48

What are the default username and password for vSmart Controller when it is installed on a VMware ESXi hypervisor'?

A.

username Cisco password admin

B.

username admin password Cisco

C.

username Cisco password Cisco

D.

username admin password admin

Full Access
Question # 49

An engineer must configure local redundancy on a site. Which configuration accomplish this task?

A.

vpn 0

interface interface-name

B.

tloc extension interlace name

tloc extension interface interface name

C.

vpn 0

tloc extension interface

D.

interface-flame

interface interface-name tloc-extension

Full Access
Question # 50

Which timer specifies information in the cache after all OMP sessions are lost at location S0123T4E56F78?

A.

advertisement interval

B.

EOR timer

C.

graceful restart timer

D.

hold time

Full Access
Question # 51

What is a requirement for a WAN Edge to reach vManage, vBond, and vSmart controllers in a data center?

A.

IGP

B.

QoS

C.

TLS

D.

OMP

Full Access
Question # 52

How is the software managed in Cisco SD-WAN?

A.

Software images must be uploaded to vManage through HTTP or FTP

B.

Software downgrades are unsupported for vManage

C.

Software images must be transferred through VPN 512 or VPN 0 of vManage

D.

Software upgrade operation in the group must include vManage. vBond, and vSmart.

Full Access
Question # 53

Which OMP route is selected for equal OMP route preference values on WAN Edge routers?

A.

route with higher TLOC preference value

B.

route with origin type of connected

C.

route with origin type of static

D.

route with lower TLOC preference value

Full Access
Question # 54

Which configuration allows users to reach YouTube from a local Internet breakout?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 55

Where on vManage does an engineer find the details of control node failure?

A.

Alarms

B.

Events

C.

Audit log

D.

Network

Full Access
Question # 56

Refer to the exhibit.

Which QoS treatment results from this configuration after the access list acl-guest is applied inbound on the vpn1 interface?

A.

A UDP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted

B.

A TCP packet sourcing from 172.16.10.1 and destined to 172.16.20.1 is dropped

C.

A UDP packet souring from 172.16.10.1 and destined to 172.16.20.1 is dropped.

D.

A TCP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted

Full Access
Question # 57

An administrator is configuring the severity level on the vManage NMS for events that indicate that an action must be taken immediately. Which severity level must be configured?

A.

warning

B.

error

C.

critical

D.

alert

Full Access
Question # 58

An engineer configures policing with a rate of 125 Bps and a burst rate of 8000 bits, as shown here:

Which configuration completes this task?

A.

Configure 125 for rate and 1000 for burst.

B.

Configure 1000 for rate and 64000 for burst

C.

Configure 125 for rate and 8000 for burst

D.

Configure 1000 for rate and 1000 for burst

Full Access
Question # 59

What is the purpose of ‘’vpn 0’’ in the configuration template when onboarding a WAN edge node?

A.

It carries control traffic over secure DTLS or TLS connections between vSmart controllers and vEdge routers, and between vSmart and vBond

B.

It carries control out-of-band network management traffic among the Viptela devices in the overlay network.

C.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vManager

D.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vBond

Full Access
Question # 60

Which policy allows communication between TLOCs of data centers and spokes and blocks communication between spokes?

A.

centralized data policy

B.

centralized control policy

C.

localized control policy

D.

localized data policy

Full Access
Question # 61

Drag and drop the functions from the left onto the correct templates on the right.

Full Access
Question # 62

In a customer retail network with multiple data centers, what does the network administrator use to create a regional hub topology?

A.

control policy on vManage

B.

control policy on vSmart

C.

data policy on vSmart

D.

app route policy on vSmart

Full Access
Question # 63

A network administrator configures SNMPv3 on a Cisco WAN Edge router from CLI for monitoring purposes How many characters are supported by the snmp user command?

A.

from 1 to 8

B.

from 1 to 16

C.

from 1 to 32

D.

from 1 to 48

Full Access
Question # 64

Drag and drop the steps from the left into the sequence on the right for a WAN Edge router after powering on for zero touch provisioning.

Full Access
Question # 65

Which two REST API functions are performed for Cisco devices in an overlay network? (Choose two)

A.

distributing a Snort image among devices

B.

attaching a device configuration template

C.

managing connections for smart licensing

D.

monitoring device certificates

E.

querying a device and aggregating statistics

Full Access
Question # 66

Refer to the exhibit.

The SD-WAN network is configured with a default full-mesh topology. The SD-WAN engineer wants the Barcelona WAN Edge to use MPLS TLOC as the preferred TLOC when communicating with Rome site. Which configuration must the engineer use to create a list to select MPLS color toward the Rome TLOC?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 67

What is the minimum Red Hat Enterprise Linux operating system requirement for a Cisco SD-WAN controller deployment via KVM?

A.

RHEL7.5

B.

RHEL 6.5

C.

RHEL4.4

D.

RHEL 6.7

Full Access
Question # 68

Which type of route advertisement of OMP can be verified?

A.

OMP, VPN. and origin

B.

Origin, TLOC, and VPN

C.

Origin, TLOC, and service

D.

OMP, TLOC and service

Full Access
Question # 69

Refer to the exhibit The network team must configure application-aware routing for the Service VPN 50.0.0.0/16 The SLA must prefer MPLS for video traffic but the remaining traffic must use a public network What must be defined other than applications before the application-aware policy is create?

A.

SLA Class, Site VPN. Prefix

B.

Data Prefix, Site VPN TLOC

C.

Application, SLA VPN. Prefix

D.

Color, SLA Class, Sue, VPN

Full Access
Question # 70

What problem happens on a device with two serial numbers, a unique device identifier (UDI), and secure unique device identifier (SUDI) when an engineer provisions ISR 4000 by PnP using only a UDI?

A.

It encounters spanning tree issues

B.

It faces interface buffer overflow patterns

C.

It encounters redirection problems.

D.

It encounters memory overload problems

Full Access
Question # 71

Refer to the exhibit. The Cisco SD-VYAN is deployed using the default topology. The engineer v/ants to configure a service insertion policy such that all data traffic between Rome to Paris is forwarded through the NGFW located in London. Which configuration fulfills this requirement, assuming that the Sen/ice VPN ID is 1?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 72

Drag and drop the steps from the left into the order on the right to upload software on vManage repository that is accessible from maintenance > Software Repository.

Full Access
Question # 73

Refer to the exhibit vManage and vBond have an issue establishing a connection with each other Which action resolves the issue?

A.

Reconfigure the system IPs to belong to the same subnet

B.

Change the organization name on both controllers to match vipteta.com.

C.

Remove the encapsulation ipsec command under the tunnel interface of vBond

D.

Configure the encapsulation ipsec command under the tunnel interface on vManage

Full Access
Question # 74

Which hardware component is involved in the Cisco SD-WAN authentication process for ISR platforms?

A.

TPMD

B.

ZTP

C.

TPC

D.

SUDI

Full Access
Question # 75

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

A.

A domain is nonexistent.

B.

A domain is block-listed.

C.

A domain is locally reachable.

D.

A domain is grey-listed.

Full Access
Question # 76

Drag and drop the devices from the left into order on the right to upgrade the software from version 19 to version 20.

Full Access
Question # 77

A large retail organization decided to move some of the branch applications to the AWS cloud. How does the network architect extend the in-house Cisco SD-WAN branch to cloud network into AWS?

A.

Create virtual WAN Edge devices Cloud through the AWS online software store

B.

Create virtual instances of vSmart Cloud through the AWS online software store

C.

Create GRE tunnels to AWS from each branch over the Internet

D.

Install the AWS Cloud Router in the main data center and provide the connectivity from each branch

Full Access
Question # 78

Refer to the exhibit. An engineer must block FTP traffic coming in from a particular Service VPN on a WAN Edge device Which set of steps achieves this goal?

A.

Create a localized policy and add it to (he interface feature template

B.

Create a localized policy add it to the device template and add an ACL to the interface feature template

C.

Create a prefix tat, add it to the localized policy and add it to the interface feature template

D.

Create a localized policy add it to VPN template and add an ACL to the interface feature template

Full Access
Question # 79

When software is upgraded on a vManage NMS, which two image-adding options store images in a local vManage software repository? (Choose two.)

A.

To be downloaded over a SMTP connection

B.

To be downloaded over a SNMP connection

C.

To be downloaded over an out-of-band connection

D.

To be downloaded over a control plane connection

E.

To be downloaded over an ICMP connection

Full Access
Question # 80

The Cisco SD-WAN engineer is configuring service chaining for a next-generation firewall located at the headquarters. Which configuration creates the service?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 81

When the VPN membership policy is being controlled at the vSmart controller, which policy disallows VPN 1 at sites 20 and 30?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 82

Refer to the exhibit.

vManage and vSmart have an issue establishing a connection to vBond. Which configuration resolves the issue?

A.

Configure the tunnel interface on all three controllers with a color of transport.

B.

Change the timezone on the vSmart to Europe/London.

C.

Configure the (11.1.1.X/24) IP addresses on the elhO interfaces on vManage and vSmart.

D.

Reconfigure the system-ip parameter on vSmart to 11.1.1.2.

Full Access
Question # 83

An engineer wants to track tunnel characteristics within an SLA-based policy for convergence. Which policy configuration will achieve this goal?

A.

App-route policy

B.

VPN membership policy

C.

Control policy

D.

Data policy

Full Access
Question # 84

How does the replicator role function in cisco SD-WAN?

A.

WAN Edge devices advertise the rendezvous point to all the receivers through the underlay network.

B.

vSmart Controllers advertise the rendezvous point to all the receivers through the overlay network.

C.

WAN Edge devices advertise the rendezvous point to all receivers through the overlay network.

D.

vSmart Controllers advertise the rendezvous point to all the receivers through the underlay network.

Full Access
Question # 85

Refer to the exhibit.

An engineer is troubleshooting an issue where vManage and vSmart have a problem establishing a connection to vBond. Which action fixes the issue?

A.

Reconfigure the vBond command on the vBond as vBond 150.5.1.3 local

B.

Configure the tunnel interface on all three controllers with a color of transport

C.

Remove the encapsulation IPsec command under the tunnel interface of vBond.

D.

Configure encapsulation as IPsec under the tunnel interface of vManage and vSmart

Full Access
Question # 86

What is a benefit of the application aware firewall feature in the Cisco SD-WAN solution?

A.

application monitoring

B.

application malware protection

C.

application visibility

D.

control policy enforcement

Full Access
Question # 87

Drag and drop the attributes from the left that make each transport location unique onto the right. Not all options are used.

Full Access
Question # 88

An engineer is troubleshooting a vEdge router and identifies a “DCONFAIL – DTLS connection failure” message. What is the problem?

A.

certificate mismatch

B.

organization mismatch

C.

memory issue

D.

connectivity issue

Full Access
Question # 89

An engineer is configuring a WAN Edge router for DIA based on matching QoS parameters. Which two actions accomplish this task? (Choose two.)

A.

Apply a QoS map policy.

B.

Configure a control policy.

C.

Configure a centralized data policy.

D.

Configure NAT on the transport interface.

E.

Apply a data policy on WAN interface.

Full Access
Question # 90

Which hardware component is involved in the Cisco SD-WAN authentication process for ISR platforms?

A.

TPMD

B.

ZTP

C.

TPC

D.

SUDI

Full Access
Question # 91

A network administrator is tasked to make sure that an OMP peer session is closed after missing three consecutive keepalive messages in 3 minutes. Additionally, route updates must be sent every minute. If a WAN Edge router becomes unavailable, the peer must use last known information to forward packets for 12 hours. Which set of configuration commands accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 92

How should the IP addresses be assigned for all members of a Cisco vManage cluster located in the same data center?

A.

in the same subnet

B.

in overlapping IPs

C.

in each controller with a /32 subnet

D.

in different subnets

Full Access
Question # 93

An engineer is configuring a WAN Edge router for DIA based on matching QoS parameters. Which two actions accomplish this task? (Choose two.)

A.

Apply a QoS map policy.

B.

Configure a control policy.

C.

Configure a centralized data policy.

D.

Configure NAT on the transport interface.

E.

Apply a data policy on WAN interface.

Full Access
Question # 94

An engineer must configure a centralized policy on a site in which all HTTP traffic should use the Public Internet circuit if the loss on this circuit is below 10%. otherwise MPLS should be used Which configuration wizard fulfils this requirement?

A.

Create Applications or Groups of Interest > Configure Traffic Rules > Apply Policies to Sites and VPNs

B.

Configure VPN Membership > Apply Policies to Sites and VPNs

C.

Create Applications or Groups of interest > Configure Traffic Data > Apply Policies to Sites and VPNs

D.

Configure Topology > Apply Policies to Sites and VPNs

Full Access
Question # 95

A network administrator configures SNMFV3 on a Cisco WAN Edge router from CL I for monitoring purposes How many characters are supported by the snmp user username command?

A.

from 1 to 8

B.

from 1 to 16

C.

from 1 to 32

D.

from 1 to 48

Full Access
Question # 96

An engineering team must prepare a traffic engineering policy where an MPLS circuit is preferred for traffic coming from the Admin VLAN Internet should be used as a backup only. Which configuration fulfill this requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 97

Which TCP Optimization feature is used by WAN Edge to prevent unnecessary retransmissions and large initial TCP window sizes to maximize throughput and achieve a better quality?

A.

SEQ

B.

SYN

C.

RTT

D.

SACK

Full Access
Question # 98

A vEdge platform is sending VRRP advertisement messages every 10 seconds. Which value configures the router back to the default timer?

A.

2 seconds

B.

3 seconds

C.

1 second

D.

5 seconds

Full Access
Question # 99

Refer to the exhibit A small company was acquired by a large organization As a result, the new organization decided to update information on their Enterprise RootCA and generated a new certificate using openssl Which configuration updates the new certificate and issues an alert in vManage Monitor | Events Dashboard?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 100

Which protocol is used for the vManage to connect to the vSmart Controller hosted in Cloud?

A.

PnP Server

B.

ZTP

C.

NETCONF

D.

HTTP

Full Access
Question # 101

What is a default protocol for control plane connection?

A.

IPsec

B.

HTTPS

C.

TLS

D.

DTLS

Full Access
Question # 102

What is an advantage of using auto mode versus static mode of power allocation when an access point is connected to a PoE switch port?

A.

It detects the device is a powered device

B.

All four pairs of the cable are used

C.

Power policing is enabled at the same time

D.

The default level is used for the access point

Full Access
Question # 103

Which protocol detects path status (up/down), measures loss/latency/jitter, and measures the quality of the IPsec tunnel MTU?

A.

OMP

B.

IP-SLA

C.

BFD

D.

DTLS

Full Access
Question # 104

Refer to exhibit.

An engineer is troubleshooting tear down of control connections even though a valid Certificate Serial Number is entered Which two actions resolve the Issue? (Choose two)

A.

Enter a valid serial number on the controllers for a given device

B.

Remove the duplicate IP in the network.

C.

Enter a valid product ID (model) on the PNP portal

D.

Match the serial number file between the controllers

E.

Restore network reachability for the controller

Full Access
Question # 105

What are the two impacts of losing vManage connectivity to fabric in the Cisco SD-WAN network? (Choose two)

A.

Policy changes propagation stops

B.

Statistics collection stops

C.

BFD peering between WAN Edge devices are unestablished

D.

Creation of templates is impossible

E.

IPsec tunnels tear down for WAN Edge devices.

Full Access
Question # 106

On which device is a service FW address configured to Insert firewall service at the hub?

A.

vEdge at the branch

B.

vSmart at the hub

C.

vEdge at the hub

D.

vSmart at the branch

Full Access
Question # 107

Which two mechanisms are used to guarantee the integrity of data packets in the Cisco SD-WAN architecture data plane? {Choose two)

A.

transport locations

B.

authentication headers

C.

certificates

D.

TPM chip

E.

encapsulation security payload

Full Access