A Cisco SD-WAN customer has a requirement to calculate the SHA value for files as they pass through the device to see the returned disposition and determine if the file is good, unknown or malicious. The customer also wants to perform real-time traffic analysis and generate alerts when threats are detected Which two Cisco SD-WAN solutions meet the requirements? (Choose two.)
A.
Cisco Trust Anchor Module
B.
Cisco Threat Grid
C.
Cisco Snort IPS
D.
Cisco AMP
E.
Cisco Secure Endpoint
Cisco Snort IPS
Cisco AMP
What is the result during a WAN Edge software upgrade process if the version of the WAN Edge software is higher than the one running on a controller device?
A.
The upgrade button is greyed out
B.
The upgrade proceeds with no warning message.
C.
The upgrade fails with a warning message
D.
The upgrade proceeds with a warning message
The upgrade proceeds with a warning message
Which component of the Cisco SD-WAN control plane architecture facilitates the storage of certificates and configurations for network components?
A.
vSmart
B.
vBond
C.
WAN Edge
D.
vManage
vManage
https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/sdwan-xegs-book/system-overview.html
Drag and drop the actions from the left into the correct sequence on the right to create a data policy to direct traffic to the Internet exit.
Step 1 – Enable NAT Functionality
Step 2 – Create centralized data policy
Step 3 – Identify VPN and match criteria
Step 4 – Apply data policy
Which device information is requited on PNP/ZTP to support the zero-touch onboarding process?
A.
serial and chassis numbers
B.
interface IP address
C.
public DNS entry
D.
system IP address
serial and chassis numbers
https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/SDWAN/sd-wanwan-edge-onboarding-deploy-guide-2020jan.pdf
Which protocol is used to measure loss latency, Jitter, and liveliness of the tunnel between WAN Edge router peers?
A.
OMP
B.
IP SLA
C.
NetFlow
D.
BFD
BFD
https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2019/pdf/TECCRS-2014.pdf
Company ABC has decided to deploy the controllers using the On-Prem method. How does the administrator upload the WAN Edge list to the vManage?
A.
Option A
B.
Option B
C.
Option C
D.
Option D
Option D
https://sdwandocs.cisco.com/Product_Documentation/vManage_Help/Release_18.3/Configuration/Devices
Which platform is a Cisco SD-WAN virtual platform?
A.
Cisco ISR 4000
B.
Cisco Nexus 1000V
C.
Cisco CSR 1000V
D.
Cisco ASR 1000
Cisco CSR 1000V
What is the default value (in milliseconds) set tor the poll interval in the BFD basic
configuration?
A.
300,000
B.
600,000
C.
900,000
D.
1,200,000
600,000
https://sdwandocs.cisco.com/Product_Documentation/vManage_Help/Release_18.2/Configuration/Templates/BFD
A customer has 1 to 100 service VPNs and wants to restrict outbound updates for VPN1 Which control policy configuration restricts these updates?
A.
Option A
B.
Option B
C.
Option C
D.
Option D
Option C
An engineer must use data prefixes to configure centralized data policies using the vManage policy configuration wizard. What is the first step to accomplish this task?
A.
Create groups of interest
B.
Configure network topology.
C.
Configure traffic rules.
D.
Apply policies to sites and VPNs.
Create groups of interest
Page 4 out of 30 Pages |
Previous |