Big Halloween Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

300-415 Questions and Answers

Question # 6

When VPNs are grouped to create destination zone in Zone-Based Firewall, how many zones can a single VPN be part of?

A.

two

B.

four

C.

one

D.

three

Full Access
Question # 7

An engineer is configuring a WAN Edge router for DIA based on matching QoS parameters. Which two actions accomplish this task? (Choose two.)

A.

Apply a QoS map policy.

B.

Configure a control policy.

C.

Configure a centralized data policy.

D.

Configure NAT on the transport interface.

E.

Apply a data policy on WAN interface.

Full Access
Question # 8

An engineer is configuring a centralized policy to influence network route advertisement. Which controller delivers this policy to the fabric?

A.

vSmart

B.

vManage

C.

WAN Edge

D.

vBond

Full Access
Question # 9

What is a requirement for deployment of on-premises vBond controllers through the Cisco Plug and Play Connect process?

A.

a DNS name that identifies vBond

B.

a defined controller profile

C.

Internet connectivity from vManage

D.

a CSV The that contains ail controllers

Full Access
Question # 10

Which website allows access to visualize the geography screen from vManager using the internet?

A.

*.opcnstreetmaps.org

B.

*.fullstreetmaps.org

C.

*.callstreelmaps.org

D.

*.globaistreetmaps.org

Full Access
Question # 11

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

A.

A domain is nonexistent.

B.

A domain is block-listed.

C.

A domain is locally reachable.

D.

A domain is grey-listed.

Full Access
Question # 12

What does forward error correction addresses in Cisco SO-WAN?

A.

inefficient traffic forwarding caused oy inbound shapers

B.

reduced application performance degradation rotated to service degradation

C.

applications with occasional invalid data input and poor performance

D.

traffic flows with increased delay over a particular transport

Full Access
Question # 13

An engineer configured a data policy called ROME-POLICY. Which configuration allows traffic flow from the Rome internal network toward other sites?

A.

apply-policy site-list Rome data-policy ROME-POLICY from-tunnel

B.

apply-policy site-list Rome data-policy ROME-POLICY from-service

C.

site-list Rome control-policy ROME-POLICY in

D.

site-list Rome control-policy ROME-POLICY out

Full Access
Question # 14

An engineer provisions a WAN Edge router. Which command should be used from the WAN Edge router to activate it with vManage?

A.

request vedge-cloud activate serial token

B.

request vedge-cloud activate chassis-number organization

C.

request vedge-cloud activate chassis-number token

D.

request vedge-cloud activate chassis-number serial <:serial>

Full Access
Question # 15

Which component of the Cisco SD-WAN architecture oversees the control plane of overlay network to establish, adjust, and maintain the connections between the WAN Edge devices that form the Cisco SD-WAN fabric?

A.

APIC-EM

B.

vManage

C.

vSmart

D.

vBond

Full Access
Question # 16

An engineer configures policing with a rate of 125 Bps and a burst rate of 8000 bits, as shown here:

Which configuration completes this task?

A.

Configure 125 for rate and 1000 for burst.

B.

Configure 1000 for rate and 64000 for burst

C.

Configure 125 for rate and 8000 for burst

D.

Configure 1000 for rate and 1000 for burst

Full Access
Question # 17

What two functions describe the TCP optimization tool used in the Cisco SD-WAN? (Choose two.)

A.

It uses TCP acknowledgment (ACK).

B.

It is used to take care of high packet loss for control traffic.

C.

It terminates TCP connections locally at the WAN edge.

D.

It uses TCP selective acknowledgment (SACK).

E.

It terminates TCP connections at the remote WAN edge.

Full Access
Question # 18

Which value of the IPsec rekey timer must be set by the engineer for an OMP graceful restart value set for 24 hours?

A.

6 hours

B.

12 hours

C.

36 hours

D.

48 hours

Full Access
Question # 19

Refer to the exhibit. Company ABC has a hub-and-spoke topology in place and currently is load balancing their data traffic at the hub site over MPLS and the public Internet. The leased circuit must be preferred over the shared circuit. Which configuration meets the requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 20

Which type of route represents prefixes received from a local site via an SD-WAN Edge router in a Cisco SD-WAN architecture?

A.

TLOC routes

B.

Service routes

C.

Multicast routes

D.

vRoutes

Full Access
Question # 21

Which attribute identifies the type of a vRoute?

A.

tag

B.

encapsulation

C.

originator

D.

origin

Full Access
Question # 22

What is the behaviour of vBond orchestrator?

A.

It maintains vSmart and WAN Edge routers secure connectivity state

B.

it builds permanent connections with vSmart controllers

C.

it updates vSmart of WAN Edge routers behind NAT devices using OMP.

D.

It builds permanent connections with WAN Edge routers

Full Access
Question # 23

An engineer must automate certificate signing through Cisco. Which vManage configuration achieves this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 24

How should the IP addresses be assigned for all members of a Cisco vManage cluster located in the same data center?

A.

in the same subnet

B.

in overlapping IPs

C.

in each controller with a /32 subnet

D.

in different subnets

Full Access
Question # 25

Which IP address must be reachable by a WAN Edge device for the ZIP process to work?

A.

10.1.1.1

B.

4.4 4.4

C.

172.16.1.1

D.

8.8.8.8

Full Access
Question # 26

Refer to the exhibit Which configuration must the engineer use to form underlay connectivity for the Cisco SD-WAN network?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 27

What must an engineer conewef when decoying an SD-WAN on-pfemlses architecture based on ESXi hypervisor?

A.

Cisco must provision the backup and snapshots platform lor ihe SD-WAN arctoecture

B.

The managed service provider must provision controllars with their appropriate cerHwcatsi

C.

The IT team a required to provision the SO-WAN controllers and Is responsAte lor backups and disaster recovery implementation

D.

The IT team will be given access by Cisco to a vManage for configuration If templates and policies coeigmalim

Full Access
Question # 28

Which protocol is used to propagate multicast join requests over the Cisco SD-WAN fabric?

A.

ARP

B.

Auto-RP

C.

OMP

D.

IGMP

Full Access
Question # 29

Which percentage for total memory or total CPU usage for a device is classified as normal in the WAN Edge Health pane?

A.

more than 80 percent usage

B.

less than 70 percent usage

C.

between 70 to 90 percent usage

D.

more than 90 percent usage

Full Access
Question # 30

Which controller is used for provisioning and configuration in a Cisco SD-WAN solution?

A.

vBond

B.

Manage

C.

WAN Edge router

D.

vSmart

Full Access
Question # 31

Refer to the exhibit.

The network design team has advised to use private IP addresses and private colors over the SP circuit for the data plane connections. The Public IP should be used for control connections. Which configuration should be applied at SiteA to achieve this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 32

WAN Edge routers are configured manually to use UDP port offset to use nondefault offset values when IPsec tunnels are created. What is the offse range?

A.

1-19

B.

0-18

C.

0-19

D.

1-18

Full Access
Question # 33

Which routes are similar to the IP route advertisements when the routing information of WAN Edge routers is learned from the local site and local routing protocols?

A.

service

B.

BGP

C.

TLOC

D.

OMP

Full Access
Question # 34

How is a TLOC uniquely identified from a WAN Edge router to the SD-WAN transport network?

A.

system IP address

B.

VPN ID

C.

OMP

D.

SD-WAN site ID

Full Access
Question # 35

An organization wants to use the cisco SD-WAN regionalized service-chaining feature to optimize cost and user experience with application in the network, which allows branch routers to analyze and steer traffic toward the required network function. Which feature meets this requirement?

A.

Cloud Services Platform

B.

VNF Service Chaning

C.

Cloud onRamp for Colocation

D.

Cloud onRamp for laaS

Full Access
Question # 36

Configure individual VRFs for each customer according to the topology to achieve these goals :

R1

R2

SW1

SW2

SW3

Full Access
Question # 37

Refer to the exhibit. An engineer is troubleshooting a control connection issue on a WAN Edge device that shows socket errors. The packet capture shows some ICMP packets dropped between the two devices. Which action resolves the issue?

A.

Recover the vManage controller that is down m a high availability cluster

B.

Change the system IP or restart the VWN Edge 4 the system IP is changed

C.

Remove IP duplication in the network and configure a unique IP address

D.

Recover vBond or wart for the controller to reload which could be caused by a reset

Full Access
Question # 38

Which component of the Cisco SD-WAN control plane architecture facilitates the storage of certificates and configurations for network components?

A.

vSmart

B.

vBond

C.

WAN Edge

D.

vManage

Full Access
Question # 39

Which alarm setting is configured to monitor serious events that affect but do not shut down, the operation of a network function?

A.

Minor

B.

Major

C.

Medium

D.

Critical

Full Access
Question # 40

An engineer must apply the configuration for certificate installation to vBond Orchestrator and vSmart Controller. Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 41

Which command displays BFD session summary information per TLOC on vEdge routers?

A.

show bfd history

B.

show bfd summary

C.

show bfd sessions

D.

show bfd tloc-summary-list

Full Access
Question # 42

When the VPN membership policy is being controlled at the vSmart controller, which policy disallows VPN 1 at sites 20 and 30?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 43

Which component is responsible for routing protocols such as BGP and OSPF in a Cisco SD-WAN solution?

A.

vSmart Controller

B.

vBond Orchestrator

C.

vManage

D.

WAN Edge Router

Full Access
Question # 44

Which component of the Cisco SD-WAN control plane architecture should be located in a public Internet address space and facilitates NAT-traversal?

A.

vBond

B.

WAN Edge

C.

vSmart

D.

vManage

Full Access
Question # 45

Which two features does the application firewall provide? (Choose two.)

A.

classification of 1400+ layer 7 applications

B.

blocks traffic by application or application-family

C.

numbered sequences of match-action pairs

D.

classification of 1000+ layer 4 applications

E.

application match parameters

Full Access
Question # 46

Refer to the exhibit Which configuration sets up direct Internet access for VPN 1?

A.

Option A

B.

Option B

C.

Option C

Full Access
Question # 47

Refer to the exhibit An engineer is configuring a QoS policy to shape traffic for VLAN 100 on a subinterface Which policy configuration accomplishes the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 48

A customer has MPLS and Internet as the TLOC colors An engineer must configure conlroJIers with the Internet and not with MPLS Which configuration achieves this requirement on vManage?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 49

How is multicast routing enabled on devices in the Cisco SD-WAN overlay network?

A.

The WAN Edge routers originate multicast service routes to the vSmart controller via OMP, which then forwards joins for requested multicast groups based on IGMP v1 or v2 toward the source or PIM-RP as specified m the original PIM join message.

B.

The vSmart controller originates multicast service routes to the WAN Edge routers via OMP, which then forwards joins for requested multicast groups cased on IGMP v1 or v2 toward the source or PlM-RP as specified m the original PIM join message

C.

The vSmart controller originates multicast service routes to the WAN Edge routers via OMP, which then forwards joins (or requested multicast groups based on IGMP v2 or v3 toward the source or PIM-RP as specified in the original PIM join message

D.

The WAN Edge routers originate multicast service routes to the vSmart controller via OMP. which then forwards joins for requested multicast groups based on iGMP v2 or v3 toward the source or PIM-RP as specified in the original PIM join message

Full Access
Question # 50

A customer has 1 to 100 service VPNs and wants to restrict outbound updates for VPN1 Which control policy configuration restricts these updates?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 51

How many vManage NMSs should be installed in each domain to achieve scalability and redundancy?

A.

two instances

B.

two clusters

C.

three or more in a cluster

D.

two or more in a cluster

Full Access
Question # 52

Drag and drop the alarm states from the left onto the corresponding alarm descriptions on the right.

Full Access
Question # 53

Refer to the exhibit.

Which QoS treatment results from this configuration after the access list acl-guest is applied inbound on the vpn1 interface?

A.

A UDP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted

B.

A TCP packet sourcing from 172.16.10.1 and destined to 172.16.20.1 is dropped

C.

A UDP packet souring from 172.16.10.1 and destined to 172.16.20.1 is dropped.

D.

A TCP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted

Full Access
Question # 54

What problem happens on a device with two serial numbers, a unique device identifier (UDI), and secure unique device identifier (SUDI) when an engineer provisions ISR 4000 by PnP using only a UDI?

A.

It encounters spanning tree issues

B.

It faces interface buffer overflow patterns

C.

It encounters redirection problems.

D.

It encounters memory overload problems

Full Access
Question # 55

Which configuration component is used in a firewall security policy?

A.

numbered sequences of match-action pairs

B.

application match parameters

C.

URL filtering policy

D.

intrusion prevention policy

Full Access
Question # 56

Which service VPN must be reachable from all WAN Edge devices and the controllers?

A.

VPN0

B.

VPN10

C.

VPN215

D.

VPN512

Full Access
Question # 57

What is a requirement for a WAN Edge to reach vManage, vBond, and vSmart controllers in a data center?

A.

IGP

B.

QoS

C.

TLS

D.

OMP

Full Access
Question # 58

What are the two components of an application-aware firewall? (Choose two.)

A.

zone pair

B.

sequence

C.

lists

D.

default action

E.

sequence action

F.

firewall policy

Full Access
Question # 59

Which routing protocol is used to exchange control plane information between vSmart controllers and WAN Edge routers in the Cisco SD-WAN secure extensible network?

A.

BGP

B.

OSPF

C.

BFD

D.

OMP

Full Access
Question # 60

What is the order of operations for software upgrades of Cisco SD-WAN nodes'?

A.

vBond vManage vSmart WAN Edge

B.

vManage vBond WAN Edge. vSmart

C.

vManage vSmart, vBond, WAN Edge

D.

vManage vBond vSraart WAN Edge

Full Access
Question # 61

Which cloud based component in cisco SD-WAN is responsible for establishing a secure connection to each WAN edge router and distributes routers and policy information via omp?

A.

vBond

B.

vManage

C.

vSmart

D.

WAN Edge

Full Access
Question # 62

An engineer is applying QoS policy for the transport-side tunnel interfaces to enable scheduling and shaping for a WAN Edge cloud router Which command accomplishes the task?

A.

cloud-qos-service-side

B.

qos-scheduler QOS_0

C.

qos-map QOS

D.

rewrite-rule QOS-REWRITE

Full Access
Question # 63

What is the maximum number of IPsec that are temporarily created and converged on a new set if IPsec Sas in the pairwise keys process during a simultaneous rekey?

A.

2

B.

4

C.

6

D.

8

Full Access
Question # 64

Refer to the exhibit. A network administrator is configuring OSPF advanced configuration parameters from a template using the vManager GUI for a branch WAN Edge router to calculate the cost of summary routes to an ASBR. Which action achieves this configuration?

A.

Enable Originate.

B.

Disable Originate.

C.

Enable RFC 1583 Compatible.

D.

Disable RFC 1583 Compatible.

Full Access
Question # 65

An engineer must configure a centralized policy on a site in which all HTTP traffic should use the Public Internet circuit if the loss on this circuit is below 10%. otherwise MPLS should be used Which configuration wizard fulfils this requirement?

A.

Create Applications or Groups of Interest > Configure Traffic Rules > Apply Policies to Sites and VPNs

B.

Configure VPN Membership > Apply Policies to Sites and VPNs

C.

Create Applications or Groups of interest > Configure Traffic Data > Apply Policies to Sites and VPNs

D.

Configure Topology > Apply Policies to Sites and VPNs

Full Access
Question # 66

What are two benefits of installing Cisco SD-WAN controllers on cloud-hosted services? (Choose two.)

A.

utilizes well-known cloud services such as Azure. AWS. and GCP

B.

accelerates Cisco SD-WAN deployment

C.

allows integration of the WAN Edge devices In the cloud

D.

installs the controllers in two cloud regions in a primary and backup setup

E.

automatically Implements zone-based firewalling on the controllers

Full Access
Question # 67

Refer to the exhibit.

The engineer must assign community tags to 3 of its 74 critical server networks as soon as that are advertised to BGP peers. These server networks must not be advertised outside AS. Which configuration fulfill this requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 68

Refer to the exhibit. An enterprise decides to use the Cisco SD-WAN Cloud onRamp for SaaS feature and utilize H.Q site Biz iNET to reach SaaS Cloud for branch C. currently reaching SaaS Cloud directly. Which role must be assigned to devices at both sites in vManage Cloud Express for this solution to work?

A.

H.Q to be added as Gateway and Branch as DIA.

B.

Branch to be added as Client Sites and H.Q as DIA.

C.

Branch to be added as DIA and H.Q as Client Site.

D.

H.Q to be added as Gateway and Branch as Client Site.

Full Access
Question # 69

An engineer is creating a policy for VPN1 users. Their scavenger traffic at site 101 must pass through a firewall. Which two match conditions must be selected to enable this policy? (Choose two.)

A.

destination port

B.

source data prefix

C.

packet length

D.

protocol

E.

application/application family list

Full Access
Question # 70

Which protocol runs between the vSmart controllers and WAN Edge routers when the vSmart controller acts like a route reflector?

A.

OMP outside the DTLS/TLS control connection

B.

BGP inside the DTLS/TLS

C.

IPsec inside the DTLS/TLS control connection

D.

OMP inside the DTLS/TLS control connection

Full Access
Question # 71

Refer to the exhibit A user has selected the options while configuring a VPN Interface Ethernet feature template What is the required configuration parameter the user must set in this template for this feature to function?

A.

The "IP MTU" field must be increased from the default value of 1500 to support the additional overhead.

B.

The "Shaping Rate (Kbps)" field must be configured with a value

C.

The "Adaptive QoS" field must be set to "on"

D.

The "Bandwidth Downstream" field must be configured with a value

Full Access
Question # 72

An engineer is configuring a data policy IPv4 prefixes for a site WAN edge device on a site with edge devices. How is this policy added using the policy configuration wizard?

A.

In vManage NMS select (he configure ► policies screen, select the centralized policy tab and click add policy

B.

In vBood orchestrator. select the configure > policies screen select the localized policy tab. and click add policy

C.

In vManage NMS. select the configure ► policies screen. select the localized policy tab- and click add policy

D.

In vSmart controller select tie configure ► policies screen, select the localized policy tab, and click add policy

Full Access
Question # 73

Two sites have one WAN Edge each WAN Edge has two public TLOCs with no restriction configured. There is full reachability between the TLOCs. How many data tunnels are formed on each Edge router?

A.

2

B.

8

C.

6

D.

4

Full Access
Question # 74

What are the two requirements for plug-and-play provisioning on Cisco IOS XE SD-WAN devices? (Choose two.)

A.

The gateway router for the WAN Edge device must be able to reach devicehelper.cisco.com.

B.

The gateway router for the WAN Edge device must be able to reach public DNS servers.

C.

The gateway router for the WAN Edge device must be able to reach ztp.viptela.com.

D.

Devices at branch offices must be able to reach the Cisco SD-WAN vSmart controller at the headquarters site.

E.

The WAN Edge device must have a valid certificate.

Full Access
Question # 75

Refer to the exhibit.

The control connection is failing. Which action resolves the issue?

A.

import vSmart in vManager

B.

Validate the certificates authenticity on vSmart

C.

Upload the WAN Edge list on vManage.

D.

Restore the reachability to the vSmart

Full Access
Question # 76

Which component of the Cisco SD-WAN network assures that only valid customer nodes are participating in the overlay network?

A.

vBond

B.

vManage

C.

vSmart

D.

WAN Edge

Full Access
Question # 77

In which device state does the WAN edge router create control connections, but data tunnels are not created?

A.

valid

B.

backup

C.

active

D.

staging

Full Access
Question # 78

An engineer must apply the configuration for certificate installation to vBond Orchestrator and vSmart Controller. Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 79

An administrator wants to create a policy to add a traffic policer called "politer-ccnp" to police data traffic on the WAN Edge. Which configuration accomplishes this task in vSmart?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 80

What are the default username and password for vSmart Controller when it is installed on a VMware ESXi hypervisor'?

A.

username Cisco password admin

B.

username admin password Cisco

C.

username Cisco password Cisco

D.

username admin password admin

Full Access
Question # 81

Which platform cannot provide IPS and URL filtering capabilities?

A.

Cisco CSR 1000V

B.

Cisco ISR 1000

C.

Cisco Catalyst 8300

D.

Cisco ISR 4000

Full Access
Question # 82

Refer to the exhibit. An engineer is enabling command line access via MPLS for in-band management. Which command completes the partial SD-WAN interface configuration with the highest degree of security?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 83

Drag and drop the devices from the left onto the correct functions on the right.

Full Access
Question # 84

An engineer must use data prefixes to configure centralized data policies using the vManage policy configuration wizard. What is the first step to accomplish this task?

A.

Create groups of interest

B.

Configure network topology.

C.

Configure traffic rules.

D.

Apply policies to sites and VPNs.

Full Access
Question # 85

In Cisco SD-WAN, what protocol is used for control connections between SD-WAN devices?

A.

DTLS

B.

OMP

C.

BGP

D.

OSPF

Full Access
Question # 86

Refer to the exhibit.

Which two configurations are needed to get the WAN Edges registered with the controllers when certificates are used? (Choose two)

A.

Generate a CSR manually within vManage server

B.

Generate a CSR manually on the WAN Edge

C.

Request a certificate manually from the Enterprise CA server

D.

Install the certificate received from the CA server manually on the WAN Edge

E.

Install the certificate received from the CA server manually on the vManage

Full Access
Question # 87

A network administrator is configuring VRRP to avoid a traffic black hole when the transport side of the network is down on the primary device. What must be configured to get the fastest failover to standby?

A.

prefix-list tracking

B.

lower timer interval

C.

higher group ID number

D.

OMP tracking

Full Access
Question # 88

A Cisco SD-WAN customer has a requirement to calculate the SHA value for files as they pass through the device to see the returned disposition and determine if the file is good, unknown or malicious. The customer also wants to perform real-time traffic analysis and generate alerts when threats are detected Which two Cisco SD-WAN solutions meet the requirements? (Choose two.)

A.

Cisco Trust Anchor Module

B.

Cisco Threat Grid

C.

Cisco Snort IPS

D.

Cisco AMP

E.

Cisco Secure Endpoint

Full Access
Question # 89

In which VPN is the NAT operation on an outgoing interface configured for direct Interne! access?

A.

1

B.

10

C.

512

D.

0

Full Access
Question # 90

What is a restriction when configuring a tunnel interface?

A.

Up to six tunnel interfaces are configurable on a vSmart.

B.

it is manually assigned when using vWanage feature template.

C.

It must be configured for the interface under aft VPNs

D.

Up to six tunnel interfaces are configurable on a WAN Edge

Full Access
Question # 91

An enterprise deployed a Cisco SD-WAN solution with hub-and-spoke topology using MPLS as the preferred network over the Internet. A network engineer must implement an application-aware routing policy to allow ICMP traffic to be load-balanced over both the available links. Which configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 92

An engineer is troubleshooting a vEdge router and identifies a “DCONFAIL – DTLS connection failure” message. What is the problem?

A.

certificate mismatch

B.

organization mismatch

C.

memory issue

D.

connectivity issue

Full Access
Question # 93

An engineer builds a three-node vManage cluster and then realizes that multiple nodes are unnecessary for the size of the company. How should the engineer revert the setup to a single vManage?

A.

Remove two rode from the three-node vManage duster

B.

Use the cluster conversion utility lo convert to standalone vManage

C.

Restore vManage from the backup VM snapshot

D.

Leave the duller as & and point to one vManage

Full Access
Question # 94

An engineer is modifying an existing data policy for VPN 115 to meet these additional requirements:

    When browsing government websites, the traffic must use direct internet access.

    The source address of the traffic leaving the site toward the government websites must be set to an IP range associated with the country itself, a particular TLOC.

The policy configuration is as follows:

Which policy sequence meets the requirements without interfering with other destinations?

A.

sequence 30

match

destination-data-prefix-list GOVERNMENT-WEBSITES

!

action accept

set

local-tloc-list

color biz-internet

B.

sequence 25

match

destination-data-prefix-list GOVERNMENT-WEBSITES

action accept

nat use-vpn 0

C.

sequence 15

match

source-data-prefix-list GOVERNMENT-WEBSITES

action accept

set

local-tloc-list

color private1

D.

sequence 15

match

destination-data-prefix-list GOVERNMENT-WEBSITES

!

action accept

set

local-tloc-list

color biz-internet

Full Access
Question # 95

Which policy configuration must be used to classify traffic as it enters the branch WAN Edge router to be put into the desired output queue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 96

Which component is responsible for creating and maintaining the secure DTLS/TLS connection on the vSmart controller?

A.

SNMP

B.

vdaemon

C.

NETCONF

D.

OMP

Full Access
Question # 97

Refer to the exhibit, which configuration configures IPsec tunnels in active and standby?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 98

An administrator needs to configure SD-WAN to divert traffic from the company's private network to an ISP network. What action should be taken to accomplish this goal?

A.

configure the control policy

B.

configure the data policy

C.

configure the data security policy

D.

configure the application aware policy

Full Access
Question # 99

Refer to the exhibit.

An engineer configured OMP with an overlay-as of 10666. What is the AS-PATH for prefix 104.104.104.104/32 on R100?

A.

100 10666

B.

100 20 104

C.

100 10666 20 104

D.

100 10666 104

Full Access
Question # 100

Refer to the exhibit vManage and vBond have an issue establishing a connection with each other Which action resolves the issue?

A.

Reconfigure the system IPs to belong to the same subnet

B.

Change the organization name on both controllers to match vipteta.com.

C.

Remove the encapsulation ipsec command under the tunnel interface of vBond

D.

Configure the encapsulation ipsec command under the tunnel interface on vManage

Full Access
Question # 101

Which protocol advertises WAN edge routes on the service side?

A.

EIGRP

B.

OSPF

C.

BGP

D.

ISIS

Full Access
Question # 102

An engineer must improve video quality by limiting HTTP traffic to the Internet without any failover. Which configuration in vManage achieves this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 103

Which protocol is used to measure loss latency, Jitter, and liveliness of the tunnel between WAN Edge router peers?

A.

OMP

B.

IP SLA

C.

NetFlow

D.

BFD

Full Access
Question # 104

What is the role of the Session Traversal Utilities for NAT server provided by the vBond orchestrator?

A.

It facilitates SD-WAN toners and controllers to discover their own mapped or translated IP addresses and port numbers

B.

It prevents SD-WAN Edge routers from forming sessions with public transports among different service providers

C.

It facilitates SD-WAN Edge routers to stay behind a NAT-enabled firewall while the transport addresses of the SD-WAN controller are unNAT-ed

D.

It allows WAN Edge routers to form sessions among MPLS TLOCs using only public IP addresses

Full Access
Question # 105

Drag and drop the functions from the left onto the correct templates on the right.

Full Access
Question # 106

Refer to the exhibit.

The tunnel interface configuration on both WAN Edge routers is:

Which configuration for WAN Edge routers will connect to the Internet?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 107

An engineer modifies a data policy for DIA in VPN 200 to meet the requirements for traffic destined to these locations:

* external networks; must be translated

* external networks; must use a public TLOC color

* syslog servers, must use a private TLOC color

Here is the existing data policy configuration:

Which policy configuration sequence set meets the requirements?

A.

B.

C.

Full Access
Question # 108

Which behavior describes a WAN Edge router running dual DIA when its DPI engine has identified a cloud SaaS application?

A.

Application traffic flows are routed over best performing DIA circuit, which makes the routing decision based on the best performing path.

B.

The gateway WAN Edge router DPI engine accepts the DNS query for SaaS applications, and DNS queries for noncloud applications follow the explicit path.

C.

Existing flows change the path and drop the traffic when the performance of the chosen path degrades.

D.

The WAN Edge DPI engine never selects a subperforming DIA circuit for the first application, and the WAN Edge router finds the SaaS application.

Full Access
Question # 109

An engineer must create a QoS policy by creating a class map and assigning it to the LLQ queue on a WAN Edge router Which configuration accomplishes the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 110

Drag and drop the BFD parameters from the left onto the BFD configurations on the right.

Full Access
Question # 111

Refer to the exhibit.

An engineer is configuring service chaining. Which set of configurations is required for all traffic from Site ID 1 going toward Site ID 2 to get filtered through the firewall on the hub site?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 112

How is vBond reachability resolved by vManage?

A.

OMP

B.

DNS

C.

BGP

D.

IPsec

Full Access
Question # 113

Which device should be configured with the service chain IP address to route intersite traffic through a firewall?

A.

vSmart

B.

firewall

C.

spoke WAN Edge

D.

hub WAREdge

Full Access
Question # 114

Drag and drop the alarm slates from the left onto the corresponding alarm descriptions on the right.

Full Access
Question # 115

Which two image formats are supported for controller codes? (Choose two.)

A.

.nxos

B.

.qcow2

C.

.ova

D.

.bin

E.

Tgz

Full Access
Question # 116

An engineer must avoid routing loops on the SD-WAN fabric for routes advertised between data center sites Which BGP loop prevention attribute must be configured on the routers to meet this requirement?

A.

same OMP overlay-as on WAN Edge routers of all data centers

B.

static routing on al WAN Edge routers instead of BGP

C.

same BGP AS between all WAN Edge routers and CE routers

D.

same BGP AS between all CE and PE routers

Full Access
Question # 117

Which command on a WAN Edge device displays the information about the colors present in the fabric that are learned from vSmart via OMP?

A.

show omp tlocs

B.

show omp sessions

C.

show omp peers

D.

show omp route

Full Access
Question # 118

Exhibit.

The SD-WAN network is configured with a default full-mash topology. An engineer wants Barcelona and Paris to communicate to each other through the London site using a control Which control policy configuration accomplishes the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 119

In an AWS cloud, which feature provision WAN Edge routers automatically in Cisco SD-WAN?

A.

Cloud app

B.

Cloud OnRamp

C.

vAnalytics

D.

Network Designer

Full Access
Question # 120

An engineer must advertise OSPF-learned routes and modify the update interval for route filtering by TLOC color to 300 on an SD-WAN device. Which configuration accomplishes this

task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 121

Which secure tunnel type should be used to connect one WAN Edge router to other WAN Edge routers?

A.

TLS

B.

DTLS

C.

SSL VPN

D.

IPsec

Full Access
Question # 122

What is a benefit of using REST APIs?

A.

predefined automation and orchestration platform for event management and logging

B.

user-defined automation and integration into other orchestration systems or tools

C.

vAnalytics to simplify operational services integration and real-time event monitoring

D.

predefined SD-WAN controller with other platform integration for event management and logging

Full Access
Question # 123

An engineer must configure two branch WAN Edge devices where an Internet connection is available and the controllers are in the headquarters. The requirement is to have IPsec VPN tunnels established between the same colors. Which configuration meets the requirement on both WAN Edge devices?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 124

Drag and drop the devices from the left into order on the right to upgrade the software from version 19 to version 20.

Full Access
Question # 125

What is a default protocol for control plane connection?

A.

IPsec

B.

HTTPS

C.

TLS

D.

DTLS

Full Access
Question # 126

Which data policy configuration influences BGP routing traffic flow from LAN to WAN?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 127

How do WAN Edge devices operate when vSmart is inaccessible or fails to be reached by the WAN Edge?

A.

They cease to forward traffic in the data plane.

B.

They continue operation normally.

C.

They continue to receive reachability updates.

D.

They continue operating normally for a configurable time.

Full Access
Question # 128

In a Cisco SD-WAN architecture, what is the role of the WAN Edge?

A.

It provides orchestration to assist in automatic provisioning of WAN Edge routers and overlay

B.

It is the management plane responsible for centralized configuration and monitoring

C.

It is the control plane that builds and maintains network topology

D.

It is the data plane that is responsible for forwarding traffic

Full Access
Question # 129

A voice packet requires a latency of 50 msec. Which policy is configured to ensure that a voice packet is always sent on the link with less than a 50 msec delay?

A.

centralized control

B.

localized data

C.

localized control

D.

centralized data

Full Access
Question # 130

Which configuration allows VPN 10 traffic to have direct internet access locally from the WAN Edge device?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 131

Refer to the exhibit.

The Cisco SD-WAN network is configured with a default full-mesh topology. An engineer wants Paris WAN Edge to use the Internet HOC as the preferred TLOC for MSN Messenger and AOL Messenger traffic. Which policy achieves this goal?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 132

An enterprise has several sites with multiple VPNs that are isolated from each other A new requirement came where users in VPN 73 must be able to talk to users in VPN 50 Which configuration meets this requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access