Exam Logo

Cisco (300-415-ENSDWI) Exam Questions And Answers page 18

An administrator must configure an ACL for traffic coming in from the service-side VPN on a specific WAN Edge device with circuit ID 123456789. Which policy must be used to configure this ACL?
SD-WAN Architecture and Design SD-WAN Deployment and Migration
In a Cisco SD-WAN network, which component is responsible for distributing route and policy information via the OMP?
SD-WAN Architecture and Design SD-WAN Policies and QoS
What is a default protocol for control plane connection?
SD-WAN Architecture and Design SD-WAN Deployment and Migration

Refer to the exhibit. Which configuration change is needed to configure the tloc-extension on Branch1-Edge1?
SD-WAN Architecture and Design
An engineer must improve video quality by limiting HTTP traffic to the Internet without any failover. Which configuration in vManage achieves this goal?
SD-WAN Architecture and Design SD-WAN Policies and QoS
Which device information is required on PNP/ZTP to support the zero touch onboarding process?
SD-WAN Deployment and Migration SD-WAN Deployment and Configuration

Refer to the exhibit. The network administrator has configured a centralized topology policy that results in the displayed routing table at a branch office. Which two configurations are verified by the output? (Choose two.)
SD-WAN Architecture and Design SD-WAN Management and Monitoring

Refer to the exhibit. The network administrator has configured a centralized topology policy that results in the displayed routing table at a branch office. Which two configurations are verified by the output? (Choose two.)
SD-WAN Architecture and Design SD-WAN Management and Monitoring
A Cisco SD-WAN customer has a requirement to calculate the SHA value for files as they pass through the device to see the returned disposition and determine if the file is good, unknown, or malicious. The customer also wants to perform real-time traffic analysis and generate alerts when threats are detected. Which two Cisco SD-WAN solutions meet the requirements? (Choose two.)
SD-WAN Security and Authentication SD-WAN Operations and Troubleshooting

Refer to the exhibit. Which command allows traffic through the IPsec tunnel configured in VPN 0?
SD-WAN Security and Authentication SD-WAN Deployment and Configuration