Which types of tunnels form when the WAN edge router connects to the SD-WAN fabric?
A network administrator is bringing up one WAN Edge for branch connectivity. Which types of tunnels form when the WAN edge router connects to the SD-WAN fabric?A . DTLS or TLS tunnel with vBond controller and IPsec tunnel with vManage controller. B. DTLS or TLS tunnel with vBond controller and...
Which WAN Edge configuration meets the requirement?
An enterprise needs DIA on some of its branches with a common location ID: A041:B70C: D78E::18. Which WAN Edge configuration meets the requirement? A) B) C) D) A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: C
Which configuration stops Netconf CLI logging on WAN Edge devices during migration?
Refer to the exhibit. Which configuration stops Netconf CLI logging on WAN Edge devices during migration? A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/routers/sdwan/command/sdwan-cr-book/config-cmd.html#wp3867250313
In which device state does the WAN edge router create control connections, but data tunnels are not created?
In which device state does the WAN edge router create control connections, but data tunnels are not created?A . valid B. backup C. active D. stagingView AnswerAnswer: D Explanation:
What is the first step to accomplish this task?
An engineer must use data prefixes to configure centralized data policies using the vManage policy configuration wizard. What is the first step to accomplish this task?A . Create groups of interest B. Configure network topology. C. Configure traffic rules. D. Apply policies to sites and VPNs.View AnswerAnswer: A
Which QoS treatment results from this configuration after the access list acl-guest is applied inbound on the vpn1 interface?
Refer to the exhibit. Which QoS treatment results from this configuration after the access list acl-guest is applied inbound on the vpn1 interface?A . A UDP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted B. A TCP packet sourcing from 172.16.10.1 and destined to 172.16.20.1 is dropped C....
How is this policy configured?
Refer to the exhibit. An administrator is configuring a policy in addition to an existing hub-and-spoke policy for two sites that should directly communicate with each other. How is this policy configured?A . hub-and-spoke B. mesh C. import existing topology D. custom control (route and TLOC)View AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/policies/vedge/policies-book/controlpolicies.html#id_107219
Which component of the Cisco SD-WAN secure extensible network provides a single pane of glass approach to network monitoring and configuration?
Which component of the Cisco SD-WAN secure extensible network provides a single pane of glass approach to network monitoring and configuration?A . APIC-EM B. vSmart C. vManage D. vBondView AnswerAnswer: C Explanation:
Which two algorithms authenticate a user when configuring SNMPv3 monitoring on a WAN Edge router? (Choose two.)
Which two algorithms authenticate a user when configuring SNMPv3 monitoring on a WAN Edge router? (Choose two.)A . AES-256 B. SHA-1 C. AES-128 D. MD5 E. SHA-2View AnswerAnswer: DE Explanation: https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/snmp/snmp-book.html
Which GUI selection will accomplish this?
An engineer wants to change the configuration of the certificate authorization mode from manual to automated. Which GUI selection will accomplish this?A . Maintenance > Security B. Configuration > Certificates C. Administration > Settings D. Tools > Operational CommandsView AnswerAnswer: C Explanation: