Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

300-415 Questions and Answers

Question # 6

Which policy configures an application-aware routing policy under Configuration > Policies?

A.

Localized policy

B.

Centralized policy

C.

Data policy

D.

Control policy

Full Access
Question # 7

Refer to the exhibit.

The engineer must assign community tags to 3 of its 74 critical server networks as soon as that are advertised to BGP peers. These server networks must not be advertised outside AS. Which configuration fulfill this requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 8

An engineer is configuring the branch office with a 172.16.0.0/16 subnet to use DIA for Internet traffic. All other traffic must flow to the central site or branches using the MPLS circuit Which configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 9

Refer to the exhibit.

The SD-WAN network is configured with a default full-mesh topology. The SD-WAN engineer wants the Barcelona WAN Edge to use MPLS TLOC as the preferred TLOC when communicating with Rome site. Which configuration must the engineer use to create a list to select MPLS color toward the Rome TLOC?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 10

What are the two impacts of losing vManage connectivity to fabric in the Cisco SD-WAN network? (Choose two)

A.

Policy changes propagation stops

B.

Statistics collection stops

C.

BFD peering between WAN Edge devices are unestablished

D.

Creation of templates is impossible

E.

IPsec tunnels tear down for WAN Edge devices.

Full Access
Question # 11

For data plane resiliency, what does the Cisco SD-WAN software implement?

A.

BFD

B.

establishing affinity between vSmart controllers and WAN Edge routers

C.

multiple vBond orchestrators

D.

OMP

Full Access
Question # 12

Which two vRoute attributes should be matched or set in vSmart policies and modified by data policies? (Choose two.)

A.

site ID

B.

preference

C.

VPN

D.

TLOC

E.

origin

Full Access
Question # 13

In which VPN is the NAT operation on an outgoing interface configured for direct Interne! access?

A.

1

B.

10

C.

512

D.

0

Full Access
Question # 14

Refer to the exhibit. The network administrator has configured a centralized topology policy that results in the displayed routing table at a branch office. Which two configurations are verified by the output? [Choose two.)

A.

The routing table is for the transport VPN.

B.

The default route is learned via OMP.

C.

This routing table is from a cEdge router.

D.

The default route is configured locally.

E.

The configured policy is adding a route tag of 300 to learned routes.

Full Access
Question # 15

What is an advantage of using auto mode versus static mode of power allocation when an access point is connected to a PoE switch port?

A.

It detects the device is a powered device

B.

All four pairs of the cable are used

C.

Power policing is enabled at the same time

D.

The default level is used for the access point

Full Access
Question # 16

Drag and drop the steps from the left into the sequence on the right for a WAN Edge router after powering on for zero touch provisioning.

Full Access
Question # 17

An enterprise needs DIA on some of its branches with a common location ID: A041:B70C: D78E::18 Which WAN Edge configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 18

In a Cisco SD-WAN network, which component is responsible for distributing route and policy information via the OMP?

A.

vManage

B.

vSmart Controler

C.

vBond Orchestrator

D.

WAN Edge Router

Full Access
Question # 19

What does forward error correction addresses in Cisco SO-WAN?

A.

inefficient traffic forwarding caused oy inbound shapers

B.

reduced application performance degradation rotated to service degradation

C.

applications with occasional invalid data input and poor performance

D.

traffic flows with increased delay over a particular transport

Full Access
Question # 20

A policy is created to influence routing path in the network using a group of prefixes. What policy application will achieve this goal when applied to a site List?

A.

vpn-membership policy

B.

cflowd-template

C.

app-route policy

D.

control-policy

Full Access
Question # 21

How is TLOC defined?

A.

It is represented by a unique identifier to specify a site in as SD-WAN architecture.

B.

It specifies a Cisco SD-WAN overlay in a multitenant vSMART deployment.

C.

It is a unique collection of GRE or iPsec encapsulation, link color, and system IP address.

D.

It is represented by group of QoS policies applied to a WAN Edge router.

Full Access
Question # 22

Refer to the exhibit Which configuration sets up direct Internet access for VPN 1?

A.

Option A

B.

Option B

C.

Option C

Full Access
Question # 23

An engineer configures policing with a rate of 125 Bps and a burst rate of 8000 bits, as shown here:

Which configuration completes this task?

A.

Configure 125 for rate and 1000 for burst.

B.

Configure 1000 for rate and 64000 for burst

C.

Configure 125 for rate and 8000 for burst

D.

Configure 1000 for rate and 1000 for burst

Full Access
Question # 24

Which type of policy must be applied on a WAN Edge application-aware firewall to control traffic between two or more VPNs?

A.

service-insertion policy

B.

data policy

C.

firewall policy

D.

control policy

Full Access
Question # 25

Company E wants to deploy Cisco SD-WAN with controllers in AWS The company's existing WAN is on private MPLS without Internet access to controllers m AWS An Internet circuit is added to a site in addition to the existing MPLS circuit. Which interface template establishes BFD neighbors over both transports?

A)

B)

C)

Miss

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 26

Which configuration component is used in a firewall security policy?

A.

numbered sequences of match-action pairs

B.

application match parameters

C.

URL filtering policy

D.

intrusion prevention policy

Full Access
Question # 27

Which secure tunnel type should be used to connect one WAN Edge router to other WAN Edge routers?

A.

TLS

B.

DTLS

C.

SSL VPN

D.

IPsec

Full Access
Question # 28

In which device state does the WAN edge router create control connections, but data tunnels are not created?

A.

valid

B.

backup

C.

active

D.

staging

Full Access
Question # 29

Refer to the exhibit. A user in the branch is connecting to Office 365 for the first time. Over which path does the branch WAN Edge router traffic follow?

A.

routing table of the branch WAN Edge router

B.

DIA exit of the branch WAN Edge router

C.

forwarded to the gateway site

D.

dropped because the minimum vQoE score has not been met

Full Access
Question # 30

An engineer is configuring a data policy for IPv4 prefixes for a single WAN Edge device on a site with multiple WAN Edge devices How is this policy added using the policy configuration wizard?

A.

ln vManage NMS, select the configure ► policies screen, select the localized policy tab and click add policy

B.

In vSmart controller, select the configure ► policies screen, select the localized policy tab. and click add policy

C.

In vManage NMS. select the configure ► policies screen select the centralized policy tab and click add policy

D.

In vBond orchestrator. select the configure ► policies screen, select the localized policy tab. and click add policy

Full Access
Question # 31

How many vCPUs and how much RAM are recommended to run the vSmart controller on the KVM server for 251 to 1000 devices in software version 20.4.x?

A.

4vCPUs. 16 GB

B.

4 vCPUs. 8 GB

C.

8vCPUs. 16 GB

D.

2vCPUs.4GB

Full Access
Question # 32

Which SD-WAN component is configured to enforce a policy to redirect branch-to-branch traffic toward a network service such as a firewall or IPS?

A.

vBond

B.

WAN Edge

C.

vSmart

D.

Firewall

Full Access
Question # 33

Which value is verified in the certificates to confirm the identity of the physical WAN Edge device?

A.

Serial Number

B.

OTP

C.

System-IP

D.

Chassis-ID

Full Access
Question # 34

Which Cisco SD-WAN component the initial communication between WAN Edge devices to join the fabric?

A.

WAN Edge Router

B.

vSmart Controller

C.

vManage

D.

vBond Orchestrator

Full Access
Question # 35

Which encryption algorithm secures binding exchanges Between Cisco TrustSec SXP peers?

A.

SEAL

B.

3DES

C.

AES

D.

MD5

Full Access
Question # 36

Drag and drop the definitions from the left to the configuration on the right.

Full Access
Question # 37

Which two sets of identifiers does OMP carry when it advertises TLOC routes between WAN Edge routers? (Choose two.)

A.

TLOC public and private address, carrier, and preference

B.

source and destination IP address, MAC, and site ID

C.

system IP address, link color, and encapsulation

D.

VPN ID, local site network, and BGP next-hop IP address

E.

TLOC public and private address, tunnel ID, and performance

Full Access
Question # 38

An engineer wants to change the configuration of the certificate authorization mode from manual to automated. Which GUI selection will accomplish this?

A.

Maintenance > Security

B.

Configuration > Certificates

C.

Administration > Settings

D.

Tools > Operational Commands

Full Access
Question # 39

Refer to the exhibit. vManage logs are available for the past few months. A device name change deployed mistakenly at a critical site. How is the device name change tracked by operation and design teams?

A)

B)

C)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 40

What prohibits deleting a VNF image from the software repository?

A.

if the image is stored by vManage

B.

if the image is referenced by a service chain

C.

if the image is uploaded by a WAN Edge device

D.

if the image is included in a configured policy

Full Access
Question # 41

Refer to the exhibit.

A customer wants to implement primary and secondary Cisco SD-WAN overlay routing for prefixes that are advertised for both data centers. The east data center (TLOC 101.101.101.101) is primary for east sites, and the west data center (TLOC 100.100.100.100) is primary for west sites. Which configuration change achieves this objective?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 42

Refer to the exhibit A vBond controller was added to the controller list with the same Enterprise Root CA certificate as vManage. The two controllers can reach each other via VPNO and share the same organization name, but the control connection is not initiated- Which action resolves the issue?

A.

Synchronize the WAN Edge list on vManage with controllers.

B.

Configure NTP on both controllers to establish a connection.

C.

Configure a valid systom IP on the vBond controller.

D.

Configure a valid vBond IP on vManage.

Full Access
Question # 43

Which protocol is used to propagate multicast join requests over the Cisco SD-WAN fabric?

A.

ARP

B.

Auto-RP

C.

OMP

D.

IGMP

Full Access
Question # 44

Which command on a WAN Edge device displays the information about the colors present in the fabric that are learned from vSmart via OMP?

A.

show omp tlocs

B.

show omp sessions

C.

show omp peers

D.

show omp route

Full Access
Question # 45

Which command disables the logging of syslog messages to the local disk?

A.

no system logging disk enable

B.

no system logging disk local

C.

system logging disk disable

D.

system logging server remote

Full Access
Question # 46

Refer to the exhibit The engineering must assign tags to 3 Of its 74 server networks as soon as they are advertised to peers These server network must not be advertised AS which configuration fulfil the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 47

Refer to the exhibit Which command allows traffic through the IPsec tunnel configured in VPN 0?

A.

service local

B.

service FW address 1.1.1.1

C.

service netsvc1 vpn 1

D.

service netsvc1 address 1.1.1.1

Full Access
Question # 48

Which data policy configuration influences BGP routing traffic flow from LAN to WAN?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 49

In an AWS cloud, which feature provision WAN Edge routers automatically in Cisco SD-WAN?

A.

Cloud app

B.

Cloud OnRamp

C.

vAnalytics

D.

Network Designer

Full Access
Question # 50

Which on-the-box security feature supported by the Cisco ISR 4451 SD-WAN device and not on vEdge?

A.

Cloud Express service

B.

Enterprise Firewall with Application Awareness

C.

reverse proxy

D.

IPsec/GRE cloud proxy

Full Access
Question # 51

Which two image formats are supported for controller codes? (Choose two.)

A.

.nxos

B.

.qcow2

C.

.ova

D.

.bin

E.

Tgz

Full Access
Question # 52

Which two requirements must be met for DNS inspection when integrating with cisco umbrella? (Choose two)

A.

Upload the WAN Edge serial allow list to the Umbrella portal.

B.

Attach security policy to the device template.

C.

Configure the Umbrella token on the vManage

D.

Create and attach a System feature template with the Umbrella registration credentials.

E.

Register and configure the vManage public IP and serial number in the Umbrella portal.

Full Access
Question # 53

In a Cisco SD-WAN architecture, what is the role of the WAN Edge?

A.

It provides orchestration to assist in automatic provisioning of WAN Edge routers and overlay

B.

It is the management plane responsible for centralized configuration and monitoring

C.

It is the control plane that builds and maintains network topology

D.

It is the data plane that is responsible for forwarding traffic

Full Access
Question # 54

Refer to the exhibit. An enterprise decides to use the Cisco SD-WAN Cloud onRamp for SaaS feature and utilize H.Q site Biz iNET to reach SaaS Cloud for branch C. currently reaching SaaS Cloud directly. Which role must be assigned to devices at both sites in vManage Cloud Express for this solution to work?

A.

H.Q to be added as Gateway and Branch as DIA.

B.

Branch to be added as Client Sites and H.Q as DIA.

C.

Branch to be added as DIA and H.Q as Client Site.

D.

H.Q to be added as Gateway and Branch as Client Site.

Full Access
Question # 55

Which logs verify when a device was upgraded?

A.

Audit

B.

Email

C.

ACL

D.

SNMP

Full Access
Question # 56

What is a description of vManage NMS?

A.

It is accessible only from VPN 512 (the management VPN).

B.

A cluster requires device templates to be created on and attached to the same server

C.

It is a software process on a dedicated WAN Edge router in the network.

D.

A cluster consists of a minimum of two vManage NMSs

Full Access
Question # 57

Refer to the exhibit. An engineer is troubleshooting a control connection issue on a WAN Edge device that shows socket errors. The packet capture shows some ICMP packets dropped between the two devices. Which action resolves the issue?

A.

Recover the vManage controller that is down m a high availability cluster

B.

Change the system IP or restart the VWN Edge 4 the system IP is changed

C.

Remove IP duplication in the network and configure a unique IP address

D.

Recover vBond or wart for the controller to reload which could be caused by a reset

Full Access
Question # 58

Which type of certificate is installed on vManage for a user to access vManage via a web browser?

A.

SD-AVC Certificate

B.

WAN Edge Certificate

C.

Controller Certificate

D.

Web Server Certificate

Full Access
Question # 59

Which configuration step is taken on vManage after WAN Edge list is uploaded?

A.

Send the list to controllers

B.

Enable the ZTP process

C.

Verify the device certificate

D.

Set the device as valid

Full Access
Question # 60

A network administrator is creating an OMP feature template from the vManage GUI to be applied to WAN edge routers. Which configuration attribute will avoid the redistribution of the routes back into the OMP from the LAN side?

A.

configure "Number of Paths Advertised per Prefix"

B.

configure "Overlay AS Number"

C.

configure "Send Backup Paths"

D.

configure "ECMP limit"

Full Access
Question # 61

How do WAN Edge devices operate when vSmart is inaccessible or fails to be reached by the WAN Edge?

A.

They cease to forward traffic in the data plane.

B.

They continue operation normally.

C.

They continue to receive reachability updates.

D.

They continue operating normally for a configurable time.

Full Access
Question # 62

What is the result during a WAN Edge software upgrade process if the version of the WAN Edge software is higher than the one running on a controller device?

A.

The upgrade button is greyed out

B.

The upgrade proceeds with no warning message.

C.

The upgrade fails with a warning message

D.

The upgrade proceeds with a warning message

Full Access
Question # 63

Refer to the exhibit.

An engineer is configuring service chaining. Which set of configurations is required for all traffic from Site ID 1 going toward Site ID 2 to get filtered through the firewall on the hub site?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 64

A vEdge platform is sending VRRP advertisement messages every 10 seconds. Which value configures the router back to the default timer?

A.

2 seconds

B.

3 seconds

C.

1 second

D.

5 seconds

Full Access
Question # 65

An enterprise is continuously adding new sites to its Cisco SD-WAN network. It must configure any cached routes flushed when OMP peers have lost adjacency Which configuration allows the cached OMP routes to be flushed after every 24 hours from its routing table?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 66

An engineer must apply the configuration for certificate installation to vBond Orchestrator and vSmart Controller. Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 67

What is the default value (in milliseconds) set tor the poll interval in the BFD basic configuration?

A.

300,000

B.

600,000

C.

900,000

D.

1,200,000

Full Access
Question # 68

Which two products are used to deploy Cisco WAN Edge Router virtual platforms? (Choose two.)

A.

HP ProLiant DL360 Generatton10 running HP-UX

B.

Cisco ENCS 5000 Series

C.

Sun SPARC Node running AIX

D.

Cisco UCS

E.

Sun Enterprise M4000 Server running Sun Solans

Full Access
Question # 69

Which two virtualized environments are available for a company to install the controllers using the on-premises model? (Choose two )

A.

VMware vSphere ESXi

B.

VMware Workstation

C.

kernel-based virtual machine

D.

OpenStack

E.

Microsoft Hyper-V

Full Access
Question # 70

What is the maximum number of IPsec that are temporarily created and converged on a new set if IPsec Sas in the pairwise keys process during a simultaneous rekey?

A.

2

B.

4

C.

6

D.

8

Full Access
Question # 71

How are policies deployed on cloud-tiosted Cisco SD-WAN controllers?

A.

Policies are created on vSmart and enforced by vSmart

B.

Policies are created on vSmart and enforced by vManage

C.

Policies are created on vManage and enforced by vManage.

D.

Policies are created on vManage and enforced by vSman

Full Access
Question # 72

At which layer does the application-aware firewall block applications on a WAN Edge?

A.

3

B.

7

C.

5

D.

2

Full Access
Question # 73

How are custom application ports monitored in Cisco SD-WAN controllers?

A.

Customers add custom application ports in vAnalytics and vManage.

B.

Customers add custom application ports in vAnalytics and vSmart.

C.

Cisco adds custom application ports In vAnalytics and vManage.

D.

Cisco adds custom application ports In vAnalytics and vSmart.

Full Access
Question # 74

Company ABC has decided to deploy the controllers using the On-Prem method. How does the administrator upload the WAN Edge list to the vManage?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 75

Which two criteria ate supported to filter traffic on a Cisco Umbrella Cloud-delivered firewall? (Choose two )

A.

tunnels

B.

site ID

C.

URL

D.

geolocation

E.

protocol

Full Access
Question # 76

Refer to the exhibit.

An engineer is troubleshooting a control connection Issue. What does "connect" mean in this how control connections output?

A.

Control connection is down

B.

Control connection is connected

C.

Control connection attempt is in progress

D.

Control connection is up

Full Access
Question # 77

Which configuration allows VPN 10 traffic to have direct internet access locally from the WAN Edge device?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 78

Refer to the exhibit An engineer is configuring a QoS policy to shape traffic for VLAN 100 on a subinterface Which policy configuration accomplishes the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 79

Which set of elements are verified by the controller to confirm the identity of edge devices?

A.

certificates, organization name and serial number of the device

B.

organization name serial number and system IP of the device

C.

certificates, organization name, and vBond domain

D.

certificates, system IP, and vBond domain

Full Access
Question # 80

A network administrator is configuring an application-aware firewall between inside zones to an outside zone on a WAN edge router using vManage GUI. What kind of Inspection is performed when the ‘’inspect’’ action is used?

A.

stateful inspection for TCP and UDP

B.

stateful inspection for TCP and stateless inspection of UDP

C.

IPS inspection for TCP and-Layer 4 inspection for UDP

D.

Layer 7 inspection for TCP and Layer 4 inspection for UDP

Full Access
Question # 81

Refer to the exhibit.

Which command-line configuration on a WAN Edge device achieves these results?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 82

Refer to the exhibit.

An enterprise has hub and spoke topology where it has several VPNs. An engineer must allow users in VPN91 to reach users in VPN92 and VPN10 to reach VPN91 and VPN92. Which configuration meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 83

After deploying Cisco SD-WAN the company realized that by default, all sites built direct IPsec VPN tunnels to each other In their previous topology all spoke sites used the head office as their next hop for the LAN segment that belongs to network 40.0.0.0/16 The company wants to deploy its previous policy, which allows the 40.0.0.0/16 network that originates at the hub to advertise to the spokes. Which configuration meets the requirement'?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 84

What must an engineer conewef when decoying an SD-WAN on-pfemlses architecture based on ESXi hypervisor?

A.

Cisco must provision the backup and snapshots platform lor ihe SD-WAN arctoecture

B.

The managed service provider must provision controllars with their appropriate cerHwcatsi

C.

The IT team a required to provision the SO-WAN controllers and Is responsAte lor backups and disaster recovery implementation

D.

The IT team will be given access by Cisco to a vManage for configuration If templates and policies coeigmalim

Full Access
Question # 85

An engineer configures Rome WAN Edge 10 use MPLS cloud as the preferred link to reach Paris WAN Edge and use biz-internet as a backup. Which policy configuration must be led in the outbound direction toward Rome to accomplish the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 86

Which component of the Cisco SD-WAN architecture oversees the control plane of overlay network to establish, adjust, and maintain the connections between the WAN Edge devices that form the Cisco SD-WAN fabric?

A.

APIC-EM

B.

vManage

C.

vSmart

D.

vBond

Full Access
Question # 87

An engineer is adding a tenant with location JD 306432373 in vManage. What is the maximum number of alphanumeric characters that are accepted in the tenant name field?

A.

64

B.

128

C.

256

D.

8

Full Access
Question # 88

How is a TLOC uniquely identified from a WAN Edge router to the SD-WAN transport network?

A.

system IP address

B.

VPN ID

C.

OMP

D.

SD-WAN site ID

Full Access
Question # 89

Which two resource data types are used to collect information for monitoring using REST API in Cisco SD-WAN? (Choose two.)

A.

POST

B.

DELETE

C.

scalar

D.

array

E.

PUT

Full Access
Question # 90

A customer has MPLS and Internet as the TLOC colors An engineer must configure conlroJIers with the Internet and not with MPLS Which configuration achieves this requirement on vManage?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 91

Where on vManage does an engineer find the details of control node failure?

A.

Alarms

B.

Events

C.

Audit log

D.

Network

Full Access
Question # 92

Which platforms are managed by a single vManage dashboard?

A.

ISR4351, ASR1002HX, vEdge2000, vEdge Cloud

B.

ISR4321, ASR1001, Nexus, ENCS

C.

ISR4321, ASR1001, ENCS, ISRv

D.

ISR4351, ASR1009, vEdge2000, CSR1000v

Full Access
Question # 93

How is the software managed in Cisco SD-WAN?

A.

Software images must be uploaded to vManage through HTTP or FTP

B.

Software downgrades are unsupported for vManage

C.

Software images must be transferred through VPN 512 or VPN 0 of vManage

D.

Software upgrade operation in the group must include vManage. vBond, and vSmart.

Full Access
Question # 94

An engineer creates a data policy to prevent communication from the 172.20.21.0/24 network to the 172.20.41.0/24 network. Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 95

Which actions must be taken to allow certain departments to require firewall protection when interacting with data center network without including other departments? (Choose two.)

A.

Use classification policing and marking

B.

Apply data policies at vEdge.

C.

Deploy a service-chained firewall service per VPN

D.

The regional hub advertises the availability of the firewall service

E.

Advertise lo vSmart controllers

Full Access
Question # 96

Refer to the exhibit The Cisco SD-WAN network is configured with a default full-mesh topology. Islamabad HQ and Islamabad WAN Edges must be used as the hub sites. Hub sites MPLS TLOC must be preferred when forwarding FTP traffic based on a configured SLA class list. Which policy configuration does the network engineer use to call the SLA class and set the preferred color to MPLS?

A.

Localized Policy, Route Policy

B.

Centralized Policy, Traffic Policy

C.

Localized Policy, Forwarding Class

D.

Centralized Policy Topology

Full Access
Question # 97

Which TCP Optimization feature is used by WAN Edge to prevent unnecessary retransmissions and large initial TCP window sizes to maximize throughput and achieve a better quality?

A.

SEQ

B.

SYN

C.

RTT

D.

SACK

Full Access
Question # 98

An engineering team must prepare a traffic engineering policy where an MPLS circuit is preferred for traffic coming from the Admin VLAN Internet should be used as a backup only. Which configuration fulfill this requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 99

How is lhe software managed in Cisco SD-WAN?

A.

Software upgrade operation in the group must include vManage. vBond. and vSmart.

B.

Software downgrades are unsupported for vManage

C.

Software images must be uploaded to vManage through HTTP or FTP.

D.

Software images must be transferred through VPN 512 or VPN 0 of vManage.

Full Access
Question # 100

What is the default value for the Multiplier field of the BFD basic configuration in vManage?

A.

3

B.

4

C.

5

D.

6

Full Access
Question # 101

An engineer creates this data policy for DIA for VPN 10:

Which policy sequence enables DIA for external networks?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 102

An engineer must use data prefixes to configure centralized data policies using the vManage policy configuration wizard. What is the first step to accomplish this task?

A.

Create groups of interest

B.

Configure network topology.

C.

Configure traffic rules.

D.

Apply policies to sites and VPNs.

Full Access
Question # 103

An organization wants to discover monitor and track the applications running on the WAN Edge device on the LAN Which configuration achieves this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 104

Refer to the exhibit.

An MPLS connection on R2 must extend to R1 Users behind R1 must have dual connectivity for data traffic Which configuration provides R1 control connectivity over the MPLS connection?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 105

Which action is performed during the onboarding process when a WAN Edge router is connected to ZTP server ztp.viptela com?

A.

The router is connected to WAN Edge Cloud Center

B.

The router is synced with vSmart Controller via an IPsec tunnel

C.

The router receives its vBond Orchestrator information

D.

The router is connected 10 vSmart Controller via a DTLSTLS tunnel

Full Access
Question # 106

An engineer must apply the configuration for certificate installation to vBond Orchestrator and vSmart Controller. Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 107

An engineer is adding a tenant with location ID 399533345 in vManage. What is the maximum number of alphanumeric characters that is accepted in the tenant name filed?

A.

64

B.

128

C.

256

D.

8

Full Access
Question # 108

Which API call retrieves a list of all devices in the network?

A.

https://vmanage_IP_address/dataservice/system/device/{{model}}

B.

http://vmanage_IP_address/dataservice/system/device/{{model}}

C.

http://vmanage_IP_address/api-call/system/device/{{model}}

D.

https://vmanage_IP_address/api-call/system/device/{{model}}

Full Access
Question # 109

WAN Edge routers are configured manually to use UDP port offset to use nondefault offset values when IPsec tunnels are created. What is the offse range?

A.

1-19

B.

0-18

C.

0-19

D.

1-18

Full Access
Question # 110

Which protocol Is used by the REST API to communicate with network services in the Cisco SO-WAN network?

A.

SSL

B.

HTTP

C.

iPsec

D.

SSM

Full Access
Question # 111

Refer to the exhibit.

Which shaping-rate does the engineer use to shape traffic at 9 Mbps?

A.

9

B.

9000

C.

90000

D.

9000000

Full Access
Question # 112

What is the OMP graceful restart default value on vSmart controllers and WAN Edge routers?

A.

21,600 seconds

B.

43,200 seconds

C.

86,400 seconds

D.

604,800 seconds

Full Access
Question # 113

Which service VPN must be reachable from all WAN Edge devices and the controllers?

A.

VPN0

B.

VPN10

C.

VPN215

D.

VPN512

Full Access
Question # 114

How should the IP addresses be assigned for all members of a Cisco vManage cluster located in the same data center?

A.

in the same subnet

B.

in overlapping IPs

C.

in each controller with a /32 subnet

D.

in different subnets

Full Access