Ensdwi Oct 2020
Ensdwi Oct 2020
Ensdwi Oct 2020
Question 1
Which component of the Cisco SD-WAN secure extensible network provides a single pane of
glass approach to network monitoring and configuration?
A. APIC-EM
B. vSmart
C. vManage
D. vBond
Answer: C
Question 2
What is a benefit of the application aware firewall feature in the Cisco SD-WAN solution?
A. application monitoring
B. application malware protection
C. application visibility
D. control policy enforcement
Answer: C
Question 3
A network administrator is configuring QoS on a Vedge 5000 router and needs to enable it on
the transport side interface. Which policy setting must be selected to accomplish this goal?
Answer: B
Question 4
A policy is created to influence routing path in the network using a group of prefixes. What
policy application will achieve this goal when applied to a site list?
A. control-policy
B. vpn-membership policy
C. app-route policy
D. cflowd-template
Answer: A
Question 5
An engineer wants to track tunnel characteristics within a SLA-based policy for convergence.
Which policy configuration will achieve this goal?
A. Data policy
B. Control policy
C. App-route policy
D. VPN membership policy
Answer: C
Question 6
vEdge-2(config-vpn-0)#interface ge0/2.101
vEdge-2(config-interface)#ip address 10.1.100.0/24
vEdge-2(config-interface)#tloc-extension ge0/0
vEdge-2(config-interface)#mtu 1496
vEdge-2(config-interface)#no shutdown
Answer: D
Question 7
Which two algorithms authenticate a user when configuring SNMPv3 monitoring on a WAN
Edge router? (Choose two)
A. AES-256
B. SHA-1
C. AES-128
D. MD5
E. SHA-2
Answer: D E
Question 8
Answer: D
Question 9
What is the purpose of ”vpn 0” in the configuration template when onboarding a WAN edge
node?
A. It carries control traffic over secure IPsec connections between vSmart controllers and
vEdge routers, and between vSmart and vManager
B. It carries control out-of-bond network management traffic among the Viptela devices in
the overlay network.
C. It carries control traffic over secure DTLS or TLS connections between vSmart controllers
and vEdge routers, and between vSmart and vBond
Answer: C
Question 10
In Cisco SD-WAN, what protocol is used for control connections between SD-WAN
devices?
A. BGP
B. OSPF
C. DTLS
D. OMP
Answer: D
Question 11
In an AWS cloud, which feature provision WAN Edge routers automatically in Cisco SD-
WAN?
A. Cloud OnRamp
B. vAnalytics
C. Cloud app
D. Network Designer
Answer: A
Question 12
When a WAN Edge device joins the SD-WAN overlay, which Cisco SD-WAN components
orchestrates the connection between the WAN Edge device and a vSmart controller?
A. OMP
B. vBond
C. vManage
D. APIC-EM
Answer: B
Question 13
A network administrator is bringing up one WAN Edge for branch connectivity. Which types
of tunnels form when the WAN edge router connects to the SD-WAN fabric?
A. DTLS or TLS tunnel with vBond controller and IPsec tunnel with vManage controller
B. DTLS or TLS tunnel with vBond controller and IPsec tunnel with other WAN Edge
routers
C. DTLS or TLS tunnel with vSmart controller and IPsec tunnel with other Edge routers
D. DTLS or TLS tunnel with vSmart controller and IPsec tunnel with vBond controller
Answer: C
Question 14
In the Cisco SD-WAN solution, vSmart controller is responsible for which two actions?
(Choose two)
Answer: C E
Question 15
Which device in the SD-WAN solution receives and categorizes event reports, and generates
alarms?
A. vSmart controllers
B. WAN Edge routers
C. vBond controllers
D. vManage NMS
Answer: D
Question 16
An administrator needs to configure SD-WAN to divert traffic from the company’s private
network to an ISP network. What action should be taken to accomplish this goal?
Answer: D
Question 17
Drag and drop the definitions from the left to the configuration on the right.
Answer:
+ destination zone: grouping of VPNs where the data traffic flows terminate
+ firewall policy: matching condition that allows traffic flow between two zones
+ source zone: grouping of VPNs where the data traffic flows originate
+ zone pair: container that associates forwarding and blocking decisions
Question 18
Drag and drop the attributes from the left that make each transport location unique onto the
right. Not all options are used.
Answer:
+ target 1: IP address
+ target 2: color
+ target 3: encapsulation
Question 19
Drag and drop the steps from the left into the order on the right to upload software on
vManage repository that is accessible from maintenance > Software Repository.
Answer:
Question 1
Answer: D
Question 2
Which two hardware platforms support Cisco IOS XE SD-WAN images? (Choose two)
A. ISR4000 series
B. ISR9300 series
C. vEdge-1000 series
D. ASR9000 series
E. ASR1000 series
Answer: A E
Question 3
Which Cisco SD-WAN WAN Edge platform supports LTE and Wi-Fi?
A. ISR 1101
B. ASR 1001
C. CSR 1000v
D. vEdge 2000
Answer: A
Question 4
Which component of the Cisco SD-WAN control plane architecture facilitates the storage of
certificates and configurations for network components?
A. vSmart
B. WAN Edge
C. vManage
D. vBond
Answer: C
Question 5
A. HTTPS
B. TLS
C. IPsec
D. DTLS
Answer: D
Question 6
Which component of the Cisco SD-WAN control plane architecture should be located in a
public Internet address space and facilitates NAT-traversal?
A. WAN Edge
B. vSmart
C. vBond
D. vManage
Answer: C
Question 7
Which component of the Cisco SD-WAN architecture oversees the control plane of overlay
network to establish, adjust, and maintain the connections that form the Cisco SD-WAN
fabric?
A. APIC-EM
B. vSmart
C. vManage
D. vBond
Answer: B
Question 8
A. Ability to provide and integrate security with complementary products and applications
B. The separation of management plane, control plane and data plane to enable horizontal
scaling
C. Truck roll branch turn up for easy provisioning and new installations
D. Cloud hosted or on-premise fully redundant management and control plane functions
Answer: B D
Question 9
Which Cisco SD-WAN component provides a secure data plane with remote vEdge routers?
A. vManage
B. vSmart
C. vBond
D. vEdge
Answer: D
Question 10
Which two mechanisms are used to guarantee the integrity of data packets in the Cisco SD-
WAN architecture data plane? (Choose two)
A. certificates
B. transport locations
C. authentication headers
D. encapsulation security payload
E. TPM chip
Answer: C D
Question 1
Answer: D
Question 2
Which configuration step is taken on vManage after WAN Edge list is uploaded to support
the on-boarding process before the device comes online?
Answer: C
Question 3
Answer: A
Question 4
Answer: C
vEdge Questions
https://www.certprepare.com/vedge-questions
Question 1
Two sites have one WAN Edge each. Each WAN Edge has two public TLOCs with no
restrict configured. There is full reachability between the TLOCs. How many data tunnels
are formed on each Edge router?
A. 6
B. 2
C. 4
D. 8
Answer: C
Question 2
On which device is a service FW address configured to insert firewall service at the hub?
Question 3
Which command verifies a policy that has been pushed to the vEdge router?
Answer: D
Question 4
Refer to the exhibit. An engineer is troubleshooting a control connection issue. What does
“connect” mean in this show control connections output?
Answer: C
Question 5
Which attributes are configured to uniquely identify and represent a TLOC route?
Question 6
Answer: A
Question 7
Which OSPF command makes the WAN Edge router a less preferred exit from a site with a
dual WAN Edge design?
A. B.
C. D.
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Question 8
A vEdge platform is sending VRRP advertisement messages every 10 seconds. Which value
configures the router back to the default timer?
A. 2 seconds
B. 5 seconds
C. 1 second
D. 3 seconds
Answer: C
Question 9
A. memory issue
B. certificate mismatch
C. organization mismatch
D. connectivity issue
Answer: D
Question 10
At which layer does the application-aware firewall block applications on a WAN Edge?
A. 3
B. 5
C. 2
D. 7
Answer: D
Question 11
A. 1 second
B. 15 seconds
C. 10 seconds
D. 5 seconds
Answer: A
Question 12
Answer: D
Question 1
When software is upgraded on a vManage NMS, which two image-adding options store
images in a local vManage software repository? (Choose two)
Answer: C D
Question 2
Which two platforms for the Cisco SD-WAN architecture are deployable in a hypervisor on-
premises or in IAAS Cloud? (Choose two)
A. CSR 1000v
B. ISR 4431
C. vEdge 100c
D. vEdge 2000
E. vEdge Cloud
Answer: A E
Question 3
Which two image formats are supported for controller nodes? (Choose two)
A. .nxos
B. .qcow2
C. .iso
D. .ova
E. .tgz
Answer: B D
Question 4
What are the two advantages of deploying cloud-based Cisco SD-WAN controllers? (Choose
two)
Answer: B C
Router Deployment
https://www.certprepare.com/router-deployment
Question 1
Which two platforms can host a vEdge Cloud Router? (Choose two)
A. Microsoft Azure
B. Dream host
C. AWS
D. DigitalCloud
E. Google
Answer: A C
Question 2
Which two services are critical for zero touch provisioning onboarding? (Choose two)
A. EMAIL
B. SNMP
C. AAA
D. DHCP
E. DNS
Answer: D E
Question 3
When redistribution is configured between OMP and BGP at two Data Center sites that have
Direct Connection Interlink, which step avoids learning the same routes on WAN Edge
routers of the DCs from LAN?
Answer: D
Question 4
Which device information is required on PNP/ZTP to support the zero touch onboarding
process?
Answer: A
Question 5
Which command displays BFD session summary information per TLOC on vEdge routers?
A. show bfd tloc-summary-list
B. show bfd history
C. show bfd summary
D. show bfd sessions
Answer: A
Question 6
Which configuration allows users to reach YouTube from a local Internet breakout?
A. B.
C. D.
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Question 7
B.
C.
D.
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Question 8
Refer to the exhibit. Which configuration change is needed to configure the tloc-extention on
Branch1-Edge1?
A. B.
C. D.
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Question 9
Which command on a WAN Edge device displays the information about the colors present in
the fabric that are learned from vSmart via OMP?
A. show omp peers
B. show omp route
C. show omp sessions
D. show omp tlocs
Answer: D
Question 10
Answer: B
Question 1
Refer to the exhibit. Which QoS treatment results from this configuration after the access list
acl-guest is applied inbound on the vpn1 interface?
A. A TCP packet sourcing from 172.16.10.1 and destined to 172.16.20.1 is dropped
B. A UDP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted
C. A UDP packet sourcing from 172.16.10.1 and destined to 172.16.20.1 is dropped
D. A TCP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted
Answer: C
Question 2
A. vBond
B. vSmart
C. WAN Edge
D. Firewall
Answer: B
Question 3
Which configuration changes the packet loss priority from low to high?
A. B.
C. D.
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
Question 4
A. Data policy
B. Centralized policy
C. Localized policy
D. Control policy
Answer: B
Question 5
Where does the Cisco V-Edge Router perform QoS traffic classification?
A. Per VPN
B. Per vEdge
C. Egress interface
D. Ingress interface
Answer: D
Question 6
Which scheduling method is configured by default for the eight queues in the cloud vEdge
router?
Answer: A
Question 7
A voice packet requires a latency of 50 msec. Which policy is configured to ensure that a
voice packet is always sent on the link with less than a 50 msec delay?
A. localized data
B. centralized control
C. localized control
D. centralized data
Answer: D
VPN Questions
https://www.certprepare.com/vpn-questions
Question 1
In which VPN is the NAT operation on an outgoing interface configured for direct Internet
access?
A. 0
B. 512
C. 10
D. 1
Answer: A
Question 2
When the VPN membership policy is being controlled at the vSmart controller, which policy
disallows VPN 1 at sites 20 and 30?
A. B.
C. D.
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Question 3
When VPNs are grouped to create destination zone in Zone-Based Firewall, how many
zones can a single VPN be part of?
A. two
B. four
C. one
D. three
Answer: C
Question 4
A.
B.
C.
D.
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Security Questions
https://www.certprepare.com/security-questions-3
Question 1
Which on-the-box security feature is supported by the Cisco ISR 4451 SD-WAN device and
not on vEdge?
Answer: C
Question 2
Answer: C
Question 3
Which value is verified in the certificates to confirm the identity of the device?
A. Serial Number
B. OTP
C. System-IP
D. Chassis-ID
Answer: A
Question 4
Which hardware component is involved in the Cisco SD-WAN authentication process for ISR
platforms?
A. ZTP
B. OTPC
C. SUDI
D. TPMD
Answer: C
Question 5
Which alarm setting is configured to monitor serious events that affect, but do not shut down,
the operation of a network function?
A. Critical
B. Medium
C. Major
D. Minor
Answer: C
Troubleshooting Questions
https://www.certprepare.com/troubleshooting-questions
Question 1
Which command disables the logging of syslog messages to the local disk?
Answer: C
Question 2
A. ACL
B. Email
C. SNMP
D. Audit
Answer: D
Question 3
Which protocol is used to measure loss, latency, jitter, and liveliness of the tunnel between
WAN Edge router peers?
A. OMP
B. NetFlow
C. BFD
D. IP SLA
Answer: C
Question 4
Which pathway under Monitor > Network > Select Device is used to verify service insertion
configuration?
A. System Status
B. ACL Logs
C. Real Time
D. Events
Answer: C
Question 1
Drag and drop the devices from the left onto the correct functions on the right.
Answer:
+ establishes a secured data plane: vEdge
+ first point of authentication: vBond
+ single pane of glass: vManage
+ enforces control policies: vSmart
Question 2
Drag and drop the vManage policy configuration procedures from the left onto the correct
definitions on the right.
Answer:
+ Create the network structure to which the policy applies: Configure topology
+ Associate a policy with sites and VPNs in the overlay network: Apply policies to sites and
VPNs
+ Create the match and action conditions of a policy: Configure traffic rules
+ Create lists that group together related items that an engineer can call in the match or action
components of a policy: Create groups of interest
Question 3
Drag and drop the policies from the left onto the correct policy types on the right.
Answer:
Control Policy
+ strict hub-and-spoke topology
+ service firewall insertion
Data Policy
+ perform shaping on traffic
+ prefer voice and video via MPLS link
Question 4
Drag and drop the route verification output from show omp tlocs from the left onto the
correct explanations on the right.
Answer:
Question 5
Drag and drop the actions from the left into the correct sequence on the right to create a
data policy to direct traffic to the Internet exit
Answer:
Question 6
Drag and drop the functions from the left onto the correct templates on the right.
Answer:
+ routing policy: route-map
+ transport VPN: VPN 0
+ management VPN: VPN 512
+ service VPN: VPN 10
+ system information: organization name