Exam4Training

Riverbed 830-01 RCPE Certified Professional WAN Optimization Online Training

Question #1

What do you need to ensure when connecting a SteelHead to a Hardware Security Module?

  • A . Access is required for both server-side and client side SteelHead appliances to the HSM
  • B . The in-path interface must be at least 10Gbps
  • C . The HSM and the in-path interfaces must share the same default gateway
  • D . The latency between the in-path interfaces and the HSM must be kept to a minimum
  • E . The latency between the auxiliary or Primary interfaces and the HSM must be kept to a minimum

Reveal Solution Hide Solution

Correct Answer: E
Question #2

For optimized encrypted MAPI, is the inner channel encrypted by default?

  • A . Yes, always
  • B . No
  • C . Only for MS Exchange 2003 and later
  • D . Yes, but this is configured on the server

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://support.riverbed.com/bin/support/static/d6j3tb1i55ni1erbjp6e3fln9v/html/mhmppa9t9gq3laicvt0r91b1n7/sh_cx_9.2_ug_html/index.html#page/sh_cx_9.2_ug/setupServiceProtocolsMAPI.html

Question #3

Which report displays the rate of established SSL connections?

  • A . WAN Throughput
  • B . Traffic Summary
  • C . SSL
  • D . Current Connections

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://support.riverbed.com/bin/support/static/d6j3tb1i55ni1erbjp6e3fln9v/html/mhmppa9t9gq3laicvt0r91b1n7/sh_cx_9.2_ug_html/index.html#page/sh_cx_9.2_ug/reportSSLStatistics.html

Question #4

A customer is complaining that all optimized connections to their internal website cause a splash screen indicating an untrusted certificate. If the users click to accept the risks and add a security exception in their browsers, it all works fine.

What is a likely cause?

  • A . The proxy certificate in the server-side SteelHead appliance is not trusted by the client browser
  • B . The SteelHead Peering Certificates have expired
  • C . The proxy certificate on the client-side SteelHead appliance is not trusted by the client browser
  • D . The server-side SteelHead does not trust the server certificate
  • E . The server-side SteelHead appliance has not joined the Domain properly

Reveal Solution Hide Solution

Correct Answer: A
Question #5

Authentication fails for certain users after configuring the joining of the server-side SteelHead appliance to the domain as a read-only domain controller (RODC).

What is the most likely issue?

  • A . The users have local branch file servers
  • B . There is an incorrect Short Domain Name (NETBIOS name)
  • C . There’s an incorrect domain controller
  • D . These users exclusively make use of Kerberos authentication

Reveal Solution Hide Solution

Correct Answer: B
Question #6

You join a SteelHead appliance to a domain as Active Directory Integrated (Windows 2008 and later).

How will this appear in Active Directory?

  • A . As a Regular Domain Controller
  • B . As a Read-Only Domain Controller
  • C . As a Writable Domain Controller
  • D . As a PDC Emulator

Reveal Solution Hide Solution

Correct Answer: B
Question #7

You have a Windows server that negotiates SMB3 encryption with the client. If you enable SMB3 optimization, but do not configure signing on the SteelHead, will there be any latency optimization?

  • A . Yes, but you won’t have SDR/LZ
  • B . Yes, and you still have SDR/LZ
  • C . No, but will still have SDR/LZ
  • D . No, and you won’t have SDR/LZ either

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://support.riverbed.com/bin/support/static/d6j3tb1i55ni1erbjp6e3fln9v/html/mhmppa9t9gq3laicvt0r91b1n7/sh_cx_9.2_ug_html/index.html#page/sh_cx_9.2_ug/ setupServiceProtocolsSMB2.html

Question #8

What is the purpose of creating an account in Active Directory with Replication User privilege for the use of the SteelHeads?

  • A . It allows SteelHeads to authenticate users on behalf of the Domain Controllers
  • B . It allows SteelHeads the ability to automatically run backups to a SMB file share within a Windows Domain
  • C . It enables the SteelHead admins to authenticate with Active Directory when managing the SteelHeads
  • D . It allows the optimization of encrypted MAPI and SMB3/3 traffic using end-to-end Kerberos authentication

Reveal Solution Hide Solution

Correct Answer: B
Question #9

Which statement is true about NFS optimization?

  • A . NFS cannot be optimized due to its proprietary encryption mechanism
  • B . All NFS is optimized with both bandwidth and latency
  • C . NFS v2 & v4 can be optimized with bandwidth only, v3 can attain both bandwidth & latency
  • D . NFS can only be optimized using packet mode optimization

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://support.riverbed.com/bin/support/static/d6j3tb1i55ni1erbjp6e3fln9v/html/mhmppa9t9gq3laicvt0r91b1n7/sh_cx_9.2_ug_html/index.html#page/sh_cx_9.2_ug/setupServiceProtocolsNFS.html

Question #10

What does the SaaS Accelerator Manager (SAM) use to calculate the capacity of service instances in the SaaS service cluster based on the type of application?

  • A . Bandwidth
  • B . Throughput
  • C . Total Data Reduction
  • D . Number of users

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiO7quJwfbvAhVRe8AKHb4BDPMQFjAAegQIBxAD&url=https%3A%2F%2Fsupport.riverbed.com%2Fbin%2Fsupport%2Fdownload%3Fdid%3D3h2gbqnl1rsd1qht52p4lv0jmo%26version%3D1.1.0&usg=AOvVaw03c4Pw410CVIelxu35_gJf

Question #11

In which type of computing does the cloud provider provide users with the platform and environment to develop, manage, and run applications over the Internet?

  • A . IaaS
  • B . PaaS
  • C . SaaS
  • D . YaaS

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://rubygarage.org/blog/iaas-vs-paas-vs-saas

Question #12

You raise a support case at Priority 2 – High.

How soon can you expect a response from Riverbed Support?

  • A . 1 hour
  • B . 4 hours
  • C . 8 hours
  • D . 24 hours

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://www.immixgroup.com/uploadedFiles/Documents/Contract_Documents/GSA/GS-35F-0511T/tcs_RIVERBED_GS-35F-0511T.pdf (7)

Question #13

Which diagnostic tool contains a copy of the historical statistics, logs, and configuration data on the system?

  • A . Traffic Summary
  • B . Process Dump
  • C . System Logs
  • D . System Dump

Reveal Solution Hide Solution

Correct Answer: D
Question #14

The maximum TCP option field size is __________ bytes.

  • A . 64
  • B . 32
  • C . 60
  • D . 40

Reveal Solution Hide Solution

Correct Answer: B
Question #15

In which of the following Transparency Modes do the Client and Server retain their own IP addressing across the WAN?

  • A . Correct Addressing
  • B . Port Transparency
  • C . Full Transparency
  • D . All of the above

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://support.riverbed.com/bin/support/static/17qudtqont75l258qrbn4maj75/html/1mk0rjev5snblam40lgbg0mrgp/sh_9.5_dg_html/index.html#page/sh_9.5_dg/network_trans.html

Question #16

What is the benefit of configuring Datastore Sync between SteelHeads?

  • A . It allows up to four SteelHeads in a cluster access to the same datastore
  • B . It gives high availability to the warm data patterns in exactly two SteelHeads
  • C . It allows for seamless transition when upgrading to a larger SteelHead
  • D . It allows for seamless transition from a physical to a virtual SteelHead
  • E . It allows more efficient use of references by synchronizing them end-to-end between branch and datacenter

Reveal Solution Hide Solution

Correct Answer: E
E

Explanation:

Reference: https://support.riverbed.com/bin/support/static/d6j3tb1i55ni1erbjp6e3fln9v/html/mhmppa9t9gq3laicvt0r91b1n7/sh_cx_9.2_ug_html/index.html#page/sh_cx_9.2_ug/setupServiceDatastore.html

Question #17

Which of these are true statements?

  • A . Transparency is a global setting affecting all in-path interfaces
  • B . Transparency for SSOOP can only be achieved using the CLI and not the GUI
  • C . Port Transparency utilizes the connection pooling function, but Full Transparency cannot
  • D . Addressing is transparent to the client and server using in-path deployments, but not when using SSOOP
  • E . Transparency is a setting only relevant to cloud deployments

Reveal Solution Hide Solution

Correct Answer: E
Question #18

What is required for optimization to occur when deploying SteelHeads on an 802.1Q trunk?

  • A . A single IP address routable to the in-path interface of the remote SteelHead
  • B . An IP address configured on all VLANs where optimization is required
  • C . A single IP on a VLAN and all traffic set as Correct Addressing
  • D . A single IP address on the default VLAN and Simplified Routing set to none
  • E . Full Transparency as a catch-all in-path rule and Simplified Routing set to Destination Only

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://support.riverbed.com/bin/support/static/fbunsuuo632vi3jrspe0evbko9/html/u2pi6l52l4drmhq3uhck9tu7hm/sh_9.2_dg_html/index.html#page/sh_9.2_dg/phys_inpath_designs.html

Question #19

When a SteelHead is on a VLAN trunk, what is the required simplified routing setting?

  • A . Destination and Source
  • B . All
  • C . None
  • D . Destination Only

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://support.riverbed.com/bin/support/static/fbunsuuo632vi3jrspe0evbko9/html/u2pi6l52l4drmhq3uhck9tu7hm/sh_9.2_dg_html/index.html#page/sh_9.2_dg/phys_inpath_designs.html

Question #20

Which SteelHead appliance deployment mode uses the Primary interface for optimization?

  • A . Virtual in-path
  • B . Physical in-path
  • C . Serial Cluster
  • D . Server-Side Out of Path (SSOOP)
  • E . Interceptor

Reveal Solution Hide Solution

Correct Answer: E

Question #21

You should use a __________ cable to the WAN0_0 interface if you are connecting to a switch interface, and a __________ cable to the WAN0_0 interface if you are connecting to a router interface.

  • A . Straight-through, Crossover
  • B . Crossover, Straight-through
  • C . Straight-through, Straight-through
  • D . Crossover, Crossover

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://support.riverbed.com/bin/support/static/fbunsuuo632vi3jrspe0evbko9/html/ u2pi6l52l4drmhq3uhck9tu7hm/sh_9.2_dg_html/index.html#page/sh_9.2_dg/pbr.html

Question #22

What is the purpose of configuring Subnet-Side Rules?

  • A . Subnet-Side Rules are part of the Topology configuration and help with Path Selection and Secure transport
  • B . In an in-path deployment, Subnet-Side Rules mean you can disable Simplified Routing (for example, HSRP deployments)
  • C . Interceptor appliances require subnet side rules to find their LAN subnets
  • D . In Virtual in-path deployments, it tells the SteelHead appliances whether traffic originates from logical LAN or logical WAN side

Reveal Solution Hide Solution

Correct Answer: A
Question #23

In virtual in-path deployments, such as PBR, what is never used?

  • A . Subnet-side rules
  • B . A fake SNMP if-index
  • C . LAN interface
  • D . WAN interface

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://support.riverbed.com/bin/support/static/fbunsuuo632vi3jrspe0evbko9/html/u2pi6l52l4drmhq3uhck9tu7hm/sh_9.2_dg_html/index.html#page/sh_9.2_dg/logical_inpath.html

Question #24

During normal operation of a WCCP cluster, Hash or Mask prevent asymmetry; however, in periods of failover this may not be the case.

What should you do to prevent asymmetry during a failover?

  • A . Disable “Allow Neighbor Failure”
  • B . Apply QoS to the OOB connections
  • C . Configure a backup Designated Web Cache (DWC)
  • D . Ensure fully meshed Connection Forwarding is configured

Reveal Solution Hide Solution

Correct Answer: C
Question #25

In a Quad Interceptor deployment with two paths, what are the correct settings to configure for High Availability?

  • A . Fail-to-wire and allow neighbour failure
  • B . Fail-to-wire and do not allow neighbour failure
  • C . Fail-to-block and allow neighbour failure
  • D . Fail-to-block and do not allow neighbour failure

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version