Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

300-415 Exam Dumps - Implementing Cisco SD-WAN Solutions (300-415 ENSDWI)

Go to page:
Question # 49

Which IP address must be reachable by a WAN Edge device for the ZIP process to work?

A.

10.1.1.1

B.

4.4 4.4

C.

172.16.1.1

D.

8.8.8.8

Full Access
Question # 50

An engineer is configuring a data policy for IPv4 prefixes for a single WAN Edge device on a site with multiple WAN Edge devices How is this policy added using the policy configuration wizard?

A.

ln vManage NMS, select the configure â–º policies screen, select the localized policy tab and click add policy

B.

In vSmart controller, select the configure â–º policies screen, select the localized policy tab. and click add policy

C.

In vManage NMS. select the configure â–º policies screen select the centralized policy tab and click add policy

D.

In vBond orchestrator. select the configure â–º policies screen, select the localized policy tab. and click add policy

Full Access
Question # 51

Which policy configures an application-aware routing policy under Configuration > Policies?

A.

Localized policy

B.

Centralized policy

C.

Data policy

D.

Control policy

Full Access
Question # 52

An engineer must configure the SD-WAN Edge router to identify DSCP 26 traffic coming from the router's local site and then change the DSCP value to DSCP 18 before sending it over to the SD-WAN fabric. What are the two ways to create the required configuration? (Choose two).

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 53

Which two resource data types are used to collect information for monitoring using REST API in Cisco SD-WAN? (Choose two.)

A.

POST

B.

DELETE

C.

scalar

D.

array

E.

PUT

Full Access
Question # 54

An enterprise has these three WAN connections:

    public Internet

    business internet

    MPLS

An engineer must configure two available links to route traffic via both links. Which configuration achieves this objective?

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 55

Which two algorithms authenticate a user when configuring SNMPv3 monitoring on a WAN Edge router? (Choose two.)

A.

AES-256

B.

SHA-1

C.

AES-128

D.

MD5

E.

SHA-2

Full Access
Question # 56

A network administrator is configuring an application-aware firewall between inside zones to an outside zone on a WAN edge router using vManage GUI. What kind of Inspection is performed when the ‘’inspect’’ action is used?

A.

stateful inspection for TCP and UDP

B.

stateful inspection for TCP and stateless inspection of UDP

C.

IPS inspection for TCP and-Layer 4 inspection for UDP

D.

Layer 7 inspection for TCP and Layer 4 inspection for UDP

Full Access
Go to page: