Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

299-01 Questions and Answers

Question # 6

How do Cascade Performance Analytics assist with Performance Monitoring?

A.

By setting intelligent static thresholds for Application metrics and Interface metrics, tolerance can be determined. Cascade will use these thresholds and tolerances to report on deviations indicative of performance problems.

B.

The Customer only needs to identify their critical hosts, interfaces and/or applications, and Cascade will automatically baseline their behavior and report on deviations indicative of performance problems.

C.

The Performance Analytics use knowledge of hosts, interfaces, and/or applications are able to detect security threats such as host scans and worms.

D.

After baselining is completed, Cascade can re-route congested traffic to avoid congested application delivery paths.

Full Access
Question # 7

What is the maximum limit of configurable flows that can be exported from the Cascade Shark appliance? (Select 2)

A.

200,000 flows per minute per port

B.

300,000 flows per minute per port

C.

500,000 flows per minute per port

D.

500,000 flows per minute total

E.

600,000 flows per minute total

Full Access
Question # 8

Additional data sources that Cascade Profiler can leverage besides flow data arE. (Select 3)

A.

Active Directory information for successful/failed login association to IPs

B.

DHCP for host IP to MAC address association.

C.

SNMP polling to routers, switches, and servers for CPU information.

D.

SNMP trap data from routers, switches, and servers for security events.

E.

SNMP polling to routers and switches for MAC address and physical switch port association.

Full Access
Question # 9

Once the Cascade Shark appliance has an initial configuration with an IP Address set to 10.1.1.1 you can connect to it from a web browser using the URL:

A.

http://10.1.1.1

B.

https://10.1.1.1

C.

https://10.1.1.1:443

D.

https://10.1.1.1:8080

E.

http://10.1.1.1:8080

Full Access
Question # 10

Which filter should be used to analyze a capture job within Cascade Pilot?

A.

Use a BPF filter to speed up the View.

B.

Apply a generic View and then define a filter by drilling-down through a more specific View.

C.

Use a Cascade Pilot filter first and then a BPF filter.

D.

Create a time filter and then apply a View with a Cascade Pilot filter.

Full Access
Question # 11

Which of the following are TRUE concerning packet capture jobs on the Cascade Shark appliancE. (Select 4)

A.

Packets can be captured from multiple capture ports on one Cascade Shark appliance.

B.

The maximum length the packet data can be specified.

C.

Packets can be filtered on host IP addresses.

D.

SSL traffic can be decoded if the appropriate certificate are loaded in the Cascade Shark appliance.

E.

The maximum storage bandwidth for the job can be specified in bits/sec.

F.

Multiple packet capture jobs can run concurrently.

Full Access
Question # 12

Which content block can be used to compare traffic between two time periods on the Cascade Profiler Dashboard?

A.

Watched list as a bar chart

B.

Watched list as a stacked area chart

C.

Watched list as a line graph

D.

Watched list as a pie chart

E.

Top list as a bar chart

Full Access
Question # 13

Which of the following capabilities are supported by the Cascade Sensor appliance but are not supported by the Cascade Sensor-VE RSP packagE. (Select 2)

A.

Network Round Trip measurement

B.

Packet logging

C.

Server Delay measurement

D.

Connection Throughput measurement

E.

Retransmission measurement

F.

L7 application fingerprint checking

Full Access
Question # 14

If a report table on Cascade Profiler includes the "Server Delay" column but shows no value for "Server Delay" in some cells, what are the possible causes? (Select 3)

A.

The time span of the report does not cover any connection set-up points

B.

Server delay is zero.

C.

The protocol used by the application in not TCP-based.

D.

Application traffic was not seen by a Cascade Sensor.

E.

The server plug-in is needed to measure "Server Delay" and not functioning correctly.

Full Access
Question # 15

How does Cascade acquire the Interface Name (ifname) and interface speed (ifspeed) for interfaces reporting to Cascade?

A.

SNMP polling from the Gateway

B.

SNMP polling from the Profiler

C.

SYSLOG

D.

All of the above

E.

None of the above

Full Access
Question # 16

Which version of SNMP is supported for Switch Port Discovery on Cascade Profiler?

A.

SNMPv1 Only

B.

SNMPv2 Only

C.

SNMPv1 and SNMPv2

D.

SNMPv1 and SNMPv3

Full Access
Question # 17

How many Group Types Can you create on your Cascade Profiler?

A.

5

B.

20

C.

15

D.

10

E.

Unlimited

Full Access
Question # 18

Common methods for receiving alerts from a Network Performance Management system includE. (select 2)

A.

Traps sent via NetFlow, sFlow, or IPFX

B.

Alerts sent via eMail

C.

Traps sent via SNMP

D.

Traps sent via SPAN

E.

Traps sent via FIX Protocol

Full Access
Question # 19

Technologies used for switching traffic between Virtual Machines under ESXi include:

A.

Traffic between Virtual machines is not switched; it is routed by the standard vRouter included with ESXi

B.

A standard or distributed vSwitch which comes with ESXi must be used, there is not 3rd party software available

C.

A 3rd party virtual switch is required such as the CISCO Nexus 1000v as no standard vSwitch exists with ESXi

D.

The included standard vSwitch of the CISCO Nexus 7000

E.

The included standard vSwitch or the CISCO Nexus 1000v

Full Access
Question # 20

Filtering in Cascade Pilot: (Select 2)

A.

Is either a BPF or Wireshark Display filter only.

B.

Can be created from a chart.

C.

Can be changed after applying a View.

D.

Is the equivalent of the Wireshark "display filter input".

Full Access
Question # 21

In this scenario, you have created a host group called My_Computers on Cascade Profiler. In that group you have included the subnet 192.168.1.0/25.

You have 10 devices in that group 192.168.1.1-10. The rest of the addresses are unused. While running reports on this segment of the network you notice that when a report is run using the entire subnet you see traffic destined for 192.168.1.120. When you run the same report specifying the host group the traffic does not appear. Why is this happening?

A.

192.168.1.120 is not in the 192.168.1.0/25 subnet

B.

192.168.1.120 has been input as a trusted host in a security policy

C.

Traffic to 192.168.1.120 was not picked up by a Sensor

D.

Traffic to 192.168.1.120 was not picked up by a Gateway

E.

192.168.1.120 never sent any traffic

Full Access
Question # 22

If unable to connect to the Cascade Shark Appliance from the Cascade Pilot console it could be becausE. (Select 2)

A.

The correct communication port(s) are NOT open on the firewall between Cascade Pilot and Cascade Shark.

B.

The Cascade Shark is placed in "passthru" mode so Cascade Pilot access is not available

C.

The Cascade Shark appliance has no capture jobs configured.

D.

You may be running Cascade Pilot-Personal-Edition (PE). You need the full version of Cascade Pilot to connect to Cascade Shark.

E.

Trend/Index data is disabled on the Cascade Shark Appliance.

Full Access
Question # 23

Which of the following best describes any limits that are enforced on the number of service, performance and availability policies that are supported on any Cascade Profiler?

A.

Stratified policy limits ranging from 5000 for Cascade Profiler Express platforms to 10,000 for Cascade Enterprise Profiler platforms

B.

5,000 for all platforms

C.

15,000 for all platforms

D.

The Analytics license provides for an unlimited number of policies

E.

None of the above

Full Access
Question # 24

When you modify a filter in Cascade Pilot:

A.

Changes are saved only in the View to which the filter has been applied.

B.

The modified filter is saved on the machine on which Cascade Pilot is running.

C.

The modified filter is saved on any Cascade Shark that Cascade Pilot is connected to.

D.

The changes are lost when you close Cascade Pilot.

Full Access
Question # 25

When analyzing a large (100GB, for example) trace file within Cascade Pilot, you should:

A.

Copy the file onto a Cascade Shark to ensure better performance.

B.

Create an index so that processing of the View analytics will be faster.

C.

Apply a View with a specific filter.

D.

Use Wireshark tools to split the trace file in multiple and smaller trace files.

Full Access
Question # 26

Within Cascade Pilot, when packet capture (pcap) files have associated trending/indexing data the following are true (select 2)

A.

They appear in the my-views main directory.

B.

Views that take advantage of the trending/indexing data load faster.

C.

The file icon includes a colored-lightning bolt.

D.

The file loads faster into Wireshark.

E.

Additional pre-defined filters and watches are available.

Full Access
Question # 27

What can be configured on the Cascade Profiler to detect utilization for an interface? (Select 2)

A.

Manually configure the interface speeds on the Devices/Interfaces page.

B.

Configure and enable SNMP access to the reporting devices on the Devices/Interfaces page.

C.

Enable NBAR on the routers.

D.

Check the "Interface Utilization" box under the Devices/Interfaces page for each router and/or Steelhead desired.

E.

Configure the appropriate Device Interface Analytic.

Full Access
Question # 28

Within the Cascade Pilot GUI, the following filter types are availablE. (Select 3)

A.

Wireshark display filter

B.

BPF

C.

Cascade Pilot Filter

D.

Cascade-Scripting filter

E.

IP chains filter

Full Access
Question # 29

Before running your first report on Cascade Profiler after installation, where is the best place to go to verify traffic flows are currently being received?

A.

System Information > Devices/Interfaces

B.

System Information > Profiler

C.

Dashboard

D.

Log in to the shell and view the /usr/mazu/var/log/Sensor.log

E.

Ping devices on UDP port 2055 to see if they are up and running

Full Access
Question # 30

To install Cascade Shark, the best practice to initially configure the IP Address to be used on the network is:

A.

Connect a cross-over cable from your laptop to the Ethernet management port and connect through the Web browser to the default IP Address of 192.168.1.10.

B.

Connect a cross-over cable from your laptop to the Auxiliary Ethernet port and connect through the Web browser to the default IP Address of 192.168.1.10.

C.

Connect by KVM or Serial Console and run the command line tool, sa_wizard, to perform the initial configuration.

D.

Connect to the appliance using the Riverbed Central Management Console (CMC) on its default IP Address and perform the initial configuration.

Full Access
Question # 31

What conditions might prevent successful SNMP polling of a flow source? (Select 2)

A.

An ACL might exist on the flow source (router) and the Cascade Standard Profiler IP address is not in it.

B.

SNMP is not enabled.

C.

The correct IP address of the flow source was not entered into the GUI.

D.

The SNMP read string provided and entered might not be correct.

E.

The flow source is not using the same NTP source as the Cascade Gateway.

Full Access
Question # 32

Is there a way to look at who owns the Domain for an external IP Address shown in the Cascade Profiler GUI?

A.

No.

B.

Yes, you can do this with the "ARIN" lookup in "external links". The customer can also add additional external links if they have other sites they use to look up IP Addresses.

C.

This is available as a column in any report that displays the IP Address.

D.

This is available under IP Host Group Type.

Full Access
Question # 33

Which of the following are available integrations for Cascade Profiler? (Select 3)

A.

SNMP to send traps to trap receivers.

B.

SNMP to discover switch ports associated with IP addresses.

C.

SNMP to discover router interface capacities.

D.

SNMP to discover router CPU utilization.

Full Access
Question # 34

On a newly created capture job on Cascade Shark appliance, by default, trending/indexing arE. (Select 2)

A.

Enabled

B.

Disabled

C.

Set to retain up to 1 week or 10GB of indexing/trending data

D.

Set to retain up to 1 week or 10GB of packets

E.

Set to keep the indexing/trending data indefinitely

Full Access
Question # 35

Which of the following statements are true (select 2)

A.

SNMP based technology can query a network device for statistics such as number of packets and bytes sent out an interface but typically doesn't have conversation-level details (such as which IP Addresses where talking at a given time)

B.

NetFlow based technology can query a network device for statistics such as number of packets and bytes sent out an interface but typically doesn't have conversation-level details (such as which IP Addresses where talking at a given time)

C.

NetFlow based technology does NOT typically include response time information, packet inspection is necessary to measure response times

D.

It is NOT possible to understand which conversations traversed a link without full packet capture

E.

SNMP based technology querying routers in the network can be used to view end to end conversations across a network to determine top talkers

Full Access
Question # 36

To assure the packet data in a trace clip is preserved from Cascade Pilot, you should:

A.

Lock the trace clip.

B.

Send the trace clip packets to file.

C.

Detach the trace clip from the capture job trace.

D.

A and B

E.

A, B, and C.

Full Access