ExamGecko
Home Home / Cisco / 300-415

Cisco 300-415 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Which two algorithms authenticate a user when configuring SNMPv3 monitoring on a WAN Edge router? (Choose two.)

A.

AES-256

A.

AES-256

Answers
B.

SHA-1

B.

SHA-1

Answers
C.

AES-128

C.

AES-128

Answers
D.

MD5

D.

MD5

Answers
E.

SHA-2

E.

SHA-2

Answers
Suggested answer: A, B

Explanation:

https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/snmp/snmp-book.html

In the Cisco SD_WAN solution, vSmart controller is responsible for which two actions? (Choose two.)

A.

Distribute crypto key information among vEdge routers

A.

Distribute crypto key information among vEdge routers

Answers
B.

Configure and monitor vEdge routers.

B.

Configure and monitor vEdge routers.

Answers
C.

Authenticate and authorize vEdge routers.

C.

Authenticate and authorize vEdge routers.

Answers
D.

Distribute the IP address from DHCP server to vEdge routers.

D.

Distribute the IP address from DHCP server to vEdge routers.

Answers
E.

Distribute route and policy information via OMP.

E.

Distribute route and policy information via OMP.

Answers
Suggested answer: A, E

Explanation:

In an AWS cloud, which feature provision WAN Edge routers automatically in Cisco SD-WAN?

A.

Cloud app

A.

Cloud app

Answers
B.

Cloud OnRamp

B.

Cloud OnRamp

Answers
C.

vAnalytics

C.

vAnalytics

Answers
D.

Network Designer

D.

Network Designer

Answers
Suggested answer: B

Explanation:

What is the purpose of ''vpn 0'' in the configuration template when onboarding a WAN edge node?

A.

It carries control traffic over secure DTLS or TLS connections between vSmart controllers and vEdge routers, and between vSmart and vBond

A.

It carries control traffic over secure DTLS or TLS connections between vSmart controllers and vEdge routers, and between vSmart and vBond

Answers
B.

It carries control out-of-band network management traffic among the Viptela devices in the overlay network.

B.

It carries control out-of-band network management traffic among the Viptela devices in the overlay network.

Answers
C.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vManager

C.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vManager

Answers
D.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vBond

D.

It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vBond

Answers
Suggested answer: A

Explanation:

Which device in the SD- WAN solution receives and categorizes event reports, and generates alarms?

A.

WAN Edge routers

A.

WAN Edge routers

Answers
B.

vSmart controllers

B.

vSmart controllers

Answers
C.

vManage NMS

C.

vManage NMS

Answers
D.

vBond controllers

D.

vBond controllers

Answers
Suggested answer: C

Explanation:

https://sdwandocs.cisco.com/Product_Documentation/vManage_Help/Release_17.1/vManage_NMS_Product_Help

A network administrator is bringing up one WAN Edge for branch connectivity. Which types of tunnels form when the WAN edge router connects to the SD-WAN fabric?

A.

DTLS or TLS tunnel with vBond controller and IPsec tunnel with vManage controller.

A.

DTLS or TLS tunnel with vBond controller and IPsec tunnel with vManage controller.

Answers
B.

DTLS or TLS tunnel with vBond controller and IPsec tunnel with other WAN Edge routers.

B.

DTLS or TLS tunnel with vBond controller and IPsec tunnel with other WAN Edge routers.

Answers
C.

DTLS or TLS tunnel with vSmart controller and IPsec tunnel with other Edge routers.

C.

DTLS or TLS tunnel with vSmart controller and IPsec tunnel with other Edge routers.

Answers
D.

DTLS or TLS tunnel with vSmart controller and IPsec tunnel with vBond controller.

D.

DTLS or TLS tunnel with vSmart controller and IPsec tunnel with vBond controller.

Answers
Suggested answer: C

Explanation:

When a WAN Edge device joins the SD-WAN overlay, which Cisco SD-WAN components orchestrates the connection between the WAN Edge device and a vSmart controller?

A.

vManage

A.

vManage

Answers
B.

vBond

B.

vBond

Answers
C.

OMP

C.

OMP

Answers
D.

APIC-EM

D.

APIC-EM

Answers
Suggested answer: B

Explanation:

An administrator needs to configure SD-WAN to divert traffic from the company's private network to an ISP network. What action should be taken to accomplish this goal?

A.

configure the control policy

A.

configure the control policy

Answers
B.

configure the data policy

B.

configure the data policy

Answers
C.

configure the data security policy

C.

configure the data security policy

Answers
D.

configure the application aware policy

D.

configure the application aware policy

Answers
Suggested answer: B

Refer to the exhibit.

What binding is created using the tloc-extension command?

A.

between ge 0/2.101 of port-type service and ge 0/0 of port-type service

A.

between ge 0/2.101 of port-type service and ge 0/0 of port-type service

Answers
B.

between ge 0/2.101 of port-type transport and ge 0/0 of port-type service

B.

between ge 0/2.101 of port-type transport and ge 0/0 of port-type service

Answers
C.

between ge 0/2.101 of port-type service and ge 0/0 of port-type transport

C.

between ge 0/2.101 of port-type service and ge 0/0 of port-type transport

Answers
D.

between ge 0/2.101 of port-type transport and ge 0/0 of port-type transport

D.

between ge 0/2.101 of port-type transport and ge 0/0 of port-type transport

Answers
Suggested answer: D

Explanation:

A network administrator is configuring an application-aware firewall between inside zones to an outside zone on a WAN edge router using vManage GUI. What kind of Inspection is performed when the ''inspect'' action is used?

A.

stateful inspection for TCP and UDP

A.

stateful inspection for TCP and UDP

Answers
B.

stateful inspection for TCP and stateless inspection of UDP

B.

stateful inspection for TCP and stateless inspection of UDP

Answers
C.

IPS inspection for TCP and-Layer 4 inspection for UDP

C.

IPS inspection for TCP and-Layer 4 inspection for UDP

Answers
D.

Layer 7 inspection for TCP and Layer 4 inspection for UDP

D.

Layer 7 inspection for TCP and Layer 4 inspection for UDP

Answers
Suggested answer: A

Explanation:

Total 382 questions
Go to page: of 39