ExamGecko
Home Home / Cisco / 300-415

Cisco 300-415 Practice Test - Questions Answers, Page 37

Question list
Search
Search

Which timer specifies information in the cache after all OMP sessions are lost at location S0123T4E56F78?

A.

advertisement interval

A.

advertisement interval

Answers
B.

EOR timer

B.

EOR timer

Answers
C.

graceful restart timer

C.

graceful restart timer

Answers
D.

hold time

D.

hold time

Answers
Suggested answer: C

Refer to the exhibit.

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Which control policy assigned to Drenches in the out direction establishes a strict hub-and-spoke topology tor VPN2?

A)

B)

C)

D)

A.

Option

A.

Option

Answers
B.

Option

B.

Option

Answers
C.

Option

C.

Option

Answers
D.

Option

D.

Option

Answers
Suggested answer: A

Explanation:

To establish a strict hub-and-spoke topology in Cisco SD-WAN for a specific VPN, such as VPN2, a control policy must be configured. This control policy dictates how traffic flows between sites, ensuring that all branch traffic is routed through the hub site.

1.Control Policy Components:

oSite Lists: Define which sites are considered hubs and which are branches.

oVPN Lists: Identify the VPNs to which the policy applies.

oControl Policy: Use sequences to match routes and specify actions to accept or reject traffic based on the defined topology.

1.Policy Analysis:

oOption A: Correctly defines site lists for hub sites (site-id 1-2) and creates a control policy that matches routes for VPN2, accepting routes from hub sites and rejecting routes from others. This ensures that traffic from branches (other sites) is only accepted if it routes through the hubs.

oOther options either incorrectly define the site lists or do not properly match and set the routes to enforce the strict hub-and-spoke topology.

1.Policy Configuration:

policy

lists

vpn-list VPN2

vpn 2

site-list hub_sites

site-id 1-2

!

control-policy vpn_multi_topology

sequence 10

match route

site-list hub_sites

vpn-list VPN2

!

action accept

!

sequence 20

match route

vpn-list VPN2

!

action reject

!

default-action accept

1.Reference:

oCisco SD-WAN Control Policy Configuration Guide

oCisco SD-WAN Hub-and-Spoke Topology Deployment Guide

Which TLOC color is used for site-to-site communication in a Google Cloud integration with Cisco SD-WAN?

A.

Private1

A.

Private1

Answers
B.

private2

B.

private2

Answers
C.

private3

C.

private3

Answers
D.

private4

D.

private4

Answers
Suggested answer: A

Explanation:

In Cisco SD-WAN, TLOC (Transport Locator) colors are used to categorize and manage different types of transport networks. When integrating with cloud services such as Google Cloud, specific TLOC colors are designated for managing site-to-site communication within the cloud infrastructure.

1.TLOC Color Assignment:

oFor Google Cloud integration, Cisco SD-WAN uses specific TLOC colors to differentiate between various types of transport links and to ensure that traffic is routed appropriately between sites.

1.Private1 for Site-to-Site Communication:

oThe TLOC color private1 is specifically used for site-to-site communication within Google Cloud. This ensures that the traffic between different sites within the Google Cloud infrastructure is managed efficiently and securely.

1.Reference:

oCisco SD-WAN Cloud Integration Guide

oCisco SD-WAN Google Cloud Configuration Documentation

Which data policy configuration influences BGP routing traffic flow from LAN to WAN?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

In Cisco SD-WAN, data policies can influence the routing traffic flow, particularly when using BGP (Border Gateway Protocol) to manage the traffic from the LAN to the WAN. This involves route manipulation techniques such as AS-path prepending to influence path selection.

1.AS-Path Prepending:

oAS-path prepending is a technique used to manipulate the path selection process in BGP. By adding extra AS numbers to the AS-path attribute, you make a particular route less preferred.

oThis can be useful in directing traffic to take a different path by making certain routes appear longer.

1.Option C Analysis:

oPolicy Definition: The policy named BGP-AS-PREPEND includes a sequence that sets the AS-path to prepend the AS numbers 10 and 20.

oApplication: The policy is applied in the outbound direction of BGP, which means it will influence the BGP routes being advertised from the LAN to the WAN.

oThis ensures that the traffic flow from the LAN to the WAN is influenced by the AS-path prepending, making certain paths less preferred.

1.Reference:

oCisco SD-WAN Routing Configuration Guide

oCisco SD-WAN BGP Policy Configuration Documentation

Which encryption algorithm secures binding exchanges Between Cisco TrustSec SXP peers?

A.

SEAL

A.

SEAL

Answers
B.

3DES

B.

3DES

Answers
C.

AES

C.

AES

Answers
D.

MD5

D.

MD5

Answers
Suggested answer: C

Explanation:

Cisco TrustSec (CTS) is a technology that enables secure access and dynamic role-based access control in the network. The Security Group Tag (SGT) Exchange Protocol (SXP) is used to propagate SGTs across network devices. To ensure the secure exchange of these tags, Cisco uses encryption algorithms.

1.AES (Advanced Encryption Standard): AES is widely used in many security protocols and standards because of its strong encryption capabilities. In the context of Cisco TrustSec, AES is the encryption algorithm used to secure binding exchanges between SXP peers. It provides robust encryption, ensuring the integrity and confidentiality of the data being exchanged.

1.Implementation: When configuring SXP peers, the AES encryption ensures that the SGT information transmitted is secure and cannot be intercepted or tampered with by unauthorized entities.

1.Reference:

oCisco TrustSec Configuration Guide

oCisco's official documentation on TrustSec SXP deployment

Which two architectural components are part of an SD-WAN high availability vManage cluster? (Choose two.)

A.

WAN Edge router

A.

WAN Edge router

Answers
B.

network configuration system

B.

network configuration system

Answers
C.

NAT router

C.

NAT router

Answers
D.

messaging server

D.

messaging server

Answers
E.

application server

E.

application server

Answers
Suggested answer: D, E

Explanation:

In a Cisco SD-WAN high availability (HA) vManage cluster, several components work together to ensure redundancy and availability. The vManage cluster is responsible for network management and configuration and consists of multiple servers that handle different functions.

1.Application Server: This server handles the core functionalities of vManage, including processing user requests, managing configurations, and executing policies. In an HA setup, multiple application servers work together to provide redundancy and load balancing.

1.Messaging Server: The messaging server is responsible for inter-server communication within the cluster. It ensures that configuration changes, policy updates, and other important messages are propagated across all vManage servers in the cluster.

These components work in tandem to maintain the operational integrity and availability of the vManage system in an HA configuration.

3.Reference:

oCisco SD-WAN vManage Cluster Deployment Guide

oCisco SD-WAN High Availability Configuration Documentation

What is a requirement for deployment of on-premises vBond controllers through the Cisco Plug and Play Connect process?

A.

a DNS name that identifies vBond

A.

a DNS name that identifies vBond

Answers
B.

a defined controller profile

B.

a defined controller profile

Answers
C.

Internet connectivity from vManage

C.

Internet connectivity from vManage

Answers
D.

a CSV The that contains ail controllers

D.

a CSV The that contains ail controllers

Answers
Suggested answer: A

Explanation:

Deploying on-premises vBond controllers through the Cisco Plug and Play Connect process requires specific configurations to ensure proper identification and communication between the controllers and the devices.

1.DNS Name: A DNS name that identifies the vBond orchestrator is crucial. This DNS name allows devices to dynamically resolve the IP address of the vBond orchestrator. This is especially important in environments where IP addresses may change, ensuring that devices can always reach the vBond orchestrator through its DNS name.

1.Process:

oWhen a device comes online, it contacts the Plug and Play server to get the necessary information for connecting to the SD-WAN fabric.

oThe DNS name is used to resolve the vBond's IP address, enabling secure and reliable communication between the device and the vBond orchestrator.

1.Reference:

oCisco SD-WAN Plug and Play Connect Deployment Guide

oCisco SD-WAN vBond Orchestrator Configuration Documentation

Exhibit.

The SD-WAN network is configured with a default full-mash topology. An engineer wants Barcelona and Paris to communicate to each other through the London site using a control Which control policy configuration accomplishes the task?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

To achieve communication between Barcelona and Paris through the London site, a control policy needs to be configured to force traffic from these two sites to pass through the London site. This setup involves manipulating the routing information such that London becomes a transit hub for traffic between Barcelona and Paris.

1.Understanding the Policy Requirements:

oCentralized Policy: This type of policy is applied at the controller level and affects multiple devices in the SD-WAN fabric. It allows the control of routing behavior across the entire network.

oRoute Policy: Specifically, a route policy will be used to set the preferred path for traffic between sites, ensuring that it passes through London.

1.Option Analysis:

oOption A: Shows the configuration of a centralized policy with a focus on route policy, which is necessary to achieve the desired traffic flow manipulation.

oOther Options: Do not provide the necessary centralized policy or route policy configurations that are needed to control the routing paths between the sites.

1.Configuration Details:

oCentralized Policy: Define the policy under the centralized policy section in the vManage GUI.

oRoute Policy: Create and apply a route policy that specifies the desired routing behavior for traffic between Barcelona and Paris, ensuring it routes through London.

1.Reference:

oCisco SD-WAN Control Policy Configuration Guide

Cisco SD-WAN Centralized Policy Documentation



What is the advantage of instating the controller on-premises?

A.

ease of deployment and management

A.

ease of deployment and management

Answers
B.

full control of the data piano and the control plane

B.

full control of the data piano and the control plane

Answers
C.

automatic geographical redundancy and security

C.

automatic geographical redundancy and security

Answers
D.

scalability and a cost-saving

D.

scalability and a cost-saving

Answers
Suggested answer: B

Explanation:

Deploying the SD-WAN controller on-premises offers several advantages, particularly in terms of control and customization.

1.Full Control of the Data Plane and the Control Plane: When the controller is deployed on-premises, the organization maintains complete control over both the data plane (traffic forwarding) and the control plane (network management and configuration). This allows for more granular control over network policies, security configurations, and performance optimizations.

1.Customization and Security: On-premises deployment allows organizations to customize their SD-WAN setup to meet specific security and compliance requirements. Sensitive data remains within the organization's control, which can be crucial for industries with strict data privacy regulations.

1.Operational Flexibility: Having the controller on-premises provides operational flexibility, enabling organizations to integrate the SD-WAN solution with existing network management tools and processes.

1.Reference:

oCisco SD-WAN Deployment Guide

oCisco SD-WAN On-Premises Controller Configuration Documentation

Total 382 questions
Go to page: of 39