Technologies used for switching traffic between Virtual Machines under ESXi include:
A. Traffic between Virtual machines is not switched; it is routed by the standard vRouter included with ESXi
B. A standard or distributed vSwitch which comes with ESXi must be used, there is not 3rd party software available
C. A 3rd party virtual switch is required such as the CISCO Nexus 1000v as no standard vSwitch exists with ESXi
D. The included standard vSwitch of the CISCO Nexus 7000
E. The included standard vSwitch or the CISCO Nexus 1000v
Simple Network Management Protocol can be used on Cascade Profiler for:
A. Accessing the Cascade Profiler's MIB by third-party applications for monitoring.
B. Obtaining interface information from routers.
C. Obtaining host MAC address information from switches.
D. Obtaining network device status through the Cascade Profiler receiving SNMP traps.
E. A, B, and D.
The Cascade Profiler authenticates users before logging them in. What are the possible choices for authentication? (Select 3)
A. Cascade Profiler local database
B. User account specifies authentication by RADIUS
C. TACACS
D. RADIUS server to authenticate the user
What is the maximum number of custom applications (Layer 4 and 7 combined) permitted to be defined on a single Cascade Profiler?
A. 50
B. 75
C. 100
D. 125
E. Unlimited
A packet capture (pcap) file that is loaded into Cascade Pilot for the first time is indexed:
A. When the file is opened in Cascade Pilot for analysis.
B. When the file is imported into Cascade Pilot for analysis.
C. When the first view is applied to the file.
D. When "Add Trend Index" is selected from a right-click menu within Cascade Pilot.
E. When the file is copied onto a Cascade Shark appliance.
If there is a Layer 7 fingerprint and a Layer 4 mapping for a particular application, which of the following is truE. (Select 5)
A. If the Layer 4 mapping override policy is not "Unknown/Unclassified", the Layer 4 mapping applies to flows not passing a Sensor or other application fingerprinting device as well as to flows not matching
any defined Layer 7 fingerprint
B. If the Layer 4 mapping override policy is "Always", then the Layer 7 fingerprint will never be used for flows matching both criteria
C. If the Layer 4 mapping override policy is "Unclassified", the Layer 4 mapping only applies to flows not passing a Sensor or other application fingerprinting device
D. If the Layer 4 mapping override policy is "Unknown/Unclassified", the Layer 4 mapping applies to flows not passing a Sensor or other application fingerprinting device as well as to flows not matching any defined Layer 7 fingerprint
E. Care must be taken when defining reports and policies to reflect overlapping definitions and the Layer 4 override policy
F. The traffic Expression "app L7_fingerprint or app L4_mapping" will catch all traffic flows for the application data in a report
How does Cascade Profiler obtain switch port discovery and population information?
A. Switch Port Discovery Protocol (SPDP)
B. Merging of CAM + ARP tables, both gathered via SNMP
C. Merging of IF and ARP tables, both gathered via SNMP
D. Merging of IF and CAM tables, both gathered via SNMP
Some common protocols which may be observed on a network with visibility tools are listed below. Match the protocol name with the most common port used.
1.
HTTP a) TCP/25
2.
HTTPS b) TCP/445
3.
HTTPS through a proxy c) TCP/443
4.
SMTP d) TCP/80
5.
CIFS e) TCP/8080
A. 1-d; 2-b; 3-c; 4-a; 5-b
B. 1-e; 2-c; 3-d; 4-a; 5-b
C. 1-d; 2-c; 3-e; 4-b; 5-a
D. 1-d; 2-c; 3-e; 4-a; 5-b
E. 1-e; 2-d; 3-c ; 4-b; 5-a
How many Host Group Types can be tracked on the Dashboard within the Cascade Profiler GUI?
A. Unlimited
B. Ten
C. Four
D. Twenty
Cascade Profiler is reporting the traffic on Steelhead optimized flows separately than the connections on tcp/7800 between two Steelheads. In other words, from Cascade you see flows for traffic on various ports used natively by the clients and servers across the steelhead as well as flows for tcp/7800. What does this indicate?
A. This is normal in optimization environments and provides the proper reporting of traffic volume between locations.
B. This indicates that Flow data is being reported on the optimized connection, between Steelheads and has no impact on reporting.
C. This indicates that Flow data is being reported on the optimized connection, between Steelheads and can lead to Cascade double-counting volumes between locations.
D. This cannot happen.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Riverbed exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 299-01 exam preparations and Riverbed certification application, do not hesitate to visit our Vcedump.com to find your solutions here.