11.11 Big Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

300-415 Implementing Cisco SD-WAN Solutions (300-415 ENSDWI) Questions and Answers

Questions 4

Company ABC has decided to deploy the controllers using the On-Prem method. How does the administrator upload the WAN Edge list to the vManage?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 5

An engineer is configuring a shaping rate of 1 Mbps on the WAN link of a WAN Edge router Which configuration accomplishes this task’?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 6

Which TLOC color is used for site-to-site communication in a Google Cloud integration with Cisco SD-WAN?

Options:

A.

Private1

B.

private2

C.

private3

D.

private4

Buy Now
Questions 7

Which protocol Is used by the REST API to communicate with network services in the Cisco SO-WAN network?

Options:

A.

SSL

B.

HTTP

C.

iPsec

D.

SSM

Buy Now
Questions 8

Which VPN must be present on at least one interface to install Cisco vManage and integrate it with WAN Edge devices in an overlay network site ID:S4307T7E78F29?

Options:

A.

VPN 512

B.

any VPN number selected

C.

services VPN range 0-511

D.

VPNO

Buy Now
Questions 9

Which type of connection is created between a host VNet and a transit VNet when configuring Cloud OnRamp for laaS?

Options:

A.

Azure private endpoint

B.

GRE tunnel

C.

IPsec tunnel

D.

Azure peer link

Buy Now
Questions 10

Which protocol advertises WAN edge routes on the service side?

Options:

A.

EIGRP

B.

OSPF

C.

BGP

D.

ISIS

Buy Now
Questions 11

Which website allows access to visualize the geography screen from vManager using the internet?

Options:

A.

*.opcnstreetmaps.org

B.

*.fullstreetmaps.org

C.

*.callstreelmaps.org

D.

*.globaistreetmaps.org

Buy Now
Questions 12

An enterprise needs DIA on some of its branches with a common location ID: A041:B70C: D78E::18 Which WAN Edge configuration meets the requirement?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 13

Drag and drop the attributes from the left that make each transport location unique onto the right. Not all options are used.

Options:

Buy Now
Questions 14

Which service VPN must be reachable from all WAN Edge devices and the controllers?

Options:

A.

VPN0

B.

VPN10

C.

VPN215

D.

VPN512

Buy Now
Questions 15

Which component of the Cisco SD-WAN secure extensible network provides a single pane of glass approach to network monitoring and configuration?

Options:

A.

APIC-EM

B.

vSmart

C.

vManage

D.

vBond

Buy Now
Questions 16

An administrator needs to configure SD-WAN to divert traffic from the company's private network to an ISP network. What action should be taken to accomplish this goal?

Options:

A.

configure the control policy

B.

configure the data policy

C.

configure the data security policy

D.

configure the application aware policy

Buy Now
Questions 17

Which device information is requited on PNP/ZTP to support the zero-touch onboarding process?

Options:

A.

serial and chassis numbers

B.

interface IP address

C.

public DNS entry

D.

system IP address

Buy Now
Questions 18

Refer to the exhibit.

An enterprise has hub and spoke topology where it has several VPNs. An engineer must allow users in VPN91 to reach users in VPN92 and VPN10 to reach VPN91 and VPN92. Which configuration meets these requirements?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 19

Which set of elements are verified by the controller to confirm the identity of edge devices?

Options:

A.

certificates, organization name and serial number of the device

B.

organization name serial number and system IP of the device

C.

certificates, organization name, and vBond domain

D.

certificates, system IP, and vBond domain

Buy Now
Questions 20

Refer to the exhibit. The Cisco SD-VYAN is deployed using the default topology. The engineer v/ants to configure a service insertion policy such that all data traffic between Rome to Paris is forwarded through the NGFW located in London. Which configuration fulfills this requirement, assuming that the Sen/ice VPN ID is 1?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 21

Which command verifies a policy that has been pushed to the vEdge router?

Options:

A.

vEdge# show running-config data policy

B.

vEdge# show policy from-vsmart

C.

vSmart# show running-config policy

D.

vSmart# show running-config apply-policy

Buy Now
Questions 22

What is the result during a WAN Edge software upgrade process if the version of the WAN Edge software is higher than the one running on a controller device?

Options:

A.

The upgrade button is greyed out

B.

The upgrade proceeds with no warning message.

C.

The upgrade fails with a warning message

D.

The upgrade proceeds with a warning message

Buy Now
Questions 23

An organization wants to use the cisco SD-WAN regionalized service-chaining feature to optimize cost and user experience with application in the network, which allows branch routers to analyze and steer traffic toward the required network function. Which feature meets this requirement?

Options:

A.

Cloud Services Platform

B.

VNF Service Chaning

C.

Cloud onRamp for Colocation

D.

Cloud onRamp for laaS

Buy Now
Questions 24

Refer to the exhibit Which NAT types must the engineer configure for the vEdge router to bring up the data plane tunnels?

Options:

A.

Enable Full Cone NAT on the vEdge interface

B.

Use public color on the TLOC

C.

Use private color on the TLOC

D.

Enable Symmetric MAT on the vEdge interface

Buy Now
Questions 25

Refer to the exhibit. vManage logs are available for the past few months. A device name change deployed mistakenly at a critical site. How is the device name change tracked by operation and design teams?

A)

B)

C)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 26

Which component is used for stateful inspection of TCP, UDP. and ICMP flows in Cisco SD-WAN firewall policies?

Options:

A.

zones

B.

sites

C.

subnets

D.

interfaces

Buy Now
Questions 27

Refer to the exhibit. A user in the branch is connecting to Office 365 for the first time. Over which path does the branch WAN Edge router traffic follow?

Options:

A.

routing table of the branch WAN Edge router

B.

DIA exit of the branch WAN Edge router

C.

forwarded to the gateway site

D.

dropped because the minimum vQoE score has not been met

Buy Now
Questions 28

In the Cisco SD_WAN solution, vSmart controller is responsible for which two actions? (Choose two.)

Options:

A.

Distribute crypto key information among vEdge routers

B.

Configure and monitor vEdge routers.

C.

Authenticate and authorize vEdge routers.

D.

Distribute the IP address from DHCP server to vEdge routers.

E.

Distribute route and policy information via OMP.

Buy Now
Questions 29

Drag and drop the vManage policy configuration procedures from the left onto the correct definitions on the right.

Options:

Buy Now
Questions 30

Which controller is excluded from the process of checking against the authorized, allowed list?

Options:

A.

vBond

B.

PnP

C.

vSmart

D.

vManage

Buy Now
Questions 31

Exhibit.

The SD-WAN network is configured with a default full-mash topology. An engineer wants Barcelona and Paris to communicate to each other through the London site using a control Which control policy configuration accomplishes the task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 32

Which on-the-box security feature supported by the Cisco ISR 4451 SD-WAN device and not on vEdge?

Options:

A.

Cloud Express service

B.

Enterprise Firewall with Application Awareness

C.

reverse proxy

D.

IPsec/GRE cloud proxy

Buy Now
Questions 33

WAN Edge routers are configured manually to use UDP port offset to use nondefault offset values when IPsec tunnels are created. What is the offse range?

Options:

A.

1-19

B.

0-18

C.

0-19

D.

1-18

Buy Now
Questions 34

Drag and drop the devices from the left into order on the right to upgrade the software from version 19 to version 20.

Options:

Buy Now
Questions 35

Which attributes are configured to uniquely Identify and represent a TLOC route?

Options:

A.

system IP address, link color, and encapsulation

B.

firewall, IPS, and application optimization

C.

site ID, tag, and VPN

D.

origin, originator, and preference

Buy Now
Questions 36

A network administrator is creating an OMP feature template from the vManage GUI to be applied to WAN edge routers. Which configuration attribute will avoid the redistribution of the routes back into the OMP from the LAN side?

Options:

A.

configure "Number of Paths Advertised per Prefix"

B.

configure "Overlay AS Number"

C.

configure "Send Backup Paths"

D.

configure "ECMP limit"

Buy Now
Questions 37

An engineer wants to automate the onboarding process for a WAN Edge router with vManage. Which command will accomplish this?

Options:

A.

request vedge-cloud activate chassis-number serial

B.

request vedge-cloud activate chassis-number token

C.

request vedge-cloud activate serial token

D.

request vedge-cloud activate chassis-number organization

Buy Now
Questions 38

An engineer configures Rome WAN Edge 10 use MPLS cloud as the preferred link to reach Paris WAN Edge and use biz-internet as a backup. Which policy configuration must be led in the outbound direction toward Rome to accomplish the task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 39

An engineer must configure a centralized policy on a site in which all HTTP traffic should use the Public Internet circuit if the loss on this circuit is below 10%. otherwise MPLS should be used Which configuration wizard fulfils this requirement?

Options:

A.

Create Applications or Groups of Interest > Configure Traffic Rules > Apply Policies to Sites and VPNs

B.

Configure VPN Membership > Apply Policies to Sites and VPNs

C.

Create Applications or Groups of interest > Configure Traffic Data > Apply Policies to Sites and VPNs

D.

Configure Topology > Apply Policies to Sites and VPNs

Buy Now
Questions 40

Which command displays BFD session summary information per TLOC on vEdge routers?

Options:

A.

show bfd history

B.

show bfd summary

C.

show bfd sessions

D.

show bfd tloc-summary-list

Buy Now
Questions 41

A network is configured with IP connectivity, and the routing protocol between devices started having problems right after the maintenance window to implement network changes. Troubleshoot and resolve to a fully functional network to ensure that:

R4

R5

Options:

Buy Now
Questions 42

What are the two functions of vSmart? (Choose two)

Options:

A.

It orchestrates connectivity between WAN Edge routers using policies to create network topology

B.

It ensures that valid WAN Edge routers can build the control pane connectivity

C.

It uses TLOCs to uniquely identify the circuit interface to control plane and data plane information

D.

It validates that the WAN Edge trying to join the overlay is authorized to join.

E.

It builds control plane connections with WAN Edge routers using ILS or UILS

Buy Now
Questions 43

Which SD-WAN devices require multicast PIM and IGMP configurations when setting up SD-WAN multicast?

Options:

A.

branch devices with multicast receivers

B.

branch devices with unicast traffic

C.

data center replicator devices

D.

data center devices with multicast sources

Buy Now
Questions 44

In which VPN is the NAT operation on an outgoing interface configured for direct Interne! access?

Options:

A.

1

B.

10

C.

512

D.

0

Buy Now
Questions 45

Which protocol is configured on tunnels by default to detect loss, latency, jitter, and path failures in Cisco SD-WAN?

Options:

A.

TLS

B.

BFD

C.

OMP

D.

BGP

Buy Now
Questions 46

What is the order of operations for software upgrades of Cisco SD-WAN nodes'?

Options:

A.

vBond vManage vSmart WAN Edge

B.

vManage vBond WAN Edge. vSmart

C.

vManage vSmart, vBond, WAN Edge

D.

vManage vBond vSraart WAN Edge

Buy Now
Questions 47

What is the default value for the Multiplier field of the BFD basic configuration in vManage?

Options:

A.

3

B.

4

C.

5

D.

6

Buy Now
Questions 48

Which routing protocol is used to exchange control plane information between vSmart controllers and WAN Edge routers in the Cisco SD-WAN secure extensible network?

Options:

A.

BGP

B.

OSPF

C.

BFD

D.

OMP

Buy Now
Questions 49

The branch users of an organization must be prevented from accessing malicious destinations, and the local files on users' systems must be protected from malware. Which two Cisco products must the organization deploy? (Choose two.)

Options:

A.

Cisco Stealthwatch

B.

Cisco Umbrella

C.

Cisco AMP

D.

Cisco Cloudlock

E.

Cisco SecureX

Buy Now
Questions 50

Refer to the exhibit. The ge0/0 interface connects to a 30-MB link. A network administrator wants to always have 10 MB available for high priority traffic. When lower-priority traffic busts exceed 20 MB. Traffic should be redirected to the second WAN interface ge0/1. Which set of configurations accomplishes this task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 51

How many cloud gateway instance(s) can be created per region when provisioning Cloud OnRamp for Multicloud from AWS in a multiregion environment?

Options:

A.

one

B.

two

C.

three

D.

four

Buy Now
Questions 52

How does the Cisco SD-WAN Cloud OnRamp solution rate the performance of a SaaS application from a branch office to the cloud via a given path?

Options:

A.

It computes a quality-of-experience score.

B.

It monitors the packet loss of priority queues.

C.

It counts the number of interface errors.

D.

It measures the delay and jitter of the path.

Buy Now
Questions 53

Which two hardware platforms support Cisco IOS XE SD-WAN images'' (Choose two)

Options:

A.

ASR1000 series

B.

ISR9300 series

C.

vEdge-1000 series

D.

ASR9000 series

E.

ISR4000 series

Buy Now
Questions 54

Refer to the exhibit. The network administrator has configured a centralized topology policy that results in the displayed routing table at a branch office. Which two configurations are verified by the output? [Choose two.)

Options:

A.

The routing table is for the transport VPN.

B.

The default route is learned via OMP.

C.

This routing table is from a cEdge router.

D.

The default route is configured locally.

E.

The configured policy is adding a route tag of 300 to learned routes.

Buy Now
Questions 55

Which cloud based component in cisco SD-WAN is responsible for establishing a secure connection to each WAN edge router and distributes routers and policy information via omp?

Options:

A.

vBond

B.

vManage

C.

vSmart

D.

WAN Edge

Buy Now
Questions 56

Which two different states of a WAN Edge certificate are shown on vManage? (Choose two.)

Options:

A.

inactive

B.

active

C.

staging

D.

invalid

E.

provisioned

Buy Now
Questions 57

An engineer is modifying an existing data policy for VPN 115 to meet these additional requirements:

    When browsing government websites, the traffic must use direct internet access.

    The source address of the traffic leaving the site toward the government websites must be set to an IP range associated with the country itself, a particular TLOC.

The policy configuration is as follows:

Which policy sequence meets the requirements without interfering with other destinations?

Options:

A.

sequence 30

match

destination-data-prefix-list GOVERNMENT-WEBSITES

!

action accept

set

local-tloc-list

color biz-internet

B.

sequence 25

match

destination-data-prefix-list GOVERNMENT-WEBSITES

action accept

nat use-vpn 0

C.

sequence 15

match

source-data-prefix-list GOVERNMENT-WEBSITES

action accept

set

local-tloc-list

color private1

D.

sequence 15

match

destination-data-prefix-list GOVERNMENT-WEBSITES

!

action accept

set

local-tloc-list

color biz-internet

Buy Now
Questions 58

An engineer is configuring a data policy for IPv4 prefixes for a single WAN Edge device on a site with multiple WAN Edge devices How is this policy added using the policy configuration wizard?

Options:

A.

ln vManage NMS, select the configure ► policies screen, select the localized policy tab and click add policy

B.

In vSmart controller, select the configure ► policies screen, select the localized policy tab. and click add policy

C.

In vManage NMS. select the configure ► policies screen select the centralized policy tab and click add policy

D.

In vBond orchestrator. select the configure ► policies screen, select the localized policy tab. and click add policy

Buy Now
Questions 59

Which table is used by the vSmart controller to maintain service routes of the WAN Edge routers in the hub and local branches?

Options:

A.

RIB

B.

FIB

C.

OMP

D.

TLOC

Buy Now
Questions 60

What prohibits deleting a VNF image from the software repository?

Options:

A.

if the image is stored by vManage

B.

if the image is referenced by a service chain

C.

if the image is uploaded by a WAN Edge device

D.

if the image is included in a configured policy

Buy Now
Questions 61

Refer to the exhibit.

Customer XYZ cannot provision dual connectivity on both of its routers due to budget constraints but wants to use both R1 and R2 interlaces for users behind them for load balancing toward the hub site. Which configuration achieves this objective?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 62

Which control policy assigned to Drenches in the out direction establishes a strict hub-and-spoke topology tor VPN2?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 63

Which two vRoute attributes should be matched or set in vSmart policies and modified by data policies? (Choose two.)

Options:

A.

site ID

B.

preference

C.

VPN

D.

TLOC

E.

origin

Buy Now
Questions 64

What is a key element used in a vBond Orchestrator redundancy topology?

Options:

A.

fully qualified domain name

B.

DHCP server

C.

load-balancer with health probes

D.

stun server

Buy Now
Questions 65

An engineer wants to track tunnel characteristics within an SLA-based policy for convergence. Which policy configuration will achieve this goal?

Options:

A.

App-route policy

B.

VPN membership policy

C.

Control policy

D.

Data policy

Buy Now
Questions 66

Refer to the exhibit Which configuration sets up direct Internet access for VPN 1?

Options:

A.

Option A

B.

Option B

C.

Option C

Buy Now
Questions 67

Refer to the exhibit. An enterprise network is connected with an ISP network on an 80 Mbps bandwidth link. The network operation team observes 100 Mbps traffic on the 1Gig-ISP link during peak hours Which configuration provides bandwidth control to avoid traffic congestion during peak hours?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 68

Refer to the exhibit Which configuration ensures that OSPF routes learned from Site2 are reachable at Sitel and vice-versa?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 69

Refer to the exhibit. An engineer must block FTP traffic coming in from a particular Service VPN on a WAN Edge device Which set of steps achieves this goal?

Options:

A.

Create a localized policy and add it to (he interface feature template

B.

Create a localized policy add it to the device template and add an ACL to the interface feature template

C.

Create a prefix tat, add it to the localized policy and add it to the interface feature template

D.

Create a localized policy add it to VPN template and add an ACL to the interface feature template

Buy Now
Questions 70

Refer to the exhibit. A network administrator is setting the queueing value for voice traffic for one of the WAN Edge routers using vManager GUI. Which queue value must be set to accomplish this task?

Options:

A.

0

B.

1

C.

2

D.

3

Buy Now
Questions 71

Which scheduling method is configured by default for the eight queues in the cloud vEdge router1?

Options:

A.

low latency queue

B.

priority queue

C.

weighted random early detection

D.

weighted round robin

Buy Now
Questions 72

Drag and drop the security terminologies from the left onto the PCI-compliant network features and devices on the right.

Options:

Buy Now
Questions 73

Which action is performed during the onboarding process when a WAN Edge router is connected to ZTP server ztp.viptela com?

Options:

A.

The router is connected to WAN Edge Cloud Center

B.

The router is synced with vSmart Controller via an IPsec tunnel

C.

The router receives its vBond Orchestrator information

D.

The router is connected 10 vSmart Controller via a DTLSTLS tunnel

Buy Now
Questions 74

Which configuration defines the groups of interest before creation of the access list or route map?

A)

B)

C)

D.

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 75

An engineer provisions a WAN Edge router. Which command should be used from the WAN Edge router to activate it with vManage?

Options:

A.

request vedge-cloud activate serial token

B.

request vedge-cloud activate chassis-number organization

C.

request vedge-cloud activate chassis-number token

D.

request vedge-cloud activate chassis-number serial <:serial>

Buy Now
Questions 76

Which API call retrieves a list of all devices in the network?

Options:

A.

https://vmanage_IP_address/dataservice/system/device/{{model}}

B.

http://vmanage_IP_address/dataservice/system/device/{{model}}

C.

http://vmanage_IP_address/api-call/system/device/{{model}}

D.

https://vmanage_IP_address/api-call/system/device/{{model}}

Buy Now
Questions 77

Where on vManage does an engineer find the details of control node failure?

Options:

A.

Alarms

B.

Events

C.

Audit log

D.

Network

Buy Now
Questions 78

What is the default value for the number of paths advertised per prefix in the OMP feature template?

Options:

A.

4

B.

8

C.

12

D.

16

Buy Now
Questions 79

Refer to the exhibit An engineer is getting a CTORGNMMIS error on a controller connection Which action resolves this issue?

Options:

A.

Configure a valid serial number on the WAN Edge

B.

Configure a valid organization name

C.

Configure a valid certificate on vSMART

D.

Configure a valid product ID

Buy Now
Questions 80

How many network interface cards are needed to add in virtual machine settings when installing vSmart controller on VMware vSphere ESXi Hypervisor software?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 81

In Cisco SD-WAN, what protocol is used for control connections between SD-WAN devices?

Options:

A.

DTLS

B.

OMP

C.

BGP

D.

OSPF

Buy Now
Questions 82

An engineer must configure local redundancy on a site. Which configuration accomplish this task?

Options:

A.

vpn 0interface interface-name

B.

tloc extension interlace nametloc extension interface interface name

C.

vpn 0tloc extension interface

D.

interface-flameinterface interface-name tloc-extension

Buy Now
Questions 83

At which layer does the application-aware firewall block applications on a WAN Edge?

Options:

A.

3

B.

7

C.

5

D.

2

Buy Now
Questions 84

Which policy is configured to ensure that a voice packet is always sent on the link with less than a 50 msec delay?

Options:

A.

localized data policy

B.

localized control policy

C.

centralized data policy

D.

centralized control policy

Buy Now
Questions 85

How many concurrent sessions does a vManage REST API have before it invalidates the least recently used session if the maximum concurrent session number is reached?

Options:

A.

150

B.

200

C.

250

D.

300

Buy Now
Questions 86

Which Cisco SD-WAN feature propagates packets with SGTs through the network?

Options:

A.

TrustSec Inline Tagging

B.

SGT Enforcement

C.

QoE

D.

SXP

Buy Now
Questions 87

Refer to the exhibit.

Which command-line configuration on a WAN Edge device achieves these results?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 88

Which two architectural components are part of an SD-WAN high availability vManage cluster? (Choose two.)

Options:

A.

WAN Edge router

B.

network configuration system

C.

NAT router

D.

messaging server

E.

application server

Buy Now
Questions 89

How must the application-aware enterprise firewall policies be applied within the same WAN Edge router?

Options:

A.

within and between zones

B.

between two VPN tunnels

C.

within zone pair

D.

between two VRFs

Buy Now
Questions 90

What are the two impacts of losing vManage connectivity to fabric in the Cisco SD-WAN network? (Choose two)

Options:

A.

Policy changes propagation stops

B.

Statistics collection stops

C.

BFD peering between WAN Edge devices are unestablished

D.

Creation of templates is impossible

E.

IPsec tunnels tear down for WAN Edge devices.

Buy Now
Questions 91

What is the role of the Session Traversal Utilities for NAT server provided by the vBond orchestrator?

Options:

A.

It facilitates SD-WAN toners and controllers to discover their own mapped or translated IP addresses and port numbers

B.

It prevents SD-WAN Edge routers from forming sessions with public transports among different service providers

C.

It facilitates SD-WAN Edge routers to stay behind a NAT-enabled firewall while the transport addresses of the SD-WAN controller are unNAT-ed

D.

It allows WAN Edge routers to form sessions among MPLS TLOCs using only public IP addresses

Buy Now
Questions 92

Refer to the exhibit.

Which two configurations are needed to get the WAN Edges registered with the controllers when certificates are used? (Choose two)

Options:

A.

Generate a CSR manually within vManage server

B.

Generate a CSR manually on the WAN Edge

C.

Request a certificate manually from the Enterprise CA server

D.

Install the certificate received from the CA server manually on the WAN Edge

E.

Install the certificate received from the CA server manually on the vManage

Buy Now
Questions 93

Which protocol is used between redundant vSmart controllers to establish a permanent communication channel?

Options:

A.

IPsec

B.

HTTPs

C.

DTLS

D.

SSL

Buy Now
Questions 94

Refer to the exhibit. An engineer is enabling command line access via MPLS for in-band management. Which command completes the partial SD-WAN interface configuration with the highest degree of security?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 95

An enterprise has these three WAN connections:

public Internet

business internet

MPLS

An engineer must configure two available links to route traffic via both links. Which configuration achieves this objective?

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 96

Refer to the exhibit. An engineer configures a hub-and-spoke SD-WAN topology with the requirement that traffic from router A branch to router B branch is guaranteed to flow through the network hub, router C. Which configuration meets the requirement for router A?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 97

What is a requirement for a WAN Edge to reach vManage, vBond, and vSmart controllers in a data center?

Options:

A.

IGP

B.

QoS

C.

TLS

D.

OMP

Buy Now
Questions 98

Refer to the exhibit.

An engineer is troubleshooting a control connection Issue. What does "connect" mean in this how control connections output?

Options:

A.

Control connection is down

B.

Control connection is connected

C.

Control connection attempt is in progress

D.

Control connection is up

Buy Now
Questions 99

What is the threshold to generate a warning alert about CPU or memory usage on a WAN Edge router?

Options:

A.

70 to 85 percent

B.

70 to 90 percent

C.

75 to 85 percent

D.

75 to 90 percent

Buy Now
Questions 100

An engineer must apply the configuration for certificate installation to vBond Orchestrator and vSmart Controller. Which configuration accomplishes this task?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 101

Which command disables the logging of syslog messages to the local disk?

Options:

A.

no system logging disk enable

B.

no system logging disk local

C.

system logging disk disable

D.

system logging server remote

Buy Now
Questions 102

How do WAN Edge devices operate when vSmart is inaccessible or fails to be reached by the WAN Edge?

Options:

A.

They cease to forward traffic in the data plane.

B.

They continue operation normally.

C.

They continue to receive reachability updates.

D.

They continue operating normally for a configurable time.

Buy Now
Questions 103

How is the scalability of the vManage increased in Cisco SD-WAN Fabric?

Options:

A.

Increase licensing on the vManage

B.

Deploy multiple vManage controllers in a cluster

C.

Deploy more than one vManage controllers on different physical server.

D.

Increase the bandwidth of the WAN link connected to the vManage

Buy Now
Questions 104

What is the main purpose of using TLOC extensions in WAN Edge router configuration?

Options:

A.

creates hardware-level transport redundancy at the local site

B.

creates an IPsec tunnel from WAN Edge to vBond Orchestrator

C.

transports control traffic to a redundant vSmart Controller

D.

transports control traffic w remote-site WAN Edge routers

Buy Now
Questions 105

A network administrator is configuring VRRP to avoid a traffic black hole when the transport side of the network is down on the master device. What must be configured to get the fastest failover to standby?

Options:

A.

lower timer interval

B.

prefix-list tracking

C.

higher group ID number

D.

OMP tracking

Buy Now
Questions 106

Which configuration allows users to reach YouTube from a local Internet breakout?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 107

Drag and drop the actions from the left into the correct sequence on the right to create a data policy to direct traffic to the Internet exit.

Options:

Buy Now
Questions 108

Which SD-WAN component detects path performance information in the organization to report the issue to the service provider at site ID:S4288T5E44F04?

Options:

A.

vAnalytics

B.

vManage NMS

C.

vBond Orchestrator

D.

Cisco DNA

Buy Now
Questions 109

Refer to the exhibit.

What binding is created using the tloc-extension command?

Options:

A.

between ge 0/2.101 of port-type service and ge 0/0 of port-type service

B.

between ge 0/2.101 of port-type transport and ge 0/0 of port-type service

C.

between ge 0/2.101 of port-type service and ge 0/0 of port-type transport

D.

between ge 0/2.101 of port-type transport and ge 0/0 of port-type transport

Buy Now
Questions 110

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

Which issue triggers the Cisco Umbrella resolver to toward DNS requests to the intelligent proxy?

Options:

A.

A domain is nonexistent.

B.

A domain is block-listed.

C.

A domain is locally reachable.

D.

A domain is grey-listed.

Buy Now
Questions 111

Which attribute identifies the type of a vRoute?

Options:

A.

tag

B.

encapsulation

C.

originator

D.

origin

Buy Now
Questions 112

Refer to the exhibit. An engineer is troubleshooting a control connection issue on a WAN Edge device that shows socket errors. The packet capture shows some ICMP packets dropped between the two devices. Which action resolves the issue?

Options:

A.

Recover the vManage controller that is down m a high availability cluster

B.

Change the system IP or restart the VWN Edge 4 the system IP is changed

C.

Remove IP duplication in the network and configure a unique IP address

D.

Recover vBond or wart for the controller to reload which could be caused by a reset

Buy Now
Questions 113

A network administrator is configuring a tunnel interface on a branch Cisco IOS XE router to run TLOC extensions. Which configuration will extend a TLOC over a GRE tunnel to another router in the branch?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 114

Refer to the exhibit A user has selected the options while configuring a VPN Interface Ethernet feature template What is the required configuration parameter the user must set in this template for this feature to function?

Options:

A.

The "IP MTU" field must be increased from the default value of 1500 to support the additional overhead.

B.

The "Shaping Rate (Kbps)" field must be configured with a value

C.

The "Adaptive QoS" field must be set to "on"

D.

The "Bandwidth Downstream" field must be configured with a value

Buy Now
Questions 115

Which feature template configures OMP?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 116

Which encryption algorithm secures binding exchanges Between Cisco TrustSec SXP peers?

Options:

A.

SEAL

B.

3DES

C.

AES

D.

MD5

Buy Now
Questions 117

An organization requires the use of integrated preventative engines, exploit protection, and the most updated and advanced signature-based antivirus with sandboxing and threat intelligence to stop malicious attachments before they reach users and get executed. Which Cisco SD-WAN solution meets the requirements?

Options:

A.

Cisco Trust Anchor module

B.

URL filtering and Umbrella DNS security

C.

Cisco AMP and Threat Grid

D.

Snort IPS

Buy Now
Questions 118

Refer to the exhibit Which command allows traffic through the IPsec tunnel configured in VPN 0?

Options:

A.

service local

B.

service FW address 1.1.1.1

C.

service netsvc1 vpn 1

D.

service netsvc1 address 1.1.1.1

Buy Now
Questions 119

Which type of policy must be applied on a WAN Edge application-aware firewall to control traffic between two or more VPNs?

Options:

A.

service-insertion policy

B.

data policy

C.

firewall policy

D.

control policy

Buy Now
Questions 120

Refer to the exhibit. A network administrator is configuring OSPF advanced configuration pararmeters from a template using the vManager GUI for a branch WAN Edge router to calculate the cost of summary routes to an ASBR. Which action achieves this configuration?

Options:

A.

Disable RFC 1583 Compatiblt

B.

Enable Originate

C.

Enable RFC 1M3 Compatible

D.

Disable Original

Buy Now
Questions 121

Which component of the Cisco SD-WAN architecture oversees the control plane of overlay network to establish, adjust, and maintain the connections between the WAN Edge devices that form the Cisco SD-WAN fabric?

Options:

A.

APIC-EM

B.

vManage

C.

vSmart

D.

vBond

Buy Now
Questions 122

When VPNs are grouped to create destination zone in Zone-Based Firewall, how many zones can a single VPN be part of?

Options:

A.

two

B.

four

C.

one

D.

three

Buy Now
Questions 123

An engineer must improve video quality by limiting HTTP traffic to the Internet without any failover. Which configuration in vManage achieves this goal?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 124

An engineer is configuring a data policy IPv4 prefixes for a site WAN edge device on a site with edge devices. How is this policy added using the policy configuration wizard?

Options:

A.

In vManage NMS select (he configure ► policies screen, select the centralized policy tab and click add policy

B.

In vBood orchestrator. select the configure > policies screen select the localized policy tab. and click add policy

C.

In vManage NMS. select the configure ► policies screen. select the localized policy tab- and click add policy

D.

In vSmart controller select tie configure ► policies screen, select the localized policy tab, and click add policy

Buy Now
Questions 125

Refer to the exhibit.

A network administrator is configuring OMP in vManage to advertise all the paths for the same prefix from a site that has two WAN Edge devices Each WAN Edge device is connected to three ISPs and two private MPLS transports. What is the minimum value for 'Number of Paths advertised per Prefix" that should be configured?

Options:

A.

2

B.

3

C.

5

D.

10

Buy Now
Questions 126

How many vManage NMSs should be installed in each domain to achieve scalability and redundancy?

Options:

A.

two instances

B.

two clusters

C.

three or more in a cluster

D.

two or more in a cluster

Buy Now
Questions 127

Refer to the exhibit.

Which QoS treatment results from this configuration after the access list acl-guest is applied inbound on the vpn1 interface?

Options:

A.

A UDP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted

B.

A TCP packet sourcing from 172.16.10.1 and destined to 172.16.20.1 is dropped

C.

A UDP packet souring from 172.16.10.1 and destined to 172.16.20.1 is dropped.

D.

A TCP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted

Buy Now
Questions 128

What are the default username and password for vSmart Controller when it is installed on a VMware ESXi hypervisor'?

Options:

A.

username Cisco password admin

B.

username admin password Cisco

C.

username Cisco password Cisco

D.

username admin password admin

Buy Now
Questions 129

How are policies deployed on cloud-tiosted Cisco SD-WAN controllers?

Options:

A.

Policies are created on vSmart and enforced by vSmart

B.

Policies are created on vSmart and enforced by vManage

C.

Policies are created on vManage and enforced by vManage.

D.

Policies are created on vManage and enforced by vSman

Buy Now
Questions 130

Which configuration changes the packet loss priority from low to highly?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 131

When software is upgraded on a vManage NMS, which two image-adding options store images in a local vManage software repository? (Choose two.)

Options:

A.

To be downloaded over a SMTP connection

B.

To be downloaded over a SNMP connection

C.

To be downloaded over an out-of-band connection

D.

To be downloaded over a control plane connection

E.

To be downloaded over an ICMP connection

Buy Now
Questions 132

An engineer is configuring a WAN Edge router for DIA based on matching QoS parameters. Which two actions accomplish this task? (Choose two.)

Options:

A.

Apply a QoS map policy.

B.

Configure a control policy.

C.

Configure a centralized data policy.

D.

Configure NAT on the transport interface.

E.

Apply a data policy on WAN interface.

Buy Now
Exam Code: 300-415
Exam Name: Implementing Cisco SD-WAN Solutions (300-415 ENSDWI)
Last Update: Nov 17, 2025
Questions: 441
300-415 pdf

300-415 PDF

$28.5  $94.99
300-415 Engine

300-415 Testing Engine

$33  $109.99
300-415 PDF + Engine

300-415 PDF + Testing Engine

$43.5  $144.99