From what source does Cascade obtain Identity (user name) information?
A. Through RADIUS server(s)
B. From Domain Controller(s)
C. Through standards-based LDAP queries
D. Via SNMP queries
Which of the following reports provide the best view into how often an analytic policy has alerted over time, which specific metrics have fired, and by how much the observations exceed the tolerance around the forecasted values?
A. Service Performance Report
B. Service Incident Report
C. Performance Investigation Reports
D. Event Reports
E. Service Level Objective Reports
What piece of information is provided to Cascade Profiler from a Cascade Sensor that is not provided to Cascade Profiler from a Cascade Shark appliance?
A. Response Time
B. Layer 4 Application Classification Mapping
C. Layer 7 Application Classification Mapping
D. Network Throughput
E. Network Round Trip Time
Assuming that all product features are implemented and enabled, what are the three default Dashboards? (Select 3)
A. Network Operations Dashboard
B. WAN Optimization Dashboard
C. Internet Access Dashboard
D. Network Security Dashboard
E. Datacenter Utility Dashboard
F. Service Dashboard
How many simultaneous users can access Cascade Profiler?
A. Ten
B. Four
C. Unlimited
D. Twenty
What syntax is used to define Host Groups within Cascade Profiler?
A. Name followed by list of Ports
B. Name followed by several Subnets
C. Name followed by Subnet
D. Subnet followed by name
E. Name followed by Subnet followed by Port
Which of the following is a supported alerting mechanism for events?
A. BGP
B. Windows Messenger
C. SMTP
D. IM
E. Skype
Which of the following are valid Dashboard Content Block Types? (Select 3)
A. Service Health
B. Watched Traffic
C. WAN Utilization
D. Service Map
E. Security Threats
Cascade Profiler encrypts data at rest with.
A. the same encryption strength and protocol selected for sending data from Gateways and Sensors to Profiler.
B. always 256bit AES, accept for international customers who are not eligible for encryption.
C. Cascade does not encrypt data while at rest.
D. Configurable under Definitions ? Encryption.
What is the value provided by creating host groups in Cascade Profiler? (Select 2)
A. You can track, report and alert on organizationally meaningful categories of traffic
B. To control access to Cascade data
C. To quickly quarantine hosts affected by a virus
D. To increase the scalability of the Cascade database
E. To view the traffic of many hosts from multiple perspectives
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Riverbed exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 201-01 exam preparations and Riverbed certification application, do not hesitate to visit our Vcedump.com to find your solutions here.