here we go again
![]() |
![]() |
![]() |
Título del Test:![]() here we go again Descripción: Exam test |




Comentarios |
---|
NO HAY REGISTROS |
1.Refer to the exhibit. The control connection is failing. Which action resolves the issue?. A. Import vSmart in vManager. B. Restore the reachability to the vSmart. C. Validate the certificates authenticity on vSmart. D. Upload the WAN edge list on vmanage. 2. In a Cisco SD-WAN architecture, what is the role of the WAN Edge?. A. It provides orchestration to assist in automatic provisioning of WAN Edge routers and overlay. B.It is the management plane responsible for centralized configuration and monitoring. C. It is the control plane that builds and maintaings network topology. D. It is the data plane that is responsible for forwarding traffic. 3.Which policy configures an application-aware routing policy under configuration > policies?. A.Control policy. B. Localize policy. C. Data policy. D. Centralized policy. 4. Refer to the exhibt. An engineer is troubleshooting an issue where vManage and vSmart have a problem establishing a connection to vbond. Which action fixes the issue?. A. Remove the encapsulation ipsec command under the tunnel interface of vbond. B. Configure the tunnel interface on all three controllers with a color of transport. C. Configure encapsulation as IPsec under the tunnel interface of vManage and vSmart. D. Reconfigure the vbond command on the vbond as vbond 150.5.1.3 local. 5. When redistribution is configured between OMP and BGP at two Data Center sites that Direct Connection Interlink, which step avoids learning the same routes on WAN edge routers on WAN Edge routers of the DCs from LAN?. A. Set OMP admin distance lower that BGP admin distance. B. Define different VRFd on both DCs. C. Set same overlay AS on both DC WAN Edge routers. D. Set down-bit on Edge routers on DC1. 6. Refer to the exhibit.Which shaping-rate does the engineer use to shape traffic at 9 Mpbs?. A. 90000. B. 9. C. 9000000. D. 9000. 7. Which two products are used to deploy Cisco WAN Edge router virtual platforms?. A. Sun SPARC Node running AIX. B. Sun Enterprise M4000 Server running Sun Solaris. C. Cisco UCS. D. HP Proliant DL 360 Generation 10 running HP-UX. E. Cisco ENCS 5000 series. 8. Two sites have one WAN Edge each. Each WAN Edge has two public TLOCs with no restrict configured. There is a full reachability between the TLOCs. How many data tunnels are formed on each Edge router?. A.2. B.6. C.4. D.8. 9. An egineer is configuring a data policy for packets that must be captured throught the policy. Which command accomplishes this task?. A. Policy > data-policy > vpn-list > sequence > default-action > accept. B. Policy > data-policy > vpn-list > sequence > default-action > drop. C. Policy > data-policy > vpn-list > sequence > action. D. Policy > data-policy > vpn-list > sequence > match. 10. Which two mechanisms are used to guarantee the integrity of data packets in the Cisco SD-WAN architecture data plane? (choose two). A. Certificates. B. authentication headers. C. Encapsulation security payload. D. transport locations. E. TPM chip. 11. Refer to exhibit. An engineer is troubleshooting tear down of control connections even though a valid Certificate Serial number is entered. Which two actions resolve this issue? (Choose two). A. Remove the duplicate IP in the network. B. Restore network reachability for the controller. C. Enter a valid serial number on the controllers for a given device. D. Match the serial number file between the contollers. E. Enter a valid product ID (model) on the PnP portal. 12. A network administrator is configuring an application-aware firewall between inside zones to an outside zone on a WAN edge router using vManage GUI. What kind of inspection is performed when the "inspect" action is used?. A. stateful inspection for TCP and UDP. B. Layer 7 inspection for TCP and layer 4 inspection for UPD. C. stateful inspection for TCP and stateless inspection of UDP. D. IPS inspection for TCP and layer 4 inspection for UDP. 13. A large retail organization decided to move some of the branch applications to the AWS cloud. How does the network architech extend the in-house Cisco SD-WAN branch to cloud network into AWS?. A. Install the AWS cloud router in the main data center and provide the connectivity from each branch. B. Create virtual WAN Edge devices cloud through the AWS online software store. C. Create GRE tunnels to AWS from each branch over the internet. D. Create virtual instances of vSmart Cloud through the AWS online software store. 14. Which template configures the out-of-band management VPN?. A. B. C. D. 15. An engineer is configuring a WAN Edge router for DIA based on matching QoS parameters. Which two actions accomplish this task? (Choose two. A. Configure a control policy. B. Configure a centralized data policy. C. Apply a QoS map policy. D. Apply a data policy on WAN interface. Configure a NAT on the transport interface. 16. Refer to the exhibit. An engineer is configuring service chaining. Which set of configuration is required for all traffic from Site ID 1 going forward site ID 2 to get filtered through the firewall on the hub site?. A. vpn 10 service FW address 1.1.1.1 policy lists site-list firewall-sites site-id 1 control-policy firewall service sequence 10 match route site id- 2 action accept set service FW vpn 10 default-action accept apply-policy site-list firewall-sites control-policy firewall-service out. B. vpn 20 service FW address 1.1.1.1 policy lists site-list firewall-sites site-id 1 control-policy firewall service sequence 10 match route site id- 2 action accept set service FW vpn 20 default-action accept apply-policy site-list firewall-sites control-policy firewall-service out. C. vpn 10 service FW address 1.1.1.1 policy lists site-list firewall-sites site-id 1 control-policy firewall service sequence 10 match route site id- 2 action accept set service FW vpn 20 default-action accept apply-policy site-list firewall-sites control-policy firewall-service out. D. vpn 10 service FW address 1.1.1.2 policy lists site-list firewall-sites site-id 1 control-policy firewall service sequence 10 match route site id- 2 action accept set service FW vpn 10 default-action accept apply-policy site-list firewall-sites control-policy firewall-service out. 17. A network administrator is tasked to make sure that an OMP peer session is closed after missing three consecutive keepalive messages in 3 minutes. Additionally, route updates must be sent every minute. If a WAN Edge router becomes unavailable, the peer must use last known information to forward packets for 12 hours. Which set of configuration accomplishes this task?. A. omp timers advertisement-interval 60 holdtime 180 graceful-restart-timer 43200. B. omp timers advertisement-interval 1 holdtime 180 graceful-restart-timer 720. C. omp timers advertisement-interval 1 holdtime 180 graceful-restart-timer 43200. D. omp timers advertisement-interval 60 holdtime 60 graceful-restart-timer 720. 18.Refer to the exhibit. The tunnel interface configuration on both WAN Edge router(s) is: vpn0 interface ge0/1 tunnel-interface encapsulation ipsec color biz-internet allow-service dhcp allow-service dns allow-service icmp no allow-service sshd no allow-service ntp no allow-service stun no shutdown Which configuration for WAN edge routers will connect to the internet?. A. vpn 0 interface ge0/1 ip address 172.16.13.3/24 ! ip route 0.0.0.0/0 172.16.8.1. B. vpn 0 interface ge0/1 ip address 172.16.15.5/24 ! ip route 0.0.0.0/0 172.16.13.1. C. vpn 0 interface ge0/1 ip address 172.16.13.3/24 ! ip route 0.0.0.0/0 172.16.13.1. D. vpn 0 interface ge0/1 ip address 172.16.15.5/24 ! ip route 0.0.0.0/0 172.16.8.1. 19. An engineer wants to track a tunnel characteristics within a SLA-based policy for convergence. Which policy configuration will achieve this goal?. A. data policy. B. app-route policy. C. VPN membership policy. D. Control Policy. 20. Company ABC has decided to deploy the controllers using the ON-prem method. How does the administrator upload the WAN Edge list to the vManage?. A. B. C. D. 21.Refer to the exhibit. Which configuration change is needed to configure the tloc-extention on Branch1-Edge1?. A. interface ge0/2.704 ip address 10.113.4.2/30 mtu 1496 tloc-extension ge0/2. B. interface ge0/2.704 ip address 10.113.4.1/30 tunnel-interface encapsulation ipsec color mpls restrict mtu 1496 tloc-extension ge0/2 no shutdown. C. interface ge0/2.704 ip address 10.113.4.1/30 tunnel-interface encapsulation ipsec color mpls restrict tloc-extension ge0/2 no shutdown. D. interface ge0/2.704 ip address 10.113.4.2/30 mtu 1496 tloc-extension ge0/1. 22. Refer to the exhibit. Which configuration extends the INET interface on R1 to be used by R2 for control and data connections?. A. R1 interface ge0/2 no shutdown interface ge0/2.10 ip address 43.43.43.2/30 tloc-extension ge0/0 R2 interface ge0/2 no shutdown interface ge0/2.10 ip address 43.43.43.1/30 tloc-extension ge0/0. B. R1 interface ge0/2 mtu 1504 no shutdown interface ge0/2.10 ip address 43.43.43.2/30 tunnel-interface color pulic-internet R2 interface ge0/2 mtu 1504 no shutdown interface ge0/2.10 ip address 43.43.43.1/30 tloc-extension ge0/0. C. R1 interface ge0/2 interface ge0/2.10 ip address 43.43.43.2/30 tloc-extension ge0/0 tunnel-interface color public-internet R2 interface ge0/2 interface ge0/2.10 ip address 43.43.43.1/30 tunnel-interface color public-internet. D. R1 interface ge0/2 mtu 1504 no shutdown interface ge0/2.10 ip address 43.43.43.2/30 tloc-extension ge0/0 R2 interface ge0/2 mtu 1504 no shutdown interface ge0/2.10 ip address 43.43.43.1/30 tunnel-interface color public-internet. 23. Refer to the exhibit. Which configuration routes Site 2 through the firewall in site 1?. A. On vSmart control policy firewall-service match route site id-w action accept set service FW vpn 10 service local default-action accept. B. On vSmart control-policy firewall-service sequence 10 site-id 2 action accept set service FW vpn 10 default-action accept. C. control policy firewall service sequence 10 match route site-id 2 action accept set service local default-action accept. D. On vSmart control-policy firewall-service sequence 10 match route site-id 2 action accept set service FW VPN 10 default-action accept. 24. Refer to the exhibit. The network administrator has configured a centralized topology policy that results in the displayed routing table at a branch office. Which two configurations are verified by the output? (Choose two). A. the default route is learned via OMP. B. The default route is configured locally. C. The routing table is from a cEdge router. D. The routing table is or the transport VPN. E. The configured policy is adding a route tag of 300 to learned routes. 25.Refer to the exhibit. Which configuration stops Netconf CLI togging on WAN Edge devices during migration?. A. logging disk netconf-disable. B. logs audit-disable netconf-disable. C. logs netconf-disable. D. logging disk audit-disable netconf-disable. 26. An engineer wants to change the configuration of the certification authorization node from manual to automated. Which GUI selection will accomplish this?. A. Configuration > Certificates. B. Tools > operational commands. C. Maintenance > Security. D. Administration > settings. 27. An administrator is configuring the severity level on the Manage NMS for events that indicate that an action must be taken inmediately. Which severity level must be configured?. A. Warning. B. Alert. C. Critical. D. Error. 28. Which component is responsible for routing protocols such as BGP and OSPF in a cisco SD-WAN solution?. A. vBond orchestrator. B. vSmart controller. C. vManage. D. WAN Edge router. 29. Which Cisco SD-WAN component facilitates the initial communication between WAN Edge devices to join the fabric?. A. WAN Edge router. B. vManage. C. vbond Orchestrator. D. vSmart controller. 30. Which two features does the application firewall provide?. A. blocks traffic by application or application-family. B. classification of 1400+ layer 7 applications. C. classification of 1000+ layer 4 applications. D. Numbered sequences of match-action pairs. E. application match parameters. 31. For data plane resiliency, what does the Cisco SD-WAN software implement?. A. establishing affinity between vsmart acontrollers and WAN edge routers. B. BFD. C. multiple vBond orchestrators. D. OMP. 32. Which plane assists in automatic onboarding of the SD-WAN routers into the SD-WAN overlay?. A. control. B. orchestration. C. management. D. data. 33. Which policy blocks TLOCS from remotes and allows TLOCS from the data center to form hub-and-spoke peering?. A. Centralized control policy. B. Centralized data-policy. C. localized control policy. D. localized data policy. 34. Which protocol is used for vManage to connect to vSmart controller hosted in cloud?. A. HTTP. B. ZTP. C. PnP server. D. NETCONF. 35. An engineer is troubleshooting a certificate issue on vedge. Which command is used to verify the validity of the certificates?. A. show certificate status. B. show certificate installed. C. show control local-properties. D. Show control summary. 36. Refer to the exhibit. An engineer is troubleshooting a control connection issue. What does "connect" mean in this show control connections output?. A. Control connection attempt is in progress. B. Control connection is down. C. Control connection is connected. D. Control connection is up. 37. A vEdge platform is sending VRRP advertisement messages every 10 seconds. Which value configures the route back to the default timer?. A. 2 seconds. B. 5 Seconds. C. 1 second. D. 3 seconds. 38. Which command on a WAN Edge device displays the information about the colors present in the fabric that are learned from vSmart via OMP?. A. show omp tlocs. B. show omp sessions. C. show omp peers. D. show omp route. 39. Where on vManage does an engineer find the details of control node failure?. A. Events. B. Network. C.Alarms. D. Audit log. 40. A network administrator is configuring VRRP to avoid a traffic black hole when transport site of the network is down on the master device. What must be configured to get the fastest failover standby?. A. OMP tracking. B. Higher group ID number. C. lower timer interval. D. Prefix-list tracking. 41. A network administrator is configuring a tunnel interface on a branch Cisco IOS XE router to run tloc extensions. Which configuration will extend a TLOC over a GRE tunnel to another router in the branch?. A. sdwan interface g0/0 extended-interface tloc-extension-gre-from 10.1.1.1. B. sdwan interface g0/0 tloc-interface tloc-extension-gre-from 10.1.1.1. C. sdwan interface g0/0 tunnel-interface tloc-extension-gre-to 10.1.1.1. D. sdwan interface g0/0 gre-interface tloc-extension-gre-to 10.1.1.1. 42. Refer to the exhibit. Which QoS treatment results from this configuration after the access list acl-guest is applied inbound on the vpn1 interface?. A. A TCP packet sourcing from 172.16.10.1 and destined to 172.16.20.1 is dropped. B. A UDP packet sourcing from 172.16.10.1 and destined to 172.16.20.1 is dropped. C. A TCP PACKET sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted. D. A UDP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted. 43. A network administrator is bringing up one WAN Edge router for branch connectivity. Which types of tunnels forms when the WAN Edge router connects to the SD-WAN fabric?. A. DTLS or TLS tunnel with vbond controller and ipsec tunnel with vManage controller. B. DTLS or TLS tunnel with vsmart controller and IPsec tunnel with vBond controller. C. DTLS or TLS tunnel with vbond controller and IPsec tunnel with other WAN Edge routers. D. DTLS OR TLS tunnel with vSmart controller and IPsec tunnel with other WAN edge routers. 44. A bank is looking for improved customer experience for applications and reduce overhead related to compliance and security. Which key feature or features of the Cisco SD-WAN solution will help the bank to achieve their goals?. A. implementation of a modem age core banking system. B. Implementation of BGP across the enterprise routing for selecting optimal path. C. QoS including application prioritization and meeting critical applications SLA for selecting optimal path. D. integration with PaaS providers to offer the best possible application experience. 45. Which two algorithms authenticate a user when configuring SNMPv3 monitoring on a WAN Edge router? (choose two). A. AES-256. B. SHA -1. C. SHA -2. D. MD5. E. AES-128. 46. Which TCP Optimization feature is used by WAN Edge to prevent unnecessary retransmissions and large initial TCP window sizes to maximize throughput and achieve a better quality?. A. SEQ. B. RTT. C. SYN. D.SACK. 47. Refer to exhibit. A network administrator is configuring omp in vManage to advertise all the paths for the same prefix from a site that has two WAN Edge devices. Each WAN Edge device is connected to three ISPs and two private MPLS transports. what is the minimum value for "number of paths advertised per prefix" that should be configured?. A.3. B.2. C.10. D.5. 48. A policy created to influence routing path in the network using a group of prefixes. What policy application will achieve this goal when applied to a site list?. A. cflowd-template. B. Control-policy. C. app-route policy. D. VPN-membership policy. 49. Refer to the exhibit. The ge0/0 interface connects to a 30-MB link. A network administrator wants to always have 10 MB available for hight priority traffic. When lower-priority traffic bursts exceed 20 MB, traffic should be redirected to the second WAN interface ge0/1. Which set of configurations accomplishes this task?. A. policy policer bursty-traffic rate 1000000 burst 20000 exceed remark access-list policer-bursty-traffic sequence 10 match source-ip 56.0.1.0/24 action accept policer bursty-traffic default-action accept. B. policy policer bursty-traffic rate 10000 burst 20000 exceed drop access-list policer-bursty-traffic sequence 10 match source-ip 56.0.1.0/24 action accept policer bursty-traffic default-action accept. C. policy policer bursty-traffic rate 100000 burst 20000 exceed continue access-list policer-bursty-traffic sequence 10 match source-ip 56.0.1.0/24 action accept policer bursty-traffic default-action accept. D. policy policer bursty-traffic rate 10 burst 20 exceed remark access-list policer-bursty-traffic sequence 10 match source-ip 56.0.1.0/24 action accept policer bursty-traffic default-action accept. 50. Which OSPF command makes the WAN Edge router less preferred exit from a site with a dual WAN Edge design?. A. vpn vpn-id router ospf area number no summary. B. vpn vpn-id router ospf max-metric. C. vpn vpn-id router ospf area number range prefix/lenght. D. vpn vpn-id router ospf area number nssa no-summary. 51. In Cisco SD-WAN, what protocol is ued for control connections between Cisco SDWAN devices?. A. OMP. B. DTLS. C. BGP. D. OSPF. 52. Which policy is configured to ensure that a voice packet is always sent on the link with less than a 50 msec delay?. A. localized data. B. centralized control. C. localized control. D. centralized data. 53. Refer to the exhibit. An administrator is configuring a policy in addition to an existing hub and spoke policy for two sites that should directly communicate with each other. How is this policy configured?. A. Custom control (route and TLOC). B. hub-and-spoke. C. mesh. D. import existing topology. 54. Refer to the exhibit. Which configuration configures IPsec tunnels in active and standby?. A. vpn 1 service netsvc1 interface ipsec1 ipsec 2 from vsmart lists vpn-list 1 vpn 1. B. vpn 0 service netsvc1 interface ipsec1 ipsec2 vpn-list1 count ServicePSec1_xxxxxxxxxx from-vsmart lists vpn-list 0 vpn 0. C. vpn 0 service netsvc1 interface ipsec 1 ipsec2 from-vsmart lists vpn-list 0 vpn 0. D. vpn 1 service netsvc 1 interface ipsec 1 ipsec 2 vpn-list 1 count ServicePSec1_xxxxxxxxxxxx from-vsmart lists vpn-list 1 vpn 1. 55. An engineer is adding a tenant in vmanage. What is the maximum number of alphanumeric characters that are accepted in the tenant name field?. A. 64. B. 256. C. 8. D. 128. 56. A customer is receiving routes via omp from vSmart controller for a specific VPN. The customer must provide access to the W2 loopback received via OMP to the OSPF neighbor on the service-side VPN. Which configuration fullfills these requirements?. A. vpn 10 name **service vpn 10**** router ospf redistribute omp route-policy OSPF_Route_Policy area 0 interface ge0/2 exit lists prefix-list W2_loopback ip-prefix 10.10.10.5/24 ! route-policy OSPF_Route_policy sequence 1 match address W2_loopback ! default action accept set metric 100 metric-type type 1. B. vpn 10 name **service vpn 10**** router ospf redistribute omp route-policy OSPF_Route_Policy area 0 interface ge0/2 exit lists prefix-list W2_loopback ip-prefix 10.10.10.5/32 ! route-policy OSPF_Route_policy sequence 1 match address W2_loopback ! action accept set metric 100 metric-type type 1. C. vpn 10 router ospf redistribute omp route-policy OSPF_Route_Policy area 0 interface ge0/2 exit lists prefix-list W2_loopback ip-prefix 10.10.10.5/24 ! route-policy OSPF_Route_policy sequence 1 match address W2_loopback ! default action accept set metric 100 metric-type type 1. D. vpn 10 router ospf redistribute omp route-policy OSPF_Route_Policy area 0 interface ge0/2 exit lists prefix-list W2_loopback ip-prefix 10.10.10.5/32 ! route-policy OSPF_Route_policy sequence 1 match address W2_loopback ! action accept set metric 100 metric-type type 1. 57. An engineer wants to automate the onboarding process for a WAN edge rotuer with vManage. Which command will accomplish this. A. request vedge-cloud activate chassis number <chassis-number> token<token-number>. A. request vedge-cloud activate serial<serial> token<token-number>. A. request vedge-cloud activate chassis number <chassis-number> organization<organization>. A. request vedge-cloud activate chassis number <chassis-number> serial<serial>. 58. A network administrator is configuring a centralized control policy based on match action pairs for multiple conditions. Which order must be configured to prefer prefix list over TLOC and TLOC over Origin?. A. deterministic order. B. Lowest to highest sequence number. C. nonsequential order. D. highest to lowest sequence number. 59. In a Cisco SD-WAN network, which compoment is responsible for distributing route and policy information via OMP?. A. vbond orchestrator. B. vSmart controller. C. WAN Edge router. D. vManage. 60.Which component of the Cisco SD-WAN control plan architecture facilitates the storage of certificates and configurations for network components?. A.vManage. B. vSmart. C. vBond. D. WAN edge. 61. Refer to the exhibit. vManage logs are available for the past few months. A device name change was deployed mistakenly at critical site. how is the device name change tracked bu operations and design teams?. A. B. C. D. 62. a customer must upgrade the Cisco SD-WAN devices and controllers from version 19.2 to version 20.3. the devices include WAN edge cloud, vManage and vBond. Which types of image files are needed for this upgrade?. A. one file for vManage and one file for all other devices with extension .bin. B. one file for vManage, one for vSmart, and one for vBond + WAN edge cloud with extension tar.gz. C. one file for vManage and one file for all other devices with extension tar.gz. D. one file for vManage, one for vSmart, and one for vBond + WAN edge cloud with extension .bin. 63. which two prerequisites must be met before the cloud onRamp for IaaS is initiated on vManage to expand the AWS cloud? (choose two). A. subscribe to the SD-WAN edge router AMI in the AWS account. B. attach a device template to the cloud WAN Edge router to be deployed in the AWS. C. preprovision the transit VPC in the AWS region. D. attach an OSPF feature template to the AWS region. E. attach the "AmazonCreateVPC" and "AmazonProvisionEC2" permission policy to the IAM account. 64. an organization wants to use SD-WAN regionalized service-chaining feature to optimize cost and user experience with applications in the network, which allows branch routers to analyze and steer traffic toward the required network function. Which feature meets this requirement?. A. Cloud onRamp for Colocation. B. Cloud services platform. C. Cloud onRamps for IaaS. D. VNF service chaining. 65. Which feature allows reachablility to an organization's internally hosted applications for an active DNS security policy on a device?. A. data policy with redirect. B. DNSCrypt configuration. C. DHCP option 6. D.Local domain bypass. 66. what are the two protocols redistributed into OMP? (choose two). A. RIP. B. LDP. C. RSVP. D. OSPF. E. EIGRP. 67. How does the replicator role function in Cisco SD-WAN?. A. vSmart controllers advertise the rendezvous point to all receivers through the overlay network. B. WAN Edge devices advertise the rendezvous point to all receivers through the overlay network. C. vSmart controllers advertise the rendezvous point to all receivers through the underlay network. D. WAN Edge devices advertise the rendezvous point to all receivers through the underlay network. 68. Which two requirements must be met for DNS inspection when integrating with Cisco Umbrella? (choose two). A. upload the WAN Edge serial allow list to the umbrella portal. B. attach security policy to the device template. C. register and configure the vManage public IP and serial number in the umbrella portal. D. configure the umbrella token on the vManage. E. create and attach a system feature template with the umbrella registration credentials. 69. Drag and drop the steps from the left into the order on the right to upload software on vmanage repository that is accesible from Maintenance > Software Repository. Click the repository. Select vManage to store the software image. click add new software. Choose the file and click to upload. 70. Drag an drop the Cisco SD-WAN components from the left into their functions on the right. Vbond orchestrator. vManage. vSmart controller. WAN Edge router. 71. Drag and drop the REST API calls from the left onto the functions on the right. PUT. GET. POST. DELETE. 72. Drag and drop the devices from the left onto the correct functions on the right. vSmart. vmanage. vedge. vbond. 73. Drag and drop the actions from the left into the correct sequence on the right to create a data policy to direct traffic to the internet exit. Apply data policy. Enable NAT funcionality. Create centralized data policy. Identify VPN and match critearia. 74. Drag and drop the definitions from the left to the configuration on the right. Grouping of VPNs where the data traffic flows originate. Grouping of VPNs where the data traffic flows terminate. matching condition that allows traffic flow between two zones. container that associated forwarding and blocking decisions. 75. drag and drop. poll interval. color. hello interval. PMTU discovery. multiplier. 76. drag and drop the policies from the left onto the correct policy types on the right. stric hub-and-spoke topology. perform shaping on traffic. service firewall insertion. prefer voice and video via MPLS link. 77. Drag and Drop the components from the left onto the corresponding Cisco NFV infrastructure building Blocks on the right, Not all options are used. Cisco UCS. CEPH. RH OpenStack. Gluster. Cisco Hyperflex. UCS Director. |