300-415 Practice Test Questions

359 Questions


A Cisco SD-WAN customer has a requirement to calculate the SHA value for files as they pass through the device to see the returned disposition and determine if the file is good, unknown or malicious. The customer also wants to perform real-time traffic analysis and generate alerts when threats are detected Which two Cisco SD-WAN solutions meet the requirements? (Choose two.)


A.

Cisco Trust Anchor Module


B.

Cisco Threat Grid


C.

Cisco Snort IPS


D.

Cisco AMP


E.

Cisco Secure Endpoint





C.
  

Cisco Snort IPS



D.
  

Cisco AMP



What is the result during a WAN Edge software upgrade process if the version of the WAN Edge software is higher than the one running on a controller device?


A.

The upgrade button is greyed out


B.

The upgrade proceeds with no warning message.


C.

The upgrade fails with a warning message


D.

The upgrade proceeds with a warning message





D.
  

The upgrade proceeds with a warning message








Which component of the Cisco SD-WAN control plane architecture facilitates the storage of certificates and configurations for network components?


A.

vSmart


B.

vBond


C.

WAN Edge


D.

vManage





D.
  

vManage



https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/sdwan-xegs-book/system-overview.html

Drag and drop the actions from the left into the correct sequence on the right to create a data policy to direct traffic to the Internet exit.






Step 1 – Enable NAT Functionality
Step 2 – Create centralized data policy
Step 3 – Identify VPN and match criteria
Step 4 – Apply data policy

Which device information is requited on PNP/ZTP to support the zero-touch onboarding process?


A.

serial and chassis numbers


B.

interface IP address


C.

public DNS entry


D.

system IP address





A.
  

serial and chassis numbers



https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/SDWAN/sd-wanwan-edge-onboarding-deploy-guide-2020jan.pdf

Which protocol is used to measure loss latency, Jitter, and liveliness of the tunnel between WAN Edge router peers?


A.

OMP


B.

IP SLA


C.

NetFlow


D.

BFD





D.
  

BFD



https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2019/pdf/TECCRS-2014.pdf

Company ABC has decided to deploy the controllers using the On-Prem method. How does the administrator upload the WAN Edge list to the vManage?


A.

Option A


B.

Option B


C.

Option C


D.

Option D





D.
  

Option D



https://sdwandocs.cisco.com/Product_Documentation/vManage_Help/Release_18.3/Configuration/Devices

Which platform is a Cisco SD-WAN virtual platform?


A.

Cisco ISR 4000


B.

Cisco Nexus 1000V


C.

Cisco CSR 1000V


D.

Cisco ASR 1000





C.
  

Cisco CSR 1000V



What is the default value (in milliseconds) set tor the poll interval in the BFD basic
configuration?


A.

300,000


B.

600,000


C.

900,000


D.

1,200,000





B.
  

600,000



https://sdwandocs.cisco.com/Product_Documentation/vManage_Help/Release_18.2/Configuration/Templates/BFD

A customer has 1 to 100 service VPNs and wants to restrict outbound updates for VPN1 Which control policy configuration restricts these updates?


A.

Option A


B.

Option B


C.

Option C


D.

Option D





C.
  

Option C



An engineer must use data prefixes to configure centralized data policies using the vManage policy configuration wizard. What is the first step to accomplish this task?


A.

Create groups of interest


B.

Configure network topology.


C.

Configure traffic rules.


D.

Apply policies to sites and VPNs.





A.
  

Create groups of interest




Page 4 out of 30 Pages
Previous