3 Months Free Update
3 Months Free Update
3 Months Free Update
What is a requirement for deployment of on-premises vBond controllers through the Cisco Plug and Play Connect process?
An engineer is troubleshooting a certificate issue on vEdge. Which command is used to verify the validity of the certificates?
An organization wants to use the cisco SD-WAN regionalized service-chaining feature to optimize cost and user experience with application in the network, which allows branch routers to analyze and steer traffic toward the required network function. Which feature meets this requirement?
Drag and drop the devices from the left into order on the right to upgrade the software from version 19 to version 20.
An engineer configures an application-aware routing policy for a group of sites The locations depend on public and private transports The policy does not work as expected when one of the transports does not perform properly This policy is configured:
which configuration completes the policy so that it works for all locations?
A)
B)
C)
D)
Which destination UDP port is used by WAN Edge router to make a DTLS connection with vBond Orchestrator?
Which feature builds transport redundancy by using the cross link between two redundant WAN Edge routers?
A policy is created to influence routing path in the network using a group of prefixes. What policy application will achieve this goal when applied to a site List?
Which two advanced security features are available on the Cisco SD-WAN WAN Edge (vEdge) device? (Choose two.)
An engineer must avoid routing loops on the SD-WAN fabric for routes advertised between data center sites Which BGP loop prevention attribute must be configured on the routers to meet this requirement?
Refer to the exhibit A user has selected the options while configuring a VPN Interface Ethernet feature template What is the required configuration parameter the user must set in this template for this feature to function?
What is the order of operations for software upgrades of Cisco SD-WAN nodes'?
Drag and drop the steps from the left Into the order on the right to delete a software image for a WAN Edge router starting with Maintenance > Software Upgrade > Device list on vManage.
An engineer creates a data policy to prevent communication from the 172.20.21.0/24 network to the 172.20.41.0/24 network. Which configuration accomplishes this task?
Drag and drop the REST API calls from the left onto the functions on the right.
An engineer configures policing with a rate of 125 Bps and a burst rate of 8000 bits, as shown here:
Which configuration completes this task?
Refer to the exhibit The engineering must assign tags to 3 Of its 74 server networks as soon as they are advertised to peers These server network must not be advertised AS which configuration fulfil the requirement?
A)
B)
C)
D)
In which Cisco SD-WAN deployment scenario does Cisco Umbrella SIG deliver the most value?
Which service VPN must be reachable from all WAN Edge devices and the controllers?
Which vBond system configuration under VPN 0 allows for a routable public IP address even if the DNS name, hostname, or IP address of the vBond orchestrator are omitted?
Drag and drop the Cisco SD-WAN components from the left onto their functions on the right.
Drag and drop the BFD parameters from the left onto the BFD configurations on the right.
An enterprise has several sites with multiple VPNs that are isolated from each other A new requirement came where users in VPN 73 must be able to talk to users in VPN 50 Which configuration meets this requirement?
Drag and drop the steps from the left into the order on the right to upload software on vManage repository that is accessible from maintenance > Software Repository.
A network administrator is creating an OMP feature template from the vManage GUI to be applied to WAN edge routers. Which configuration attribute will avoid the redistribution of the routes back into the OMP from the LAN side?
Which timer specifies information in the cache after all OMP sessions are lost at location S0123T4E56F78?
Which two mechanisms are used by vManage to ensure that the certificate serial number of the WAN Edge router that is needed to authenticate is listed in the WAN Edge Authorized Señal Number Hst’ (Choose two)
Refer to the exhibit. Which configuration value is used to change the administrative distance of iBGP routes to 20?
Which two products are used to deploy Cisco WAN Edge Router virtual platforms? (Choose two.)
Refer to the exhibit Which configuration sets up direct Internet access for VPN 1?
Which scheduling method is configured by default for the eight queues in the cloud vEdge router1?
An enterprise needs DIA on some of its branches with a common location ID: A041:B70C: D78E::18 Which WAN Edge configuration meets the requirement?
A)
B)
C)
D)
A network administrator is bringing up one WAN Edge for branch connectivity. Which types of tunnels form when the WAN edge router connects to the SD-WAN fabric?
Refer to the exhibit Which command allows traffic through the IPsec tunnel configured in VPN 0?
An engineer is configuring a data policy for packets that must be captured through the policy. Which command accomplishes this task?
An administrator must deploy the controllers using the On-Prem method while vManage can access the PnP portal from inside How are the two WAN Edge authorized allowed lists to be made available to vManage? (Choose two)
Which two hardware platforms support Cisco IOS XE SD-WAN images'' (Choose two)
Which two services are critical for zero touch provisioning on-boarding? (Choose two)
What are the two advantages of deploying cloud-based Cisco SD-WAN controllers? (Choose two.)
Which controller is excluded from the process of checking against the authorized, allowed list?
Refer to the exhibit. vManage logs are available for the past few months. A device name change deployed mistakenly at a critical site. How is the device name change tracked by operation and design teams?
A)
B)
C)
Which feature allows reachability to an organization’s internally hosted application for an active DNS security policy on a device?
Refer to the exhibit.
Which shaping-rate does the engineer use to shape traffic at 9 Mbps?
Which Cisco SD-WAN configuration provides the advantages of day-zero deployment and reusable configuration components?
What is a requirement for a WAN Edge to reach vManage, vBond, and vSmart controllers in a data center?
Which routing protocol is used to exchange control plane information between vSmart controllers and WAN Edge routers in the Cisco SD-WAN secure extensible network?
What is the default value for the Multiplier field of the BFD basic configuration in vManage?
Refer to the exhibit. A user in the branch is connecting to Office 365 for the first time. Over which path does the branch WAN Edge router traffic follow?
Refer to exhibit.
An engineer is troubleshooting tear down of control connections even though a valid Certificate Serial Number is entered Which two actions resolve the Issue? (Choose two)
Refer to the exhibit.
A customer wants to implement primary and secondary Cisco SD-WAN overlay routing for prefixes that are advertised for both data centers. The east data center (TLOC 101.101.101.101) is primary for east sites, and the west data center (TLOC 100.100.100.100) is primary for west sites. Which configuration change achieves this objective?
Refer to the exhibit An engineer is configuring a QoS policy to shape traffic for VLAN 100 on a subinterface Which policy configuration accomplishes the task?
A)
B)
C)
D)
A customer is receiving routes via OMP from vSmart controller for a specific VPN. The customer must provide access to the W2 loopback received via OMP to the OSPF neighbor on the service-side VPN, which configuration fulfils these requirements?
An engineer must apply the configuration for certificate installation to vBond Orchestrator and vSmart Controller. Which configuration accomplishes this task?
Exhibit.
The SD-WAN network Is configured with a default full-mesh topology. The network engineer wants the Rome WAN Edge to use the MPLS TLOC as the preferred TLOC when ….. Telnet traffic as long as me MPLS Ink has these, characteristics:
Loss: 5%
Latency: 100ms
Jitter: 100 ms
Which configuration must the network engineer use to create a list that that classifies the MPLS link characteristics?
A)
B)
C)
D)
Which routes are similar to the IP route advertisements when the routing information of WAN Edge routers is learned from the local site and local routing protocols?
Refer to the exhibit.
The tunnel interface configuration on both WAN Edge routers is:
Which configuration for WAN Edge routers will connect to the Internet?
Which device should be configured with the service chain IP address to route intersite traffic through a firewall?
Which component of the Cisco SD-WAN secure extensible network provides a single pane of glass approach to network monitoring and configuration?
Drag and drop the vManage policy configuration procedures from the left onto the correct definitions on the right.
Refer to the exhibit, Which configuration routes Site 2 through the firewall in Site 1?
An enterprise has these three WAN connections:
public Internet
business internet
MPLS
An engineer must configure two available links to route traffic via both links. Which configuration achieves this objective?
Refer to the exhibit.
What binding is created using the tloc-extension command?
Which VManage dashboard is used to monitor the next-hop reachability between two devices traversing through OMP for a service VPN’
An engineer is adding a tenant with location JD 306432373 in vManage. What is the maximum number of alphanumeric characters that are accepted in the tenant name field?
An administrator wants to create a policy to add a traffic policer called "politer-ccnp" to police data traffic on the WAN Edge. Which configuration accomplishes this task in vSmart?
In Cisco SD-WAN, what protocol is used for control connections between SD-WAN devices?
If Smart Account Sync is not used, which Cisco SD-WAN component is used to upload an authorized serial number file?
What is the role of the Session Traversal Utilities for NAT server provided by the vBond orchestrator?
Which two prerequisites must be met before the Cloud onRamp for laaS is initiated on vManage to expand to the AWS cloud? (Choose two)
Drag and drop the policies from the left onto the correct policy types on the right.
Which two resource data types are used to collect information for monitoring using REST API in Cisco SD-WAN? (Choose two.)
Which two virtualized environments are available for a company to install the controllers using the on-premises model? (Choose two )
What happens if the intelligent proxy is unreachable in the Cisco SD-WAN network?
An engineer must create a QoS policy by creating a class map and assigning it to the LLQ queue on a WAN Edge router Which configuration accomplishes the task?
A)
B)
C)
D)
An engineer is creating a policy for VPN1 users. Their scavenger traffic at site 101 must pass through a firewall. Which two match conditions must be selected to enable this policy? (Choose two.)
Refer to the exhibit. An enterprise network is connected with an ISP network on an 80 Mbps bandwidth link. The network operation team observes 100 Mbps traffic on the 1Gig-ISP link during peak hours Which configuration provides bandwidth control to avoid traffic congestion during peak hours?
A)
B)
C)
D)
Which plane assists in the automatic onboarding of the SD-WAN routers into the SD-WAN overlay?
What are the two components of an application-aware firewall? (Choose two.)
Which protocol is used to propagate multicast join requests over the Cisco SD-WAN fabric?
An organization requires the use of integrated preventative engines, exploit protection, and the most updated and advanced signature-based antivirus with sandboxing and threat intelligence to stop malicious attachments before they reach users and get executed. Which Cisco SD-WAN solution meets the requirements?
Refer to the exhibit. An engineer must block FTP traffic coming in from a particular Service VPN on a WAN Edge device Which set of steps achieves this goal?
Which cloud based component in cisco SD-WAN is responsible for establishing a secure connection to each WAN edge router and distributes routers and policy information via omp?
Which action is performed during the onboarding process when a WAN Edge router is connected to ZTP server ztp.viptela com?
Company E wants to deploy Cisco SD-WAN with controllers in AWS The company's existing WAN is on private MPLS without Internet access to controllers m AWS An Internet circuit is added to a site in addition to the existing MPLS circuit. Which interface template establishes BFD neighbors over both transports?
A)
B)
C)
Miss
D)
When the VPN membership policy is being controlled at the vSmart controller, which policy disallows VPN 1 at sites 20 and 30?
A)
B)
C)
D)
What is an advantage of using auto mode versus static mode of power allocation when an access point is connected to a PoE switch port?
Refer to the exhibit The network team must configure El GRP peering at HQ with devices in the service VPN connected to WAN Edge CSRv. CSRv is currently configured with
A)
B)
C)
D)
Which policy blocks TLOCs from remotes and allows TLOCs from the data center to form hub-and-spoke peering?
Which on-the-box security feature supported by the Cisco ISR 4451 SD-WAN device and not on vEdge?
How is an event monitored and reported for an individual device in the overlay network at site ID:S4300T6E43F36?
Refer to the exhibit.
A network administrator is configuring OMP in vManage to advertise all the paths for the same prefix from a site that has two WAN Edge devices Each WAN Edge device is connected to three ISPs and two private MPLS transports. What is the minimum value for 'Number of Paths advertised per Prefix" that should be configured?
Refer to the exhibit. An engineer is troubleshooting a control connection issue on a WAN Edge device that shows socket errors. The packet capture shows some ICMP packets dropped between the two devices. Which action resolves the issue?
Which pathway under Monitor > Network > Select Device is used to verify service insertion configuration?
Which control policy assigned to Drenches in the out direction establishes a strict hub-and-spoke topology tor VPN2?
A)
B)
C)
D)
Two sites have one WAN Edge each WAN Edge has two public TLOCs with no restriction configured. There is full reachability between the TLOCs. How many data tunnels are formed on each Edge router?
Which policy configures an application-aware routing policy under Configuration > Policies?
A network administrator is configuring VRRP to avoid a traffic black hole when the transport side of the network is down on the master device. What must be configured to get the fastest failover to standby?
An engineer is adding a tenant with location ID 399533345 in vManage. What is the maximum number of alphanumeric characters that is accepted in the tenant name filed?
Refer to the exhibit.
Which command-line configuration on a WAN Edge device achieves these results?
A)
B)
C)
D)
Refer to the exhibit The network team must configure ElGRP peering at HQ with devices in the service VPN connected to WAN Edge CSRv. CSRv is currently configured with
Which configuration on the WAN Edge meets the requiremnet
A)
B)
C)
D)
Refer to the exhibit.
An MPLS connection on R2 must extend to R1 Users behind R1 must have dual connectivity for data traffic Which configuration provides R1 control connectivity over the MPLS connection?
A)
B)
C)
D)
Which policy is configured to ensure that a voice packet is always sent on the link with less than a 50 msec delay?
What is the procedure to upgrade all Cisco SD-WAN devices to a recent version?