Drag and drop the actions from the left into the correct sequence on the right to create a data policy to direct traffic to the Internet exit
DRAG DROP Drag and drop the actions from the left into the correct sequence on the right to create a data policy to direct traffic to the Internet exit. View AnswerAnswer: Explanation: Step 1 C Enable NAT Functionality Step 2 C Create centralized data policy Step 3 C Identify VPN...
Which configuration step is taken on vManage after WAN Edge list is uploaded?
Which configuration step is taken on vManage after WAN Edge list is uploaded?A . Send the list to controllersB . Enable the ZTP processC . Verify the device certificateD . Set the device as validView AnswerAnswer: D Explanation: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/SDWAN/sdwan-wan-edge-onboarding-deploy-guide-2020nov.pdf
Which feature builds transport redundancy by using the cross link between two redundant WAN Edge routers?
Which feature builds transport redundancy by using the cross link between two redundant WAN Edge routers?A . OMPB . zero-touch provisioningC . quality of serviceD . TLOC extensionView AnswerAnswer: D Explanation:
Which component of the Cisco SD-WAN control plane architecture facilitates the storage of certificates and configurations for network components?
Which component of the Cisco SD-WAN control plane architecture facilitates the storage of certificates and configurations for network components?A . vSmartB . vBondC . WAN EdgeD . vManageView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/sdwan-xe-gs-book/system-overview.html
Drag and drop the route verification output from show omp tlocs from the left onto the correct explanations on the right
DRAG DROP Drag and drop the route verification output from show omp tlocs from the left onto the correct explanations on the right. View AnswerAnswer:
Drag and drop the attributes from the left that make each transport location unique onto the right. Not all options are used
DRAG DROP Drag and drop the attributes from the left that make each transport location unique onto the right. Not all options are used. View AnswerAnswer:
What kind of Inspection is performed when the ‘’inspect’’ action is used?
A network administrator is configuring an application-aware firewall between inside zones to an outside zone on a WAN edge router using vManage GUI. What kind of Inspection is performed when the ‘’inspect’’ action is used?A . stateful inspection for TCP and UDPB . stateful inspection for TCP and stateless inspection...
How many data tunnels are formed on each Edge router?
Two sites have one WAN Edge each WAN Edge has two public TLOCs with no restriction configured. There is full reachability between the TLOCs. How many data tunnels are formed on each Edge router?A . 2B . 8C . 6D . 4View AnswerAnswer: D
In the Cisco SD_WAN solution, vSmart controller is responsible for which two actions? (Choose two.)
In the Cisco SD_WAN solution, vSmart controller is responsible for which two actions? (Choose two.)A . Distribute crypto key information among vEdge routersB . Configure and monitor vEdge routers.C . Authenticate and authorize vEdge routers.D . Distribute the IP address from DHCP server to vEdge routers.E . Distribute route and...
In Cisco SD-WAN, what protocol is used for control connections between SD-WAN devices?
In Cisco SD-WAN, what protocol is used for control connections between SD-WAN devices?A . DTLSB . OMPC . BGPD . OSPFView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/security/vedge/security-book/security-overview.html