Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

300-415 Exam Dumps - Implementing Cisco SD-WAN Solutions (ENSDWI)

Question # 4

Which vBond system configuration under VPN 0 allows for a routable public IP address even if the DNS name, hostname, or IP address of the vBond orchestrator are omitted?

A.

local

B.

vbond-only

C.

dns-name

D.

WAN

Full Access
Question # 5

Which secure tunnel type should be used to connect one WAN Edge router to other WAN Edge routers?

A.

TLS

B.

DTLS

C.

SSL VPN

D.

IPsec

Full Access
Question # 6

Refer to the exhibit. Which configuration stops Netconf CLI logging on WAN Edge devices during migration?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 7

Refer to the exhibit.

The Cisco SD-WAN network is configured with a default full-mesh topology. An engineer wants Paris WAN Edge to use the Internet HOC as the preferred TLOC for MSN Messenger and AOL Messenger traffic. Which policy achieves this goal?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 8

In which device state does the WAN edge router create control connections, but data tunnels are not created?

A.

valid

B.

backup

C.

active

D.

staging

Full Access
Question # 9

What is the OMP graceful restart default value on vSmart controllers and WAN Edge routers?

A.

21,600 seconds

B.

43,200 seconds

C.

86,400 seconds

D.

604,800 seconds

Full Access
Question # 10

Refer to the exhibit, Which configuration routes Site 2 through the firewall in Site 1?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 11

At which layer does the application-aware firewall block applications on a WAN Edge?

A.

3

B.

7

C.

5

D.

2

Full Access
Question # 12

Which actions must be taken to allow certain departments to require firewall protection when interacting with data center network without including other departments? (Choose two.)

A.

Use classification policing and marking

B.

Apply data policies at vEdge.

C.

Deploy a service-chained firewall service per VPN

D.

The regional hub advertises the availability of the firewall service

E.

Advertise lo vSmart controllers

Full Access
Question # 13

What are two attributes of vRoute? (Choose two)

A.

originator

B.

service

C.

encapsulation

D.

carrier

E.

domain ID

Full Access
Question # 14

Which encryption algorithm is used for encrypting SD-WAN data plane traffic?

A.

Triple DES

B.

IPsec

C.

AES-128

D.

AES-256 GCM

Full Access
Question # 15

Refer to the exhibit.

An MPLS connection on R2 must extend to R1 Users behind R1 must have dual connectivity for data traffic Which configuration provides R1 control connectivity over the MPLS connection?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 16

In the Cisco SD_WAN solution, vSmart controller is responsible for which two actions? (Choose two.)

A.

Distribute crypto key information among vEdge routers

B.

Configure and monitor vEdge routers.

C.

Authenticate and authorize vEdge routers.

D.

Distribute the IP address from DHCP server to vEdge routers.

E.

Distribute route and policy information via OMP.

Full Access
Question # 17

An enterprise deployed a Cisco SD-WAN solution with hub-and-spoke topology using MPLS as the preferred network over the Internet. A network engineer must implement an application-aware routing policy to allow ICMP traffic to be load-balanced over both the available links. Which configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 18

What prohibits deleting a VNF image from the software repository?

A.

if the image is stored by vManage

B.

if the image is referenced by a service chain

C.

if the image is uploaded by a WAN Edge device

D.

if the image is included in a configured policy

Full Access
Question # 19

An administrator wants to create a policy to add a traffic policer called "politer-ccnp" to police data traffic on the WAN Edge. Which configuration accomplishes this task in vSmart?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 20

Company ABC has decided to deploy the controllers using the On-Prem method. How does the administrator upload the WAN Edge list to the vManage?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 21

For data plane resiliency, what does the Cisco SD-WAN software implement?

A.

BFD

B.

establishing affinity between vSmart controllers and WAN Edge routers

C.

multiple vBond orchestrators

D.

OMP

Full Access
Question # 22

Refer to the exhibit The engineering must assign tags to 3 Of its 74 server networks as soon as they are advertised to peers These server network must not be advertised AS which configuration fulfil the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 23

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

A.

A domain is nonexistent.

B.

A domain is block-listed.

C.

A domain is locally reachable.

D.

A domain is grey-listed.

Full Access
Question # 24

Drag and drop the devices from the left into order on the right to upgrade the software from version 19 to version 20.

Full Access
Question # 25

Refer to the exhibit The Cisco SD-WAN network is configured with a default full-mesh topology. Islamabad HQ and Islamabad WAN Edges must be used as the hub sites. Hub sites MPLS TLOC must be preferred when forwarding FTP traffic based on a configured SLA class list. Which policy configuration does the network engineer use to call the SLA class and set the preferred color to MPLS?

A.

Localized Policy, Route Policy

B.

Centralized Policy, Traffic Policy

C.

Localized Policy, Forwarding Class

D.

Centralized Policy Topology

Full Access
Question # 26

A network administrator configures SNMFV3 on a Cisco WAN Edge router from CL I for monitoring purposes How many characters are supported by the snmp user username command?

A.

from 1 to 8

B.

from 1 to 16

C.

from 1 to 32

D.

from 1 to 48

Full Access
Question # 27

An engineer is configuring the branch office with a 172.16.0.0/16 subnet to use DIA for Internet traffic. All other traffic must flow to the central site or branches using the MPLS circuit Which configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 28

An engineer is adding a tenant with location ID 399533345 in vManage. What is the maximum number of alphanumeric characters that is accepted in the tenant name filed?

A.

64

B.

128

C.

256

D.

8

Full Access
Question # 29

Which pathway under Monitor > Network > Select Device is used to verify service insertion configuration?

A.

System Status

B.

Troubleshooting

C.

Real Time

D.

Events

Full Access
Question # 30

When the VPN membership policy is being controlled at the vSmart controller, which policy disallows VPN 1 at sites 20 and 30?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 31

An enterprise needs DIA on some of its branches with a common location ID: A041:B70C: D78E::18 Which WAN Edge configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 32

In which VPN is the NAT operation on an outgoing interface configured for direct Interne! access?

A.

1

B.

10

C.

512

D.

0

Full Access
Question # 33

Refer to the exhibit.

An engineer configured OMP with an overlay-as of 10666. What is the AS-PATH for prefix 104.104.104.104/32 on R100?

A.

100 10666

B.

100 20 104

C.

100 10666 20 104

D.

100 10666 104

Full Access
Question # 34

An engineer modifies a data policy for DIA in VPN 67. The location has two Internet-bound circuits. Only the web browsing traffic must be admitted for DIA. without further discrimination about which transport to use.

Here is the existing data policy configuration:

Which policy configuration sequence meets the requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 35

An organization requires the use of integrated preventative engines, exploit protection, and the most updated and advanced signature-based antivirus with sandboxing and threat intelligence to stop malicious attachments before they reach users and get executed. Which Cisco SD-WAN solution meets the requirements?

A.

Cisco Trust Anchor module

B.

URL filtering and Umbrella DNS security

C.

Cisco AMP and Threat Grid

D.

Snort IPS

Full Access
Question # 36

Refer to the exhibit The network team must configure application-aware routing for the Service VPN 50.0.0.0/16 The SLA must prefer MPLS for video traffic but the remaining traffic must use a public network What must be defined other than applications before the application-aware policy is create?

A.

SLA Class, Site VPN. Prefix

B.

Data Prefix, Site VPN TLOC

C.

Application, SLA VPN. Prefix

D.

Color, SLA Class, Sue, VPN

Full Access
Question # 37

Refer to the exhibit. Which configuration value is used to change the administrative distance of iBGP routes to 20?

A.

Configure internal Routes Distance to 20

B.

Configure Propagate AS Path to off

C.

Configure Local Distance to 20

D.

Configure External routes distance 20

Full Access
Question # 38

Which VPN must be present on at least one interface to install Cisco vManage and integrate it with WAN Edge devices in an overlay network site ID:S4307T7E78F29?

A.

VPN 512

B.

any VPN number selected

C.

services VPN range 0-511

D.

VPNO

Full Access
Question # 39

A Cisco SD-WAN customer has a requirement to calculate the SHA value for files as they pass through the device to see the returned disposition and determine if the file is good, unknown or malicious. The customer also wants to perform real-time traffic analysis and generate alerts when threats are detected Which two Cisco SD-WAN solutions meet the requirements? (Choose two.)

A.

Cisco Trust Anchor Module

B.

Cisco Threat Grid

C.

Cisco Snort IPS

D.

Cisco AMP

E.

Cisco Secure Endpoint

Full Access
Question # 40

Which percentage for total memory or total CPU usage for a device is classified as normal in the WAN Edge Health pane?

A.

more than 80 percent usage

B.

less than 70 percent usage

C.

between 70 to 90 percent usage

D.

more than 90 percent usage

Full Access
Question # 41

Which two algorithms authenticate a user when configuring SNMPv3 monitoring on a WAN Edge router? (Choose two.)

A.

AES-256

B.

SHA-1

C.

AES-128

D.

MD5

E.

SHA-2

Full Access
Question # 42

An engineer configures policing with a rate of 125 Bps and a burst rate of 8000 bits, as shown here:

Which configuration completes this task?

A.

Configure 125 for rate and 1000 for burst.

B.

Configure 1000 for rate and 64000 for burst

C.

Configure 125 for rate and 8000 for burst

D.

Configure 1000 for rate and 1000 for burst

Full Access
Question # 43

Refer to the exhibit.

The SD-WAN network is configured with a default full-mesh topology. The SD-WAN engineer wants the Barcelona WAN Edge to use MPLS TLOC as the preferred TLOC when communicating with Rome site. Which configuration must the engineer use to create a list to select MPLS color toward the Rome TLOC?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 44

How is a TLOC uniquely identified from a WAN Edge router to the SD-WAN transport network?

A.

system IP address

B.

VPN ID

C.

OMP

D.

SD-WAN site ID

Full Access
Question # 45

A voice packet requires a latency of 50 msec. Which policy is configured to ensure that a voice packet is always sent on the link with less than a 50 msec delay?

A.

centralized control

B.

localized data

C.

localized control

D.

centralized data

Full Access
Question # 46

Refer to the exhibit Which NAT types must the engineer configure for the vEdge router to bring up the data plane tunnels?

A.

Enable Full Cone NAT on the vEdge interface

B.

Use public color on the TLOC

C.

Use private color on the TLOC

D.

Enable Symmetric MAT on the vEdge interface

Full Access
Question # 47

Drag and drop the steps from the left into the order on the right to upload software on vManage repository that is accessible from maintenance > Software Repository.

Full Access
Question # 48

Which SD-WAN component is configured to enforce a policy to redirect branch-to-branch traffic toward a network service such as a firewall or IPS?

A.

vBond

B.

WAN Edge

C.

vSmart

D.

Firewall

Full Access
Question # 49

What is the order of operations for software upgrades of Cisco SD-WAN nodes'?

A.

vBond vManage vSmart WAN Edge

B.

vManage vBond WAN Edge. vSmart

C.

vManage vSmart, vBond, WAN Edge

D.

vManage vBond vSraart WAN Edge

Full Access
Question # 50

What are the two protocols redistributed into OMP? (Choose two.)

A.

OSPF

B.

RIP

C.

LDP

D.

RSVP

E.

EIGRP

Full Access
Question # 51

Which two mechanisms are used to guarantee the integrity of data packets in the Cisco SD-WAN architecture data plane? {Choose two)

A.

transport locations

B.

authentication headers

C.

certificates

D.

TPM chip

E.

encapsulation security payload

Full Access
Question # 52

Which hardware component is involved in the Cisco SD-WAN authentication process for ISR platforms?

A.

TPMD

B.

ZTP

C.

TPC

D.

SUDI

Full Access
Question # 53

An enterprise is continuously adding new sites to its Cisco SD-WAN network. It must configure any cached routes flushed when OMP peers have lost adjacency Which configuration allows the cached OMP routes to be flushed after every 24 hours from its routing table?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 54

An administrator is configuring the severity level on the vManage NMS for events that indicate that an action must be taken immediately. Which severity level must be configured?

A.

warning

B.

error

C.

critical

D.

alert

Full Access
Question # 55

Drag and drop the actions from the left into the correct sequence on the right to create a data policy to direct traffic to the Internet exit.

Full Access
Question # 56

Drag and drop the Cisco SD-WAN components from the left onto their functions on the right.

Full Access
Question # 57

Which two image formats are supported for controller codes? (Choose two.)

A.

.nxos

B.

.qcow2

C.

.ova

D.

.bin

E.

Tgz

Full Access
Question # 58

Which two hardware platforms support Cisco IOS XE SD-WAN images'' (Choose two)

A.

ASR1000 series

B.

ISR9300 series

C.

vEdge-1000 series

D.

ASR9000 series

E.

ISR4000 series

Full Access
Question # 59

An engineer is configuring a list that matches all IP prefixes with lengths from /1 to /16 in a centralized control policy. Which list accomplishes this task?

A.

0.0.0.0/1 le 16

B.

0.0.0.0/0 ge 1

C.

0.0.0.0/0 le l6

D.

0.0.0.0/16 ge 1

Full Access
Question # 60

Refer to the exhibit. A network administrator is setting the queueing value for voice traffic for one of the WAN Edge routers using vManager GUI. Which queue value must be set to accomplish this task?

A.

0

B.

1

C.

2

D.

3

Full Access
Question # 61

Which hardware component is involved in the Cisco SD-WAN authentication process for ISR platforms?

A.

TPMD

B.

ZTP

C.

TPC

D.

SUDI

Full Access
Question # 62

A policy is created to influence routing path in the network using a group of prefixes. What policy application will achieve this goal when applied to a site List?

A.

vpn-membership policy

B.

cflowd-template

C.

app-route policy

D.

control-policy

Full Access
Question # 63

A network administrator is bringing up one WAN Edge for branch connectivity. Which types of tunnels form when the WAN edge router connects to the SD-WAN fabric?

A.

DTLS or TLS tunnel with vBond controller and IPsec tunnel with vManage controller.

B.

DTLS or TLS tunnel with vBond controller and IPsec tunnel with other WAN Edge routers.

C.

DTLS or TLS tunnel with vSmart controller and IPsec tunnel with other Edge routers.

D.

DTLS or TLS tunnel with vSmart controller and IPsec tunnel with vBond controller.

Full Access
Question # 64

An engineer wants to track tunnel characteristics within an SLA-based policy for convergence. Which policy configuration will achieve this goal?

A.

App-route policy

B.

VPN membership policy

C.

Control policy

D.

Data policy

Full Access
Question # 65

Refer to the exhibit A WAN Edge device was recently added to vManage but a control connection could not be established Which action resolves this issue?

A.

Rectify the Rod CA certificate mismatch on WAN Edge devices

B.

Install the bootstrap code on WAN Edge and check for CSR

C.

Send the serial number to vBond from the vManage controller.

D.

Resolve the ZTP reachability and rectify smart account credentials issue

Full Access
Question # 66

What are the default username and password for vSmart Controller when it is installed on a VMware ESXi hypervisor'?

A.

username Cisco password admin

B.

username admin password Cisco

C.

username Cisco password Cisco

D.

username admin password admin

Full Access
Question # 67

Refer to the exhibit. A user in the branch is connecting to Office 365 for the first time. Over which path does the branch WAN Edge router traffic follow?

A.

routing table of the branch WAN Edge router

B.

DIA exit of the branch WAN Edge router

C.

forwarded to the gateway site

D.

dropped because the minimum vQoE score has not been met

Full Access
Question # 68

Which action is performed during the onboarding process when a WAN Edge router is connected to ZTP server ztp.viptela com?

A.

The router is connected to WAN Edge Cloud Center

B.

The router is synced with vSmart Controller via an IPsec tunnel

C.

The router receives its vBond Orchestrator information

D.

The router is connected 10 vSmart Controller via a DTLSTLS tunnel

Full Access
Question # 69

Refer to exhibit.

An engineer is troubleshooting tear down of control connections even though a valid Certificate Serial Number is entered Which two actions resolve the Issue? (Choose two)

A.

Enter a valid serial number on the controllers for a given device

B.

Remove the duplicate IP in the network.

C.

Enter a valid product ID (model) on the PNP portal

D.

Match the serial number file between the controllers

E.

Restore network reachability for the controller

Full Access
Question # 70

A network administrator configures SNMPv3 on a Cisco WAN Edge router from CLI for monitoring purposes How many characters are supported by the snmp user command?

A.

from 1 to 8

B.

from 1 to 16

C.

from 1 to 32

D.

from 1 to 48

Full Access
Question # 71

What is the main purpose of using TLOC extensions in WAN Edge router configuration?

A.

creates hardware-level transport redundancy at the local site

B.

creates an IPsec tunnel from WAN Edge to vBond Orchestrator

C.

transports control traffic to a redundant vSmart Controller

D.

transports control traffic w remote-site WAN Edge routers

Full Access
Question # 72

In an AWS cloud, which feature provision WAN Edge routers automatically in Cisco SD-WAN?

A.

Cloud app

B.

Cloud OnRamp

C.

vAnalytics

D.

Network Designer

Full Access
Question # 73

Refer to the exhibit, which configuration configures IPsec tunnels in active and standby?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 74

An engineer builds a three-node vManage cluster and then realizes that multiple nodes are unnecessary for the size of the company. How should the engineer revert the setup to a single vManage?

A.

Remove two rode from the three-node vManage duster

B.

Use the cluster conversion utility lo convert to standalone vManage

C.

Restore vManage from the backup VM snapshot

D.

Leave the duller as & and point to one vManage

Full Access
Question # 75

Drag and drop the functions from the left onto the correct templates on the right.

Full Access
Question # 76

An enterprise has these three WAN connections:

  • public Internet
  • business internet
  • MPLS

An engineer must configure two available links to route traffic via both links. Which configuration achieves this objective?

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 77

Which protocol detects path status (up/down), measures loss/latency/jitter, and measures the quality of the IPsec tunnel MTU?

A.

OMP

B.

IP-SLA

C.

BFD

D.

DTLS

Full Access
Question # 78

What is the role of the Session Traversal Utilities for NAT server provided by the vBond orchestrator?

A.

It facilitates SD-WAN toners and controllers to discover their own mapped or translated IP addresses and port numbers

B.

It prevents SD-WAN Edge routers from forming sessions with public transports among different service providers

C.

It facilitates SD-WAN Edge routers to stay behind a NAT-enabled firewall while the transport addresses of the SD-WAN controller are unNAT-ed

D.

It allows WAN Edge routers to form sessions among MPLS TLOCs using only public IP addresses

Full Access
Question # 79

Which feature builds transport redundancy by using the cross link between two redundant WAN Edge routers?

A.

OMP

B.

zero-touch provisioning

C.

quality of service

D.

TLOC extension

Full Access
Question # 80

Drag and drop the devices from the left onto the correct functions on the right.

Full Access
Question # 81

A customer is receiving routes via OMP from vSmart controller for a specific VPN. The customer must provide access to the W2 loopback received via OMP to the OSPF neighbor on the service-side VPN, which configuration fulfils these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 82

Refer to the exhibit The network team must configure application-aware routing for the Service VPN 50.0.0.0/16 The SLA must prefer MPLS for video traffic but the remaining traffic must use a public network What must be defined other than applications before the application-aware policy is create?

A.

SLA Class, Site VPN. Prefix

B.

Data Prefix, Site VPN TLOC

C.

Application, SLA VPN. Prefix

D.

Color, SLA Class, Sue, VPN

Full Access
Question # 83

What are the two advantages of deploying cloud-based Cisco SD-WAN controllers? (Choose two.)

A.

centralized control and data plane

B.

distributed authentication policies

C.

management of SLA

D.

infrastructure as a service

E.

centralized raid storage of data

Full Access
Question # 84

An engineer is adding a tenant with location JD 306432373 in vManage. What is the maximum number of alphanumeric characters that are accepted in the tenant name field?

A.

64

B.

128

C.

256

D.

8

Full Access
Question # 85

Refer to the exhibit. Which configuration extends the INET interface on R1 to be used by R2 for control and data connections?

A)

B)

C)

A.

Option A

B.

Option B

C.

Option C

Full Access
Question # 86

Refer to the exhibit Which configuration must the engineer use to form underlay connectivity for the Cisco SD-WAN network?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 87

An administrator needs to configure SD-WAN to divert traffic from the company's private network to an ISP network. What action should be taken to accomplish this goal?

A.

configure the control policy

B.

configure the data policy

C.

configure the data security policy

D.

configure the application aware policy

Full Access
Question # 88

An organization requires the use of integrated preventative engines, exploit protection, and the most updated and advanced signature-based antivirus with sandboxing and threat intelligence to stop malicious attachments before they reach users and get executed. Which Cisco SD-WAN solution meets the requirements?

A.

Cisco Trust Anchor module

B.

URL filtering and Umbrella DNS security

C.

Cisco AMP and Threat Grid

D.

Snort IPS

Full Access
Question # 89

How many subnets are necessary in Azure VNet for a WAN Edge device to function in the cloud deployment?

A.

CSR is the WAN Edge device that is supported in the Microsoft cloud. The Microsoft underlay cloud fabric performs the management function.

B.

There must be three subnets in VNet: management, public, and services.

C.

One public subnet is required in VNet. The Microsoft underlay cloud fabric performs all of the routing functions for WAN Edge.

D.

Public and services subnets are required in VNet. The Microsoft underlay cloud fabric performs the management function.

Full Access
Question # 90

Which feature template configures OMP?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 91

A network administrator configures SNMPv3 on a Cisco WAN Edge router from CLI for monitoring purposes How many characters are supported by the snmp user command?

A.

from 1 to 8

B.

from 1 to 16

C.

from 1 to 32

D.

from 1 to 48

Full Access
Question # 92

What is the result during a WAN Edge software upgrade process if the version of the WAN Edge software is higher than the one running on a controller device?

A.

The upgrade button is greyed out

B.

The upgrade proceeds with no warning message.

C.

The upgrade fails with a warning message

D.

The upgrade proceeds with a warning message

Full Access
Question # 93

Which protocol is used to propagate multicast join requests over the Cisco SD-WAN fabric?

A.

ARP

B.

Auto-RP

C.

OMP

D.

IGMP

Full Access
Question # 94

Refer to the exhibit.

Which two configurations are needed to get the WAN Edges registered with the controllers when certificates are used? (Choose two)

A.

Generate a CSR manually within vManage server

B.

Generate a CSR manually on the WAN Edge

C.

Request a certificate manually from the Enterprise CA server

D.

Install the certificate received from the CA server manually on the WAN Edge

E.

Install the certificate received from the CA server manually on the vManage

Full Access
Question # 95

Refer to the exhibit.

The control connection is failing. Which action resolves the issue?

A.

import vSmart in vManager

B.

Validate the certificates authenticity on vSmart

C.

Upload the WAN Edge list on vManage.

D.

Restore the reachability to the vSmart

Full Access
Question # 96

A network engineer must configure all branches to communicate with each other through the Service Chain Firewall located at the headquarters site. Which configuration allows the engineer to accomplish this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 97

Which pathway under Monitor > Network > Select Device is used to verify service insertion configuration?

A.

Real Time

B.

System Status

C.

ACL Logs

D.

Events

Full Access
Question # 98

How must the application-aware enterprise firewall policies be applied within the same WAN Edge router?

A.

within and between zones

B.

between two VPN tunnels

C.

within zone pair

D.

between two VRFs

Full Access
Question # 99

An engineer is configuring a WAN Edge router for DIA based on matching QoS parameters. Which two actions accomplish this task? (Choose two.)

A.

Apply a QoS map policy.

B.

Configure a control policy.

C.

Configure a centralized data policy.

D.

Configure NAT on the transport interface.

E.

Apply a data policy on WAN interface.

Full Access
Question # 100

What is the default value for the Multiplier field of the BFD basic configuration in vManage?

A.

3

B.

4

C.

5

D.

6

Full Access
Question # 101

An enterprise needs DIA on some of its branches with a common location ID: A041:B70C: D78E::18 Which WAN Edge configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 102

An administrator must deploy the controllers using the On-Prem method while vManage can access the PnP portal from inside How are the two WAN Edge authorized allowed lists to be made available to vManage? (Choose two)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 103

REST applications communicate over HTTP or HTTPS to make calls between network devices. Which two HTTPS standard methods are included? (Choose two.)

A.

Array

B.

DELETE

C.

POST

D.

Scalar

E.

Object

Full Access
Question # 104

Refer to the exhibit. The Cisco SD-VYAN is deployed using the default topology. The engineer v/ants to configure a service insertion policy such that all data traffic between Rome to Paris is forwarded through the NGFW located in London. Which configuration fulfills this requirement, assuming that the Sen/ice VPN ID is 1?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 105

Drag and drop the vManage policy configuration procedures from the left onto the correct definitions on the right.

Full Access
Question # 106

Refer to the exhibit A small company was acquired by a large organization As a result, the new organization decided to update information on their Enterprise RootCA and generated a new certificate using openssl Which configuration updates the new certificate and issues an alert in vManage Monitor | Events Dashboard?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 107

Which device information is requited on PNP/ZTP to support the zero-touch onboarding process?

A.

serial and chassis numbers

B.

interface IP address

C.

public DNS entry

D.

system IP address

Full Access