Which routing protocol is used to exchange control plane information between vSmart controllers and WAN Edge routers in the Cisco SD-WAN secure extensible network?

Which routing protocol is used to exchange control plane information between vSmart controllers and WAN Edge routers in the Cisco SD-WAN secure extensible network?A . BGPB . OSPFC . BFDD . OMPView AnswerAnswer: D

June 19, 2022 No Comments READ MORE +

Which two actions accomplish this task?

An engineer is configuring a WAN Edge router for DIA based on matching QoS parameters. Which two actions accomplish this task? (Choose two.)A . Apply a QoS map policy.B . Configure a control policy.C . Configure a centralized data policy.D . Configure NAT on the transport interface.E . Apply a...

June 18, 2022 No Comments READ MORE +

Which component of the Cisco SD-WAN secure extensible network provides a single paneof glass approach to network monitoring and configuration?

Which component of the Cisco SD-WAN secure extensible network provides a single paneof glass approach to network monitoring and configuration?A . APIC-EMB . vSmartC . vManageD . vBondView AnswerAnswer: C

June 18, 2022 No Comments READ MORE +

Drag and drop the BFD parameters from the left onto the BFD configurations on the right

DRAG DROP Drag and drop the BFD parameters from the left onto the BFD configurations on the right. View AnswerAnswer: Explanation: https://sdwandocs.cisco.com/Product_Documentation/vManage_Help/Release_18.2/Configuration/Templates/BFD

June 17, 2022 No Comments READ MORE +

When a WAN Edge device joins the SD-WAN overlay, which Cisco SD-WAN components orchestrates the connection between the WAN Edge device and a vSmart controller?

When a WAN Edge device joins the SD-WAN overlay, which Cisco SD-WAN components orchestrates the connection between the WAN Edge device and a vSmart controller?A . vManageB . vBondC . OMPD . APIC-EMView AnswerAnswer: B

June 17, 2022 No Comments READ MORE +

Which list accomplishes this task?

An engineer is configuring a list that matches all IP prefixes with lengths from /1 to /16 in a centralized control policy. Which list accomplishes this task?A . 0.0.0.0/1 le 16B . 0.0.0.0/0 ge 1C . 0.0.0.0/0 le l6D . 0.0.0.0/16 ge 1View AnswerAnswer: B

June 16, 2022 No Comments READ MORE +

Drag and drop the functions from the left onto the correct templates on the right

DRAG DROP Drag and drop the functions from the left onto the correct templates on the right. View AnswerAnswer:

June 16, 2022 No Comments READ MORE +

What is the maximum number of alphanumeric characters that are accepted in the tenant name field?

An engineer is adding a tenant with location JD 306432373 in vManage. What is the maximum number of alphanumeric characters that are accepted in the tenant name field?A . 64B . 128C . 256D . 8View AnswerAnswer: B

June 15, 2022 No Comments READ MORE +

Which command allows traffic through the IPsec tunnel configured in VPN 0?

Refer to the exhibit. Which command allows traffic through the IPsec tunnel configured in VPN 0?A . service localB . service FW address 1.1.1.1C . service netsvc1 vpn 1D . service netsvc1 address 1.1.1.1View AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/policies/vedge-20-x/policies-book/service-chaining.html

June 15, 2022 No Comments READ MORE +

Which device in the SD- WAN solution receives and categorizes event reports, and generates alarms?

Which device in the SD- WAN solution receives and categorizes event reports, and generates alarms?A . WAN Edge routersB . vSmart controllersC . vManage NMSD . vBond controllersView AnswerAnswer: C Explanation: https://sdwan-docs.cisco.com/Product_Documentation/vManage_Help/Release_17.1/vManage_NMS_Product_Help

June 15, 2022 No Comments READ MORE +