Which two WAN Edge devices should be deployed in a cloud? (Choose two.)
Which two WAN Edge devices should be deployed in a cloud? (Choose two.)A . vEdge 5000vB . ASR 1000vC . CSR 1000vD . vEdge 100wmE . vEdge cloudView AnswerAnswer: C, E Explanation:
Which hardware component is involved in the Cisco SD-WAN authentication process for ISR platforms?
Which hardware component is involved in the Cisco SD-WAN authentication process for ISR platforms?A . TPMDB . ZTPC . TPCD . SUDIView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/SDWAN/sdwan-wan-edge-onboarding-deploy-guide-2020nov.pdf
At which layer does the application-aware firewall block applications on a WAN Edge?
At which layer does the application-aware firewall block applications on a WAN Edge?A . 3B . 7C . 5D . 2View AnswerAnswer: B
What must be configured to get the fastest failover to standby?
A network administrator is configuring VRRP to avoid a traffic black hole when the transport side of the network is down on the master device. What must be configured to get the fastest failover to standby?A . lower timer intervalB . prefix-list trackingC . higher group ID numberD . OMP...
What action should be taken to accomplish this goal?
An administrator needs to configure SD-WAN to divert traffic from the company's private network to an ISP network. What action should be taken to accomplish this goal?A . configure the control policyB . configure the data policyC . configure the data security policyD . configure the application aware policyView AnswerAnswer:...
Drag and drop the definitions from the left to the configuration on the right
DRAG DROP Drag and drop the definitions from the left to the configuration on the right. View AnswerAnswer: Explanation:
Drag and drop the policies from the left onto the correct policy types on the right
DRAG DROP Drag and drop the policies from the left onto the correct policy types on the right. View AnswerAnswer:
Which two algorithms authenticate a user when configuring SNMPv3 monitoring on a WAN Edge router? (Choose two.)
Which two algorithms authenticate a user when configuring SNMPv3 monitoring on a WAN Edge router? (Choose two.)A . AES-256B . SHA-1C . AES-128D . MD5E . SHA-2View AnswerAnswer: A B Explanation: https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/snmp/snmp-book.html
Which type of route advertisement of OMP can be verified?
Which type of route advertisement of OMP can be verified?A . OMP, VPN. and originB . Origin, TLOC, and VPNC . Origin, TLOC, and serviceD . OMP, TLOC and serviceView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/routers/sdwan/configuration/config-18-2.pdf#page=122
When the VPN membership policy is being controlled at the vSmart controller, which policy disallows VPN 1 at sites 20 and 30?
When the VPN membership policy is being controlled at the vSmart controller, which policy disallows VPN 1 at sites 20 and 30? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/routers/sdwan/configuration/config-17-2.pdf#page=190