PdfPrep.com

300-415 ENSDWI Implementing Cisco SD-WAN Solutions Online Questions

Implementing Cisco SD-WAN Solutions 300-415 ENSDWI online questions have been updated, which can help you test your knowledge of Cisco’s SD-WAN solution including SD-WAN architecture, controller deployment, WAN Edge router deployment, policies, security, quality of service, multicast, and management and operations. Learn the Cisco certification 300-415 ENSDWI exam free updated online questions below.

Page 1 of 14

 Loading...
1. Which feature builds transport redundancy by using the cross link between two redundant WAN Edge routers?

 Loading...
2. When redistribution is configured between OMP and BGP at two Data Center sites that have Direct Connection interlink, which step avoids learning the same routes on WAN Edge routers of the DCs from LAN?

 Loading...
3. Refer to the exhibit.





Which two configurations are needed to get the WAN Edges registered with the controllers when certificates are used? (Choose two)

 Loading...
4. Refer to the exhibit.





A network administrator is configuring OMP in vManage to advertise all the paths for the same prefix from a site that has two WAN Edge devices Each WAN Edge device is connected to three ISPs and two private MPLS transports .

What is the minimum value for 'Number of Paths advertised per Prefix" that should be configured?

 Loading...
5. DRAG DROP

Drag and drop the policies from the left onto the correct policy types on the right.



 Loading...
6. For data plane resiliency, what does the Cisco SD-WAN software implement?

 Loading...
7. In which device state does the WAN edge router create control connections, but data tunnels are not created?

 Loading...
8. Which protocol is used to measure loss latency, Jitter, and liveliness of the tunnel between WAN Edge router peers?

 Loading...
9. Which configuration changes the packet loss priority from low to highly?

A)





B)





C)





D)



 Loading...
10. Which device information is requited on PNP/ZTP to support the zero-touch onboarding process?

Page 2 of 14

 Loading...
11. Refer to the exhibit.





Which configuration routes Site 2 through the firewall in Site 1?



 Loading...
12. Refer to the exhibit.





Which QoS treatment results from this configuration after the access list acl-guest is applied inbound on the vpn1 interface?

 Loading...
13. DRAG DROP

Drag and drop the vManage policy configuration procedures from the left onto the correct definitions on the right.



 Loading...
14. When software is upgraded on a vManage NMS, which two image-adding options store images in a local vManage software repository? (Choose two.)

 Loading...
15. Which pathway under Monitor > Network > Select Device is used to verify service insertion configuration?

 Loading...
16. Which component of the Cisco SD-WAN control plane architecture should be located in a public Internet address space and facilitates NAT-traversal?

 Loading...
17. Refer to the exhibit .





Which configuration extends the INET interface on R1 to be used by R2 for control and data connections?

A)





B)





C)



 Loading...
18. A network administrator is bringing up one WAN Edge for branch connectivity .

Which types of tunnels form when the WAN edge router connects to the SD-WAN fabric?

 Loading...
19. Refer to the exhibit.





The network administrator has configured a centralized topology policy that results in the displayed routing table at a branch office .

Which two configurations are verified by the output? [Choose two.)

 Loading...
20. Refer to the exhibit.





The tunnel interface configuration on both WAN Edge routers is:





Which configuration for WAN Edge routers will connect to the Internet?



Page 3 of 14

 Loading...
21. Which type of route advertisement of OMP can be verified?

 Loading...
22. What are the two advantages of deploying cloud-based Cisco SD-WAN controllers? (Choose two.)

 Loading...
23. DRAG DROP

Drag and drop the attributes from the left that make each transport location unique onto the right. Not all options are used.



 Loading...
24. At which layer does the application-aware firewall block applications on a WAN Edge?

 Loading...
25. Company ABC has decided to deploy the controllers using the On-Prem method .

How does the administrator upload the WAN Edge list to the vManage?

A)





B)





C)





D)



 Loading...
26. Refer to the exhibit.





What binding is created using the tloc-extension command?

 Loading...
27. DRAG DROP

Drag and drop the REST API calls from the left onto the functions on the right.



 Loading...
28. DRAG DROP

Drag and drop the components from the left onto the corresponding Cisco NFV infrastructure Building Blocks on the right. Not all options are used.



 Loading...
29. Which policy blocks TLOCs from remotes and allows TLOCs from the data center to form hub-and-spoke peering?

 Loading...
30. An engineer is tasked to improve throughput for connection-oriented traffic by decreasing round-trip latency .

Which configuration will achieve this goal?

Page 4 of 14

 Loading...
31. Two sites have one WAN Edge each WAN Edge has two public TLOCs with no restriction configured. There is full reachability between the TLOCs .

How many data tunnels are formed on each Edge router?

 Loading...
32. Which combination of platforms are managed by vManage?

 Loading...
33. Where on vManage does an engineer find the details of control node failure?

 Loading...
34. Which two requirements must be met for DNS inspection when integrating with cisco umbrella? (Choose two)

 Loading...
35. Which OSPF command makes the WAN Edge router a less preferred exit from a site with a dual WAN Edge design?

A)





B)





C)





D)



 Loading...
36. Refer to the exhibit.





The ge0/0 interface connects to a 30-MB link. A network administrator wants to always have 10 MB available for high priority traffic. When lower-priority traffic busts exceed 20 MB. Traffic should be redirected to the second WAN interface ge0/1 .

Which set of configurations accomplishes this task?

A)





B)





C)





D)



 Loading...
37. Which two features does the application firewall provide? (Choose two.)

 Loading...
38. What is an advantage of using auto mode versus static mode of power allocation when an access point is connected to a PoE switch port?

 Loading...
39. Which alarm setting is configured to monitor serious events that affect but do not shut down, the operation of a network function?

 Loading...
40. Which Cisco SD-WAN WAN Edge platform supports LTE and Wi-Fi?

Page 5 of 14

 Loading...
41. Which policy configures an application-aware routing policy under Configuration > Policies?

 Loading...
42. In Cisco SD-WAN, what protocol is used for control connections between SD-WAN devices?

 Loading...
43. On which device is a service FW address configured to Insert firewall service at the hub?

 Loading...
44. When VPNs are grouped to create destination zone in Zone-Based Firewall, how many zones can a single VPN be part of?

 Loading...
45. What is the purpose of ‘’vpn 0’’ in the configuration template when onboarding a WAN edge node?

 Loading...
46. Which two image formats are supported for controller codes? (Choose two.)

 Loading...
47. An engineer is troubleshooting a certificate issue on vEdge .

Which command is used to verify the validity of the certificates?

 Loading...
48. Which component of the Cisco SD-WAN control plane architecture facilitates the storage of certificates and configurations for network components?

 Loading...
49. Refer to the exhibit.





Which configuration change is needed to configure the tloc-extention on Branch1-Edge1?

A)





B)





C)





D)



 Loading...
50. An engineer wants to track tunnel characteristics within an SLA-based policy for convergence .

Which policy configuration will achieve this goal?

Page 6 of 14

 Loading...
51. Which scheduling method is configured by default for the eight queues in the cloud vEdge router1?

 Loading...
52. Which logs verify when a device was upgraded?

 Loading...
53. Refer to the exhibit.





An engineer is configuring service chaining .

Which set of configurations is required for all traffic from Site ID 1 going toward Site ID 2 to get filtered through the firewall on the hub site?

A)





B)





C)





D)



 Loading...
54. DRAG DROP

Drag and drop the Cisco SD-WAN components from the left onto their functions on the right.



 Loading...
55. A large retail organization decided to move some of the branch applications to the AWS cloud .

How does the network architect extend the in-house Cisco SD-WAN branch to cloud network into AWS?

 Loading...
56. An engineer wants to automate the onboarding process for a WAN Edge router with vManage .

Which command will accomplish this?

 Loading...
57. When a WAN Edge device joins the SD-WAN overlay, which Cisco SD-WAN components orchestrates the connection between the WAN Edge device and a vSmart controller?

 Loading...
58. Which device in the SD- WAN solution receives and categorizes event reports, and

generates alarms?

 Loading...
59. DRAG DROP

Drag and drop the steps from the left into the order on the right to upload software on vManage repository that is accessible from maintenance > Software Repository.



 Loading...
60. DRAG DROP

Drag and drop the functions from the left onto the correct templates on the right.



Page 7 of 14

 Loading...
61. Which combination of platforms are managed by vManage?

 Loading...
62. What is the default interval for BFD packets?

 Loading...
63. Which two platforms can host a vEdge Cloud Router? (Choose two)

 Loading...
64. Which two services are critical for zero touch provisioning onboarding? (Choose two)

 Loading...
65. Which statement about VRRP is true?

 Loading...
66. Where does the Cisco V-Edge Router perform QoS traffic classification?

 Loading...
67. Which on-the-box security feature is supported by the Cisco ISR 4451 SD-WAN device and not on vEdge?

 Loading...
68. A policy is created to influence routing in the network using a group of prefixes.

What policy application will achieve this goal when applied to a site list?

 Loading...
69. Which secure connection should be used to access the REST APIs through the Cisco vManage web server?

 Loading...
70. Which two products that perform lifecycle management for virtual instances are supported by WAN Edge cloud routers? (Choose two.)

Page 8 of 14

 Loading...
71. What is a description of vManage NMS?

 Loading...
72. In which device state does the WAN edge router create control connections, but data tunnels are not created?

 Loading...
73. Which two WAN Edge devices should be deployed in a cloud? (Choose two.)

 Loading...
74. Which port is used for vBond under controller certificates if no alternate port is configured?

 Loading...
75. A network administrator is creating an OMP feature template from the vManage GUI to be applied to WAN edge routers.

Which configuration attribute will avoid the redistribution of the routes back into the OMP from the LAN side?

 Loading...
76. Which device information is requited on PNP/ZTP to support the zero touch onboarding process?

 Loading...
77. An engineer is configuring a centralized policy to influence network route advertisement.

Which controller delivers this policy to the fabric?

 Loading...
78. An engineer is tasked to improve throughput for connection-oriented traffic by decreasing round-trip latency Which configuration will achieve this goal?

 Loading...
79. Which VPN connects the transport-side WAN Edge interface to the underlay/WAN network?

 Loading...
80. Refer to the exhibit.





A network administrator is configuring OMP in vManage to advertise all the paths for the same prefix from a site that has two WAN Edge devices Each WAN Edge device is connected to three ISPs and two private MPLS transports.

What is the minimum value for 'Number of Paths advertised per Prefix" that should be configured?

Page 9 of 14

 Loading...
81. If Smart Account Sync is not used, which Cisco SD-WAN component Is used to upload an authorized serial number file?

 Loading...
82. Which feature builds transport redundancy by using the cross link between two redundant WAN Edge routers?

 Loading...
83. A network administrator is configuring a tunnel interface on a branch Cisco IOS XE router to run TLOC extensions.

Which configuration will extend a TLOC over a GRE tunnel to another router in the branch?

A)





B)





C)





D)



 Loading...
84. Which component of the Cisco SD-WAN architecture oversees the control plane of overlay network to establish, adjust, and maintain the connections that form the Cisco SD-WAN fabric?

 Loading...
85. Which two hardware platforms support Cisco IOS XE SD-WAN images? (Choose two.)

 Loading...
86. What is a default protocol for control plane connection?

 Loading...
87. Which component of the Cisco SD-WAN control plane architecture should be located in a public Internet address space and facilitates NAT-traversal?

 Loading...
88. Which Cisco SD-WAN WAN Edge platform supports LTE and Wi-Fi?

 Loading...
89. Refer to the exhibit.





What does the BFD value of 8 represent?

 Loading...
90. What are the two advantages of deploying cloud-based Cisco SD-WAN controllers? (Choose two.)

Page 10 of 14

 Loading...
91. Which two image formats are supported for controller codes? (Choose two.)

 Loading...
92. Which two platforms for the Cisco SD-WAN architecture are deployable in a hypervisor on-premises or in IAAS Cloud? (Choose two.)

 Loading...
93. How is the scalability of the Manage increased in Cisco SD-WAN Fabric?

 Loading...
94. Which component of the Cisco SD-WAN control plane architecture facilitates the storage of certificates and configurations for network components?

 Loading...
95. An engineer is troubleshooting a vEdge router and identifies a “DCONFAIL C DTLS connection failure” message.

What is the problem?

 Loading...
96. An engineer is troubleshooting a certificate issue on vEdge.

Which command is used to verify the validity of the certificates?

 Loading...
97. Refer to the exhibit.





An engineer is troubleshooting a control connection issue.

What does “connect” mean in this show control connections output?

 Loading...
98. A vEdge platform is sending VRRP advertisement messages every 10 seconds.

Which value configures the router back to the default timer?

 Loading...
99. Which OSPF command makes the WAN Edge router a less preferred exit from a site with a dual WAN Edge design?

A)





B)





C)





D)



 Loading...
100. Which two services are critical for zero touch provisioning on-boarding? (Choose two.)

Page 11 of 14

 Loading...
101. When redistribution is configured between OMP and BGP at two Data Center sites that have Direct Connection Interlink, which step avoids learning the same routes on WAN Edge routers of the DCs from LAN?

 Loading...
102. Which device information is required on PNP/ZTP to support the zero touch onboarding process?

 Loading...
103. Which configuration step is taken on vManage after WAN Edge list is uploaded to support the on-boarding process before the device comes online?

 Loading...
104. On which device is a service FW address configured to insert firewall service at the hub?

 Loading...
105. Which attributes are configured to uniquely identify and represent a TLOC route?

 Loading...
106. Which type of route advertisement of OMP can be verified?

 Loading...
107. When VPNs are grouped to create destination zone in Zone-Based Firewall, how many zones can a single VPN be part of?

 Loading...
108. Which template configures the out-of band management VPN?

A)





B)





C)





D)



 Loading...
109. Which on-the-box security feature is supported by the Cisco ISR 4451 SD-WAN device and not on vEdge?

 Loading...
110. What is a benefit of the application-aware firewall?

Page 12 of 14

 Loading...
111. Which value is verified in the certificates to confirm the identity of the device?

 Loading...
112. Which hardware component is involved in the Cisco SD-WAN authentication process for ISR platforms?

 Loading...
113. Which alarm setting is configured to monitor serious events that affect, but do not shut down, the operation of a network function?

 Loading...
114. Which command disables the logging of syslog messages to the local disk?

 Loading...
115. Which logs verify when a device was upgraded?

 Loading...
116. Which protocol is used to measure loss, latency, jitter, and liveliness of the tunnel between WAN Edge router peers?

 Loading...
117. Which pathway under Monitor > Network > Select Device is used to verify service insertion configuration?

 Loading...
118. Drag and drop the devices from the left onto the correct functions on the right.



 Loading...
119. Drag and drop the vManage policy configuration procedures from the left onto the correct definitions on the right.



 Loading...
120. Drag and drop the policies from the left onto the correct policy types on the right.



Page 13 of 14

 Loading...
121. Drag and drop the route verification output from show omp tlocs from the left onto the correct explanations on the right.



 Loading...
122. Drag and drop the actions from the left into the correct sequence on the right to create a data policy to direct traffic to the Internet exit



 Loading...
123. Drag and drop the functions from the left onto the correct templates on the right.



 Loading...
124. Which component of the Cisco SD-WAN secure extensible network provides a single pane of glass approach to network monitoring and configuration?

 Loading...
125. What is a benefit of the application aware firewall feature in the Cisco SD-WAN solution?

 Loading...
126. A network administrator is configuring QoS on a Vedge 5000 router and needs to enable it on the transport side interface.

Which policy setting must be selected to accomplish this goal?

 Loading...
127. A policy is created to influence routing path in the network using a group of prefixes.

What policy application will achieve this goal when applied to a site list?

 Loading...
128. An engineer wants to track tunnel characteristics within a SLA-based policy for convergence.

Which policy configuration will achieve this goal?

 Loading...
129. Refer to the exhibit.





What binding is created using the tloc-extension command?

 Loading...
130. Which two algorithms authenticate a user when configuring SNMPv3 monitoring on a WAN Edge router? (Choose two)

Page 14 of 14

 Loading...
131. A network administrator is configuring an application-aware firewall between inside zones to an outside zone on a WAN edge router using vManage GUI.

What kind of inspection is performed when the ”inspect” action is used?

 Loading...
132. What is the purpose of ”vpn 0” in the configuration template when onboarding a WAN edge node?

 Loading...
133. In Cisco SD-WAN, what protocol is used for control connections between SD-WAN devices?

 Loading...
134. In an AWS cloud, which feature provision WAN Edge routers automatically in Cisco SD - WAN?

 Loading...
135. When a WAN Edge device joins the SD-WAN overlay, which Cisco SD-WAN components orchestrates the connection between the WAN Edge device and a vSmart controller?

 Loading...
136. A network administrator is bringing up one WAN Edge for branch connectivity.

Which types of tunnels form when the WAN edge router connects to the SD -WAN fabric?

 Loading...
137. In the Cisco SD-WAN solution, vSmart controller is responsible for which two actions? (Choose two)

 Loading...
138. Which device in the SD-WAN solution receives and categorizes event reports, and generates alarms?

 Loading...
139. An administrator needs to configure SD-WAN to divert traffic from the company’s private network to an ISP network.

What action should be taken to accomplish this goal?

 Loading...
140. Drag and drop the definitions from the left to the configuration on the right.



 Loading...

 

Exit mobile version