Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What is a benefit of the application aware firewall feature in the Cisco SD-WAN solution?

A.

application monitoring

B.

application malware protection

C.

application visibility

D.

control policy enforcement

Full Access
Question # 5

An engineer must use data prefixes to configure centralized data policies using the vManage policy configuration wizard. What is the first step to accomplish this task?

A.

Create groups of interest

B.

Configure network topology.

C.

Configure traffic rules.

D.

Apply policies to sites and VPNs.

Full Access
Question # 6

An engineer is adding a tenant with location JD 306432373 in vManage. What is the maximum number of alphanumeric characters that are accepted in the tenant name field?

A.

64

B.

128

C.

256

D.

8

Full Access
Question # 7

Which type of lists are used to group related items via an application-aware routing policy under the policy lists command hierarchy on vSmart controllers?

A.

data prefix, she. and VPN

B.

OSCP value, application, and VPN

C.

data prefix, application, and SLA class

D.

DSCP value, site, and VPN

Full Access
Question # 8

Refer to the exhibit. Which configuration value is used to change the administrative distance of iBGP routes to 20?

A.

Configure internal Routes Distance to 20

B.

Configure Propagate AS Path to off

C.

Configure Local Distance to 20

D.

Configure External routes distance 20

Full Access
Question # 9

What must an engineer conewef when decoying an SD-WAN on-pfemlses architecture based on ESXi hypervisor?

A.

Cisco must provision the backup and snapshots platform lor ihe SD-WAN arctoecture

B.

The managed service provider must provision controllars with their appropriate cerHwcatsi

C.

The IT team a required to provision the SO-WAN controllers and Is responsAte lor backups and disaster recovery implementation

D.

The IT team will be given access by Cisco to a vManage for configuration If templates and policies coeigmalim

Full Access
Question # 10

Refer to the exhibit A small company was acquired by a large organization As a result, the new organization decided to update information on their Enterprise RootCA and generated a new certificate using openssl Which configuration updates the new certificate and issues an alert in vManage Monitor | Events Dashboard?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 11

What is the role of the Session Traversal Utilities for NAT server provided by the vBond orchestrator?

A.

It facilitates SD-WAN toners and controllers to discover their own mapped or translated IP addresses and port numbers

B.

It prevents SD-WAN Edge routers from forming sessions with public transports among different service providers

C.

It facilitates SD-WAN Edge routers to stay behind a NAT-enabled firewall while the transport addresses of the SD-WAN controller are unNAT-ed

D.

It allows WAN Edge routers to form sessions among MPLS TLOCs using only public IP addresses

Full Access
Question # 12

Which Cisco SD-WAN component the initial communication between WAN Edge devices to join the fabric?

A.

WAN Edge Router

B.

vSmart Controller

C.

vManage

D.

vBond Orchestrator

Full Access
Question # 13

A network administrator is configuring VRRP to avoid a traffic black hole when the transport side of the network is down on the master device. What must be configured to get the fastest failover to standby?

A.

lower timer interval

B.

prefix-list tracking

C.

higher group ID number

D.

OMP tracking

Full Access
Question # 14

Which storage format Is used when vManage Is deployed as a virtual machine on a KVM hypervisor?

A.

.iso

B.

.qcow2

C.

.ova

D.

.tgz

Full Access
Question # 15

Refer to the exhibit.

Which command-line configuration on a WAN Edge device achieves these results?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 16

How is an event monitored and reported for an individual device in the overlay network at site ID:S4300T6E43F36?

A.

The device sends event notifications to vManage.

B.

The device sends notifications to vSmart that sends them to vManage.

C.

The device sends a critical alarm of events to vManage.

D.

The device sends a critical alarm to vSmart that sends it to vManage.

Full Access
Question # 17

Refer to the exhibit.

A network administrator is configuring OMP in vManage to advertise all the paths for the same prefix from a site that has two WAN Edge devices Each WAN Edge device is connected to three ISPs and two private MPLS transports. What is the minimum value for 'Number of Paths advertised per Prefix" that should be configured?

A.

2

B.

3

C.

5

D.

10

Full Access
Question # 18

Refer to the exhibit.

An engineer is configuring service chaining. Which set of configurations is required for all traffic from Site ID 1 going toward Site ID 2 to get filtered through the firewall on the hub site?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 19

Refer to the exhibit An engineer is configuring a QoS policy to shape traffic for VLAN 100 on a subinterface Which policy configuration accomplishes the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 20

How do WAN Edge devices operate when vSmart is inaccessible or fails to be reached by the WAN Edge?

A.

They cease to forward traffic in the data plane.

B.

They continue operation normally.

C.

They continue to receive reachability updates.

D.

They continue operating normally for a configurable time.

Full Access
Question # 21

Which command disables the logging of syslog messages to the local disk?

A.

no system logging disk enable

B.

no system logging disk local

C.

system logging disk disable

D.

system logging server remote

Full Access
Question # 22

Drag and drop the functions from the left onto the correct templates on the right.

Full Access
Question # 23

Refer to the exhibit Which command allows traffic through the IPsec tunnel configured in VPN 0?

A.

service local

B.

service FW address 1.1.1.1

C.

service netsvc1 vpn 1

D.

service netsvc1 address 1.1.1.1

Full Access
Question # 24

Which SD-WAN component is configured to enforce a policy to redirect branch-to-branch traffic toward a network service such as a firewall or IPS?

A.

vBond

B.

WAN Edge

C.

vSmart

D.

Firewall

Full Access
Question # 25

Which protocol is configured on tunnels by default to detect loss, latency, jitter, and path failures in Cisco SD-WAN?

A.

TLS

B.

BFD

C.

OMP

D.

BGP

Full Access
Question # 26

Refer to the exhibit The Cisco SD-WAN network is configured with a default full-mesh topology. Islamabad HQ and Islamabad WAN Edges must be used as the hub sites. Hub sites MPLS TLOC must be preferred when forwarding FTP traffic based on a configured SLA class list. Which policy configuration does the network engineer use to call the SLA class and set the preferred color to MPLS?

A.

Localized Policy, Route Policy

B.

Centralized Policy, Traffic Policy

C.

Localized Policy, Forwarding Class

D.

Centralized Policy Topology

Full Access
Question # 27

Where on vManage does an engineer find the details of control node failure?

A.

Alarms

B.

Events

C.

Audit log

D.

Network

Full Access
Question # 28

Which plane assists in the automatic onboarding of the SD-WAN routers into the SD-WAN overlay?

A.

Data

B.

Orchestration

C.

Management

D.

Control

Full Access
Question # 29

Refer to the exhibit. Which configuration extends the INET interface on R1 to be used by R2 for control and data connections?

A)

B)

C)

A.

Option A

B.

Option B

C.

Option C

Full Access
Question # 30

Refer to the exhibit. An administrator is configuring a policy in addition to an existing hub-and-spoke policy for two sites that should directly communicate with each other. How is this policy configured?

A.

hub-and-spoke

B.

mesh

C.

import existing topology

D.

custom control (route and TLOC)

Full Access
Question # 31

Which component of the Cisco SD-WAN control plane architecture should be located in a public Internet address space and facilitates NAT-traversal?

A.

vBond

B.

WAN Edge

C.

vSmart

D.

vManage

Full Access
Question # 32

An engineer is configuring a data policy for packets that must be captured through the policy. Which command accomplishes this task?

A.

policy > data-policy > vpn-list > sequence > default-action > drop

B.

policy > data-policy > vpn-list > sequence > action

C.

policy > data-policy > vpn-list > sequence > default-action > accept

D.

policy > data-policy > vpn-list > sequence > match

Full Access
Question # 33

Refer to the exhibit.

The tunnel interface configuration on both WAN Edge routers is:

Which configuration for WAN Edge routers will connect to the Internet?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 34

What is the order of operations for software upgrades of Cisco SD-WAN nodes'?

A.

vBond vManage vSmart WAN Edge

B.

vManage vBond WAN Edge. vSmart

C.

vManage vSmart, vBond, WAN Edge

D.

vManage vBond vSraart WAN Edge

Full Access
Question # 35

Which pathway under Monitor > Network > Select Device is used to verify service insertion configuration?

A.

Real Time

B.

System Status

C.

ACL Logs

D.

Events

Full Access
Question # 36

An administrator wants to create a policy to add a traffic policer called "politer-ccnp" to police data traffic on the WAN Edge. Which configuration accomplishes this task in vSmart?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 37

A customer has MPLS and Internet as the TLOC colors An engineer must configure conlroJIers with the Internet and not with MPLS Which configuration achieves this requirement on vManage?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 38

Drag and drop the Cisco SD-WAN components from the left onto their functions on the right.

Full Access
Question # 39

An enterprise has these three WAN connections:

  • public Internet
  • business internet
  • MPLS

An engineer must configure two available links to route traffic via both links. Which configuration achieves this objective?

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 40

Which SD-WAN component detects path performance information in the organization to report the issue to the service provider at site ID:S4288T5E44F04?

A.

vAnalytics

B.

vManage NMS

C.

vBond Orchestrator

D.

Cisco DNA

Full Access
Question # 41

Which pathway under Monitor > Network > Select Device is used to verify service insertion configuration?

A.

System Status

B.

Troubleshooting

C.

Real Time

D.

Events

Full Access
Question # 42

A customer is receiving routes via OMP from vSmart controller for a specific VPN. The customer must provide access to the W2 loopback received via OMP to the OSPF neighbor on the service-side VPN, which configuration fulfils these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 43

Drag and drop the definitions from the left to the configuration on the right.

Full Access
Question # 44

Refer to the exhibit. vManage logs are available for the past few months. A device name change deployed mistakenly at a critical site. How is the device name change tracked by operation and design teams?

A)

B)

C)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 45

Which two actions are necessary to set the Controller Certificate Authorization mode to indicate a root certificate? (Choose two)

A.

Select the Controller Certificate Authorization mode that is recommended by Cisco

B.

Change the organization name of the Cisco SO-WAN fabric.

C.

Upload an SSL certificate to vManape,

D.

Select a private certificate signing authority instead of a public certificate signing authority

E.

Select a validity period from the drop-down menu

Full Access
Question # 46

The Cisco SD-WAN engineer is configuring service chaining for a next-generation firewall located at the headquarters. Which configuration creates the service?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 47

Refer to the exhibit.

Which two configurations are needed to get the WAN Edges registered with the controllers when certificates are used? (Choose two)

A.

Generate a CSR manually within vManage server

B.

Generate a CSR manually on the WAN Edge

C.

Request a certificate manually from the Enterprise CA server

D.

Install the certificate received from the CA server manually on the WAN Edge

E.

Install the certificate received from the CA server manually on the vManage

Full Access
Question # 48

A network administrator is configuring a centralized control policy based on match action pairs for multiple conditions, which order must be configured to prefer Prefix List over TLOC and TLOC over Origin?

A.

highest to lowest sequence number

B.

nonsequential order

C.

deterministic order

D.

lowest to highest sequence number

Full Access
Question # 49

For data plane resiliency, what does the Cisco SD-WAN software implement?

A.

BFD

B.

establishing affinity between vSmart controllers and WAN Edge routers

C.

multiple vBond orchestrators

D.

OMP

Full Access
Question # 50

Which two resource data types are used to collect information for monitoring using REST API in Cisco SD-WAN? (Choose two.)

A.

POST

B.

DELETE

C.

scalar

D.

array

E.

PUT

Full Access
Question # 51

Refer to the exhibit Cisco SD-WAN is deployed with controllers hosted in a data center All branches have WAN Edge devices with dual connections to the data center one via Internet and the other using MPLS Three branches out of 20 have issues with their control connections on MPLS circuit The local error refers to Control Connection Failure Which action resolves the issue*?

A.

Rectify any issues with the underlay routing configuration

B.

Match the TLOC color on the controllers and all WAN Edge devices

C.

Match certificates for the DTLS connection and Root CA must be installed first on WAN Edge devices

D.

Update the system IP on vManage and then resend it to the controllers

Full Access
Question # 52

A large retail organization decided to move some of the branch applications to the AWS cloud. How does the network architect extend the in-house Cisco SD-WAN branch to cloud network into AWS?

A.

Create virtual WAN Edge devices Cloud through the AWS online software store

B.

Create virtual instances of vSmart Cloud through the AWS online software store

C.

Create GRE tunnels to AWS from each branch over the Internet

D.

Install the AWS Cloud Router in the main data center and provide the connectivity from each branch

Full Access
Question # 53

Which policy configures an application-aware routing policy under Configuration > Policies?

A.

Localized policy

B.

Centralized policy

C.

Data policy

D.

Control policy

Full Access
Question # 54

An engineer is configuring a list that matches all IP prefixes with lengths from /1 to /16 in a centralized control policy. Which list accomplishes this task?

A.

0.0.0.0/1 le 16

B.

0.0.0.0/0 ge 1

C.

0.0.0.0/0 le l6

D.

0.0.0.0/16 ge 1

Full Access
Question # 55

How does the replicator role function in cisco SD-WAN?

A.

WAN Edge devices advertise the rendezvous point to all the receivers through the underlay network.

B.

vSmart Controllers advertise the rendezvous point to all the receivers through the overlay network.

C.

WAN Edge devices advertise the rendezvous point to all receivers through the overlay network.

D.

vSmart Controllers advertise the rendezvous point to all the receivers through the underlay network.

Full Access
Question # 56

An engineer is configuring a WAN Edge router for DIA based on matching QoS parameters. Which two actions accomplish this task? (Choose two.)

A.

Apply a QoS map policy.

B.

Configure a control policy.

C.

Configure a centralized data policy.

D.

Configure NAT on the transport interface.

E.

Apply a data policy on WAN interface.

Full Access
Question # 57

When software is upgraded on a vManage NMS, which two image-adding options store images in a local vManage software repository? (Choose two.)

A.

To be downloaded over a SMTP connection

B.

To be downloaded over a SNMP connection

C.

To be downloaded over an out-of-band connection

D.

To be downloaded over a control plane connection

E.

To be downloaded over an ICMP connection

Full Access
Question # 58

Refer to the exhibit.

An engineer configured OMP with an overlay-as of 10666. What is the AS-PATH for prefix 104.104.104.104/32 on R100?

A.

100 10666

B.

100 20 104

C.

100 10666 20 104

D.

100 10666 104

Full Access
Question # 59

Which protocol is used for the vManage to connect to the vSmart Controller hosted in Cloud?

A.

PnP Server

B.

ZTP

C.

NETCONF

D.

HTTP

Full Access
Question # 60

An engineer configured a data policy called ROME-POLICY. Which configuration allows traffic flow from the Rome internal network toward other sites?

A.

apply-policy site-list Rome data-policy ROME-POLICY from-tunnel

B.

apply-policy site-list Rome data-policy ROME-POLICY from-service

C.

site-list Rome control-policy ROME-POLICY in

D.

site-list Rome control-policy ROME-POLICY out

Full Access
Question # 61

Refer to the exhibit vManage and vBond have an issue establishing a connection to vSmart Which two actions does the administrator take to fix the issue? (Choose two)

Install the certificate received from the certificate server.

A.

Manually resync vManage and vBond

B.

Reconfigure the vSmart from CLI with the proper Hostname & System IP

C.

Delete and re-add vSmart Click Generate and validate CSR

D.

Request a certificate from the certificate server based on the CSR for the vSmart

Full Access
Question # 62

Drag and drop the devices from the left onto the correct functions on the right.

Full Access
Question # 63

Which configuration allows users to reach YouTube from a local Internet breakout?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 64

Which device in the SD- WAN solution receives and categorizes event reports, and generates alarms?

A.

WAN Edge routers

B.

vSmart controllers

C.

vManage NMS

D.

vBond controllers

Full Access
Question # 65

An engineer wants to track tunnel characteristics within an SLA-based policy for convergence. Which policy configuration will achieve this goal?

A.

App-route policy

B.

VPN membership policy

C.

Control policy

D.

Data policy

Full Access
Question # 66

Refer to the exhibit. An enterprise network is connected with an ISP network on an 80 Mbps bandwidth link. The network operation team observes 100 Mbps traffic on the 1Gig-ISP link during peak hours Which configuration provides bandwidth control to avoid traffic congestion during peak hours?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 67

Refer to the exhibit.

The control connection is failing. Which action resolves the issue?

A.

import vSmart in vManager

B.

Validate the certificates authenticity on vSmart

C.

Upload the WAN Edge list on vManage.

D.

Restore the reachability to the vSmart

Full Access
Question # 68

What is an advantage of using auto mode versus static mode of power allocation when an access point is connected to a PoE switch port?

A.

It detects the device is a powered device

B.

All four pairs of the cable are used

C.

Power policing is enabled at the same time

D.

The default level is used for the access point

Full Access
Question # 69

Which device information is requited on PNP/ZTP to support the zero-touch onboarding process?

A.

serial and chassis numbers

B.

interface IP address

C.

public DNS entry

D.

system IP address

Full Access
Question # 70

Refer to the exhibit.

An engineer is troubleshooting an issue where vManage and vSmart have a problem establishing a connection to vBond. Which action fixes the issue?

A.

Reconfigure the vBond command on the vBond as vBond 150.5.1.3 local

B.

Configure the tunnel interface on all three controllers with a color of transport

C.

Remove the encapsulation IPsec command under the tunnel interface of vBond.

D.

Configure encapsulation as IPsec under the tunnel interface of vManage and vSmart

Full Access
Question # 71

An engineer is applying QoS policy for the transport-side tunnel interfaces to enable scheduling and shaping for a WAN Edge cloud router Which command accomplishes the task?

A.

cloud-qos-service-side

B.

qos-scheduler QOS_0

C.

qos-map QOS

D.

rewrite-rule QOS-REWRITE

Full Access
Question # 72

An engineer configures an application-aware routing policy for a group of sites The locations depend on public and private transports The policy does not work as expected when one of the transports does not perform properly This policy is configured:

which configuration completes the policy so that it works for all locations?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 73

A network administrator is bringing up one WAN Edge for branch connectivity. Which types of tunnels form when the WAN edge router connects to the SD-WAN fabric?

A.

DTLS or TLS tunnel with vBond controller and IPsec tunnel with vManage controller.

B.

DTLS or TLS tunnel with vBond controller and IPsec tunnel with other WAN Edge routers.

C.

DTLS or TLS tunnel with vSmart controller and IPsec tunnel with other Edge routers.

D.

DTLS or TLS tunnel with vSmart controller and IPsec tunnel with vBond controller.

Full Access
Question # 74

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

A.

A domain is nonexistent.

B.

A domain is block-listed.

C.

A domain is locally reachable.

D.

A domain is grey-listed.

Full Access
Question # 75

Which protocol runs between the vSmart controllers and WAN Edge routers when the vSmart controller acts like a route reflector?

A.

OMP outside the DTLS/TLS control connection

B.

BGP inside the DTLS/TLS

C.

IPsec inside the DTLS/TLS control connection

D.

OMP inside the DTLS/TLS control connection

Full Access
Question # 76

Which protocol is used to propagate multicast join requests over the Cisco SD-WAN fabric?

A.

ARP

B.

Auto-RP

C.

OMP

D.

IGMP

Full Access
Question # 77

Which logs verify when a device was upgraded?

A.

Audit

B.

Email

C.

ACL

D.

SNMP

Full Access
Question # 78

Refer to the exhibit. The Cisco SD-VYAN is deployed using the default topology. The engineer v/ants to configure a service insertion policy such that all data traffic between Rome to Paris is forwarded through the NGFW located in London. Which configuration fulfills this requirement, assuming that the Sen/ice VPN ID is 1?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 79

A policy is created to influence routing in the network using a group of prefixes. What policy application will achieve this goal when applied to a site list?

A.

Vpn-membership policy

B.

Control-policy

C.

cflowd-template

D.

App-route policy

Full Access
Question # 80

What is a requirement for a WAN Edge to reach vManage, vBond, and vSmart controllers in a data center?

A.

IGP

B.

QoS

C.

TLS

D.

OMP

Full Access
Question # 81

Refer to the exhibit vManage and vBond have an issue establishing a connection to vSmart Which two actions does the administrator take to fix the issue? (Choose two)

Install the certificate received from the certificate server.

A.

Manually resync vManage and vBond

B.

Reconfigure the vSmart from CLI with the proper Hostname & System IP

C.

Delete and re-add vSmart Click Generate and validate CSR

D.

Request a certificate from the certificate server based on the CSR for the vSmart

Full Access
Question # 82

Which device information is required on PNP/ZTP to support the zero-touch onboarding process?

A.

interface IP address

B.

system IP address

C.

public DNS entry

D.

serial and chassis numbers

Full Access
Question # 83

Which two image formats are supported for controller codes? (Choose two.)

A.

.nxos

B.

.qcow2

C.

.ova

D.

.bin

E.

Tgz

Full Access
Question # 84

Which website allows access to visualize the geography screen from vManager using the internet?

A.

*.opcnstreetmaps.org

B.

*.fullstreetmaps.org

C.

*.callstreelmaps.org

D.

*.globaistreetmaps.org

Full Access
Question # 85

Which platform cannot provide IPS and URL filtering capabilities?

A.

Cisco CSR 1000V

B.

Cisco ISR 1000

C.

Cisco Catalyst 8300

D.

Cisco ISR 4000

Full Access
Question # 86

Which policy allows communication between TLOCs of data centers and spokes and blocks communication between spokes?

A.

centralized data policy

B.

centralized control policy

C.

localized control policy

D.

localized data policy

Full Access
Question # 87

How must the application-aware enterprise firewall policies be applied within the same WAN Edge router?

A.

within and between zones

B.

between two VPN tunnels

C.

within zone pair

D.

between two VRFs

Full Access
Question # 88

Refer to the exhibit.

An organization is testing a Cisco SD-WAN solution and decided to have the control plane established first and not the data plane at the time of migration. Which configuration achieves this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 89

Which protocol detects path status (up/down), measures loss/latency/jitter, and measures the quality of the IPsec tunnel MTU?

A.

OMP

B.

IP-SLA

C.

BFD

D.

DTLS

Full Access
Question # 90

WAN Edge routers are configured manually to use UDP port offset to use nondefault offset values when IPsec tunnels are created. What is the offse range?

A.

1-19

B.

0-18

C.

0-19

D.

1-18

Full Access
Question # 91

Which two mechanisms are used by vManage to ensure that the certificate serial number of the WAN Edge router that is needed to authenticate is listed in the WAN Edge Authorized Señal Number Hst’ (Choose two)

A.

Synchronize to the PnP

B.

Manually upload it to vManage

C.

The devices register to vManage directly as the devices come online

D.

The vManage is shipped with the list

E.

Synchronize to the Smart Account

Full Access
Question # 92

How many concurrent sessions does a vManage REST API have before it invalidates the least recently used session if the maximum concurrent session number is reached?

A.

150

B.

200

C.

250

D.

300

Full Access
Question # 93

Which pathway under Monitor > Network > Select Device is used to verify service insertion configuration?

A.

System Status

B.

Troubleshooting

C.

Real Time

D.

Events

Full Access
Question # 94

Which SD-WAN component allows an administrator to manage and store software images for SD-WAN network elements?

A.

vGond controllers

B.

WAN Edge routers

C.

vSman controllers

D.

vManage NMS

Full Access
Question # 95

Refer to the exhibit.

What binding is created using the tloc-extension command?

A.

between ge 0/2.101 of port-type service and ge 0/0 of port-type service

B.

between ge 0/2.101 of port-type transport and ge 0/0 of port-type service

C.

between ge 0/2.101 of port-type service and ge 0/0 of port-type transport

D.

between ge 0/2.101 of port-type transport and ge 0/0 of port-type transport

Full Access
Question # 96

Refer to the exhibit The network team must configure application-aware routing for the Service VPN 50.0.0.0/16 The SLA must prefer MPLS for video traffic but the remaining traffic must use a public network What must be defined other than applications before the application-aware policy is create?

A.

SLA Class, Site VPN. Prefix

B.

Data Prefix, Site VPN TLOC

C.

Application, SLA VPN. Prefix

D.

Color, SLA Class, Sue, VPN

Full Access
Question # 97

Which action is performed during the onboarding process when a WAN Edge router is connected to ZTP server ztp.viptela com?

A.

The router is connected to WAN Edge Cloud Center

B.

The router is synced with vSmart Controller via an IPsec tunnel

C.

The router receives its vBond Orchestrator information

D.

The router is connected 10 vSmart Controller via a DTLSTLS tunnel

Full Access
Question # 98

Refer to the exhibit.

The SD-WAN network is configured with a default full-mesh topology. The SD-WAN engineer wants the Barcelona WAN Edge to use MPLS TLOC as the preferred TLOC when communicating with Rome site. Which configuration must the engineer use to create a list to select MPLS color toward the Rome TLOC?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 99

What problem happens on a device with two serial numbers, a unique device identifier (UDI), and secure unique device identifier (SUDI) when an engineer provisions ISR 4000 by PnP using only a UDI?

A.

It encounters spanning tree issues

B.

It faces interface buffer overflow patterns

C.

It encounters redirection problems.

D.

It encounters memory overload problems

Full Access
Question # 100

Refer to exhibit.

An engineer is troubleshooting tear down of control connections even though a valid Certificate Serial Number is entered Which two actions resolve the Issue? (Choose two)

A.

Enter a valid serial number on the controllers for a given device

B.

Remove the duplicate IP in the network.

C.

Enter a valid product ID (model) on the PNP portal

D.

Match the serial number file between the controllers

E.

Restore network reachability for the controller

Full Access
Question # 101

An enterprise deployed a Cisco SD-WAN solution with hub-and-spoke topology using MPLS as the preferred network over the Internet. A network engineer must implement an application-aware routing policy to allow ICMP traffic to be load-balanced over both the available links. Which configuration meets the requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 102

Refer to the exhibit.

The engineer must assign community tags to 3 of its 74 critical server networks as soon as that are advertised to BGP peers. These server networks must not be advertised outside AS. Which configuration fulfill this requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 103

What is the order of operations for software upgrades of Cisco SD-WAN nodes'?

A.

vBond vManage vSmart WAN Edge

B.

vManage vBond WAN Edge. vSmart

C.

vManage vSmart, vBond, WAN Edge

D.

vManage vBond vSraart WAN Edge

Full Access
Question # 104

Which set of platforms must he in separate VMS as of release 16.1?

A.

vSmart and WAN Edge

B.

WAN Edge and vBond

C.

vManagc and vSmart

D.

vBond and vSmart

Full Access
Question # 105

Refer to the exhibit A small company was acquired by a large organization As a result, the new organization decided to update information on their Enterprise RootCA and generated a new certificate using openssl Which configuration updates the new certificate and issues an alert in vManage Monitor | Events Dashboard?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 107

The Cisco SD-WAN engineer is configuring service chaining for a next-generation firewall located at the headquarters. Which configuration creates the service?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access