Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

201-01 Exam Dumps - Riverbed Certified Solutions Associate - Network Performance Management

Question # 4

Trace clips can expire if arriving packets start to override old packets.

In order to keep a Trace Clip from expiring, you should: (Choose two.)

A.

Attach the trace clip.

B.

Unlock the trace clip.

C.

Lock the trace clip.

D.

Send the trace clip to a file.

E.

Detach the trace clip.

Full Access
Question # 5

Which of the following dashboard widgets is most suitable for monitoring the status of an entire Service, including both front-end and back-end (server-server) segments?

A.

Service Health

B.

Service Health by Location

C.

Watched Applications

D.

Current Events

E.

System Messages

Full Access
Question # 6

What are the default credentials to log into the Cascade Shark appliance Web Interface?

A.

admin/admin

B.

root/sharkappliance

C.

root/root

D.

root/riverbed

E.

admin/cacetech

Full Access
Question # 7

CX-Tracer is an AppResponse Module designed for increased visibility into:

A.

Front-end request to back-end connection mapping in Citrix XenApp environments.

B.

User-to-Citrix desktop mapping in Citrix XenDesktop environments.

C.

Citrix desktop server resource utilization measurements.

D.

Optimized traffic response times through the Riverbed SteelHead CX model appliances.

E.

Real-time Citrix decodes.

Full Access
Question # 8

Which of the following devices could be the data source for Cascade Profiler? (Select 3)

A.

Cascade gateway

B.

Cascade Pilot software

C.

Wireshark software

D.

Cascade Sensor

E.

Cascade Shark

Full Access
Question # 9

Cascade Profiler encrypts data at rest with.

A.

the same encryption strength and protocol selected for sending data from Gateways and Sensors to Profiler.

B.

always 256bit AES, accept for international customers who are not eligible for encryption.

C.

Cascade does not encrypt data while at rest.

D.

Configurable under Definitions ? Encryption.

Full Access
Question # 10

What Operating System is required for installation of Cascade Pilot?

A.

Windows Server 2003 or Windows Server 2008

B.

Windows XP, Windows Vista, or Windows 7

C.

Cascade Pilot is not specific to an operating system since access is through any standard web browser.

D.

Any operating system supported by Wireshark

Full Access
Question # 11

What are the supported speeds on the Cascade management interfaces?

A.

100/1000Mbps

B.

1000Mbps

C.

10/100Mbps

D.

10/100/1000Mbps

E.

10000Mbps

Full Access
Question # 12

What is the minimum number of physical chassis required in a Cascade deployment using a standard Profiler?

A.

2; the standard Profiler and a Sensor or Gateway or Shark

B.

2; the standard Profiler and an Express

C.

1; the standard profiler

D.

3; the Event Manager, the Database Manager, and the User Interface Manager

E.

3; the standard Profiler, a Database chassis, and an Analyzer chassis

Full Access
Question # 13

Which of the following statements are true about NetProfiler Security Profiles? (Choose three.)

A.

A security profile can be created for “business hours” or “weekends” or any other time periods you want to specify.

B.

Security Profiles utilize the SNORT Threat Signature Database.

C.

Security Profile data is aged out after one month.

D.

Security Profiles negate the need for IDS/IPS type systems.

E.

The appliance collects traffic data from the monitored network and aggregate it into security profiles.

F.

Recent statistics play a larger role in the profile than older statistics.

Full Access
Question # 14

Voice over IP (VoIP) monitoring by Network Performance Management systems typically concerns:

A.

Items such Mean Opinion Score (MOS) scores, jitter, and packet loss – important indicators of potential voice quality issues.

B.

PBX Health statistics.

C.

Ability to break into a conversation for emergency interruption services.

D.

Ability to assure 911 Emergency dialing is available.

E.

All of the above.

Full Access
Question # 15

Which tools can be used to perform a deep dive packet inspection from AppResponse?

A.

High Speed Capture, Transaction Analyzer

B.

Packet Analyzer, Packet Download Manager

C.

Packet Analyzer, High Speed Capture

D.

Packet Analyzer, Transaction Analyzer

Full Access
Question # 16

Packet Analyzer concurrent licenses are served to clients from which of the following platforms? (Choose three.)

A.

NetExpress

B.

Any Windows server platform

C.

NetProfiler

D.

Riverbed License Portal

E.

NetShark

Full Access
Question # 17

How can Cascade Profiler help with a server virtualization project?

A.

Cascade can measure CPU utilization and memory use. It can correlate this data with bandwidth collected via flow protocols.

B.

In a virtualization projects, the key is to identify Assets service applications and Application Dependencies. Using Cascade you can run reports on underutilized servers, server /application dependences, and have an inventory of your assets and how they are used.

C.

In a virtualization project it is important to understand which processes are running on a server that are not being used. Cascade can identify these processes automatically.

D.

All of the above.

Full Access
Question # 18

When Cascade Pilot is connected to Cascade Shark:

A.

Cascade Shark interfaces and captures job traces appear under the devices tab within the sources panel.

B.

Cascade Shark interfaces appear under the devices tab of the sources panel AND Cascade Shark capture job traces appear under the files tab of the sources panel.

C.

Cascade Shark interfaces and captures job traces appear in the views panel.

D.

Cascade Shark interfaces must be selected from the home menu to begin a capture.

Full Access
Question # 19

Time Control within Cascade Pilot allows:

A.

An evaluation license of the software to remain active for a period longer than the default license period.

B.

A selected portion of a packet capture (pcap) file to be opened in Cascade Pilot from a larger capture file.

C.

A view applied to a packet capture (pcap) file to be limited to the time period selected.

D.

Watches to be scheduled to alert the user at a pre-defined time.

Full Access
Question # 20

An interactive view within Cascade Pilot is:

A.

A downloadable customized view from the online Cascade community.

B.

Any view that is applied to live devices and dynamically updated.

C.

A view that can be created after drill-down from one view to another.

D.

Any view that was created by applying a traffic filter.

E.

All views within Cascade Pilot are considered interactive views.

Full Access
Question # 21

Cascade collects flow data on which of the following boxes? (Select 2)

A.

Sensor

B.

Gateway

C.

Express Profiler

D.

Standard Profiler

E.

Enterprise Profiler

Full Access
Question # 22

What two methods does the Profiler have for getting MAC address information? (Select 2)

A.

SMTP integration

B.

SNMP integration

C.

DHCP integration

D.

There is only one method of getting MAC address information.

E.

Line monitoring for ARP requests

Full Access
Question # 23

In Cascade Profiler, how many items can be displayed in a single watched list in a Dashboard Content Block?

A.

Unlimited

B.

10

C.

4

D.

20

Full Access
Question # 24

Within Cascade Profiler, what best describes an “Application”?

A.

An Application is a collection of Host IP Addresses.

B.

An Application is a Layer-7 protocol or combination of IP Address and Port.

C.

An Application is a list of TCP Port Numbers.

D.

An Application is a combination of several Host Group Types.

Full Access
Question # 25

If there are multiple network devices reporting flow data to Cascade and two devices report flow records for the same TCP connection, what will Cascade report?

A.

The traffic will be double counted.

B.

Cascade will discard one of the flow records.

C.

If both flows types are the same (e.g. NetFlow) Cascade will de-duplicate the records but if they are of different flow types, one record will be discarded.

D.

Cascade will de-duplicate and consolidate the flow records regardless of source and flow type.

E.

This is not possible.

Full Access
Question # 26

When Flow Data is being forwarded from a _____ to a 3rd Party Flow collector it is _____

A.

Sensor; Compressed

B.

Cascade Profiler; send in its original form

C.

Cascade Express; sent de-duplicated

D.

Cascade Express; sent in its original form

E.

Cascade Gateway; sent in its original form

Full Access
Question # 27

What are some reports Cascade Profiler provides to benefit WAN management?

A.

WAN Optimization Benefits reports, Breakdown of business versus non-business application reports, QOS reports by interface and/or application.

B.

WAN Optimization of all TCP protocols with more specific optimization of over 50 TCP Applications.

C.

WAN reporting of TCP Protocols.

D.

QOS shaping, User-based policies that will block not compliant traffic, WAN optimization reporting.

Full Access
Question # 28

Deployment of Virtual NetProfiler, Virtual NetExpress, and Virtual Gateway is supported on which version of ESXi? (Choose three.)

A.

5.5

B.

5.0

C.

5.1

D.

4.0

Full Access
Question # 29

In the Cascade Profiler GUI, what are the different ways an “Application” is defined? (Select 2)

A.

Using a Layer4 Mapping (combination of IP Address and TCP/UDP Port)

B.

Using a Layer7 Deep Packet Inspection

C.

Using a Host Group

D.

Using Switch Port Discovery

E.

Using Firewall Policy Import

Full Access
Question # 30

Where can you look in the Cascade Profiler Web User Interface to determine the licensed flow rates?

A.

This information is not visible in the User Interface.

B.

This information is shown on the dashboard page.

C.

This information is shown on the Configuration->General Settings page.

D.

This information is shown on the Help->About page.

E.

This information is shown on the System->Information page.

Full Access
Question # 31

When flows in excess of the licensed limit are received by a Profiler what happens to them?

A.

They are cached for later processing.

B.

They are ignored/dropped.

C.

The user is able to choose which flows to keep and which to ignore.

D.

All flows are processed but an alert is sent to the user.

Full Access
Question # 32

To change the page refresh rate for the Cascade Profiler UI from one minute to ten minutes for a specific user which page would you navigate to?

A.

Configuration

B.

Setup Page

C.

UI Preference

D.

Personal Dashboard

E.

Configuration/General Settings

Full Access
Question # 33

In the Cascade Profiler GUI, what do the QoS values mean?

A.

They are based upon the 6-bit Differentiated Services Code Point (DSCP).

B.

They are based upon Host Group definitions, defined within the Cascade GUI.

C.

They are based upon Application definitions, defined within the Cascade GUI.

D.

They are based upon Port definitions, defined within the Cascade GUI.

Full Access
Question # 34

What are the capabilities of NetProfiler behavior analysis? (Choose two.)

A.

Advanced analytics using dynamic modeling of network behavior.

B.

Comparisons to absolute thresholds.

C.

Windows WMI data gathered from Application Servers.

D.

Loss of connectivity based on three consecutive lost ICMP ping responses.

E.

Error rated collected through SNMP Polling of Network Interfaces.

Full Access
Question # 35

How does Cascade performance analytics assist with Performance Monitoring?

A.

By setting static thresholds for Application metrics and Interface metrics, tolerance can be determined. Cascade will use these thresholds and tolerances to report on deviations indicative of Performance problems.

B.

The Customer only needs to identify their critical interfaces and applications, and Cascade will automatically baseline their behavior and report on deviations indicative of Performance problems.

C.

The Performance Analytics are able to detect security threats such as host scans and worms.

D.

After base-lining, Cascade can re-route congested traffic to avoid congested application delivery paths.

Full Access
Question # 36

What benefit can Cascade provide with no WAN optimization product deployed?

A.

It cannot provide any benefits.

B.

Cascade provides benefits beyond optimization reporting to include Application Performance Monitoring, Security/Compliance benefits, and general Network Visibility..

C.

The firewall capabilities of Cascade can still be utilized on the network to prevent network attacks.

D.

Cascade can monitor spanning tree algorithms as reporting benefits in a given network.

Full Access