Special Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

300-415 Questions and Answers

Question # 6

Which two metrics must a cloud Edge router use to pick the optimal path for a SaaS application reachable via a gateway site? (Choose two.)

A.

HTTP loss and latency metrics to the SaaS application

B.

ICMP loss and latency metrics to the SaaS application

C.

BFD loss and latency metrics to the gateway site

D.

BFD loss and latency metrics to the SaaS application

E.

HTTP loss and latency metrics to the gateway site

Full Access
Question # 7

Which protocol runs between the vSmart controllers and WAN Edge routers when the vSmart controller acts like a route reflector?

A.

OMP outside the DTLS/TLS control connection

B.

BGP inside the DTLS/TLS

C.

IPsec inside the DTLS/TLS control connection

D.

OMP inside the DTLS/TLS control connection

Full Access
Question # 8

Which SD-WAN component is configured to enforce a policy to redirect branch-to-branch traffic toward a network service such as a firewall or IPS?

A.

vBond

B.

WAN Edge

C.

vSmart

D.

Firewall

Full Access
Question # 9

An engineer is adding a tenant with location ID 399533345 in vManage. What is the maximum number of alphanumeric characters that is accepted in the tenant name filed?

A.

64

B.

128

C.

256

D.

8

Full Access
Question # 10

Which VPNs must be configured outside the workflow to complete the SD-WAN overlay setup when using the Quick Connect workflow?

A.

service and transport VPNs

B.

service VPNs

C.

transport VPNs

D.

management VPNs

Full Access
Question # 11

Refer to the exhibit. An engineer must block FTP traffic coming in from a particular Service VPN on a WAN Edge device Which set of steps achieves this goal?

A.

Create a localized policy and add it to (he interface feature template

B.

Create a localized policy add it to the device template and add an ACL to the interface feature template

C.

Create a prefix tat, add it to the localized policy and add it to the interface feature template

D.

Create a localized policy add it to VPN template and add an ACL to the interface feature template

Full Access
Question # 12

A Cisco SD-WAN customer has a requirement to calculate the SHA value for files as they pass through the device to see the returned disposition and determine if the file is good, unknown or malicious. The customer also wants to perform real-time traffic analysis and generate alerts when threats are detected Which two Cisco SD-WAN solutions meet the requirements? (Choose two.)

A.

Cisco Trust Anchor Module

B.

Cisco Threat Grid

C.

Cisco Snort IPS

D.

Cisco AMP

E.

Cisco Secure Endpoint

Full Access
Question # 13

Refer to exhibit.

An engineer is troubleshooting tear down of control connections even though a valid Certificate Serial Number is entered Which two actions resolve the Issue? (Choose two)

A.

Enter a valid serial number on the controllers for a given device

B.

Remove the duplicate IP in the network.

C.

Enter a valid product ID (model) on the PNP portal

D.

Match the serial number file between the controllers

E.

Restore network reachability for the controller

Full Access
Question # 14

Refer to the exhibit. vManage logs are available for the past few months. A device name change deployed mistakenly at a critical site. How is the device name change tracked by operation and design teams?

A)

B)

C)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 15

A company deploys a Cisco SD-WAN solution but has an unstable Internet connection. When the link to vSmart comes back up, the WAN Edge router routing table is not refreshed, and some traffic to the destination network is dropped. The headquarters is the hub site, and it continuously adds new sites to the SD-WAN network. An engineer must configure route refresh between WAN Edge and vSmart within 2 minutes. Which configuration meets this requirement?

A.

Option A

B.

B

C.

Option B

D.

E.

Option C

F.

Option D

Full Access
Question # 16

Which Cisco SD-WAN configuration provides the advantages of day-zero deployment and reusable configuration components?

A.

CLI-based templates

B.

configuration groups

C.

configuration via the vBond controller

D.

configuration through a Cisco Prime server

Full Access
Question # 17

What is a requirement for deployment of on-premises vBond controllers through the Cisco Plug and Play Connect process?

A.

a DNS name that identifies vBond

B.

a defined controller profile

C.

Internet connectivity from vManage

D.

a CSV The that contains ail controllers

Full Access
Question # 18

How many concurrent sessions does a vManage REST API have before it invalidates the least recently used session if the maximum concurrent session number is reached?

A.

150

B.

200

C.

250

D.

300

Full Access
Question # 19

Refer to the exhibit. A customer wants to deploy service insertion at site1. Which traffic from VPN 10 must route to this site through a firewall. A policy must be in place to route VPN 10 traffic from all sites toward this firewall. Which configuration must be on the vSmart controller to meet this requirement?

A.

B.

C.

D.

Full Access
Question # 20

Which protocol is configured on tunnels by default to detect loss, latency, jitter, and path failures in Cisco SD-WAN?

A.

TLS

B.

BFD

C.

OMP

D.

BGP

Full Access
Question # 21

Refer to the exhibit.

Customer XYZ cannot provison dual connectivity on both Its routers due to budget constratnts but wants to use tnth RI and R2 interface for users behind them for load toward the hub site Which configurauon achieves this objectives?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 22

Which routing protocol has the highest default administrative distance?

A.

OMP

B.

external EIGRP

C.

IS-IS

D.

IBGP

Full Access
Question # 23

Refer to the exhibit.

An engineer configured OMP with an overlay-as of 10666. What is the AS-PATH for prefix 104.104.104.104/32 on R100?

A.

100 10666

B.

100 20 104

C.

100 10666 20 104

D.

100 10666 104

Full Access
Question # 24

The Cisco SD-WAN engineer is configuring service chaining for a next-generation firewall located at the headquarters. Which configuration creates the service?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 25

A network administrator is configuring a centralized control policy based on match action pairs for multiple conditions, which order must be configured to prefer Prefix List over TLOC and TLOC over Origin?

A.

highest to lowest sequence number

B.

nonsequential order

C.

deterministic order

D.

lowest to highest sequence number

Full Access
Question # 26

Drag and drop the route verification output from show omp tlocs from the left onto the correct explanations on the right.

Full Access
Question # 27

Which logs verify when a device was upgraded?

A.

Audit

B.

Email

C.

ACL

D.

SNMP

Full Access
Question # 28

An engineer must deploy a QoS policy with these requirements:

• policy name: App-police

• police rate: 1000000

• burst: 1000000

• exceed: drop

Which configuration meets the requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 29

Refer to the exhibit. An enterprise network is connected with an ISP network on an 80 Mbps bandwidth link. The network operation team observes 100 Mbps traffic on the 1Gig-ISP link during peak hours Which configuration provides bandwidth control to avoid traffic congestion during peak hours?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 30

An administrator wants to create a policy to add a traffic policer called "politer-ccnp" to police data traffic on the WAN Edge. Which configuration accomplishes this task in vSmart?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 31

Drag and drop the definitions from the left to the configuration on the right.

Full Access
Question # 32

An organization wants to use the cisco SD-WAN regionalized service-chaining feature to optimize cost and user experience with application in the network, which allows branch routers to analyze and steer traffic toward the required network function. Which feature meets this requirement?

A.

Cloud Services Platform

B.

VNF Service Chaning

C.

Cloud onRamp for Colocation

D.

Cloud onRamp for laaS

Full Access
Question # 33

Which component is used for stateful inspection of TCP, UDP. and ICMP flows in Cisco SD-WAN firewall policies?

A.

zones

B.

sites

C.

subnets

D.

interfaces

Full Access
Question # 34

Which device should be configured with the service chain IP address to route intersite traffic through a firewall?

A.

vSmart

B.

firewall

C.

spoke WAN Edge

D.

hub WAREdge

Full Access
Question # 35

Which two criteria ate supported to filter traffic on a Cisco Umbrella Cloud-delivered firewall? (Choose two )

A.

tunnels

B.

site ID

C.

URL

D.

geolocation

E.

protocol

Full Access
Question # 36

In the Cisco SD_WAN solution, vSmart controller is responsible for which two actions? (Choose two.)

A.

Distribute crypto key information among vEdge routers

B.

Configure and monitor vEdge routers.

C.

Authenticate and authorize vEdge routers.

D.

Distribute the IP address from DHCP server to vEdge routers.

E.

Distribute route and policy information via OMP.

Full Access
Question # 37

Which type of lists are used to group related items via an application-aware routing policy under the policy lists command hierarchy on vSmart controllers?

A.

data prefix, she. and VPN

B.

OSCP value, application, and VPN

C.

data prefix, application, and SLA class

D.

DSCP value, site, and VPN

Full Access
Question # 38

What problem happens on a device with two serial numbers, a unique device identifier (UDI), and secure unique device identifier (SUDI) when an engineer provisions ISR 4000 by PnP using only a UDI?

A.

It encounters spanning tree issues

B.

It faces interface buffer overflow patterns

C.

It encounters redirection problems.

D.

It encounters memory overload problems

Full Access
Question # 39

What is a description of vManage NMS?

A.

It is accessible only from VPN 512 (the management VPN).

B.

A cluster requires device templates to be created on and attached to the same server

C.

It is a software process on a dedicated WAN Edge router in the network.

D.

A cluster consists of a minimum of two vManage NMSs

Full Access
Question # 40

Which port is used for vBond under controller certificates if no alternate port is configured?

A.

12345

B.

12347

C.

12346

D.

12344

Full Access
Question # 41

Which device in the SD- WAN solution receives and categorizes event reports, and generates alarms?

A.

WAN Edge routers

B.

vSmart controllers

C.

vManage NMS

D.

vBond controllers

Full Access
Question # 42

Refer to the exhibit.

An engineer is troubleshooting an issue where vManage and vSmart have a problem establishing a connection to vBond. Which action fixes the issue?

A.

Reconfigure the vBond command on the vBond as vBond 150.5.1.3 local

B.

Configure the tunnel interface on all three controllers with a color of transport

C.

Remove the encapsulation IPsec command under the tunnel interface of vBond.

D.

Configure encapsulation as IPsec under the tunnel interface of vManage and vSmart

Full Access
Question # 43

Which two prerequisites must be met before the Cloud onRamp for laaS is initiated on vManage to expand to the AWS cloud? (Choose two)

A.

Attach the *AmazonCreateVPC* and "Amazon Provision EC2" permission policy to the IAM account

B.

Subscribe to the SD-WAN Edge router AMI in the AWS account

C.

Attach an OSPF feature template to the AWS cloud Edge router template

D.

Attach a device template to the cloud WAN Edge router to be deployed in the AWS

E.

Preprovision the transit VPC in the AWS region

Full Access
Question # 44

At which layer does the application-aware firewall block applications on a WAN Edge?

A.

3

B.

7

C.

5

D.

2

Full Access
Question # 45

A customer is receiving routes via OMP from vSmart controller for a specific VPN. The customer must provide access to the W2 loopback received via OMP to the OSPF neighbor on the service-side VPN, which configuration fulfils these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 46

An engineer is applying QoS policy for the transport-side tunnel interfaces to enable scheduling and shaping for a WAN Edge cloud router Which command accomplishes the task?

A.

cloud-qos-service-side

B.

qos-scheduler QOS_0

C.

qos-map QOS

D.

rewrite-rule QOS-REWRITE

Full Access
Question # 47

Which protocol Is used by the REST API to communicate with network services in the Cisco SO-WAN network?

A.

SSL

B.

HTTP

C.

iPsec

D.

SSM

Full Access
Question # 48

An engineer is configuring the branch office with a 172.16.0.0/16 subnet to use DIA for Internet traffic. All other traffic must flow to the central site or branches using the MPLS circuit Which configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 49

How is TLOC defined?

A.

It is represented by a unique identifier to specify a site in as SD-WAN architecture.

B.

It specifies a Cisco SD-WAN overlay in a multitenant vSMART deployment.

C.

It is a unique collection of GRE or iPsec encapsulation, link color, and system IP address.

D.

It is represented by group of QoS policies applied to a WAN Edge router.

Full Access
Question # 50

What are the two protocols redistributed into OMP? (Choose two.)

A.

OSPF

B.

RIP

C.

LDP

D.

RSVP

E.

EIGRP

Full Access
Question # 51

Refer to the exhibit. The Cisco SD-VYAN is deployed using the default topology. The engineer v/ants to configure a service insertion policy such that all data traffic between Rome to Paris is forwarded through the NGFW located in London. Which configuration fulfills this requirement, assuming that the Sen/ice VPN ID is 1?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 52

What is the maximum number of IPsec that are temporarily created and converged on a new set if IPsec Sas in the pairwise keys process during a simultaneous rekey?

A.

2

B.

4

C.

6

D.

8

Full Access
Question # 53

When redistribution is configured between OMP and BGP at two Data Center sites that have Direct Connection interlink, which step avoids learning the same routes on WAN Edge routers of the DCs from LAN?

A.

Define different VRFs on both DCs

B.

Set same overlay AS on both DC WAN Edge routers

C.

Set down-bit on Edge routers on DC1

D.

Set OMP admin distance lower than BGP admin distance

Full Access
Question # 54

Which percentage for total memory or total CPU usage for a device is classified as normal in the WAN Edge Health pane?

A.

more than 80 percent usage

B.

less than 70 percent usage

C.

between 70 to 90 percent usage

D.

more than 90 percent usage

Full Access
Question # 55

Which two image formats are supported for controller codes? (Choose two.)

A.

.nxos

B.

.qcow2

C.

.ova

D.

.bin

E.

Tgz

Full Access
Question # 56

Refer to the exhibit.

An MPLS connection on R2 must extend to R1 Users behind R1 must have dual connectivity for data traffic Which configuration provides R1 control connectivity over the MPLS connection?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 57

Refer to the exhibit Which NAT types must the engineer configure for the vEdge router to bring up the data plane tunnels?

A.

Enable Full Cone NAT on the vEdge interface

B.

Use public color on the TLOC

C.

Use private color on the TLOC

D.

Enable Symmetric MAT on the vEdge interface

Full Access
Question # 58

Refer to the exhibit Which configuration must the engineer use to form underlay connectivity for the Cisco SD-WAN network?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 59

An engineer is configuring a shaping rate of 1 Mbps on the WAN link of a WAN Edge router Which configuration accomplishes this task’?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 60

What is the minimum Red Hat Enterprise Linux operating system requirement for a Cisco SD-WAN controller deployment via KVM?

A.

RHEL7.5

B.

RHEL 6.5

C.

RHEL4.4

D.

RHEL 6.7

Full Access
Question # 61

Which VManage dashboard is used to monitor the next-hop reachability between two devices traversing through OMP for a service VPN’

A.

Troubleshooting > App Route Visualization

B.

Troubleshooting > Tunnel Health

C.

Troubleshooting > Simulate Flows

D.

Troubleshooting > Packet Capture

Full Access
Question # 62

Refer to the exhibit. Which configuration value is used to change the administrative distance of iBGP routes to 20?

A.

Configure internal Routes Distance to 20

B.

Configure Propagate AS Path to off

C.

Configure Local Distance to 20

D.

Configure External routes distance 20

Full Access
Question # 63

An engineer modifies a data policy for DIA in VPN 67. The location has two Internet-bound circuits. Only the web browsing traffic must be admitted for DIA. without further discrimination about which transport to use.

Here is the existing data policy configuration:

Which policy configuration sequence meets the requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 64

Which encryption algorithm is used for encrypting SD-WAN data plane traffic?

A.

Triple DES

B.

IPsec

C.

AES-128

D.

AES-256 GCM

Full Access
Question # 65

Which component of the Cisco SD-WAN architecture oversees the control plane of overlay network to establish, adjust, and maintain the connections between the WAN Edge devices that form the Cisco SD-WAN fabric?

A.

APIC-EM

B.

vManage

C.

vSmart

D.

vBond

Full Access
Question # 66

Refer to the exhibit Which command allows traffic through the IPsec tunnel configured in VPN 0?

A.

service local

B.

service FW address 1.1.1.1

C.

service netsvc1 vpn 1

D.

service netsvc1 address 1.1.1.1

Full Access
Question # 67

Refer to the exhibit An engineer must configure a QoS policy between me hub and site A (spoke) over a standard internet circuit where traffic shaping is adjusted automatically based on evaiiabk» bandwidth Which configuration meets the requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 68

For data plane resiliency, what does the Cisco SD-WAN software implement?

A.

BFD

B.

establishing affinity between vSmart controllers and WAN Edge routers

C.

multiple vBond orchestrators

D.

OMP

Full Access
Question # 69

Which configuration allows VPN 10 traffic to have direct internet access locally from the WAN Edge device?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 70

Drag and drop the security terminologies from the left onto the PCI-compliant network features and devices on the right.

Full Access
Question # 71

Which component is responsible for routing protocols such as BGP and OSPF in a Cisco SD-WAN solution?

A.

vSmart Controller

B.

vBond Orchestrator

C.

vManage

D.

WAN Edge Router

Full Access
Question # 72

An engineer is configuring a data policy for IPv4 prefixes for a single WAN Edge device on a site with multiple WAN Edge devices How is this policy added using the policy configuration wizard?

A.

ln vManage NMS, select the configure ► policies screen, select the localized policy tab and click add policy

B.

In vSmart controller, select the configure ► policies screen, select the localized policy tab. and click add policy

C.

In vManage NMS. select the configure ► policies screen select the centralized policy tab and click add policy

D.

In vBond orchestrator. select the configure ► policies screen, select the localized policy tab. and click add policy

Full Access
Question # 73

An engineer is configuring a WAN Edge router for DIA based on matching QoS parameters. Which two actions accomplish this task? (Choose two.)

A.

Apply a QoS map policy.

B.

Configure a control policy.

C.

Configure a centralized data policy.

D.

Configure NAT on the transport interface.

E.

Apply a data policy on WAN interface.

Full Access
Question # 74

In an AWS cloud, which feature provision WAN Edge routers automatically in Cisco SD-WAN?

A.

Cloud app

B.

Cloud OnRamp

C.

vAnalytics

D.

Network Designer

Full Access
Question # 75

How are policies deployed on cloud-tiosted Cisco SD-WAN controllers?

A.

Policies are created on vSmart and enforced by vSmart

B.

Policies are created on vSmart and enforced by vManage

C.

Policies are created on vManage and enforced by vManage.

D.

Policies are created on vManage and enforced by vSman

Full Access
Question # 76

Which two advanced security features are available on the Cisco SD-WAN WAN Edge (vEdge) device? (Choose two.)

A.

URL filtering

B.

snort intrusion prevention system

C.

Cisco Umbrella DNS Security

D.

Cisco AMP and AMP Threat Grid

E.

Enterprise Firewall

Full Access
Question # 77

Which two hardware platforms support Cisco IOS XE SD-WAN images'' (Choose two)

A.

ASR1000 series

B.

ISR9300 series

C.

vEdge-1000 series

D.

ASR9000 series

E.

ISR4000 series

Full Access
Question # 78

Which configuration step is taken on vManage after WAN Edge list is uploaded?

A.

Send the list to controllers

B.

Enable the ZTP process

C.

Verify the device certificate

D.

Set the device as valid

Full Access
Question # 79

In a Cisco SD-WAN architecture, what is the role of the WAN Edge?

A.

It provides orchestration to assist in automatic provisioning of WAN Edge routers and overlay

B.

It is the management plane responsible for centralized configuration and monitoring

C.

It is the control plane that builds and maintains network topology

D.

It is the data plane that is responsible for forwarding traffic

Full Access
Question # 80

An engineer must automate certificate signing through Cisco. Which vManage configuration achieves this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 81

Refer to the exhibit.

The engineer must assign community tags to 3 of its 74 critical server networks as soon as that are advertised to BGP peers. These server networks must not be advertised outside AS. Which configuration fulfill this requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 82

What is the default value for the number of paths advertised per prefix in the OMP feature template?

A.

4

B.

8

C.

12

D.

16

Full Access
Question # 83

Which OSPF command makes the WAN Edge router a less preferred exit from a site with a dual WAN Edge design?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 84

What is the purpose of ‘’vpn 0’’ in the configuration template when onboarding a WAN edge node?

A.

It carries control traffic over secure DTLS or TLS connections between vSmart controllers and vEdge routers, and between vSmart and vBond

B.

It carries control out-of-band network management traffic among the Viptela devices in the overlay network.

C.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vManager

D.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vBond

Full Access
Question # 85

What are two attributes of vRoute? (Choose two)

A.

originator

B.

service

C.

encapsulation

D.

carrier

E.

domain ID

Full Access
Question # 86

Drag and drop the vManage policy configuration procedures from the left onto the correct definitions on the right.

Full Access
Question # 87

An enterprise has these three WAN connections:

    public Internet

    business internet

    MPLS

An engineer must configure two available links to route traffic via both links. Which configuration achieves this objective?

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 88

What is the default value (in milliseconds) set tor the poll interval in the BFD basic configuration?

A.

300,000

B.

600,000

C.

900,000

D.

1,200,000

Full Access
Question # 89

What is the advantage of instating the controller on-premises?

A.

ease of deployment and management

B.

full control of the data piano and the control plane

C.

automatic geographical redundancy and security

D.

scalability and a cost-saving

Full Access
Question # 90

How must the application-aware enterprise firewall policies be applied within the same WAN Edge router?

A.

within and between zones

B.

between two VPN tunnels

C.

within zone pair

D.

between two VRFs

Full Access
Question # 91

Refer to the exhibit vManage and vBond have an issue establishing a connection with each other Which action resolves the issue?

A.

Reconfigure the system IPs to belong to the same subnet

B.

Change the organization name on both controllers to match vipteta.com.

C.

Remove the encapsulation ipsec command under the tunnel interface of vBond

D.

Configure the encapsulation ipsec command under the tunnel interface on vManage

Full Access
Question # 92

What happens if the intelligent proxy is unreachable in the Cisco SD-WAN network?

A.

The grey-listed domains are unresolved

B.

The Cisco Umbrella Connector locally resolves the DNS request

C.

The block-listed domains are unresolved

D.

The Cisco Umbrella Connector temporarily redirects HTTPS traffic

Full Access
Question # 93

Which component is used to optimize the multicast distribution tree enabled through the multicast network?

A.

IGMP client

B.

vManage controllers

C.

VPN concentrator

D.

OMP replicator

Full Access
Question # 94

Which policy is configured to ensure that a voice packet is always sent on the link with less than a 50 msec delay?

A.

localized data policy

B.

localized control policy

C.

centralized data policy

D.

centralized control policy

Full Access
Question # 95

A network administrator is configuring Qos on a vEdge 5000 router and needs to enable it on the transport side interface. Which policy setting must be selected to accomplish this goal?

A.

Cloud QoS Service side

B.

Cloud QoS

C.

NetFlow

D.

Application

Full Access
Question # 96

Which configuration changes the packet loss priority from low to highly?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 97

Which encryption algorithm secures binding exchanges Between Cisco TrustSec SXP peers?

A.

SEAL

B.

3DES

C.

AES

D.

MD5

Full Access
Question # 98

Which component of the Cisco SD-WAN secure extensible network provides a single pane of glass approach to network monitoring and configuration?

A.

APIC-EM

B.

vSmart

C.

vManage

D.

vBond

Full Access
Question # 99

How does the replicator role function in cisco SD-WAN?

A.

WAN Edge devices advertise the rendezvous point to all the receivers through the underlay network.

B.

vSmart Controllers advertise the rendezvous point to all the receivers through the overlay network.

C.

WAN Edge devices advertise the rendezvous point to all receivers through the overlay network.

D.

vSmart Controllers advertise the rendezvous point to all the receivers through the underlay network.

Full Access
Question # 100

Which routes are similar to the IP route advertisements when the routing information of WAN Edge routers is learned from the local site and local routing protocols?

A.

service

B.

BGP

C.

TLOC

D.

OMP

Full Access
Question # 101

Which Cisco SD-WAN component the initial communication between WAN Edge devices to join the fabric?

A.

WAN Edge Router

B.

vSmart Controller

C.

vManage

D.

vBond Orchestrator

Full Access
Question # 102

An engineer must avoid routing loops on the SD-WAN fabric for routes advertised between data center sites Which BGP loop prevention attribute must be configured on the routers to meet this requirement?

A.

same OMP overlay-as on WAN Edge routers of all data centers

B.

static routing on al WAN Edge routers instead of BGP

C.

same BGP AS between all WAN Edge routers and CE routers

D.

same BGP AS between all CE and PE routers

Full Access
Question # 103

Refer to the exhibit.

vManage and vBond have an issue establishing a connection to each other. Which configuration resolves the issue?

A.

Configure the timezone on vBond to Europe/London.

B.

Configure the encapsulation ipsec command under the tunnel interface on vManage.

C.

Configure a default route on vBond pointing to 172.16.2.254.

D.

Remove the encapsulation ipsec command under the tunnel interface of vBond.

Full Access
Question # 104

A customer has 1 to 100 service VPNs and wants to restrict outbound updates for VPN1 Which control policy configuration restricts these updates?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 105

Which SD-WAN component allows an administrator to manage and store software images for SD-WAN network elements?

A.

vGond controllers

B.

WAN Edge routers

C.

vSman controllers

D.

vManage NMS

Full Access
Question # 106

Which scheduling method is configured by default for the eight queues in the cloud vEdge router1?

A.

low latency queue

B.

priority queue

C.

weighted random early detection

D.

weighted round robin

Full Access
Question # 107

Which capability does Cisco SD-WAN Multi-Region Fabric provide?

A.

end-to-end SLA-aware routing

B.

overlay support for IP multicast

C.

end-to-end encryption for inter-region traffic

D.

assignment of a single vSmart controller to handle region 0 and noncore regions

Full Access
Question # 108

An administrator must deploy the controllers using the On-Prem method while vManage can access the PnP portal from inside How are the two WAN Edge authorized allowed lists to be made available to vManage? (Choose two)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 109

An engineer must create a QoS policy by creating a class map and assigning it to the LLQ queue on a WAN Edge router Which configuration accomplishes the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 110

An engineer configures Rome WAN Edge 10 use MPLS cloud as the preferred link to reach Paris WAN Edge and use biz-internet as a backup. Which policy configuration must be led in the outbound direction toward Rome to accomplish the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 111

Drag and drop the attributes from the left that make each transport location unique onto the right. Not all options are used.

Full Access
Question # 112

Which two requirements must be met for DNS inspection when integrating with cisco umbrella? (Choose two)

A.

Upload the WAN Edge serial allow list to the Umbrella portal.

B.

Attach security policy to the device template.

C.

Configure the Umbrella token on the vManage

D.

Create and attach a System feature template with the Umbrella registration credentials.

E.

Register and configure the vManage public IP and serial number in the Umbrella portal.

Full Access
Question # 113

Which platforms are managed by a single vManage dashboard?

A.

ISR4351, ASR1002HX, vEdge2000, vEdge Cloud

B.

ISR4321, ASR1001, Nexus, ENCS

C.

ISR4321, ASR1001, ENCS, ISRv

D.

ISR4351, ASR1009, vEdge2000, CSR1000v

Full Access
Question # 114

Which component of the Cisco SD-WAN control plane architecture should be located in a public Internet address space and facilitates NAT-traversal?

A.

vBond

B.

WAN Edge

C.

vSmart

D.

vManage

Full Access
Question # 115

Which value is verified in the certificates to confirm the identity of the physical WAN Edge device?

A.

Serial Number

B.

OTP

C.

System-IP

D.

Chassis-ID

Full Access
Question # 116

What is an advantage of using auto mode versus static mode of power allocation when an access point is connected to a PoE switch port?

A.

It detects the device is a powered device

B.

All four pairs of the cable are used

C.

Power policing is enabled at the same time

D.

The default level is used for the access point

Full Access
Question # 117

What is a benefit of using REST APIs?

A.

predefined automation and orchestration platform for event management and logging

B.

user-defined automation and integration into other orchestration systems or tools

C.

vAnalytics to simplify operational services integration and real-time event monitoring

D.

predefined SD-WAN controller with other platform integration for event management and logging

Full Access
Question # 118

An engineer is troubleshooting a vEdge router and identifies a “DCONFAIL – DTLS connection failure” message. What is the problem?

A.

certificate mismatch

B.

organization mismatch

C.

memory issue

D.

connectivity issue

Full Access