Which secure connection should be used to access the REST APIs through the Cisco vManage web server?
Which secure connection should be used to access the REST APIs through the Cisco vManage web server?A . HTTP inspector interfaceB . authenticated HTTPSC . authenticated DTLSD . JSON Inspector interfaceView AnswerAnswer: B Explanation: https://documenter.getpostman.com/view/3224967/SVmpXhXd#ed9ccd34-cc5a-4258-bb6b-9b3848b7f650
Which hardware component is involved in the Cisco SD-WAN authentication process for ISR platforms?
Which hardware component is involved in the Cisco SD-WAN authentication process for ISR platforms?A . TPMDB . ZTPC . TPCD . SUDIView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/SDWAN/sdwan-wan-edge-onboarding-deploy-guide-2020nov.pdf
Which command on a WAN Edge device displays the information about the colors present in the fabric that are learned from vSmart via OMP?
Which command on a WAN Edge device displays the information about the colors present in the fabric that are learned from vSmart via OMP?A . show omp tlocsB . show omp sessionsC . show omp peersD . show omp routeView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/routers/sdwan/command/sdwan-cr-book/sdwan-cr-book_chapter_0100.html#wp1675287742
Which set of configurations accomplishes this task?
Refer to the exhibit. The ge0/0 interface connects to a 30-MB link. A network administrator wants to always have 10 MB available for high priority traffic. When lower-priority traffic busts exceed 20 MB. Traffic should be redirected to the second WAN interface ge0/1. Which set of configurations accomplishes this task?...
In which device state does the WAN edge router create control connections, but data tunnels are not created?
In which device state does the WAN edge router create control connections, but data tunnels are not created?A . validB . backupC . activeD . stagingView AnswerAnswer: D
Which types of tunnels form when the WAN edge router connects to the SD-WAN fabric?
A network administrator is bringing up one WAN Edge for branch connectivity. Which types of tunnels form when the WAN edge router connects to the SD-WAN fabric?A . DTLS or TLS tunnel with vBond controller and IPsec tunnel with vManage controller.B . DTLS or TLS tunnel with vBond controller and...
Drag and drop the BFD parameters from the left onto the BFD configurations on the right
DRAG DROP Drag and drop the BFD parameters from the left onto the BFD configurations on the right. View AnswerAnswer: Explanation: https://sdwandocs.cisco.com/Product_Documentation/vManage_Help/Release_18.2/Configuration/Templates/BFD
What is an attribute of TLOC’?
What is an attribute of TLOC’?A . encryptionB . local preferenceC . tagD . serviceView AnswerAnswer: C
How is the scalability of the vManage increased in Cisco SD-WAN Fabric?
How is the scalability of the vManage increased in Cisco SD-WAN Fabric?A . Increase licensing on the vManageB . Deploy multiple vManage controllers in a clusterC . Deploy more than one vManage controllers on different physical server.D . Increase the bandwidth of the WAN link connected to the vManageView AnswerAnswer:...
Which list accomplishes this task?
An engineer is configuring a list that matches all IP prefixes with lengths from /1 to /16 in a centralized control policy. Which list accomplishes this task?A . 0.0.0.0/1 le 16B . 0.0.0.0/0 ge 1C . 0.0.0.0/0 le l6D . 0.0.0.0/16 ge 1View AnswerAnswer: A