Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

299-01 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

299-01 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Riverbed Certified Solutions Professional - Network Performance Management
  • Last Update: May 6, 2024
  • Questions and Answers: 245
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

299-01 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

299-01 Practice Exam Questions with Answers Riverbed Certified Solutions Professional - Network Performance Management Certification

Question # 6

Which version of SNMP is supported for Switch Port Discovery on Cascade Profiler?

A.

SNMPv1 Only

B.

SNMPv2 Only

C.

SNMPv1 and SNMPv2

D.

SNMPv1 and SNMPv3

Full Access
Question # 7

A strip chart within Cascade Pilot shows data points:

A.

According to the Cascade Pilot time zone.

B.

According to the time zone of the Cascade Shark to which you are connected.

C.

According to Cascade Pilot time zone or optionally, to the Cascade Shark time zone as well.

D.

According to UTC.

Full Access
Question # 8

Which of the following are true about Trend/Index data on a Cascade Shark appliancE. (Select 3)

A.

Allows Cascade Pilot to load views that take advantage of the Index more quickly.

B.

Includes the number of bytes and packets for each conversation seen by the Cascade Shark appliance.

C.

It is configured on a per-port basis.

D.

It is configured using the sa-wizard as part of the initial configuration.

E.

It is enabled by default per capture job.

Full Access
Question # 9

You can analyze data on Cascade Pilot received from live interfaces iF. (Select 2)

A.

Cascade Pilot is started with administrator privileges.

B.

Cascade Shark is configured to show capture ports.

C.

You apply a View to the interface and create a Watch on Web traffic.

D.

You have privileges to do so in your user profile.

Full Access
Question # 10

Cascade Profiler is able to report traffic using two different approaches (centricities). Two approaches can result in different results when using the same report criteria due to the way data is aggregated and counted. What are these two approaches? (Select 2)

A.

Interface centric

B.

Application centric

C.

Host centric

D.

Port centric

E.

The Cascade Profiler does not have two approaches

Full Access
Question # 11

Time Control within Cascade Pilot is used for:

A.

Controlling the portion of a packet capture (pcap) file analysed in the current view.

B.

Creating a trace clip from a Cascade Shark appliance Capture job.

C.

Controlling the size of a Capture Job created on a Cascade Shark appliance.

D.

A and B

E.

A, B, and C.

Full Access
Question # 12

Which configuration option is it highly recommended that every Cascade Profiler Deployment implement?

A.

Host Baseline Profiles

B.

Custom Port Definitions

C.

Host Groupings

D.

Mitigation Configuration

E.

Firewall Configuration

Full Access
Question # 13

What is the maximum number of custom applications that can be defined on a Cascade Profiler?

A.

Yes, 25

B.

Yes, 50

C.

Yes, 100

D.

Yes 500

E.

No Limit

Full Access
Question # 14

Additional data sources that Cascade Profiler can leverage besides flow data arE. (Select 3)

A.

Active Directory information for successful/failed login association to IPs

B.

DHCP for host IP to MAC address association.

C.

SNMP polling to routers, switches, and servers for CPU information.

D.

SNMP trap data from routers, switches, and servers for security events.

E.

SNMP polling to routers and switches for MAC address and physical switch port association.

Full Access
Question # 15

In Cascade, how are custom Layer 7 applications configured?

A.

On the Sensor, you must define either a hex string, text string, or URL.

B.

On the Profiler, you must define either a hex string, text string, or URL.

C.

On the Gateway, you must define either a hex string, text string, or URL.

D.

You have to first enable security analytics on the Profiler, then you define either a string or URL on either the Profiler or the Sensor.

E.

Custom applications cannot be defined, but the Sensor can identify most off-the-shelf programs.

Full Access
Question # 16

What can be configured on the Cascade Profiler to detect utilization for an interface? (Select 2)

A.

Manually configure the interface speeds on the Devices/Interfaces page.

B.

Configure and enable SNMP access to the reporting devices on the Devices/Interfaces page.

C.

Enable NBAR on the routers.

D.

Check the "Interface Utilization" box under the Devices/Interfaces page for each router and/or Steelhead desired.

E.

Configure the appropriate Device Interface Analytic.

Full Access
Question # 17

Before running your first report on Cascade Profiler after installation, where is the best place to go to verify traffic flows are currently being received?

A.

System Information > Devices/Interfaces

B.

System Information > Profiler

C.

Dashboard

D.

Log in to the shell and view the /usr/mazu/var/log/Sensor.log

E.

Ping devices on UDP port 2055 to see if they are up and running

Full Access
Question # 18

In Cascade Profiler, what is the minimum amount of historical flow data required for an Application Performance analytic to initialize?

A.

Three weeks

B.

Three days

C.

One day

D.

Configurable from one minute to three weeks

Full Access
Question # 19

On Cascade Profiler, Which of the following behavioral analytic policy types are available in CascadE. (Select 3)

A.

Application performance

B.

Link performance

C.

Host performance

D.

Application availability

E.

Service level performance

F.

Conformance verification

G.

Link congestion

Full Access
Question # 20

On Cascade Profiler, in terms of retention of completed reports and reporting sources (one minute flow and rollup files), which of the following is true? (Select 4)

A.

One minute flow records are deleted from the file system FIFO (oldest first) once the appliance has filled the space that is allocated.

B.

There is a fixed amount of space on the filesystem for completed reports.

C.

A report template can be marked "keep until I delete it" so that any reports that are scheduled with this template are not automatically deleted from the filesystem.

D.

When the flows or rollup records have been deleted from the filesystem, any saved report that was generated from those flow sources is no longer available.

E.

Users have the ability to allocate additional space to the 1 min flow logs in order to increase retention. This is done at the expense of other rollup resolutions.

Full Access
Question # 21

On an Enterprise Profiler, which Cascade software module usually runs on hardware with another software module, but can be placed on its own hardware to support extremely large clusters?

A.

Event Manager

B.

Dispatcher

C.

User Interface

D.

Database

Full Access
Question # 22

What is the maximum number of custom applications (Layer 4 and 7 combined) permitted to be defined on a single Cascade Profiler?

A.

50

B.

75

C.

100

D.

125

E.

Unlimited

Full Access
Question # 23

Cascade Profiler's Switch Integration feature uses SNMP and adds the capability for Cascade to report on which of the followinG. (Select 2)

A.

User name

B.

Host IP address

C.

Host MAC address

D.

The physical switch port a specific host is connected to

E.

Switch port traffic levels

F.

Switch port status

G.

SNMP traps from the switch

Full Access
Question # 24

What is a benefit that Cascade Profiler might provide to Security Operations? (Select 3)

A.

Ability to identify Scanners and Worm Propagations.

B.

Ability to provide information for a firewall rule when a user defined policy is violated.

C.

Ability to alert on security policy (e.g. an insecure policies, such as FTP, is in use).

D.

Ability to identify Worms by name.

Full Access
Question # 25

Which of the following best describes any limits that are enforced on the number of service, performance and availability policies that are supported on any Cascade Profiler?

A.

Stratified policy limits ranging from 5000 for Cascade Profiler Express platforms to 10,000 for Cascade Enterprise Profiler platforms

B.

5,000 for all platforms

C.

15,000 for all platforms

D.

The Analytics license provides for an unlimited number of policies

E.

None of the above

Full Access
Question # 26

How many Host Group Types can be tracked on the Dashboard within the Cascade Profiler GUI?

A.

Unlimited

B.

Ten

C.

Four

D.

Twenty

Full Access
Question # 27

Assume five different devices reported the same flow/conversation to the Cascade Profiler – two Riverbed Steelheads, two routers, and a Cascade Sensor in the data center. For a query that looks only for all traffic between the client and server (i.e., no devices or interfaces were specified on the query), what bandwidth and packet values will be reported?

A.

The smallest bandwidth and packet count recorded by the five devices.

B.

The largest bandwidth and packet counts recorded by one of the interfaces on one of the five devices.

C.

The mean bandwidth and packet count recorded by the five devices.

D.

The highest LAN packet count recorded by either Steelhead.

E.

None of the above – the flow records store only the first byte and packet count reported by any of the reporting devices.

Full Access
Question # 28

The Cascade Profiler authenticates users before logging them in. What are the possible choices for authentication? (Select 3)

A.

Cascade Profiler local database

B.

User account specifies authentication by RADIUS

C.

TACACS

D.

RADIUS server to authenticate the user

Full Access
Question # 29

How does Cascade Profiler obtain switch port discovery and population information?

A.

Switch Port Discovery Protocol (SPDP)

B.

Merging of CAM + ARP tables, both gathered via SNMP

C.

Merging of IF and ARP tables, both gathered via SNMP

D.

Merging of IF and CAM tables, both gathered via SNMP

Full Access
Question # 30

When changing the priority for a Layer 4 mapping on Cascade Profiler best practices indicate that Application Mappings should be given higher priorities based on:

A.

Longest Match

B.

Shortest Match

C.

IP & Port

D.

IP

Full Access
Question # 31

Which of the following types of hosts are included in Cascade grouping on Cascade Profiler?

A.

Internal hosts only

B.

External hosts only

C.

All hosts

D.

Internal and External hosts only

E.

Specified internal hosts plus the non-routable subnets

Full Access
Question # 32

Which TCP port is used for Cascade Profiler web based management interfaces?

A.

80/tcp

B.

8080/tcp

C.

8090/tcp

D.

443/tcp

E.

22/tcp

Full Access
Question # 33

In order to create an interactive view on Cascade Pilot:

A.

Select two views from the views panel using control-click then right click on one and select "Create Interactive View" from the drop-down menu.

B.

After a Drill-Down from one view to another, right click on the Drill-Down view in the sources panel and select "Create Interactive View" from the drop-down menu.

C.

Select any item (such as a host IP Address, Port or Protocol name) in the main workspace and right click on the item, then select "Create Interactive View" from the drop-down menu.

D.

Select any view in the views panel, right-click it and select "Create Interactive View" from the drop-down menu.

E.

Open the filters panel, apply an existing or new filter to the view then select "save as interactive view" from the home menu.

Full Access
Question # 34

Which of the following configuration changes can be used to reduce the number of alerts generated overall for a Service?

A.

Edit each Service policy to increase the Tolerance slider for Low and High alerts.

B.

Edit each Service policy and set a noise floor to specify the minimum amount of change that the policy can treat as deviation from normal behavior.

C.

Edit the Service and select fewer metrics to monitor for each segment that comprises the Service.

D.

Modify the location host group type used for monitoring end user traffic to use fewer groups (for example, Region instead of Site).

E.

A, B, C, and D.

F.

A and B only.

Full Access
Question # 35

In this scenario, you have created a host group called My_Computers on Cascade Profiler. In that group you have included the subnet 192.168.1.0/25.

You have 10 devices in that group 192.168.1.1-10. The rest of the addresses are unused. While running reports on this segment of the network you notice that when a report is run using the entire subnet you see traffic destined for 192.168.1.120. When you run the same report specifying the host group the traffic does not appear. Why is this happening?

A.

192.168.1.120 is not in the 192.168.1.0/25 subnet

B.

192.168.1.120 has been input as a trusted host in a security policy

C.

Traffic to 192.168.1.120 was not picked up by a Sensor

D.

Traffic to 192.168.1.120 was not picked up by a Gateway

E.

192.168.1.120 never sent any traffic

Full Access
Question # 36

In the Cascade Profiler GUI, where can you mark a TCP port as a Server Port?

A.

Definitions->Host Groups

B.

Definitions->Applications

C.

Definitions->Port Names

D.

Definitions->Port Groups

E.

Integration->Switch Port Discovery

Full Access