Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

201-01 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

201-01 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: Riverbed Certified Solutions Associate - Network Performance Management
  • Last Update: Sep 13, 2025
  • Questions and Answers: 245
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

201-01 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

201-01 Practice Exam Questions with Answers Riverbed Certified Solutions Associate - Network Performance Management Certification

Question # 6

What is one way Cascade can assist with Application Performance problems?

A.

Cascade will send synthetic transactions to measure response time.

B.

Cascade has a software agent that can be loaded on a Windows Server to provide response time metrics with most major applications

C.

Cascade tracks Response Time metrics by observing live traffic. These metrics are used with other indicators to build baselines and analyze deviations that may be indicators to issues.

D.

All the above.

Full Access
Question # 7

In configuring a router to send NetFlow to Cascade, an important point to consider is:

A.

Ensuring the interface of the Cascade Profiler is on the same subnet as the router, as NetFlow is not routable.

B.

Using the “tcp/(n) + 1” port numbering scheme to ensure this router’s NetFlow is unique from all other routers.

C.

Ensuring the router has IP connectivity to the Cascade Gateway.

D.

Ensuring the interface of the Cascade Gateway is on the same subnet as the router, as NetFlow is not routable.

E.

Using the “udp/(n) + 1” port numbering scheme to ensure this router’s NetFlow is unique from all other routers.

Full Access
Question # 8

What are the capabilities of NetProfiler behavior analysis? (Choose two.)

A.

Advanced analytics using dynamic modeling of network behavior.

B.

Comparisons to absolute thresholds.

C.

Windows WMI data gathered from Application Servers.

D.

Loss of connectivity based on three consecutive lost ICMP ping responses.

E.

Error rated collected through SNMP Polling of Network Interfaces.

Full Access
Question # 9

Which mode should be enabled to monitor traffic in high-throughput environments such as server farms or data centers?

A.

Database Performance mode

B.

Application Stream Analysis boost mode

C.

Server Boost mode

D.

Web Transaction Analysis mode

Full Access
Question # 10

A company has been using a Cascade Express-300 Profiler for some time, but has recently started dropping flows as they are overrunning their licensed limit. What is the best course of action if they are considering an upgrade to the next tier of Cascade Profiler? (Select 2)

A.

The company must buy a new Standard Cascade Profiler and stop using their Express.

B.

The company can continue to use their Express but must buy a new Cascade Profiler.

C.

The Express can be further licensed to capture the currently dropped flows.

D.

The company must buy a new Standard Cascade Profiler but can use the Express functioning as a remote Cascade Sensor.

E.

The company must buy a new Standard Cascade Profiler and can continue to use their Express but the two Cascade Profilers must be used independent of one another.

F.

The company can try to reduce the number of flows being seen by the Express.

Full Access
Question # 11

How does Cascade performance analytics assist with Performance Monitoring?

A.

By setting static thresholds for Application metrics and Interface metrics, tolerance can be determined. Cascade will use these thresholds and tolerances to report on deviations indicative of Performance problems.

B.

The Customer only needs to identify their critical interfaces and applications, and Cascade will automatically baseline their behavior and report on deviations indicative of Performance problems.

C.

The Performance Analytics are able to detect security threats such as host scans and worms.

D.

After base-lining, Cascade can re-route congested traffic to avoid congested application delivery paths.

Full Access
Question # 12

What are the features available in Cascade Pilot that are NOT available in Cascade Pilot Personal Edition (PE)? (Select 3)

A.

Drill down from Cascade Profiler

B.

Indexing files for fast analysis

C.

Visual troubleshooting and analysis

D.

Distributed capture and analysis (Cascade Shark appliance)

E.

Application Transaction diagrams

Full Access
Question # 13

What two methods does the Profiler have for getting MAC address information? (Select 2)

A.

SMTP integration

B.

SNMP integration

C.

DHCP integration

D.

There is only one method of getting MAC address information.

E.

Line monitoring for ARP requests

Full Access
Question # 14

Which of the following is the most likely reason that a newly added user cannot log in to SteelCentral Portal?

A.

There is a 30-minute waiting period before newly added users become active.

B.

The user is probably using an unsupported web browser.

C.

The user is probably lacking the Access permission.

D.

None of the above.

Full Access
Question # 15

In SteelCentral Portal, reports can be created in these ways:

A.

Use out of the box report templates

B.

Export any dashboard to PDF

C.

With a right-click operation

D.

All of the above

Full Access
Question # 16

In the Cascade Profiler, what best describes a “Host Group”?

A.

A logical collection of IP Addresses that can be grouped by region, application, and function.

B.

A set of netflow collectors.

C.

NetFlow senders.

D.

A group of Ports.

E.

A collection of MAC Addresses.

Full Access
Question # 17

What is the proper way to install and license Cascade Pilot? (Select 2)

A.

Ensure Internet connectivity and activate the application online during installation.

B.

Install the application and activate it through the phone.

C.

Install the application on your Linux or Windows system and then launch it.

D.

Install the application on your Windows machine and then launch it.

Full Access
Question # 18

A filter can be created in Cascade Pilot:

A.

By importing a display or capture filter from Wireshark.

B.

By saving the filter applied in a View.

C.

Only when you are connected to a Cascade Shark.

D.

Only before applying a View.

Full Access
Question # 19

If there are multiple network devices reporting flow data to Cascade and two devices report flow records for the same TCP connection, what will Cascade report?

A.

The traffic will be double counted.

B.

Cascade will discard one of the flow records.

C.

If both flows types are the same (e.g. NetFlow) Cascade will de-duplicate the records but if they are of different flow types, one record will be discarded.

D.

Cascade will de-duplicate and consolidate the flow records regardless of source and flow type.

E.

This is not possible.

Full Access
Question # 20

Which technology can be used to determine that a TCP Reset has been sent from a server to client?

A.

Packet Collection Only

B.

Flow Collection Only

C.

SNMP Statistics Only

D.

Flow Collection or Packet Collection

E.

SNMP Statistics or Packet Collection

Full Access
Question # 21

What version of Windows is/are supported by the Cascade Active Directory Connector? (Select 2)

A.

NT 4.0

B.

Windows Server 2003

C.

Windows Server 2008

D.

Windows Server 2005

E.

A & D

Full Access
Question # 22

When using CX-Tracer Module, specific ICA metrics can be obtained for which environment?

A.

XenApp

B.

Any of them, but an agent on Citrix servers needs to be installed

C.

NetScaler

D.

XenDesktop

Full Access
Question # 23

What is the maximum number of flows that can be sent from a remote Cascade device (Sensor/Gateway) to an Cascade Express Profiler?

A.

25,000 flows per minute

B.

50,000 flows per minute

C.

As many flows as can be collected from up to 5 other devices

D.

100,000 flows per minute

E.

Limited by the Cascade Profiler license limit

Full Access
Question # 24

Which product category is Cascade likely to be included within? (Select 3)

A.

Fault Management

B.

Application Performance Management (APM)

C.

Network Behavior Analysis (NBA)

D.

Flow based Network Monitoring and Analysis

Full Access
Question # 25

How do you configure a new user for the Cascade Shark appliance?

A.

From the User Management section of the Web Interface

B.

From the Basic Settings page of the Web Interface

C.

From the Users menu of Cascade Pilot

D.

From the Advanced Settings page of the Web Interface

Full Access
Question # 26

A trace clip created with Cascade Pilot is:

A.

A packet capture (pcap) file that is open on the local file system for analysis by Cascade Pilot.

B.

A packet capture (pcap) file that is exported on to the Cascade Shark OS disk for analysis by Cascade Pilot.

C.

A capture job that is suspended or stopped.

D.

A time filter into a job trace.

Full Access
Question # 27

Cascade provides benefits in which of the following areas?

A.

WAN optimization, WAN shaping, QoS Policy enforcement

B.

WAN management, Application Performance, Data Center management

C.

Reporting, Asset Inventory, Ticketing

D.

SNMP Trap collection, Log consolidation, Correlation

Full Access
Question # 28

A SPAN port or Port Mirror is:

A.

A technique used to send Flow data from a switch or router.

B.

A technique used to copy packet data traversing a switch or router to a packet capture device from a passively monitoring port on the switch or router.

C.

A technique used to connect into a live link in a network using a network-tap in order to send all packet data traversing the live link to a packet capture device.

D.

A technique for placing a link on a switch or router in loopback mode for troubleshooting purposes.

Full Access
Question # 29

The correct Profiler to use for a deployment with 800K flows per minute would be:

A.

Cascade Express 100

B.

Cascade Express 300

C.

Cascade Standard series

D.

Cascade Enterprise series

Full Access
Question # 30

Where are Application Names used within the Cascade Profiler GUI?

A.

On Dashboards

B.

In Reports

C.

In User Defined Policies

D.

In Application Performance Policies

E.

All of the above

Full Access
Question # 31

On the Cascade Profiler using Switch Port Discovery, under switching setup, the device type can be the following. (Select 2)

A.

Smart Switch

B.

Switch

C.

Lookup Router

D.

Hub

Full Access
Question # 32

Which of the following pieces of information is required when configuring an Cascade Enterprise Profiler?

A.

BGP AS number

B.

IP address of Sensor

C.

Default gateway of Internet router

D.

Subnet mask for entire corporate network

E.

Subnet mask for all Cascade Enterprise Profiler modules

Full Access
Question # 33

What is a benefit of Cascade’s Deep-Packet Inspection? (Select 4)

A.

Cascade can determine every URL that a client goes to out on the internet.

B.

Cascade can identify applications at Layer7 which will aid in determining business versus non-business use-age of resources.

C.

Cascade can identify applications that use multiple common ports based upon Layer7 to more readily track application dependencies.

D.

Cascade can be configured with URLs, match those URL’s to application names and, in order to understand which applications are utilized on web servers that host multiple web applications over the same TCP port.

E.

Cascade can identify unencrypted applications such as FTP and TELNET regardless of port number, and other applications (such as Peer to Peer) that may violate a company’s security policies.

Full Access
Question # 34

Which of the following can Flow Gateway not do?

A.

Roll remote devices via SNMP at the request of NetProfiler.

B.

Process up to tens of millions of raw flows per minute.

C.

Provide analysis of incoming flows and identify anomalies in traffic patterns.

D.

Selectively forward flows from original sources to third party colectors.

E.

Selectively forward flows from original sources to NetProfiler(s).

Full Access
Question # 35

The trending/indexing setting on the Cascade Shark appliance apply to:

A.

A specific capture job

B.

All the capture jobs

C.

All the capture ports on the appliance

D.

A specific capture port on the appliance

Full Access
Question # 36

An interactive view within Cascade Pilot is:

A.

A downloadable customized view from the online Cascade community.

B.

Any view that is applied to live devices and dynamically updated.

C.

A view that can be created after drill-down from one view to another.

D.

Any view that was created by applying a traffic filter.

E.

All views within Cascade Pilot are considered interactive views.

Full Access
Question # 37

In the Cascade Profiler GUI, what best describes a Dashboard?

A.

A set of graphs showing top interfaces, top hosts, top users, and top protocols from which you can run reports.

B.

A configurable set of content blocks for watched and top items (items including hosts, network interfaces, ports, protocols, and applications), which are updated with current information and from which you can run reports.

C.

A configurable set of connection graphs for watched and top items (items including hosts, network interfaces, ports, protocols, and applications), which are updated with current information and from which you can run reports

D.

A configurable set of fixed logarithmic graphs for watched and top items (items including hosts, network interfaces, ports, protocols, and applications), which are updated with current information and from which you can run reports.

Full Access
Question # 38

Which of the following is a supported alerting mechanism for events?

A.

BGP

B.

Windows Messenger

C.

SMTP

D.

IM

E.

Skype

Full Access
Question # 39

NetProfiler allows you to build maps of an application and monitor the interactions between application components.

What are these cold?

A.

User Defined Policies

B.

SNMP Polling

C.

Dashboards

D.

Services

E.

Navigate Network

Full Access
Question # 40

What are the primary differences between an Express and Standard Profiler?

A.

There is no difference between an Express and Standard Profiler.

B.

An Express Profiler has the option only for a built-in Sensor and cannot receive flow data.

C.

A Standard Profiler has the option only for a built-in Sensor and cannot receive flow data.

D.

An Express Profiler can handle more flows per minute then a Standard Profiler.

E.

An Express Profiler has a built in Sensor and Gateway.

Full Access
Question # 41

If the status in a SteelCentral Portal Application Map does not show colors, this is likely because:

A.

Manually created hosts are not monitored

B.

Manually created relationships are not monitored

C.

Thresholds need to be set

D.

All of the above

Full Access
Question # 42

What are the types of content blocks available to view “Events” on the Cascade Profiler dashboard? (Select 2)

A.

Security Events

B.

Performance and Availability Events

C.

Current Events

D.

Unacknowledged Events

E.

Public Events

F.

Private Events

G.

Per User Events

Full Access
Question # 43

Host Name Resolution can be modified in Configuration/UI Preferences. What are the three choices that you can select for resolution? (Select 3)

A.

Resolve host names using DNS

B.

Resolve host names using /etc/hosts

C.

Resolve host names for hosts managed by DHCP

D.

Suppress DHCP/DNS search domains (ce.lab.nbttech.com,nbttech.com) from resolved hosts

Full Access
Question # 44

For Cascade Profiler, Where can a user customize which recipients (SMTP and/or SNMP) are alerted when different severity events from different policies are triggered?

A.

In UI preferences

B.

In behavior analysis - policies

C.

In behavior analysis - notifications

D.

In behaviors analysis - events

E.

In configuration - general settings

Full Access
Question # 45

Authentication mechanisms supported by the Cascade Profiler arE. (Select 2)

A.

Local user accounts

B.

Active Directory

C.

TACACS+

D.

RADIUS

E.

LDAP

Full Access
Question # 46

What must be considered when sizing a Cascade Shark appliance? (Select 3)

A.

Write-to-disk speed

B.

NetFlow consumption rate required

C.

Protocol support required

D.

Capture port types required

E.

Packet storage required

Full Access
Question # 47

In the Cascade Profiler GUI, where can you map a name to the combination of IP Address and TCP Port Number?

A.

Definitions->Host Groups

B.

Definitions->Applications

C.

Definitions->Port Groups

D.

Definitions->Port Names

E.

Integration->Switch Port Discovery

Full Access
Question # 48

Alerts triggered in Cascade Profiler are distributed to recipients by Cascade Profiler using which mechanism(s):

A.

None, alerts are accessible via the Cascade GUI only

B.

SNMP traps only

C.

SMTP email only

D.

Pager only

E.

One of SMTP email or SNMP trap but not both

F.

SNMP traps and SMTP mail, each one optional, both allowed

Full Access
Question # 49

User Interface Preferences give users the ability to: (Select 3)

A.

change the Navigation Bar Position.

B.

change were reports are saved on Profiler.

C.

change data unit from Bytes to Bits.

D.

change user Time Zone.

E.

search for lost templates.

Full Access
Question # 50

Which technologies can be used to determine that a client’s TCP Window size has shrunk to zero?

A.

Packet Collection Only

B.

Flow Collection Only

C.

SNMP Statistics Only

D.

Flow Collection or Packet Collection

E.

SNMP Statistics or Packet Collection

Full Access
Question # 51

To leverage the AppResponse Citrix Module, you must install a collection agent.

What Citrix product does the agent run on?

A.

XenApp

B.

XenDesktop

C.

Apache

D.

VDI

Full Access
Question # 52

NetExpress provides a good solution in which of the following environments?

A.

NetExpress is only good for extremely tiny enterprises with a few hundred hosts that want a single, company-wide visibility monitoring solution.

B.

Small enterprises with a few thousand hosts that want a single, company-wide visibility monitoring solution.

C.

Large enterprises with hundreds of thousands of hosts that want a single, company-wide visibility monitoring solution.

D.

NetExpress is a good solution for any sized organization that want a single, company-wide visibility monitoring solution.

E.

Medium-size enterprises with tens of thousands of hosts that want a single, company-wide visibility monitoring solution.

Full Access
Question # 53

How do you verify that the Cascade Profiler has been successfully installed and configured?

A.

Go to the Dashboard page and verify that the graphs display data.

B.

Go to the System->Information page and assure that all status indications (System and Component, DNS Server) are displaying OK.

C.

Go to the System->Devices/Interfaces page and assure that each data source that is expected to be available is listed and that no status indicators are red.

D.

Go to the Reports->Traffic page. Near the bottom of the Report Criteria section, click Run now. Verify that a traffic report is displayed.

E.

All of the Above

Full Access
Question # 54

To drill down and analyze a file within Cascade Pilot, you should. (Select 2)

A.

Select a graphic object in a View chart, and drag a View on the object.

B.

Select a graphic object in a View chart, and drag a View on the trace file.

C.

Select the View, right-click, and apply it with the filter associated with a graphic object.

D.

Right-click in the View chart, and select "Drill-down" to select the View.

Full Access
Question # 55

NetProfiler provides a view of what is occurring on a network at what level of detail?

A.

Packet-level detail with microsecond-level details.

B.

Flow-level detail with one-minute level details.

C.

Packet-level detail with nanosecond-level details.

D.

Flow-level details with nanosecond-level details.

E.

Packet-level detail with one-minute level details.

Full Access
Question # 56

When you create a trace clip with Packet Analyzer, the packets are selected from the Job Trace and copied to a new repository in the remote probe.

A.

TRUE

B.

FALSE

Full Access
Question # 57

Outgoing Mail Server (SMTP) Settings enable Cascade Profiler to: (Select 2)

A.

receive mail from others.

B.

send reports.

C.

send disk failure notifications.

D.

send alerts.

Full Access
Question # 58

How many Cascade Shark appliances can be accessed by a single Cascade Pilot license?

A.

2

B.

10

C.

100

D.

No limit

Full Access
Question # 59

Company X wants to incorporate SPAN port monitoring into its Cascade deployment. An important point they should consider is to:

A.

Ensure the Cascade Gateway’s monitor interface is receiving packets from the SPAN destination interface.

B.

Ensure the Cascade Sensor’s monitor interface is receiving packets from the SPAN destination interface.

C.

Set the Cascade Sensor’s monitor interface to the same VLAN as the SPAN destination interface.

D.

Set the Cascade Gateway’s monitor interface to the same VLAN as the SPAN destination interface.

E.

Set the SPAN destination interface the same as at least one source interface to ensure complete coverage.

Full Access
Question # 60

If you needed to replicate flow from a router and forward it in its native format to additional flow collectors, which Cascade device would you use?

A.

Sensor

B.

Express

C.

Shark

D.

Gateway

E.

Gateway-VE

Full Access
Question # 61

In a mixed Windows 2003 and Windows 2008 domain environment, what are the options for setting up Active Directory (AD) integration with Cascade? (Select 2)

A.

You must run only a single version of the AD connector program.

B.

Install the AD Connector 1.5 on all domain controllers.

C.

Install the appropriate version of the AD Connector on each domain controller.

D.

Install the AD Connector v2.0 on all domain controllers.

E.

Install the AD Connector v2.0 on an Event Collector host.

Full Access
Question # 62

Refer to the exhibit.

201-01 question answer

Under Accounts, the admin user can have the Actions options of Audit, Edit, Copy, Delete and Disable. What are the Actions that a RAIDUS User can have?

A.

Audit, Edit, Copy

B.

Audit, Edit, Copy, Delete

C.

Audit, Edit, Copy, Delete, Disable

D.

Audit, View, Delete Disable

Full Access
Question # 63

What are the Cascade Profiler Alert Levels?

A.

Low and High

B.

Emergency, Critical, Alert, Error, Warning, Notice, Informational, and Debug

C.

Critical, Warning, and Informational

D.

System Down, System Impaired, Attack, SLA/SLO Violation, and Security Policy Violation

E.

Low, Med, and High

Full Access
Question # 64

What piece of information is provided to Cascade Profiler from a Cascade Sensor that is not provided to Cascade Profiler from a Cascade Shark appliance?

A.

Response Time

B.

Layer 4 Application Classification Mapping

C.

Layer 7 Application Classification Mapping

D.

Network Throughput

E.

Network Round Trip Time

Full Access
Question # 65

Cascade Profiler flow logs can be stored on which of the following?

A.

SAN and Local Disk Storage

B.

SAN only

C.

Local Gateway-Storage

D.

Hard Drive and Ethernet or USB-attached NAS

E.

Local only

Full Access
Question # 66

What is an initiative with which Cascade can help? (Select 3)

A.

WAN Optimization

B.

Data Center Consolidation

C.

Router Configuration Management

D.

Firewall Audit

Full Access
Question # 67

From Cascade Pilot, reports may include:

A.

One or all views from the main workspace.

B.

Notes entered associated with a view.

C.

Analyst and Client information entered.

D.

A and B.

E.

A, B and C.

Full Access
Question # 68

The best definition of a Host Scan is:

A.

When one host on the network attaches to a network printer-scanner device and is able to exploit the printer-scanner to download all material scanned on the device.

B.

When one host on the network is infected with malware and the malware scans all of the files resident on the infected system looking for exploits.

C.

When several hosts on the network send a high volume of traffic to a single host to try to exhaust the resources of the host.

D.

When one host on the network send ping packets or other packet types to multiple other devices on the network to determine which hosts are available for further exploit.

Full Access
Question # 69

Cascade Profiler is able to report traffic using two different approaches (centricities). Two approaches can result in different results when using the same report criteria due to the way data is aggregated and counted. What are these two approaches? (Select 2)

A.

Interface centric

B.

Application centric

C.

Host centric

D.

Port centric

E.

The Cascade Profiler does not have two approaches

Full Access
Question # 70

If one has a Service Health dashboard widget included on a dashboard, will all newly created Services automatically appear on that dashboard widget?

A.

Yes, always.

B.

It depends on whether all of the segments initialize their baseline.

C.

It depends on what criteria was used when defining the dashboard widget.

D.

It depends on which user defined and committed the Service.

E.

It depends on how many Services have already been configured.

Full Access
Question # 71

How do you perform the initial Cascade Shark appliance configuration during installation? (Select 3)

A.

Through the serial port.

B.

Through a keyboard and monitor connected to the appliance.

C.

Through the Cascade Shark appliance Web Interface using the default Cascade Shark appliance IP Address.

D.

Through the Cascade Shark appliance Web Interface if the IP address of Cascade Shark appliance is assigned through a DHCP server.

Full Access
Question # 72

One of the theories behind NetProfiler Services is:

A.

Many organizations do not know all the aspects of a given application or service they provide, which makes it difficult to fully map that service and monitor it from end to end. NetProfiler has visibility into many different areas and can often see connections used by different parts of a service that may be unknown to different administrators. This visibility allows NetProfiler to identify all the different components of a service and prov

B.

When monitoring an application, it is often necessary to think of that application as a service instead of an application. By utilizing NetProfiler Services, you are able to take your application and easily convert it to a service. This conversion allows you to treat the application differently so it can be more effectively monitored.

C.

Applications are large and complex and often traverse different groups within a single organization. Without the concept of a service in NetProfiler, it would not be possible to monitor the traffic from a single application since each group would have no purchase their own NetProfiler to monitor their individual aspect of the application.

D.

None of the above.

Full Access
Question # 73

Which of the following statements is true regarding SNMP polling and NTP syncing among Cascade components?

A.

Cascade Gateway’s poll Netflow sources via SNMP, while Cascade Profiler, Cascade Gateway and Cascade Sensor sync NTP from a common source.

B.

Cascade Profiler’s poll Netflow sources via SNMP, while Cascade Profiler, Cascade Gateway and Cascade Sensor sync NTP a common source.

C.

Cascade Profiler’s poll Netflow sources via SNMP, while Cascade Profiler is the NTP source for Cascade Gateways and Cascade Sensors.

D.

Cascade Gateway’s poll Netflow sources via SNMP, while Cascade Profiler is the NTP source for Cascade Gateways, Cascade Sensors and Cascade Sharks.

E.

SNMP polling is not supported in Cascade.

Full Access