ExamGecko
Home Home / Cisco / 300-415

Cisco 300-415 Practice Test - Questions Answers, Page 27

Question list
Search
Search

List of questions

Search

Which percentage for total memory or total CPU usage for a device is classified as normal in the WAN Edge Health pane?

A.

more than 80 percent usage

A.

more than 80 percent usage

Answers
B.

less than 70 percent usage

B.

less than 70 percent usage

Answers
C.

between 70 to 90 percent usage

C.

between 70 to 90 percent usage

Answers
D.

more than 90 percent usage

D.

more than 90 percent usage

Answers
Suggested answer: B

Which configuration component is used in a firewall security policy?

A.

numbered sequences of match-action pairs

A.

numbered sequences of match-action pairs

Answers
B.

application match parameters

B.

application match parameters

Answers
C.

URL filtering policy

C.

URL filtering policy

Answers
D.

intrusion prevention policy

D.

intrusion prevention policy

Answers
Suggested answer: A

Refer to the exhibit

Refer to the exhibit An engineer must configure a QoS policy between me hub and site A (spoke) over a standard internet circuit where traffic shaping is adjusted automatically based on evaiiabk bandwidth Which configuration meets the requirement?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: D

Refer to the exhibit

Refer to the exhibit. An engineer must block FTP traffic coming in from a particular Service VPN on a WAN Edge device Which set of steps achieves this goal?

A.

Create a localized policy and add it to (he interface feature template

A.

Create a localized policy and add it to (he interface feature template

Answers
B.

Create a localized policy add it to the device template and add an ACL to the interface feature template

B.

Create a localized policy add it to the device template and add an ACL to the interface feature template

Answers
C.

Create a prefix tat, add it to the localized policy and add it to the interface feature template

C.

Create a prefix tat, add it to the localized policy and add it to the interface feature template

Answers
D.

Create a localized policy add it to VPN template and add an ACL to the interface feature template

D.

Create a localized policy add it to VPN template and add an ACL to the interface feature template

Answers
Suggested answer: C

A network administrator configures SNMPv3 on a Cisco WAN Edge router from CLI for monitoring purposes. How many characters are supported by the snmp user <username> command?

A.

from 1 to 8

A.

from 1 to 8

Answers
B.

from 1 to 16

B.

from 1 to 16

Answers
C.

from 1 to 32

C.

from 1 to 32

Answers
D.

from 1 to 48

D.

from 1 to 48

Answers
Suggested answer: C

Which two virtualized environments are available for a company to install the controllers using the on-premises model? (Choose two )

A.

VMware vSphere ESXi

A.

VMware vSphere ESXi

Answers
B.

VMware Workstation

B.

VMware Workstation

Answers
C.

kernel-based virtual machine

C.

kernel-based virtual machine

Answers
D.

OpenStack

D.

OpenStack

Answers
E.

Microsoft Hyper-V

E.

Microsoft Hyper-V

Answers
Suggested answer: A, D

Which two performance data details are provided by Cisco SO-WAN vAnalytics? (Choose two)

A.

jitter loss and latency for data tunnels

A.

jitter loss and latency for data tunnels

Answers
B.

application quality of experience score from zero to ten

B.

application quality of experience score from zero to ten

Answers
C.

detail on total cost of ownership for the fabric

C.

detail on total cost of ownership for the fabric

Answers
D.

certificate authority status (health and expiration dates) for all controllers

D.

certificate authority status (health and expiration dates) for all controllers

Answers
E.

view devices connected to a vManage NMS

E.

view devices connected to a vManage NMS

Answers
Suggested answer: A, B

How are policies deployed on cloud-tiosted Cisco SD-WAN controllers?

A.

Policies are created on vSmart and enforced by vSmart

A.

Policies are created on vSmart and enforced by vSmart

Answers
B.

Policies are created on vSmart and enforced by vManage

B.

Policies are created on vSmart and enforced by vManage

Answers
C.

Policies are created on vManage and enforced by vManage.

C.

Policies are created on vManage and enforced by vManage.

Answers
D.

Policies are created on vManage and enforced by vSman

D.

Policies are created on vManage and enforced by vSman

Answers
Suggested answer: A

A network administrator configures SNMFV3 on a Cisco WAN Edge router from CL I for monitoring purposes How many characters are supported by the snmp user username command?

A.

from 1 to 8

A.

from 1 to 8

Answers
B.

from 1 to 16

B.

from 1 to 16

Answers
C.

from 1 to 32

C.

from 1 to 32

Answers
D.

from 1 to 48

D.

from 1 to 48

Answers
Suggested answer: C

In which file format is a critical severity report downloaded from the MONITOR I ALARM tab in the vManage GUI?

A.

.txt

A.

.txt

Answers
B.

.pdf

B.

.pdf

Answers
C.

csv

C.

csv

Answers
D.

xIsx

D.

xIsx

Answers
Suggested answer: C
Total 382 questions
Go to page: of 39