Pre-Winter Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

299-01 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

299-01 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Riverbed Certified Solutions Professional - Network Performance Management
  • Last Update: Oct 8, 2024
  • Questions and Answers: 245
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

299-01 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

299-01 Practice Exam Questions with Answers Riverbed Certified Solutions Professional - Network Performance Management Certification

Question # 6

Additional data sources that Cascade Profiler can leverage besides flow data arE. (Select 3)

A.

Active Directory information for successful/failed login association to IPs

B.

DHCP for host IP to MAC address association.

C.

SNMP polling to routers, switches, and servers for CPU information.

D.

SNMP trap data from routers, switches, and servers for security events.

E.

SNMP polling to routers and switches for MAC address and physical switch port association.

Full Access
Question # 7

What best describes the Rebalance and Reallocate buttons on the Configuration/Flow Log page of the Cascade Profiler? (Select 2)

A.

Rebalance moves flows among analysers in a Cascade Enterprise Profiler.

B.

Reallocate varies the storage space dedicated for templates and saved reports.

C.

Rebalance optimizes the use of the allocated space that allows you to get a longer retention time out of the same amount of disk space.

D.

Reallocate allows the users to decide the percent of total disk storage capacity that is allocated to the various flow logs.

E.

Rebalancing and Reallocating must be done simultaneously.

Full Access
Question # 8

Which of the following will result in RTT values not being available for a flow? (Select 2)

A.

UDP flow

B.

TCP flow

C.

An RST after the fifth data packet

D.

Retransmitted ACK's

E.

Retransmitted FIN's

Full Access
Question # 9

For a TCP conversation that is non-optimized but being reported by a branch Steelhead appliance, the data center Steelhead appliance, and a data center Cascade Shark appliance, how is the Network RTT calculated?"

A.

The network setup (time between SYN to 1st ACK) is added together across the three segments: client to branch Steelhead appliance, branch Steelhead to DC Steelhead appliance, DC Steelhead appliance to the Server.

B.

The Server Delay time minus the Client Delay time.

C.

The top talker (server) that has sent the most data.

D.

The network setup time reported by the Cascade Shark appliance, which is the time between the reported client-->server SYN and the 1st client-->server ACK.

Full Access
Question # 10

When saving a new application performance analytic on Cascade Profiler, which of the following is true?

A.

You must have at least three days of history of 15 minute rollups before saving the analytic.

B.

You must have at least three days of history of 15 minute rollups before the analytic initializes.

C.

If you include all possible metrics, but there is no possibility of measuring response time due to lack of Sensor coverage, the analytic will fail to initialize.

D.

The analytic will not alert for a minimum of 1 week during baseline collection.

E.

Both B and C.

Full Access
Question # 11

Which DHCP Server Product(s) are supported with the Cascade DHCP integration?

A.

QIP

B.

ISC

C.

Infoblox

D.

Windows DHCP

E.

All of the above

F.

None of the above

Full Access
Question # 12

On a newly created capture job on Cascade Shark appliance, by default, trending/indexing arE. (Select 2)

A.

Enabled

B.

Disabled

C.

Set to retain up to 1 week or 10GB of indexing/trending data

D.

Set to retain up to 1 week or 10GB of packets

E.

Set to keep the indexing/trending data indefinitely

Full Access
Question # 13

For a worm security event to be triggered on Cascade Profiler, what event must have occurred first?

A.

Host Scan

B.

Port Scan

C.

Link Availability

D.

Suspicious Connection

E.

There is no event that triggers before a worm event.

Full Access
Question # 14

Which of the following types of hosts are included in Cascade grouping on Cascade Profiler?

A.

Internal hosts only

B.

External hosts only

C.

All hosts

D.

Internal and External hosts only

E.

Specified internal hosts plus the non-routable subnets

Full Access
Question # 15

Why should all flow exporting devices use the same NTP (Network Time Protocol ) source?

A.

Ensures Cascade is able to recreate the packets.

B.

Essential for the flow de-duplication process.

C.

Ensures the flow is delivered to the correct Gateway.

D.

All of the above.

E.

None of the above.

Full Access
Question # 16

What are the two types of dashboards available within the Cascade Profiler GUI? (select 2)

A.

Top Hosts

B.

Top Applications

C.

Public

D.

Private

E.

Devices and Interfaces Utilization

Full Access
Question # 17

Which of the following are TRUE concerning packet capture jobs on the Cascade Shark appliancE. (Select 4)

A.

Packets can be captured from multiple capture ports on one Cascade Shark appliance.

B.

The maximum length the packet data can be specified.

C.

Packets can be filtered on host IP addresses.

D.

SSL traffic can be decoded if the appropriate certificate are loaded in the Cascade Shark appliance.

E.

The maximum storage bandwidth for the job can be specified in bits/sec.

F.

Multiple packet capture jobs can run concurrently.

Full Access
Question # 18

Quality of Service information is obtained from what Cascade sources?

A.

Cascade Sensor only

B.

Cannot get QoS data on Cascade

C.

Cascade Sensor and Cascade Gateway

D.

CascadeFlow traffic only

E.

NetFlow and IPFIX traffic only

Full Access
Question # 19

When creating an analytic service, the discovery process requires a minimum of:

A.

At least three days of data available.

B.

At least three weeks of data available.

C.

The application specialist available.

D.

Some historical data and some starting point (a server, port, application).

E.

A customer network diagram available.

Full Access
Question # 20

How do all the Cascade components stay time synchronized?

A.

They all point to the same NTP server.

B.

The Profiler, ideally, points to an NTP server (although it can use local time as well), the Gateway and Sensor get their time information from the Profiler which acts as their NTP Server.

C.

For security reasons, all components use local time. The same time should be set on each component.

D.

They all synchronize their time via timestamps in Netflow sources.

Full Access
Question # 21

What report on Cascade Profiler would be used to show both sides of a conversation and the ports they communicated on?

A.

Peers

B.

Peers and Ports

C.

Host Pairs

D.

Ports

E.

Host Pairs and Ports

Full Access
Question # 22

If you have a Steelhead at a branch office, and if there is only one device you are allowed to collect flow data from, which device would be the best choice, if visibility of data before and after optimization and reporting on data reduction is important?

A.

Steelhead

B.

CE router

C.

PE router

D.

Netflow-enable hosts

Full Access
Question # 23

Link Congestion policies apply to a specific interface and can: (Select 3)

A.

Warn if either inbound or outbound traffic increases abnormally

B.

Warn if an application component of traffic increases abnormally

C.

Warn if traffic to/from specific hosts exceeds a specific utilization level

D.

Warn if the response time across a link increases abnormally

Full Access
Question # 24

Technologies used for switching traffic between Virtual Machines under ESXi include:

A.

Traffic between Virtual machines is not switched; it is routed by the standard vRouter included with ESXi

B.

A standard or distributed vSwitch which comes with ESXi must be used, there is not 3rd party software available

C.

A 3rd party virtual switch is required such as the CISCO Nexus 1000v as no standard vSwitch exists with ESXi

D.

The included standard vSwitch of the CISCO Nexus 7000

E.

The included standard vSwitch or the CISCO Nexus 1000v

Full Access
Question # 25

Simple Network Management Protocol can be used on Cascade Profiler for:

A.

Accessing the Cascade Profiler's MIB by third-party applications for monitoring.

B.

Obtaining interface information from routers.

C.

Obtaining host MAC address information from switches.

D.

Obtaining network device status through the Cascade Profiler receiving SNMP traps.

E.

A, B, and D.

Full Access
Question # 26

An interactive view within Cascade Pilot:

A.

Can be created from a single applied View.

B.

Can work on local trace files only.

C.

Can include more than two charts.

D.

Is not available in the regular Cascade Pilot installation.

Full Access
Question # 27

Cascade Profiler's Switch Integration feature uses SNMP and adds the capability for Cascade to report on which of the followinG. (Select 2)

A.

User name

B.

Host IP address

C.

Host MAC address

D.

The physical switch port a specific host is connected to

E.

Switch port traffic levels

F.

Switch port status

G.

SNMP traps from the switch

Full Access
Question # 28

Filtering in Cascade Pilot: (Select 2)

A.

Is either a BPF or Wireshark Display filter only.

B.

Can be created from a chart.

C.

Can be changed after applying a View.

D.

Is the equivalent of the Wireshark "display filter input".

Full Access
Question # 29

In order to create an interactive view on Cascade Pilot:

A.

Select two views from the views panel using control-click then right click on one and select "Create Interactive View" from the drop-down menu.

B.

After a Drill-Down from one view to another, right click on the Drill-Down view in the sources panel and select "Create Interactive View" from the drop-down menu.

C.

Select any item (such as a host IP Address, Port or Protocol name) in the main workspace and right click on the item, then select "Create Interactive View" from the drop-down menu.

D.

Select any view in the views panel, right-click it and select "Create Interactive View" from the drop-down menu.

E.

Open the filters panel, apply an existing or new filter to the view then select "save as interactive view" from the home menu.

Full Access
Question # 30

Which version of SNMP traps can the Cascade Profiler and Cascade Express send?

A.

SNMPv1 Only

B.

SNMPv2 Only

C.

SNMPv1 and SNMPv2

D.

SNMPv1 and SNMPv3

Full Access
Question # 31

The "Policies Usage" that is reported under System – Information pertains to which of the following:

A.

All Service-based application performance policies

B.

All Service-based policies plus all Performance and Availability analytic policies

C.

All Service-based policies plus all Performance and Availability analytic policies plus all User-Defined Policies

D.

All Service-based policies plus all Performance and Availability analytic policies plus all User-Defined Policies plus all Security policies

E.

None of the above

Full Access
Question # 32

In the Cascade Profiler Dashboard GUI, what types of content blocks can you create? (Select 4)

A.

Watched items (where items are hosts, interface, etc.)

B.

Top items (where items are hosts, interface, etc.)

C.

Top usernames

D.

Unacknowledged Events

E.

Current Events

F.

Last Day Events

Full Access
Question # 33

On the Cascade Profiler, which of the following is not a Scanner Choice under Vulnerability Scan Setup? (Select 2)

A.

Nessus

B.

Rapid7

C.

Qualys

D.

Retina

E.

nCircle

F.

MBSA

Full Access
Question # 34

Which of the following best describes any limits that are enforced on the number of service, performance and availability policies that are supported on any Cascade Profiler?

A.

Stratified policy limits ranging from 5000 for Cascade Profiler Express platforms to 10,000 for Cascade Enterprise Profiler platforms

B.

5,000 for all platforms

C.

15,000 for all platforms

D.

The Analytics license provides for an unlimited number of policies

E.

None of the above

Full Access
Question # 35

Which of the following capabilities are supported by the Cascade Sensor appliance but are not supported by the Cascade Sensor-VE RSP packagE. (Select 2)

A.

Network Round Trip measurement

B.

Packet logging

C.

Server Delay measurement

D.

Connection Throughput measurement

E.

Retransmission measurement

F.

L7 application fingerprint checking

Full Access
Question # 36

Which parameters can be used to set up an Application Performance analytic on Cascade Profiler?

A.

Applications, Ports/Protocols, QOS, Servers, Clients

B.

Ports/Protocols, QOS, Servers, Clients

C.

Applications, Ports/Protocols,

D.

Applications, Ports/Protocols, QOS, Servers, Clients, Interfaces

Full Access
Question # 37

Is there a way to look at who owns the Domain for an external IP Address shown in the Cascade Profiler GUI?

A.

No.

B.

Yes, you can do this with the "ARIN" lookup in "external links". The customer can also add additional external links if they have other sites they use to look up IP Addresses.

C.

This is available as a column in any report that displays the IP Address.

D.

This is available under IP Host Group Type.

Full Access
Question # 38

What mechanism does Cascade Profiler use to identify the switch port a host is attached to and the hosts associated MAC address?

A.

SNMP traps from the switches and routers

B.

NetFlow v9

C.

SNMP polling of the switches and routers

D.

All of the above

E.

None of the above

Full Access
Question # 39

When defining a service which of the following are supported ways of aggregating the results? (Select 2)

A.

Client Ports

B.

Applications

C.

Ports

D.

Server

Full Access
Question # 40

What is a benefit that Cascade Profiler might provide to Security Operations? (Select 3)

A.

Ability to identify Scanners and Worm Propagations.

B.

Ability to provide information for a firewall rule when a user defined policy is violated.

C.

Ability to alert on security policy (e.g. an insecure policies, such as FTP, is in use).

D.

Ability to identify Worms by name.

Full Access
Question # 41

If a report table on Cascade Profiler includes the "Server Delay" column but shows no value for "Server Delay" in some cells, what are the possible causes? (Select 3)

A.

The time span of the report does not cover any connection set-up points

B.

Server delay is zero.

C.

The protocol used by the application in not TCP-based.

D.

Application traffic was not seen by a Cascade Sensor.

E.

The server plug-in is needed to measure "Server Delay" and not functioning correctly.

Full Access
Question # 42

What are the sources of Layer7 Fingerprints as shown in the Cascade Profiler GUI? (Select 4)

A.

from the Cascade Sensor

B.

NetFlow

C.

NBAR

D.

Packeteer

E.

User Defined

F.

Enhanced sFlow

Full Access
Question # 43

Which of the following metrics can Cascade Profiler create dependency (Connection Graphs) for? (Select 3)

A.

Average drops

B.

Average retransmits

C.

Average response time

D.

Average utilization

E.

Total bandwidth bits

Full Access
Question # 44

When initializing data for service metrics or analytics, for what minimum percent of the time must relevant and valid data be present for the service to properly initialize?

A.

25%

B.

50%

C.

75%

D.

100%

E.

None of the above

Full Access
Question # 45

When using a Network Performance Management tool such as Cascade, TCP sessions can be observed as completed by observing:

A.

TCP Window size is observed as zero

B.

Buffering bits (zeros) are included in the last packet of the flow

C.

TCP is connectionless so there is no way to determine completion

D.

A RST or FIN flag is included in the flow

E.

A SYN or CPT flag is included in the flow

Full Access
Question # 46

Which of the following describes how a Cascade Gateway transfers flow data to a Cascade Profiler? (Select 2)

A.

It uses IETF's IPFIX protocol.

B.

Is uses whichever flow protocol it received the data on.

C.

It uses a proprietary compressed and encrypted connection.

D.

It sends data over SYSLOG port 514 which is compressed and encrypted via proprietary technology.

E.

It sends data over TCP/41017.

Full Access
Question # 47

When sending data from a Gateway or Sensor to a Profiler which ports must be opened between the devices? (Select 3)

A.

tcp/8443

B.

udp/123

C.

tcp/41017

D.

tcp/42999

E.

tcp/123

Full Access
Question # 48

What types of Layer-7 Application Signatures are available within the Cascade Profiler GUI? (Select 3)

A.

By URL

B.

By Regular Expression

C.

By Packet Start offset

D.

By ASCII String

E.

By Hex String

F.

By Error Code Type

Full Access
Question # 49

Within Cascade Pilot, Sequence Diagrams allow you to display information between two end points. You have a choice of displaying information for two different layers in the network stack. Descriptions of the sequence diagrams for the two Layers follow: (Select 2)

A.

Layer 1 information. For example, for Ethernet tap points this includes signal levels and attenuation.

B.

Layer 2 information. For example, for Ethernet with 802.1Q encapsulation this includes the VLAN identifier and frame size between MAC Addresses

C.

Layer 3 information. For example, for IPv4 this includes the protocol, time-to-live (TTL), and IP Identifier between IP Addresses

D.

Layer 4 Transport information. For example, for TCP this includes TCP flags, size in bytes, and sequence number between IP Addresses.

E.

Application header information. For example, for Web traffic this includes HTTP methods and message numbers (e.g. "200", "404").

Full Access
Question # 50

Cascade Profiler is able to report traffic using two different approaches (centricities). Two approaches can result in different results when using the same report criteria due to the way data is aggregated and counted. What are these two approaches? (Select 2)

A.

Interface centric

B.

Application centric

C.

Host centric

D.

Port centric

E.

The Cascade Profiler does not have two approaches

Full Access
Question # 51

On Cascade Profiler, Which of the following behavioral analytic policy types are available in CascadE. (Select 3)

A.

Application performance

B.

Link performance

C.

Host performance

D.

Application availability

E.

Service level performance

F.

Conformance verification

G.

Link congestion

Full Access
Question # 52

Within Cascade Pilot, a tool tip is available to provide additional information about items such as views. To access the tool tip for a view you must:

A.

Hover your mouse over the name of the view.

B.

Hover your mouse over the icon in front of the view name.

C.

Open context-sensitive help with the view displayed.

D.

Right-click within the main workspace and select "show view tool tip" from the right hand menu.

Full Access
Question # 53

Which Cascade device actually polls for the SNMP information in the switch port Discovery process?

A.

Application Sensor

B.

Gateway

C.

Profiler

D.

All of the above

E.

None of the above

Full Access
Question # 54

What protocol/port does the Gateway use to collect NetFlow?

A.

UDP, TCP, or SCTP on any defined port

B.

UDP only for any port or ports as defined by the operator

C.

UDP only for a single port as defined by the operator

D.

UDP and TCP for any port as defined by the operator

E.

UDP/2055

Full Access
Question # 55

Which configuration screen or screens are edited on the Cascade Shark to change names used by certain ports within various views on Cascade Pilot:

A.

Cascade Pilot Views Advanced Settings under the Settings menu

B.

Port/Protocols Names and Port/Protocols Groups under the Port/Protocol Definition menu

C.

Layer-4 Mappings and Application-Definitions under the Definitions menu

D.

Layer-4 Mappings under the Advanced Settings menu

E.

Defined as a BPF filter when configuring a Capture job

Full Access
Question # 56

When a Profiler or Enterprise Profiler receives flow over its licensed capacity what happens?

A.

Profiler/Enterprise Profiler is entered into ICE (In Case of Emergency) mode to add 20% flow capacity. A total of 6 hours in ICE is licensed by default.

B.

This limit is alarmed but flow capture is maintained until %110 of capacity is reached.

C.

Flows over the flow limit are dropped.

D.

Only source, destination, and total bites are entered into the database for over limit flows.

Full Access
Question # 57

WAN optimization reports on Cascade Profiler require that the WAN interfaces for all Steelheads performing optimization are included in a WAN Interface group and are marked as Steelhead interfaces. Which of the following is true?

A.

If the Steelhead is running a RioS version older than 5.5.3, the Steelhead WAN interfaces need to be manually added, and marked as Steelhead interfaces.

B.

If the Steelhead is running a RioS version 5.5.3 or higher, the Steelhead WAN interfaces are automatically added to the WAN page, but the user must manually mark them as Steelhead interfaces.

C.

If the Steelhead is running a RioS version 6.0.1 or higher, the Steelhead WAN interfaces are automatically added to the WAN page and are also be marked as a Steelhead interface.

D.

All of the above are true.

E.

A and C only are true.

Full Access
Question # 58

What must happen prior to running WAN Optimization reports on Cascade Profiler?

A.

Host Groups must be configured.

B.

Cascade Profiler must be successfully polling Steelhead appliances via SNMP.

C.

The WAN-Steelhead interface group must be populated with WAN interfaces for all Steelhead appliances.

D.

The Profiler baseline collection must be complete.

E.

A WAN Optimization reporting template must be configured.

Full Access
Question # 59

What integrations are available when an enterprise already owns an SNMP monitoring technology (such as Solarwinds or HPOV)? (Select 2)

A.

Cascade Profiler can use switch port discovery to retrieve ARP and CAM tables directly from the NMS.

B.

Most NMS' can be configured to SNMP Poll Cascade Profiler to retrieve conversation information.

C.

Network API (from NMS via URL strings to get Cascade Reports)

D.

There are no integrations; NMS' are competitors to Cascade Profiler.

E.

External Links (from Cascade Profiler via URL strings to NMS)

Full Access
Question # 60

A SPAN port or Port Mirror differs from RSPAN technology in which way:

A.

A SPAN port captures traffic locally, an RSPAN captures traffic remotely

B.

A SPAN port captures traffic consistently, an RSPAN captures traffic randomly

C.

A SPAN port captures multiple ports while an RSPAN is "relational" and captures multiple VLANs (Relational LANs)

D.

They are both the same with different terms being used by different vendors

E.

A SPAN port is used on a Switch while a RSPAN is used on a Router

Full Access
Question # 61

How does Cascade acquire the Interface Name (ifname) and interface speed (ifspeed) for interfaces reporting to Cascade?

A.

SNMP polling from the Gateway

B.

SNMP polling from the Profiler

C.

SYSLOG

D.

All of the above

E.

None of the above

Full Access
Question # 62

Which of the following will show a list of all NetFlow sources sending data to the Cascade system?

A.

The Network Operations Dashboard

B.

The "Interface Information" Report available from the "Reports->Shortcuts" page

C.

The "System > Information" page

D.

The "System > Devices/Interfaces" page

Full Access
Question # 63

Where is one place Cascade Profiler can obtain Identity (user) information for use in reporting user activity on a network?

A.

Through Radius Server(s)

B.

From Domain Controller(s)

C.

Through LDAP queries

D.

Via SNMP queries

Full Access
Question # 64

If you use overlapping IP address ranges (for example 10.0.0.0/8, 10.1.2/16, and 10.2.3/24) in a host group definition on Cascade Profiler which of the following is true?:

A.

The Profiler assigns a host to all overlapping custom groups.

B.

The Profiler assigns a host to the custom group whose definitions has the shortest matching prefix.

C.

The Profiler assigns a host to the custom group whose definitions has the longest matching prefix.

D.

An error message is generated.

Full Access
Question # 65

Which example, assuming we want the 192.168.1 subnet shown as "Tokyo", shows the correct syntax for setting up this host group under a host group type on Cascade Profiler?

A.

"192.168.1.0/24 Tokyo"

B.

"Tokyo = 192.168.1.0/24"

C.

"192.168.1.0-192.168.1.255 Tokyo"

D.

"192.168.1.0;255.255.255.0 Tokyo"

Full Access
Question # 66

What options are available on Cascade Profiler for triggering an alert when QoS tagging for a flow has changed along the way from remote site to data center location?

A.

Define an application availability analytic for the application being monitored

B.

Define an interface-based user-defined policy

C.

Enable the Bandwidth Surge security policy

D.

Run a report that identifies any traffic flows that have had two different QoS taggings applied

E.

Cascade does not have the capability to trigger such an alert.

Full Access
Question # 67

On the Cascade Shark Appliance, which User Groups on the appliance exist by default:

A.

Administrators, Operators, Monitors

B.

Read-Only-Group, Read-Write-Group, Full-Access Group

C.

Administrators, Network-Operations, Network-Security

D.

Administrators, NormalUsers, Viewers

E.

Administrators, Operators, Monitors, Viewers

Full Access
Question # 68

When creating a custom view in Cascade Pilot, customizations may includE. (Select 3)

A.

In-chart tool controls

B.

Data Retention Time

C.

Chart Color scheme

D.

Application of a Filter

E.

Sampling Time

Full Access
Question # 69

To install Cascade Shark, the best practice to initially configure the IP Address to be used on the network is:

A.

Connect a cross-over cable from your laptop to the Ethernet management port and connect through the Web browser to the default IP Address of 192.168.1.10.

B.

Connect a cross-over cable from your laptop to the Auxiliary Ethernet port and connect through the Web browser to the default IP Address of 192.168.1.10.

C.

Connect by KVM or Serial Console and run the command line tool, sa_wizard, to perform the initial configuration.

D.

Connect to the appliance using the Riverbed Central Management Console (CMC) on its default IP Address and perform the initial configuration.

Full Access
Question # 70

Cascade Shark can export flow data to a Cascade Profiler. When configuring Cascade Shark, flow export can be configured:

A.

Per each capture job

B.

Per each trace clip

C.

Per each capture port

D.

Per each capture board/aggregating port

E.

Per each Cascade Shark appliance

Full Access
Question # 71

Which of the listed versions of NetFlow are supported by Cascade?

A.

v1 and v5

B.

v7

C.

v9

D.

all of the above

E.

none of the above

Full Access
Question # 72

Cascade provides a means for contacting other network devices for additional information about a host or user of interest. Right-clicking a host name, IP address, MAC address or port number and choosing _________________ from the shortcut menu sends a query to the other network device.

A.

View Packets

B.

Error Report

C.

Restart Service

D.

View Switch Port

E.

External Link

Full Access
Question # 73

What is the typical retention time of packets of a CSK-01100 Cascade Shark appliance with 1 capture job?

A.

About 34 hours with a captured length of 65535 bytes and a packet rate of 400kbps

B.

About 9 hours with a captured length of 1000 bytes and an average traffic rate of 1Gbps.

C.

About 18 hours with a captured length of 65535 bytes and an average traffic rate of 500Mbps.

D.

About 20 hours with a captured length of 500 bytes and an average packet rate of 400kbps.

Full Access