REVIEWER Flashcards

1
Q

Inter-Frame Delay Variation is _____.

Select one:
a. The time required to transmit a Service Frame from ingress UNI to egress UNI

b. The measure of the number of lost frames between the ingress UNI and egress UNI expressed as a percentage

c. The percentage of time that a service is usable

d. The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance

A

d. The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance

Inter-Frame Delay Variation (IFDV) is how much the delay varies between two frames. For example, if one delay is 15ms and the second is 17ms, the IFDV is 2ms.
An SDCP candidate should focus on the fact that Frame Delay (FD), Inter-Frame Delay Variation (IFDV), Frame Loss Ratio (FLR), and Availability are four metrics that are used to measure performance of an SD-WAN service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The purpose of DSCP is to ______________.

a. Apply CoS
b. Secure the packet
c. Support Layer 1
d. Deliver the frame

A

a. Apply CoS

Differentiated services code point (DSCP) is one method to identify a class of service for traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What specification standardizes Ethernet?

Select one:
a. IEEE 802.1ad
b. IETF 1492
c. ANSI T1.105
d. IEEE 802.3

A

d. IEEE 802.3

IEEE standardized Ethernet definition in its 802.3 standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A VLAN is a _______.

Select one:
a. Packet based technology specified using the IEEE 802.1Q
b. Jumbo framed
c. Layer 2 broadcast domains
d. Packet

A

c. Layer 2 broadcast domains

A Virtual LAN (VLAN) is used to partition a network into smaller groups (for example, individual departments within a company’s building). When implemented, each VLAN creates a broadcast domain at Layer 2, such that a broadcast from any member of the VLAN is transmitted to all members of that VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A WAN connects ________________.

Select one:
a. Q in Q” or S-Tags
b. LANs and MANs
c. Controllers
d. Switches

A

b. LANs and MANs

Local Area Networks (LANs) and Metro Area Networks (MANs) are often interconnected over geographically larger Wide Area Networks (WANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a LAN?

Select one:
a. Jumbo frames
b. A switch
c. 1518
d. Two or more connected computers, normally in a small area

A

d. Two or more connected computers, normally in a small area

A Local Area Network (LAN) is a collection of computers and other equipment connected together, generally in a single building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the subnet of the network 10.2.3.48/28?

Select one:
a. 10.2.3.48-10.2.3.63
b. 10.2.3.48-10.2.3.55
c. 10.2.3.33-10.2.3.48
d. 10.2.3.40-10.2.3.48

A

a. 10.2.3.48-10.2.3.63

A /28 subnet results in range of 16 addresses. This subnet starts with 10.2.3.48 and runs through 10.2.3.63.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A VLAN-ID is ____ bits.

Select one:
a. 1024
b. 12
c. 1518
d. 4096

A

b. 12

Each VLAN tag is 4 bytes or 32 bits. (A byte is equal to 8 bits.) The ID of the VLAN is one component within the tag and that specific field is 12 bits long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Underlay Connectivity Services provide ____________.

Select one:
a. LAN Services
b. WAN Services
c. WLAN Services
d. PAN Services

A

b. WAN Services

SD-WAN is based on WAN services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ping6 is:

Select one:
a. Ping for IPv6
b. Not used
c. A new version of ping for IPv4
d. A Layer 1 tool

A

a. Ping for IPv6

Pingv6 is the IPv6 equivalent of a ping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BFD can detect a link failure in less than _____.

Select one:
a. 1 second
b. 5,000 nanoseconds
c. 50 milliseconds
d. 15 seconds

A

c. 50 milliseconds

50 milliseconds is a common time span that is used as a standard to react to changes or outages in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A standard ethernet frame without a single 802.1Q tag is how long?

A. 1526
B. 1518
C. 9000
D. 1522

A

B. 1518

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TRUE OR FALSE. With an active-active connection, each connection actively carries data and has enough bandwidth to handle the committed traffic from all the application flows in case of failure.

A. False
B. True

A

B. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two-Way Active Measurement Protocol (TWAMP) measures what?

A. The time required to transmit a Service Frame from an Ingress UNI to an Egress UN
B. The difference in delay of two Service Frames belonging to the same Class of Service instance
C. Network performance between any two devices in a network
D. The number of lost frames between an Ingress and an Egress UNI

A

C. Network performance between any two devices in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is used by network devices to track and store information about the status of components within that device?

A. ICMP
B. SNMP
C. Traceroute
D. Ping

A

B. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Active Path Testing involves what?

A. Actual customer traffic and excludes link selection
B. Emulated traffic and excludes link selection
C. Emulated traffic and include link selection
D. Actual customer traffic and includes link selection

A

C. Emulated traffic and include link selection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following locations will a packet with a destination address of 88.0.0.130 be sent to?

A. 88.0.0.192/27
B. 88.0.0.128/30
C. 88.0.0.64/26
D. 88.0.0.184/29

A

B. 88.0.0.128/30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following locations will a packet with a destination address of 129.71.4.97 be sent to?

A. 129.71.4.0/27
B. 129.71.4.48/28
C. 129.71.4.96/28
D. 129.71.4.64/29

A

C. 129.71.4.96/28

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which if the following locations will a packet with a destination address of 201.255.255.60 be sent to?

A. 201.255.255.96/28
B. 201.255.255.64/29
C. 201.255.255.0/27
D. 201.255.255.48/28

A

D. 201.255.255.48/28

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following represent the loopback in IPv4 and IPv6?

A. 127.0.0.1 and ::127/128
B. 0.0.0.1 and ::1/128
C. 0.0.0.1 and ::127/128
D. 127.0.0.1 and ::1/128

A

D. 127.0.0.1 and ::1/128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SD-WAN enables WAN connections that are: (Choose three)

A. Simple
B. Policy driven
C. Orchestrated
D. Application aware

A

B. Policy driven
C. Orchestrated
D. Application aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An SD-WAN service:

A. Uses MPLS labels to encode specific application policy
B. Should always be encrypted using SSL
C. Provides a logical Layer 3 Virtual Private Network (L3 VPN) for a Subscriber that conveys IP packets over multiple disparate Underlay Connectivity Services between Subscriber sites
D. Exclusively uses Carrier Ethernet services

A

C. Provides a logical Layer 3 Virtual Private Network (L3 VPN) for a Subscriber that conveys IP packets over multiple disparate Underlay Connectivity Services between Subscriber sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A ground transportation company currently runs a number of enterprise applications and has a mobile trucking application running in their trucks. In the future, they anticipate implementing self-driving technology and may have latency requirements for some of their application needs in the future.

SD-WAN offers what benefits to this company now and in the future?

A. Applications flows can be forwarded based on next shortest path
B. Forwarding occurs based on cost of the UCS
C. Application flows can be forwarded based on next hop
D. With SD-WAN, forwarding occurs based on performance metrics that can be applied now (uptime and bandwidth), and in the future

A

D. With SD-WAN, forwarding occurs based on performance metrics that can be applied now (uptime and bandwidth), and in the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A large law practice has a number of law offices. Each office has an MPLS VPN UCS to the headquarters in New York City and Public Internet UCS. In the near future, the law practice wants to increase the use of online legal applications for its clients. The firm runs internal applications, like voice and video over IP, legal applications, etc.

Why are SD-WAN services going to be a benefit to this legal practice?

A. Application flows can be forwarded base on next shortest path
B. Application flows can be forwarded based on next hop
C. With SD-WAN, the law practice has greater flexibility in forwarding decisions based on both application and network performance to support the new office locations, and future business plans with customer facing applications
D. Forwarding occurs base on cost of the UCS

A

C. With SD-WAN, the law practice has greater flexibility in forwarding decisions based on both application and network performance to support the new office locations, and future business plans with customer facing applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A service provider company would like to start offering SD-WAN service to its customers. What are the benefits of using SD-WAN services over more traditional WAN services?
A. Application flows are always forwarded based on the next hop
B. Application flows can be forwarded based on the shortest path
C. Forwarding occurs based on the costs of the UCS
D. With SD-WAN, the service provider allows forwarding decisions to be made by their customers, based on performance metrics from the application and the network, in real-time, so the best forwarding path can be selected

A

D. With SD-WAN, the service provider allows forwarding decisions to be made by their customers, based on performance metrics from the application and the network, in real-time, so the best forwarding path can be selected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A company is suffering from regular bouts of excessive delay on their existing WAN. What selling point of SD-WAN could be used to convince the ownership to convert to a solution using SD-WAN?

A. SD-WAN forwards traffic based on performance metrics
B. SD-WAN forwards traffic based on circuit cost
C. SD-WAN forwards traffic based on number of hops
D. SD-WAN forwards traffic based on available bandwidth on links

A

A. SD-WAN forwards traffic based on performance metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An existing Legacy WAN has 60% Bandwidth utilization, intermittent outages, and 100-150 ms latency. Encryption is implemented, and a policy-based Firewall is needed.

What is the benefit of going to SD-WAN?
A. Greater Bandwidth
B. Greater Resiliency
C. More security

A

B. Greater Resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A healthcare corporation runs a medical imaging application that requires latency and delay to be below a specific metric. This application’s bandwidth also changes throughout the day and week. The healthcare corporation has two MPLS based, private UCSs and a public Internet connection. Implementing SD-WAN offers what benefit to this latency, delay, and bandwidth sensitive application?

A. Forwarding occurs based on cost of the UCS
B. Forwarding occurs based on shortest path
C. Forwarding occurs based on performance metrics
D. Applications flows can be forwarded based on next hop

A

C. Forwarding occurs based on performance metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is an advantage of SD-WAN versus traditional WAN?

A. Greater application performance
B. Increased bandwidth
C. Highly Available WAN
D. Higher WAN utilization

A

C. Highly Available WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is not an advantage of an SD-WAN service over a private multi-point connectivity service?

A. SD-WAN can forward packets to the public Internet, but a private multi-point connectivity service cannot
B. SD-WAN can use different paths for different applications, but a private multi-point connectivity service cannot
C. SD-WAN can change routes taken by packets based on recent performance metrics, but a private multi-point connectivity service cannot
D. SD-WAN can forward packets between two UNIs that are not directly connected by a connectivity service, but a private multi-point connectivity service cannot

A

D. SD-WAN can forward packets between two UNIs that are not directly connected by a connectivity service, but a private multi-point connectivity service cannot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A MEF SD-WAN Service consists of all of the follow EXCEPT which one?

A. Exactly one SWVC which based on a set of SWVC Service Attributes

B. One or more SWVC End Points for the SWVC at each of those UNIs, where each SWVC End Point is based on a set of SWVC End Point Service Attributes

C. One or more Underlay Connectivity Services and corresponding UCS UNIs and UCS End Points and corresponding Service Attributes for each of them

D. One or more SD-WAN UNIs where the Subscriber accesses the SD-WAN service. Each based on a set of UNI Service Attributes

A

B. One or more SWVC End Points for the SWVC at each of those UNIs, where each SWVC End Point is based on a set of SWVC End Point Service Attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Application traffic is being sent from Site A to Site C.
At the SD-WAN Edge for both Site A and site C, what is the correct UNI Application Flow (Ingress or Egress)

A. Site A is Ingress UNI, Site C is Ingress UNI
B. Site A is Egress UNI, Site C is Egress UNI
C. Site A is Egress UNI, Site C Ingress UNI
D. Site A is Ingress UNI, Site C is Egress UNI

A

D. Site A is Ingress UNI, Site C is Egress UNI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Ingress IPv4 packets that have the Strict Source and Record Router (SSRR) option set arrive at a Service Provider. How should they handle the packets?

A. Reflect them back to the source
B. Drop them
C. Record them for monitoring applications

A

B. Drop them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Examine the two graphics. Which of the following is correct?

A. Both graphics are incorrect. Only one User to Network interface (UNI) is allowed per SD-WAN Edge
B. From the SD-WAN Edge point of view, the two examples are equivalent
C. All traffic must belong to the same VLAN or Subnet in order to be accepted at the User to Network Interfaces (UNIs). Both examples are incorrect.
D. The top graphic is incorrect while the bottom is acceptable, because traffic from the same Ethernet interface must belong to the same subnet

A

B. From the SD-WAN Edge point of view, the two examples are equivalent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following is true regarding Tunnel Virtual Connection (TVCs)?

A. Multiple Tunnel Virtual Connections (TVCs) can be created between the same two SD-WAN Edges but they be assigned the same security
B. A path Between two SD-WAN UNIs is a single Tunnel Virtual Connection (TVC) between the SD-WAN Edges where the UNIs are located, or set of concatenated TVCs that link those SD-WAN Edges
C. Multiple Tunnel Virtual Connections (TVCs) can be created between the same two SD-WAN Edges but they must share the same Class of Service and performance characteristics
D. A path between two SD-WAN UNIs is a single Tunnel Virtual Connections (TVC) between the SD-WAN Edges, but more than one TVC between SD-WAN Edges in not permitted

A

B. A path Between two SD-WAN UNIs is a single Tunnel Virtual Connection (TVC) between the SD-WAN Edges where the UNIs are located, or set of concatenated TVCs that link those SD-WAN Edges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are all the valid shortest paths between SD-WAN Edge #3 and SD-WAN Edge #4?

A. TVCs A and F, TVCs C then G
B. TVCs A then B, TVCs C then B, TVCs B then F
C. There are no valid paths
D. TVCs A then F, TVCs C then G, TVCs D then G

A

D. TVCs A then F, TVCs C then G, TVCs D then G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A healthcare corporation runs medical imaging application that has delay requirements. The healthcare corporation has multiple hospitals that need to connect to its data center, which provides the medical imaging application.

The healthcare corporation has two MPLS based, private UCSs and a public internet connection at each hospital location
Radiologist are complaining their medical imaging application is taking many minutes to load the images for each patient when the images should appear in less than a second

What should the SDCP professional do to fix this issue?

A. Connect the branch SD-WAN UNI to controller
B. Request that the SP choose TVC based on latency performance and bandwidth availability
C. Configure the medical application data to use the Internet Breakout
D. Add another UCS to each branc

A

B. Request that the SP choose TVC based on latency performance and bandwidth availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A financial company involved with making trades on a stock exchange runs applications that are sensitive to latency and delay. The company has s SD-WAN service with two MPLS based private UCS. There are multiple reports from end users complaining of delay and sluggishness when using this application. What should be done to fix this sluggishness and delay issue?

A. Add another UCS
B. Configure an Internet Breakout at the financial company
C. Connect an SD-WAN UNI to an SD-WAN Edge
D. Request that the SP choose a TVC based on latency performance

A

D. Request that the SP choose a TVC based on latency performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is correct about the SD-WAN Virtual Connection End Point (SWVC EP) at Subscriber Network Site C?

A. The SD-WAN Edge network function determines the correct TVC based on routing policy only
B. The SD-WAN Edge is the network function between the SD-WAN UNI and one or more Underlay Connectivity Service User to Network Interface (UCS UNIs)
C. The SD-WAN Edge determines how Application Flows should be handled. If a given Application Flow matches to a TVC, it will bypass the UCS UNI
D. SD-WAN Edge interfaces cannot be physical connections if they are to carry Tunnel Virtua Connections (TVCs)

A

B. The SD-WAN Edge is the network function between the SD-WAN UNI and one or more Underlay Connectivity Service User to Network Interface (UCS UNIs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A subscriber chooses to centralize their internet feed at their headquarters location. Each of 4 branches and the headquarter were using 100Mbps each for Internet Breakout. After changing from Local Internet Breakout at each branch to Breakout through the headquarters and configuring the Internet Breakout at headquarters for 500 Mbps, a marked drop in the rate of TCP-based Internet traffic is noted. Non-Internet traffic is flowing as before. What could cause this?

A. Larger Delay
B. Bandwidth limitation at the Headquarters
C. Larger Delay Variation
D. Greater packet loss

A

A. Larger Delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which Policy assignment takes precedence over all other assignments?

A. Zone-wide Policy assigned to an Application Flow Specification by the SWVC List of Zones Service Attribute
B. Zone-wide Policy assigned to an Application Flow Specification Group by the SWVC List of Zones Service Attribute
C. Policy assigned to an Application Flow Specification in a Zone using the SWVC End Point Policy Map Service Attribute
D. Policy assigned to an Application Flow Specification Group in a Zone using the SWVC End Point Policy Map Service Attribute

A

C. Policy assigned to an Application Flow Specification in a Zone using the SWVC End Point Policy Map Service Attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A school district is connection Student and Faculty traffic across an SD-WAN Service. Each SD-WAN End Point explicitly maps policies to the Application Flow/Zone matchup as shown above. Use the following Zones and Zone-wide policies below:
Zone Faculty
IP range = [172.16.0.0/12, 192.168.0.0/23]
Policies = [Office-365 - policy1, Voice - policy1]
Zone Student
IP range = [10.2.0.0/16]
Policies = [Wed - policy2]

A packet arrives at UNI 2 with the following attributes:
Application Flow of Web
Source IP = 10.2.255.3

What is the result?

A. The Zone is Student and the policy is policy2
B. The packet is discarded
C. The Zone is faculty and the policy applied is policy3
D. The Zone is Student and the Policy is Policy3

A

A. The Zone is Student and the policy is policy2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A school district is connection Student and Faculty traffic across an SD-WAN Service. Each SWVC End Point explicitly maps policies to the Application Flow/Zone matchup as shown above. Use the following Zones and Zone-wide policies below:
Zone Faculty
IP range = [172.16.0.0/12, 192.168.0.0/23]
Policies = [Office-365 - policy1, Voice - policy1]
Zone Student
IP range = [10.2.0.0/16]
Policies = [Wed - policy2]

A packet arrives at UNI 3 with the following attributes:
Application Flow of Office-365
Source IP = 172.16.30.99

What is the result?

A. The Packet is discarded
B. The Zone is Faculty and the policy applied is policy1
C. The Zone is Faculty and the policy applied is policy2
D. The Zone is Student and the policy applied is policy2

A

B. The Zone is Faculty and the policy applied is policy1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A school district is connection Student and Faculty traffic across an SD-WAN Service. Each SWVC End Point explicitly maps policies to the Application Flow/Zone matchup as shown above. Use the following Zones and Zone-wide policies below:
Zone Faculty
IP range = [172.16.0.0/12, 192.168.0.0/23]
Policies = [Web - policy2, Voice - policy3]
Zone Student
IP range = [10.2.0.0/16]
Policies = [Wed - policy3]

A packet arrives at UNI 1 with the following attributes:
Application Flow of email
Source IP = 10.2.97.100

What is the result?

A. The Zone is Faculty and the policy applied is policy1
B. The Zone is Student and the policy is policy3
C. The packet is discarded
D. The Zone is Student and the policy is policy2

A

C. The packet is discarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

An HTTP packet that originated at 10.1.1.2 is sent to a web server at destination 10.2.2.17. Three Application Flows are defined as follows:
A SDAV4 = 10.2.2.0/24, DPORT = 80
B SAV4 = 10.1.1.0/24, SPORT = 80
C DAV4 = 10.1.1.0/24, SDPORT = 80

Which of the follow Application Flows will it be associated with?
A. None; the traffic is discarded
B. Application Flow B
C. Application Flow A
D. Application Flow C

A

C. Application Flow A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

An enterprise has many voice IP applications. An SD-WAN service connects branch offices to the main headquarters. At each branch office, there are at least 2 UCS. At all branch offices, the end users are complaining of audio breaking up intermittently.

What should be done to address this issue?
A. Connect the branch SD-WAN UNI to the controller
B. Configure an Internet Breakout at each branch
C. Request that the SP choose a TVC based on latency performance
D. Add another UCS to each branch

A

C. Request that the SP choose a TVC based on latency performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

An SDCP is designing a solution for a potential Subscriber with a headquarters and two remote offices.
The Subscriber has several needs:

  • The Subscriber has approved a public a private UCS for each site
  • Each remote office has 30 Mbps of traffic, which flows to and from the headquarters only
  • One-third of the traffic is designated for the private UCS with the remaining traffic using Public UCS.
  • Each underlay can be used by any traffic in the case of failure of the other UCS

How would the SDCP analyze the design? (Choose two)
A. Provision the Underlay connectivity at 30 Mbps public and 30 Mbps private at each remote office
B. Designate one UCS as Backup
C. Provision the Underlay connectivity 60 Mpbs public and 60 Mbps private at the headquarters
D. Set the SWVC List of Policies Service Attribute policy criteria, PUBLIC-PRIVATE = Prefer-Public

A

A. Provision the Underlay connectivity at 30 Mbps public and 30 Mbps private at each remote office

C. Provision the Underlay connectivity 60 Mpbs public and 60 Mbps private at the headquarters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

An SDCP is designing a solution for a potential Subscriber.

  • The Subscriber has some Audio/Video (A/V) traffic that cannot tolerate major loss nor latency and must be highly available
  • They also have other traffic that us not as sensitive to the above requirements
  • They have a high-cost Private UCS, with a very strict Service Level Specification (SLS) and a low-cost Public UCS with a more lenient SLS

How should the traffic be provisioned? (Choose three)

A. The non-A/V traffic should be sent over the Public UCS, since it is cheaper

B. The PUBLIC-PRIVATE policy criteria should be set to Public-Only to keep the non-A/V to flow over the Public UCS only

C. Keep the A/V traffic on a TVC on the Private UCS with the more stringent SLS versus a TVC on the Public UCS

D. The PUBLIC-PRIVATE policy criteria should be set to Either to allow the A/V to flow over whichever is available if a UCS is unavailable

A

A. The non-A/V traffic should be sent over the Public UCS, since it is cheaper

C. Keep the A/V traffic on a TVC on the Private UCS with the more stringent SLS versus a TVC on the Public UCS

D. The PUBLIC-PRIVATE policy criteria should be set to Either to allow the A/V to flow over whichever is available if a UCS is unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

As SD-WAN featuring a remote office and a main office connected by a single Public UCS had Local Internet Breakout for TCP based Internet traffic originating at the remote office. Upon changing the remote office to using Internet Breakout through the main office, the traffic dropped in overall speed.

Consider the following. Which one of these options will cause this issue?

A. Higher speed access to the UCS at the remote versus the main site
B. A higher Frame Loss Ratio on the UCS versus going direct to the Internet
C. Increased delay Variation on the TVC to the main office
D. Increased Delay when going via the main office

A

D. Increased Delay when going via the main office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

An SDCP is in the process of migrating from a legacy design to SD-WAN. The Subscriber has the following needs:
* Low cost
* A limit of two UCSs at each location
* Local Internet Breakout
* Privacy for all business transactions on the SD-WAN
* No VoIP except through a designated corporate VoIP application
* Redundancy for all traffic

What actions must the SDCP do to fulfill the Subscriber’s needs? (Choose two)

A. Provision one UCS to achieve low cost
B. Provision two Public UCS
C. Provision three UCS for redundancy, enable ecryption for each to address privacy
D. Provision no UCS as backup

A

B. Provision two Public UCS

D. Provision no UCS as backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The SVWC List of Application Flow Specifications Service Attribute is defines as follows:
<A, [<PROTV4,1,2><SAV4,10.1.1.0/24>, <DAV4,192.5.1.0/24>], none>
<B, [<PROTV4,1,2><SAV4,10.1.1.0/24>, <DAV4,192.5.2.0/24>], none>
<C, [<PROTV4,1,2><SAV4,10.1.2.0/24>, <DAV4,192.5.1.0/24>], none>
<D, [<PROTV4,1,2><SAV4,10.1.2.0/24>, <DAV4,192.5.2.0/24>], none>

Which flow will the following packets be associated with?

Packet 1
IP Protocol 1
Source IP 10.1.2.17
Destination IP 192.5.1.100

Packet 2
IP Protocol 2
Source IP 10.1.2.254
Destination IP 192.5.2.255

Packet 3
IP Protocol 8
Source IP 10.1.2.17
Destination IP 192.5.1.100

A. Packet 1 will map to Flow D
B. Packet 2 will map to Flow C
C. Packet 3 will map to Flow C
D. Packet 3 will be blocked

A

D. Packet 3 will be blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A new Subscriber has a legacy MPLS private network connecting their three offices and is migrating to SD-WAN. The Subscriber has several requirements that the new SD-WAN must satisfy:
* Each office must have redundant access to the Internet through local Internet Breakout
* Redundancy for all traffic
* An internal application has strict performance needs

What option should an SDCP recommend?

A. Add a Public UCS at each office | Remove the MPLS network | Enable Internet Breakout at each office

B. Add a Public UCS at each office | Retain the MPLS network | Enable Internet Breakout at each office

C. Add two Public UCS at each office | Remove the MPLS network | Enable Internet Breakout at each office

D. Add two Public UCS at each office | Retain the MPLS network | Enable Internet Breakout at each office

A

D. Add two Public UCS at each office | Retain the MPLS network | Enable Internet Breakout at each office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A school district has a primary and backup set of data centers for three school locations; all connected using an SD-WAN Service Provider Network as shown above. Student traffic between schools need to be allowed. However, Faculty data should only be shared with the primary/backup data center locations.

What is the correct virtual topology that should be deployed by the SD-WAN Service Provider for the school district?

A. (Student, multipoint-to-multipoint ([A,B,C])) | (Faculty, Rooted-multipoint, ([X,Y],[A,B,C],[]))

B. (Student, multipoint-to-multipoint ([A,B,C])) | (Faculty, Rooted-multipoint, ([A,B,C],[X,Y]))

C. (Student, multipoint-to-multipoint ([A,B,C])) | (Faculty, Rooted-multipoint, ([X,Y],[A,B,C]))

D. (Student, multipoint-to-multipoint ([X,Y])) | (Faculty, Rooted-multipoint, ([A,B,C]))

A

C. (Student, multipoint-to-multipoint ([A,B,C])) | (Faculty, Rooted-multipoint, ([X,Y],[A,B,C]))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A school has applied Block Lists for the category of gambling websites to prevent student and faculty access. Unfortunately, one website is incorrectly being blocked as a gambling website when students should be allowed access. How should the school go about modifying the Block List as a Subscriber?

A. As a Subscriber, the school can make a request to the Provider web-portal page. The Service Provider will give a time frame as to when the update will happen

B. The school can update the Block List which will over-write the Provider’s database to push to other Subscribers

C. Subscriber cannot make changes not request changes be made to the Block List; otherwise sync issues can arise

D. The school can put in a request, but it is not the Service Providers responsibility to give a time frame as to when the request will be fulfilled

A

A. As a Subscriber, the school can make a request to the Provider web-portal page. The Service Provider will give a time frame as to when the update will happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A subscriber has a single HTTP and FTP server at 124.1.1.100. They need all HTTP traffic that is headed to it to be associated to a single Application Flow. What criteria should be used?

A. DAV4=124.1.1.100
B. SAV4=124.1.1.100
C. SPORT=80
D. DPORT=80

A

D. DPORT=80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The requirement for an SD-WAN service is to apply one policy to all HTTP traffic to or from server 10.10.1.2 and another policy to all other HTTP traffic.

A. <afs1, [<DPORT,80>, <SDAV4,10.10.1.2>]> <AFS2, [<DPORT,80>]>

B. <afs1, [<SDPORT,80>]> <afs2, [<SDPORT,80>, <SAV4,10.10.1.2>]>

C. <afs1, [<SPORT,80>]> <afs2, [<SPORT,80>, <SAV4,10.10.1.2>]>

D. <afs1, [<SDPORT,80>, <SDAV4,10.10.1.2>]> <AFS2, [<SDPORT,80>]>

A

A. <afs1, [<DPORT,80>, <SDAV4,10.10.1.2>]> <AFS2, [<DPORT,80>]>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

You receive complaints that some tagged traffic is not being delivered. The L2 MAX frame size is set to 1518 and the UNI L2 interface Service Attribute is CVLAN 3024. What do you do to resolve the issue?

A. Increase the BANDWIDTH policy

B. Change the UNI L2 Interface Service Attribute to 1518

C. Increase the L2 MAX frame size to 1522

D. Enable the BACKUP policy attribute

A

C. Increase the L2 MAX frame size to 1522

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A Subscriber notices that some frames transmitted to one SD-WAN Edge are not being delivered to other SD-WAN Edges. The Subscriber investigates and finds that the SD-WAN UNI Maximum L2 Interface Frame Size is set to 1518. The value of the SD-WAN UNI L2 Interface Service Attribute value is CVLAN 34.

Which action should be taken to address this issue?

A. Change the SD-WAN UNI L2 Interface Service Attribute value to CVLAN 35
B. Increase SD-WAN UNI Maximum L2 Interface Frame Size 1520
C. Remove the VLAN tag on every frame
D. Increase SD-WAN UNI Maximum L2 Interface Frame Size 1522

A

D. Increase SD-WAN UNI Maximum L2 Interface Frame Size 1522

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

After implementing SD-WAN services, the SD-WAN customer has a security audit performed. The results of the security audit indicate security vulnerabilities in all of the applications that require a secure connection.

Which policy should be investigated?

A. OVERLAY policy
B. BILLING-METHOD policy
C. ENCRYPTRION policy
D. UNDERLAY policy

A

C. ENCRYPTRION policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A medical practice upgrades to SD-WAN service. During the upgrade, the doctors express concern about the confidentiality of patient’s records. What can be configured to ensure this?

A. ECRYPTION = Required-Always
B. BACKUP = Disables
C. PUBLIC-PRIVATE = Private Only
D. INTERNET BREAKOUT = Disables

A

A. ECRYPTION = Required-Always

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which of the following is true?
A. A UNI can be encrypted
B. A UCS can be encrypted
C. An SWVC Endpoint can be encrypted
D. A TVC can be encrypted

A

D. A TVC can be encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What settings ensure data is encrypted when transmitted over an SD-WAN?

A. The SWVC Policy Criteria ENCRYPTION is set to Required-Always and the UCS is encrypted

B. The SWVC Policy Criteria ENCRYPTION is set to Required-Always and the TVC is encrypted

C. The UNI attribute ENCRYPTION is set to Required-Always and the TVC is encrypted

D. The UNI attribute ENCRYPTION is set to Required-Always and the UCS is encrypted

A

B. The SWVC Policy Criteria ENCRYPTION is set to Required-Always and the TVC is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A legacy branch is being integrated into an SD-WAN network. The office currently has a primary and backup MPLS UCS via two ports on a single router. The office needs Local Internet Breakout and site-to-site access. What needs to be done to accomplish this?

A. Add a second router
B. Set INTERNET-BREAKOUT to Enabled for all flows over the current UCS
C. Add a Private UCS
D. Add a Public UCS

A

D. Add a Public UCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A company has 3 locations that use an SD-WAN service. The locations use a mix of Public and Private UCS.

Due to a security issue at the London office, the value of the UCS End Point Breakout Service Attribute for the Public UCS in London is Disabled. Some users in Lindon require access to SaaS applications on the Internet.

How are these SaaS Application Flows forwarded?

A. They are forwarded over the SWVC to an SD-WAN UNI that has access to the Internet

B. They cannot be forwarded to the Internet using Internet Breakout and will be dropped

C. They are forwarded over SWVC to another SD-WAN Edge connected to a Public UCS that allows Internet Breakout at the UCS End Point

D. They are forwarded over the local Internet UCS since the INTERNET-BREAKOUT Policy overrides the UCS End Point Breakout Service Attribute

A

C. They are forwarded over SWVC to another SD-WAN Edge connected to a Public UCS that allows Internet Breakout at the UCS End Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

An Enterprise has an SD-WAN service with both flat-rate and usage-based UCS. The enterprise does not want the billing method to have an impact on how Application Flows are forwarded.

Which value of the BILLING-METHOD Policy Criterion meets this requirement?

A. Flat-Rate
B. Both
C. Usage-Based
D. Either

A

D. Either

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

A hospital uses SD-WAN service to prioritize multiple Paths for outbound traffic to a COTS (Commercial off-the-shelf) application that is sensitive to Packet Delay. The SD-WAN Provider has applied the following PERFORMANCE Policy Criterion:

«“One-way Packet Delay”, 20ms>, <None>></None>

What metric should be examined to explain why the application is having performance issues?

A. Packet Delay is over the threshold
B. One-way Packet Loss Ratio is not being accounted for
C. The path priority is based on Packet Delay
D. Packet Delay is under the threshold

A

C. The path priority is based on Packet Delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

The PERFORMANCE Policy Criterion is:
PERFORMANCE «“One-way Packet Delay”, 20ms>
<”One-way Packet Loss Ratio”, 0.03%»

Imaging also, three Paths to destination A, B, and C: A = <10ms, 0.01%> B = <12 ms, 0.01%> C = <12 ms, 0.02%>

Which statement is incorrect?

A. B and C could be in the other order since they have same value for the primary Performance Metric. But in this case, it is reasonable to assume that an implementation might order these Paths based on the secondary Performance Metric

B. A will be first, followed by either B or C, since they are ties for delay

C. All values are less than the thresholds and the list is ordered correctly based on the primary Performance Metric, the One-way Packet Delay

D. One-way Packet Loss Ratio is the primary metric and One-way Packet Delay is the secondary

A

D. One-way Packet Loss Ratio is the primary metric and One-way Packet Delay is the secondary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

The PERFORMANCE Policy Criterion is:
PERFORMANCE «“One-way Packet Delay”, 20ms>
<”One-way Packet Loss Ratio”, 0.03%»

Imaging also, three Paths to destination A, B, and C:
A = <10ms, 0.04%>
B = <12 ms, 0.01%>
C = <12 ms, 0.02%>

Which of the following is true when evaluating the three paths listed?

A. Path A is the top priority since it has the lowest One-way Packet Delay, which is the primary metric

B. Packet drops is worst than having the packet gets delayed, and should be avoided at all cost, so the top priority should be path B since it has the lowest One-way Packet Loss Ratio

C. Path A should be taken out of the list and should not be considered as a forwarding path since it has exceeded the threshold for One-way Packet Loss Ratio of 0.3%

D. Path A has a One-way Loss Ratio above the 0.03% threshold; therefore, the Path is placed at the end of the list even though it has the best One-way Packet Delay. B and C are ties for delay, so they can be either order - but above A.

A

D. Path A has a One-way Loss Ratio above the 0.03% threshold; therefore, the Path is placed at the end of the list even though it has the best One-way Packet Delay. B and C are ties for delay, so they can be either order - but above A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

The PERFORMANCE Policy Criterion is:
PERFORMANCE «“One-way Packet Delay”, 20ms>, <”One-way Packet Loss Ratio”, 0.03%»

Imaging also, three Paths to destination A, B, and C:

A = <10ms, 0.035%>
B = <21ms, 0.01%>
C = <12ms, 0.02%>

Which statement is not correct?

A. Since the primary metric is One-way Packet Delay, the correct path order is Path A is the top preferred, followed by Path C, with Patch B as the worst path placed at the bottom

B. Path B’s delay exceeds the threshold

C. Path A’s One-way Packet Loss Ratio is above the threshold

D. Both Path A and Path B is moved to the end of the list and Path C is the favored Path

A

A. Since the primary metric is One-way Packet Delay, the correct path order is Path A is the top preferred, followed by Path C, with Patch B as the worst path placed at the bottom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A hospital uses an SD-WAN service to prioritize multiple Paths for outbound traffic to one of the hospital’s COTS (Commercial off-the-shelf) applications that is sensitive to Packet Delay. The SD-WAN Provider has applied the following PERFORMANCE Policy Criterion:

«“One-way Packet Delay”, 15ms>, <”One-way Packet Loss Ratio”, 0.06%»

The three paths to the application are:

Path A = <10ms, 0.05%>
Path C = <14ms, 0.03%>
Path B = <16ms, 0.01%>

Which of the following is true when evaluating the three paths listed?

A. Path B should be removed from the list given that 16ms is above the threshold for that Performance Metric

B. Path A is correctly assigned first in priority

C. Path C should be assigned first in priority

D. Path B should be the first Path option instead of Path A given that it has the most desirable “One-way Packet Loss Ratio

A

B. Path A is correctly assigned first in priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A hospital uses an SD-WAN service to prioritize multiple Paths for outbound traffic to one of the hospital’s COTS (Commercial off-the-shelf) applications that is sensitive to Packet Delay. The SD-WAN Provider has applied the following PERFORMANCE Policy Criterion:

«“One-way Packet Delay”, 20ms>, <”One-way Packet Loss Ratio”, 0.05%»

The four paths to this application are:

Path B = <8ms, 0.05%>
Path C = <14ms, 0.03%>
Path A = <5ms, 0.07%>
Path D = <25ms, 0.10%>

Which of the following is true when evaluating the four paths listed?

A. Path A is correctly place at the end of the list
B. Path A should be re-ordered to the first option in the list
C. Path D should be removed from the list
D. Path B should be moved below Path C

A

C. Path D should be removed from the list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A collection of MPLS label switch routers is called a ____________.

a. UCS
b. EGP
c. MPLS Cloud
d. IGP

A

c. MPLS Cloud

An MPLS cloud is the collection of routers that make up an MPLS network. Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) are the two broad categories of routing protocols. Underlay connection service (UCS) are what SD-WAN services are built on top of.

The correct answer is: MPLS Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Frame Loss Ratio is _____.

a. The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance
b. The time required to transmit a Service Frame from ingress UNI to egress UNI
c. The percentage of time that a service is usable
d. The measure of the number of lost frames between the ingress UNI and egress UNI expressed as a percentage

A

d. The measure of the number of lost frames between the ingress UNI and egress UNI expressed as a percentage

Frame Loss Ratio (FLR) is the percentage of frames that are sent but not received correctly. For example, if 100 frames get sent and 98 frames are received directly, this results in 2% FLR.

An SDCP candidate should focus on the fact that Frame Delay (FD), Inter-Frame Delay Variation (IFDV), Frame Loss Ratio (FLR), and Availability are four metrics that are used to measure performance of an SD-WAN service.

The correct answer is: The measure of the number of lost frames between the ingress UNI and egress UNI expressed as a percentage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

When BGP is used as the routing protocol between Autonomous Systems, it is called _______.

a. eBGP
b. IS-IS
c. iBGP
d. 803.1

A

a. eBGP

Interior BGP (iBGP) is used within one Autonomous System (AS). Exterior BGP (eBGP) is used between Autonomous Systems.

The correct answer is: eBGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

How does SLAAC differ from DHCP?

a. SLAAC is for both IPv6 and IPv4, DHCP is not.

b. DHCP only issues IPv6 addresses. SLACC only issues IPv5 addresses.

c. SLAAC can be used to assign addresses without a DHCP server.

d. DHCP is newer, SLACC is older.

A

c. SLAAC can be used to assign addresses without a DHCP server.

Stateless Address Autoconfiguration (SLAAC) is a technique used in IPv6 to assign addresses. Unlike DHCP, it does not require a server.

The correct answer is: SLAAC can be used to assign addresses without a DHCP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Availability is _____.

a. Time required to transmit a Service Frame from ingress UNI to egress UNI

b. Percentage of time that a service is usable

c. The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance

d. Measure of the number of lost frames between the ingress UNI and egress UNI expressed as a percentage

A

b. Percentage of time that a service is usable

Availability is the percentage of overall time that the service is used by the subscriber (versus is down with an outage).

An SDCP candidate should focus on the fact that Frame Delay (FD), Inter-Frame Delay Variation (IFDV), Frame Loss Ratio (FLR), and Availability are four metrics that are used to measure performance of an SD-WAN service.

The correct answer is: Percentage of time that a service is usable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

OSPF is a link state protocol that uses _________ to update routing topologies.

a. TLV
b. BGP
c. LSA
d. NLRI

A

c. LSA

Link State Advertisements are used to update routers that run OSPF.

The correct answer is: LSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which of the following IP addresses is in the 10.7.8.0/28 network?

a. 10.7.28.2
b. 10.7.8.28
c. 10.2.8.7
d. 10.7.8.2

A

d. 10.7.8.2

Your answer is correct.
The range of the 10.7.8.0/28 subnet is 10.7.8.0-10.7.8.15.

The correct answer is: 10.7.8.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

DHCP is used to _______________________.

a. Dynamically compute the path a packet takes

b. Promote Layer 2 address throughout the network.

c. Assign IPv4 and IPv6 addresses to hosts

d. Secure packets from source to destination

A

c. Assign IPv4 and IPv6 addresses to hosts

Dynamic Host Control Protocol (DHCP) servers assigns IP addresses to host computers that request them.

The correct answer is: Assign IPv4 and IPv6 addresses to hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

IEEE 802.1ad is also known as ___________________.

a. TLVs
b. NLRI
c. DSCP
d. “Q in Q” or S-Tags

A

d. “Q in Q” or S-Tags

802.1ad defines the use of two tags (a S-Tag and C-tag). Tags where originally defined in the 802.1Q standard and have acquired the nickname of Q- tags. Thus Q in Q refers to the fact that one Q tag is encapsulated behind the second.

The correct answer is: “Q in Q” or S-Tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is the subnet of the network 10.2.3.48/28?

a. 10.2.3.40-10.2.3.48
b. 10.2.3.48-10.2.3.55
c. 10.2.3.48-10.2.3.63
d. 10.2.3.33-10.2.3.48

A

c. 10.2.3.48-10.2.3.63

A /28 subnet results in range of 16 addresses. This subnet starts with 10.2.3.48 and runs through 10.2.3.63.

The correct answer is: 10.2.3.48-10.2.3.63

81
Q

RIP is a ______ IGP protocol.

a. Path vector
b. Attribute vector
c. New routing protocol
d. Distance vector

A

d. Distance vector

82
Q

Underlay Connectivity Services provide ____________.

a. WLAN Services
b. WAN Services
c. PAN Services
d. LAN Services

A

b. WAN Services

SD-WAN is based on WAN services.

83
Q

SNMP is used to ________.

a. Route packets over the Internet

b. Track and store information about the status of a network device

c. Enable packets to be resent

d. As a requirement for Layer 2 connectivity

A

b. Track and store information about the status of a network device

Simple Network Management Protocol (SNMP) allows a management device to communicate to other devices, both getting information, such as network statistics and device health, as well as setting information, such as changing the configure of the device.

The correct answer is: Track and store information about the status of a network device

84
Q

IPv4 enables data to be routed between _________ networks.

a. No
b. Layer 1024
c. Layer 7
d. Layer 2

A

d. Layer 2

IP operates at Layer 3 of the OSI model, interconnecting Layer 2 networks.

The correct answer is: Layer 2

85
Q

SPRING/SR enables the ______ router to specify the route of a packet.

a. Middle
b. Source
c. Destination
d. Orchestrator

A

b. Source

85
Q

A common cause of insufficient bandwidth is _________.

a. When a link or node fails and the failure is not quickly detected

b. Packets arrive too late at the destination

c. Packets need to be resent

d. The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance

A

a. When a link or node fails and the failure is not quickly detected

A failure can result in a lack of bandwidth if the traffic was relying on the path.

Sending of packets is a normal occurrence on a network. While normally not a cause of bandwidth issues, an excessive amount of resends could result in new traffic not having the space to be transmitted.

The correct answer is: When a link or node fails and the failure is not quickly detected

85
Q

A VLAN tag adds ____ to the length of the frame.

a. 4 bytes
b. 4094 VLAN tags
c. 1500 bits
d. 1526 bytes

A

a. 4 bytes

Each tag is 4 bytes in length.

86
Q

A Service Provider provides SD-WAN services to the ____________.

a. Subscriber
b. LAN Service Provider
c. Underlying Service Provider
d. WAN Service Providers

A

a. Subscriber

SD-WAN Service Providers provide SD-WAN Services to subscribers.

The correct answer is: Subscriber

87
Q

Which two tools use ICMP:

(Select 2.)

a. IP route
b. Ifconfig
c. Traceroute or traceroute6
d. Ping or ping6

A

c. Traceroute or traceroute6
d. Ping or ping6

Ping and Traceroute (along with their IPv6 variants Pingv6 and traceroutev6) use Internet Control Message Protocol (ICMP) to perform their functions.

The correct answers are: Ping or ping6, Traceroute or traceroute6

88
Q

What is an endpoint?

a. One end of a network connection
b. A switch
c. Packet
d. A route

A

a. One end of a network connection

In a traditional sense, an endpoint is a modem, hub, bridge, switch, router, printer or a host computer. In other words, the end of of a connection. For example, a computer being one end sends a print job to a printer at the other end.

While a router or a switch could be an endpoint, an endpoint is not always a router or switch.

A packet is a small chunk of data that is sent on a network.

The correct answer is: One end of a network connection

89
Q

BGP selects the forwarding path based on _______.

a. Path vector
b. Attributes
c. Distance vector
d. List of routers

A

b. Attributes

BGP uses a Path Vector algorithm to choose the path to forward traffic.

The correct answer is: Attributes

90
Q

The purpose of DSCP is to ______________.

a. Deliver the frame
b. Support Layer 1
c. Apply CoS
d. Secure the packet

A

c. Apply CoS

Differentiated services code point (DSCP) is one method to identify a class of service for traffic.

The correct answer is: Apply CoS

91
Q

A VLAN is a _______.

a. Packet based technology specified using the IEEE 802.1Q
b. Jumbo frame
c. Packet
d. Layer 2 broadcast domain

A

d. Layer 2 broadcast domain

A Virtual LAN (VLAN) is used to partition a network into smaller groups (for example, individual departments within a company’s building). When implemented, each VLAN creates a broadcast domain at Layer 2, such that a broadcast from any member of the VLAN is transmitted to all members of that VLAN.

The correct answer is: Layer 2 broadcast domain

92
Q

FRR is MPLS technology that _____.

a. Is bidirectional
b. Is a faster switch
c. Is part of the next generation
d. Pre-calculates alternate MSPL Label Switching Paths

A

d. Pre-calculates alternate MSPL Label Switching Paths

Fast Reroute (FRR) pre-calculates an alternative. So if the primary path fails, the alternative is already known and traffic can rapidly be switched to it.

The correct answer is: Pre-calculates alternate MSPL Label Switching Paths

93
Q

IPv5 is ________________________.

a. Not used outside of research purposes

b. Required for IPv6 to function

c. The newest version of the IP protocol

d. 802.1ad defines the use of two tags (an S-Tag and a C-tag). Tags were originally defined in the 802.1Q standard and have acquired the nickname of Q- tags. Thus, Q in Q refers to the fact that one Q tag is encapsulated behind the second.

A

a. Not used outside of research purposes

IPv4 is the current and most commonly used version of IP today. The number of addresses that IPv4 can supply has reached a limit.
IPv5 never moved out of research.
The industry is moving to IPv6 today for a number of reasons. The biggest of which is the massive increase in available addresses.
The correct answer is: Not used outside of research purposes

94
Q

What specification standardizes Ethernet?

a. IEEE 802.1ad
b. IEEE 802.3
c. IETF 1492
d. ANSI T1.105

A

b. IEEE 802.3

IEEE standardized Ethernet definition in its 802.3 standard.

The correct answer is: IEEE 802.3

95
Q

An IPv6 address is represented by _________.

a. 32 bits
b. 256 bits
c. 128 bits
d. 64 bits

A

c. 128 bits

IPv6 has 128 binary bits. IPv4 has 32 bits.

The correct answer is: 128 bits

96
Q

A WAN connects ________________.

a. Q in Q” or S-Tags
b. Controllers
c. Switches
d. LANs and MANs

A

d. LANs and MANs

Local Area Networks (LANs) and Metro Area Networks (MANs) are often interconnected over geographically larger Wide Area Networks (WANs).

The correct answer is: LANs and MANs

97
Q

IPv6 provides ________________________ addresses.

a. High speed
b. 4.3 billion
c. 2^128 = 340 billion billion billion billion
d. Low latency

A

c. 2^128 = 340 billion billion billion billion

IPv6 provides 2^128 addresses which is a larger increase over IPv4. IPv4 only provides 2^32 or approximately 4.3 billion addresses, which is less than 1 per person on Earth. With IPv6 ,every person can have millions of addresses dedicated for every device they own or use.

The correct answer is: 2^128 = 340 billion billion billion billion

98
Q

A standard Ethernet Frame is _____ in length.

a. 12 bits
b. 1500 bits
c. 1526 bytes
d. 1518 bytes

A

d. 1518 bytes

A standard Ethernet frame has a header and tail of 18 bytes and data of 1500 bytes for a total of 1518 bytes. If the data is shorter, it is padded with dummy data up to the 1500 bytes. Frames can be larger than 1518 bytes, if the Service Provider allows more than 1500 bytes of data. Additionally, tags can be added to the frame for a number of uses, including identifying a VLAN that the frame is associated with. Each tag adds 4 additional bytes to the length.

The correct answer is: 1518 bytes

99
Q

All nodes on an IEEE 802 network must have a ______________ in order to send and receive Ethernet Frames in a Layer 2 broadcast domain.

a. Jumbo frames
b. Router
c. Mac address
d. Routing protocol

A

c. Mac address

Media Access Control (MAC) addresses identify the source and destination locations for traffic at Layer 2 of the OSI model. At Layer 3, IP addresses are used.

The correct answer is: Mac address

100
Q

The primary Layer 3 routing protocol that runs the global Internet is _______.

a. OSPF
b. IS-IS
c. STP
d. eBGP

A

d. eBGP

eBGP is the exterior gateway protocol that connects the Internet.

The correct answer is: eBGP

101
Q

Ping6 is:

a. Ping for IPv6
b. A Layer 1 tool
c. A new version of ping for IPv4
d. Not used

A

a. Ping for IPv6

Pingv6 is the IPv6 equivalent of a ping.

The correct answer is: Ping for IPv6

102
Q

An Ethernet Frame with IEEE 802.1ad tags is ___________.

a. 1518 bytes
b. 1526 bytes
c. 1500 bits
d. 12 bits

A

b. 1526 bytes

IEEE 802.1ad(QinQ) specifies the use of two tags, a C-Tag to identify a customer’s VLAN and a S-Tag for the Service Provider to differentiate one customer’s service from all others. Adding 2x4 bytes to the standard frame size of 1518 yields 1526 bytes.

The correct answer is: 1526 bytes

103
Q

The process of selecting a path for packets to travel across networks is called ____________.

a. Frame
b. Routing
c. Switching
d. Packet

A

b. Routing

Routing chooses the best path, or route, from source to destination.

The correct answer is: Routing

104
Q

The purpose of the traceroute command is to:

a. Reset all Layer 3 devices on the network
b. Provide uptime
c. Allow packets to be resent
d. Provide the path and round trip time for each hop as well as to the destination

A

d. Provide the path and round trip time for each hop as well as to the destination

Traceroute returns the specific steps along the path from the source to the destination.

The correct answer is: Provide the path and round trip time for each hop as well as to the destination

105
Q

IS-IS can be separated into ______ levels.

a. 2
b. 1522
c. Over 1 million
d. 4094

A

a. 2

IS-IS has 2 levels.

The correct answer is: 2

106
Q

What is PCP used for?

a. Jumbo frames
b. VLAN-ID
c. Class of Service (CoS)
d. A packet

A

c. Class of Service (CoS)

Priority Code Point (PCP) is a three bit field in a Ethernet frame that contains a value between 0-7 to indicate the class of service of a particular frame.

The correct answer is: Class of Service (CoS)

107
Q

A common cause of retransmission is _____.

a. When a link or node fails and the failure is not quickly detected

b. Packets arrive too late at the destination

c. The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance

d. Packets did not arrive or arrived damaged

A

d. Packets did not arrive or arrived damaged

Packets need to be retransmitted (resent) if they arrive damaged or if they never arrived at all.

The correct answer is: Packets did not arrive or arrived damaged

108
Q

What is a LAN?

a. Jumbo frames
b. 1518
c. Two or more connected computers, normally in a small area
d. A switch

A

c. Two or more connected computers, normally in a small area

A Local Area Network (LAN) is a collection of computers and other equipment connected together, generally in a single building.

The correct answer is: Two or more connected computers, normally in a small area

109
Q

Frame Delay is _____.

Select one:
a. The measure of the number of lost frames between the ingress UNI and egress UNI expressed as a percentage

b. The percentage of time that a service is usable

c. The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance

d. The time required to transmit a Service Frame from ingress UNI to egress UNI

A

d. The time required to transmit a Service Frame from ingress UNI to egress UNI

Frame delay (FD) represents the time delay from when a frame is transmitted until it is totally received at the destination.

An SDCP candidate should focus on the fact that Frame Delay (FD), Inter-Frame Delay Variation (IFDV), Frame Loss Ratio (FLR), and Availability are four metrics that are used to measure performance of an SD-WAN service.

The correct answer is: The time required to transmit a Service Frame from ingress UNI to egress UNI

109
Q

A Subscriber purchases SD-WAN services from ____________.

a. Jumbo Frame Service Providers
b. SD-WAN Service Provider
c. Underlying Service Provider
d. LAN Service Provider

A

b. SD-WAN Service Provider

SD-WAN Service Providers provide SD-WAN Services to subscribers.

The correct answer is: SD-WAN Service Provider

109
Q

Ping provides:

(Select more than 3.)

Select one or more:
a. Connectivity
b. Reachability
c. Latency performance
d. Uptime

A

a. Connectivity
b. Reachability
c. Latency performance

A successful Ping proves the source is connected to the network. The path reaches from the source to the destination and gives the amount of time needed to reach the destination, thus the latency.

The correct answers are: Connectivity, Reachability, Latency performance

109
Q

When BGP is used as the routing protocol within an Autonomous System, it is called _______.

a. iBGP
b. 802.11a
c. OSPF
d. eBGP

A

a. iBGP

Interior BGP (iBGP) is used within one Autonomous System (AS). Exterior BGP (eBGP) is used between Autonomous Systems.

The correct answer is: iBGP

110
Q

The purpose of the traceroutev6 command is to:

a. Traceroute for IPv6
b. Provide Layer 1 information
c. Reset all Layer 3 devices on the network
d. Provide uptime
e. Allow packets to be resent

A

a. Traceroute for IPv6

Traceroutev6 is the equivalent of traceroute for IPv6.

The correct answer is: Traceroute for IPv6

111
Q

An SD-WAN is deployed to a marketing firm to connect their four branches and its headquarters. At the request of the form, The Service Provider designed it to limit Internet traffic at each branch. During the rollout, employees discover they are unable to access the Internet. Investigating the issues, the Service Provider discovers:

Inter-branch communications work correctly.
The INTERNET-BREAKOUT Policy is set to Enabled.
The local Internet UCS is working at each branch

What should the Service Provider verify next?

A. PUBLIC-PRIVATE Policy criteria
B. BACKUP Policy criteria
C. ENCRYPTION Policy criteria
D. BANDWIDTH Policy criteria

A

D. BANDWIDTH Policy criteria

111
Q

Inter-Frame Delay Variation is _____.

a. The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance

b. The percentage of time that a service is usable

c. The measure of the number of lost frames between the ingress UNI and egress UNI expressed as a percentage

d. The time required to transmit a Service Frame from ingress UNI to egress UNI

A

a. The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance

Inter-Frame Delay Variation (IFDV) is how much the delay varies between two frames. For example, if one delay is 15ms and the second is 17ms, the IFDV is 2ms.

An SDCP candidate should focus on the fact that Frame Delay (FD), Inter-Frame Delay Variation (IFDV), Frame Loss Ratio (FLR), and Availability are four metrics that are used to measure performance of an SD-WAN service.

The correct answer is: The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance

112
Q

A remote site needs a connection to send confidential company information to headquarters with a minimum data rate of 50Mbps at all times. It should be limited to 200Mbps at maximum.

Which policy is appropriate?

A. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, disabled> <PUBLIC-PRIVATE, Private-Only> <BILING-METHOD, Flat-rate-only> <BACKUP, Enabled> <BANDWIDTH, 50Mbps, 200Mbps>]>

B. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, disabled> <PUBLIC-PRIVATE, Private-Only> <BILING-METHOD, Flat-rate-only> <BACKUP, Enabled> <BANDWIDTH, none, 50Mbps>]>

C. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, disabled> <PUBLIC-PRIVATE, Private-Only> <BILING-METHOD, Flat-rate-only> <BACKUP, Enabled> <BANDWIDTH, 150Mbps, 50Mbps>]>

D. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, disabled> <PUBLIC-PRIVATE, Private-Only> <BILING-METHOD, Flat-rate-only> <BACKUP, Enabled> <BANDWIDTH, 50Mbps, none>]>

A

A. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, disabled> <PUBLIC-PRIVATE, Private-Only> <BILING-METHOD, Flat-rate-only> <BACKUP, Enabled> <BANDWIDTH, 50Mbps, 200Mbps>]>

112
Q

A school district is working to connect different schools together using an overlay VPN. Schools must share large amounts of streaming audio and video data. A test roll out of an SD-WAN Service is using the existing Internet connections as UCSs or Underlay Connectivity Services. Schools are reporting that high-definition video between schools is suffering. What should be done to start troubleshooting this issue?

A. Start using more compressed video codecs to lower the file size

B. Require schools to find a budget to increase bandwidth for each SD-WAN Edge

C. Add additional UCSs at each of the school locations suffering the issue

D. Confirm the Application Flow Specification Group includes the needed bandwidth commitment for the video Application Flow of each SD-WAN Edge

A

D. Confirm the Application Flow Specification Group includes the needed bandwidth commitment for the video Application Flow of each SD-WAN Edge

113
Q

A library system with multiple branches has implemented SD-WAN services. The initial SD-WAN setting limited Internet traffic for each branch.

End users are now unable to access the Internet
The local Internet UCS is working
The policy for each branch is set to INTERNET-BREAKOUT = Enabled

What other value should be verified?

A. OVERLAY Policy
B. BANDWIDTH Policy
C. ENCRYPTION Policy
D. BILLING-METHOD Policy

A

B. BANDWIDTH Policy

114
Q

An SDCP is called in to help with an existing migration from MPLS to SD-WAN. All branches have a single MPLS to the regional headquarters. The customer has the following requirements:

Each site has two UCSs
Business application flows with security requirements
Local Internet Breakout
Restriction of BitTorrent and social media

Which option best meets all the customer’s requirements?

A. Two Public UCS
Local Internet Breakout with the two public UCSs
ENCRYPTION Enabled on all TVCs
Block BitTorrent and Social Media

B. Local Internet Breakout with only two public UCS
Block BitTorrent and social Media
Three Public UCS
One Public UCS for business application backup

C. Add one Public UCS and keep the MPLS
Local Internet Breakout on the one Public UCS
Block BitTorrent and Social Media
ENCRYPTION Enabled on only MPLS TVCs

D. Local Internet Breakout with two public UCSs
Encryption in the backup UCS
Block BitTorrent and Social Media
Two Public UCS

A

A. Two Public UCS
Local Internet Breakout with the two public UCSs
ENCRYPTION Enabled on all TVCs
Block BitTorrent and Social Media

115
Q

A new Application Flow from a new application is being added by a Subscriber to their SD-WAN. The company has a public and a Private UCS. The Virtual Topology SalesManagementVT has been defined as shown by the dashed line:
The following requirements are needed:
* The application is used to communicate solely between the company’s cash registers at all of its stores
* The application is mission critical to the company and runs around the clock

Which Policy is appropriate for the Application Flow?

A. [PolA, [<ENCRYPTION, Required-Public-Only>
<INTERNET-BREAKOUT, Enabled>
<BACKUP, Enabled>
<PUBLIC-PRIVATE, Either>
<VIRTUAL-TOPOLOGY, swvc>]]

B. [PolB, [<ENCRYPTION, Required-Public-Only>
<INTERNET-BREAKOUT, Enabled>
<BACKUP, Enabled>
<PUBLIC-PRIVATE, Either>
<VIRTUAL-TOPOLOGY, >]]

C. [PolC, [<ENCRYPTION, Required-Public-Only>
<INTERNET-BREAKOUT, Disabled>
<BACKUP, Enabled>
<PUBLIC-PRIVATE, Either>
<VIRTUAL-TOPOLOGY, Swvc>]]

D. [PolD, [<ENCRYPTION, Required-Public-Only>
<INTERNET-BREAKOUT, Disabled>
<BACKUP, Enabled>
<PUBLIC-PRIVATE, Either>
<VIRTUAL-TOPOLOGY, SalesManagementVT>]]

A

C. [PolC, [<ENCRYPTION, Required-Public-Only>
<INTERNET-BREAKOUT, Disabled>
<BACKUP, Enabled>
<PUBLIC-PRIVATE, Either>
<VIRTUAL-TOPOLOGY, Swvc>]]

116
Q

A legal firm is upgrading from a legacy network of IP VPN MPLS to SD-WAN to improve availability. They wish to implement it over only Internet UCSs. Each location of the firm is rented and has a coax line provided. The leases do not allow additional physical installations. What do you recommend for UCS access links?

A. Two HFC links from different providers

B. An HFC link and a LTE access from the same company

C. An HFC link and a PON link from different providers

D. Two HFC links from the cable provider

A

B. An HFC link and a LTE access from the same company

117
Q

An SDCP needs to build a Policy for traffic egressing a UNI at a remote site. The remote site only accepts traffic originating at the other offices within the SD-WAN.

Which Policy should the SDCP design for the Application Flow?

A. [PolA, [<BLOCK-SOURCE, [INTERNET]>, <AF-SECURITY-EGRESS, None>]]

B. [PolB, [<BLOCK-SOURCE, [INTERNET]>, <AF-SECURITY-EGRESS, None>, <INTERNET-BREAKOUT, Disabled>]]

C. [PolC, [<PUBLIC-PRIVATE, Either>, <AF-SECURITY-EGRESS, None>]]

D. [PolD, [<BLOCK-SOURCE, [UNI.INTERNET]>, <AF-SECURITY-EGRESS, None>]]

A

A. [PolA, [<BLOCK-SOURCE, [INTERNET]>, <AF-SECURITY-EGRESS, None>]]

118
Q

A medical center with multiple locations throughout the region has a desire to upgrade their existing MPLS VPN WAN to SD-WAN. Each location needs to have a single UCS and needs to forward medical application data over a backup UCS upon failure.
300Mbps of bandwidth is needed at each location

What UCS should the medical service choose at each location?

A. Two DSL from different service providers
B. Gigabit Passive Optical Network (GPON) and LTE from the same service provider
C. Hybrid fiber-coaxial from the same provider
D. Two DSL from the same provider

A

B. Gigabit Passive Optical Network (GPON) and LTE from the same service provider

119
Q

A legal firm is upgrading from a legacy network of IP VPN MPLS to SD-WAN to improve availability. They wish to implement it over only Internet UCSs. Each location of the firm is rented and has a copper line provided. The Leases do not allow additional physical installations.

What do you recommend for UCS access links?

A. A DSL link and a LTE access from the same company
B. A DSL link and a PON link from different providers
C. Two PON links from different providers
D. Two PON links from a single provider

A

A. A DSL link and a LTE access from the same company

120
Q

Measuring which of the following involves the difference of a measurement of two Service Frames belonging to the same Class of Service (Cos) instance?

A. Frame Loss Ratio (FLR)
B. Frame Delay (FD)
C. Availability
D. Inter-Frame Delay Variation (IFDV)

A

D. Inter-Frame Delay Variation (IFDV)

120
Q

A new subscriber plans to send a regular video feed and is concerned about high quality reception and availability of their data. What do you recommend to the potential subscriber?

A. A single Public UCS
B. Two public UCSs
C. A single Private UCS
D. Two Private UCSs

A

D. Two Private UCSs

120
Q

A hospital has an application to exchange medical records subject to patient confidentiality. An SD-WAN Service is installed with dual UCS that connect the hospital with a local clinic. The clinic is reporting slowness whenever using the application.
What fix should be applied?

A. Increase Bandwidth for both UCS
B. Apply a policy that selects a UCS based on performance
C. Use Internet breakout at the hospital
D. Apply a policy to use one UCS as a backup

A

B. Apply a policy that selects a UCS based on performance

120
Q

A national pharmaceutical company has 3 locations connected to a headquarters using traditional WAN technology. The pharmaceutical company opens up a 4th location and wants to implement SD-WAN services in the new location.
The headquarters building has equipment that can be upgraded to use SD-WAN
The new location has 1 Private and 1 Public UCS

During service activation testing, latency is very high for applications that use the Private UCS. What can be done to prevent this issue from occurring?

A. Add an additional UCS
B. Define tighter latency and performance specifications of the UCS in the Service Level Specification
C. Decrease the number of hops
D. Increase the bandwidth of the UCS to 10 Gbps

A

B. Define tighter latency and performance specifications of the UCS in

120
Q

A regional e-commerce company has implemented SD-WAN. During the SD-WAN implementation, two Private UCSs were added to the warehouse with 1 Gbps of bandwidth each to support new Enterprise Resource Planning software with latency requirements for voice and video chat features.

The warehouse is only using a maximum of 500Mbps of bandwidth, but end users are complaining of broken audio and slow page updates.

Network monitoring software consistently shows high latency
What could have been done before the SD-WAN implementation to overcome these issues?

A. Define tighter latency and performance specifications of the UCS in the Service Level Specification

B. Add an additional UCS

C. Decrease the number of hops

D. Increase the bandwidth of the UCS to 10 Gbps

A

A. Define tighter latency and performance specifications of the UCS in the Service Level Specification

121
Q

A small company recently purchased a 1Gbps Public UCS and SD-WAN services with the plan to expand in the future.
They only use 75Mbps of bandwidth on average.
The maximum amount of bandwidth used in a month is 343Mbps.
The company recently started using VOIP and has notices interrupted audio and delay errors from the application.

What should have been done before implementation of the SD-WAN services to overcome these issues?

A. Add and configure an Internet Breakout
B. Increase the bandwidth of the UCS to 10 Gbps
C. Add a second UCS
D. Define latency and performance of the UCS in the Service Level Specification

A

D. Define latency and performance of the UCS in the Service Level Specification

121
Q

Which of the following is an advantage of a private UCS over a public UCS?

A. Better encryption
B. Lower cost
C. Better predictability
D. Fast speed

A

C. Better predictability

122
Q

A subscriber is reporting issues with a new public UCS. Gathering data, you discover:
The Subscriber is only using 25Mbps of data.
High levels of latency are being reported, exceeding the maximum their primary applications can tolerate.
50Mbps of bandwidth was guaranteed.

What could have prevented these issues?

A. Increasing the maximum upload and download speeds of the UCS
B. Tighter Service Level Specifications
C. The geolocation database for the UCS
D. Changing the number of hops to destination over the UCS

A

B. Tighter Service Level Specifications

123
Q

A Subscriber is reporting issues with a new Public UCS. Gathering data, you discover:
The Subscriber is using long-term average of 50Mbps of TCP data.
High levels of latency are being reported occasionally, exceeding the maximum their primary applications can tolerate.
50Mbps of bandwidth was guaranteed on the UCS.

What can be done to prevent these issues?

A. Tighter Service Level Specifications
B. Changing the number of hops to destinations over the UCS
C. Update the geolocation database for the UCS
D. Increasing the maximum upload and download bandwidth speed of the UCS

A

D. Increasing the maximum upload and download bandwidth speed of the UCS

124
Q

An SD-WAN Subscriber is experiencing a business slowdown and is looking to optimize their costs. As an SDCP you have worked with them to categorize their traffic into two groups.

The first group is audio feeds that are highly sensitive to delay and must have a high availability.
The second group can have a lower availability and is not sensitive to delay
The Subscriber has both a low-cost Public UCS with a very relaxed SLS as well as a Private UCS SLS with very strict low delay and frame loss.

What do you recommend to the subscriber?

A. Configure the Audio traffic flows to prefer the Private UCS.
Set the PUBLIC-PRIVATE service Attribute to Either for all audio flows.
Configure the non-Audio traffic to only use the Public UCS.

B. Configure the Audio traffic to prefer the Private UCS
Set the PUBLIC-PRIVATE service Attribute to Private-Only for all audio flows
Configure the non-Audio traffic to only use the Public UCS

C. Configure the Audio traffic flows to prefer the Private UCS
Configure the non-Audio traffic flows to prefer the Public UCS only
Designate as a Backup UCS the Public UCS

D. Configure the Audio flows to prefer the Private UCS.
Configure the non-Audio traffic to prefer the Public UCS.
Enable both UCS as backups

A

A. Configure the Audio traffic flows to prefer the Private UCS.
Set the PUBLIC-PRIVATE service Attribute to Either for all audio flows.
Configure the non-Audio traffic to only use the Public UCS.

124
Q

You need to size Underlay Connectivity Services for 3 remote sites and a headquarters laid out in a hub and spoke design. The customer requires:

All traffic flows between the remote sites and headquarters only.
80Mbps of traffic each way between each remote site and headquarters.
One Public and one Private underlay will be configured at each site, with 75% of the traffic on the Public and 25% on the Private at each location.
Both Underlays are available to all traffic in case of failure.

Which is the best choice for sizing?

A. Provision 80Mbps for the Public Underlay and 80Mbps for the Private Underlay at each remote site

B. Provision 60Mbps for the Public Underlay and 20Mbps for the Private Underlay at each remote site

C. Provision 60Mbps for the Public Underlay and 20Mbps for the Private Underlay at each remote site
Provision 180Mbps for the Public Underlay and 60Mbps for the Private Underlay at headquarters. Set the BACKUP service attribute to Enabled in SWVC policies

D. Provision 40Mbps for the Public Underlay and 40Mbps for the Private Underlay at each remote site

A

A. Provision 80Mbps for the Public Underlay and 80Mbps for the Private Underlay at each remote site

125
Q

A subscriber has the following requirements for SD-WAN services:
10Mbps of bandwidth for critical Application Flows
60mbps of bandwidth for Application Flows with less resiliency than the critical data Application Flows
Guest Wi-Fi of 35MBPS needing Local Internet Breakout

What UCS options are the best choice for this Subscriber?

A. Three public; one private 70Mbps, one private 20Mbps, and one public 200Mbps

B. Two; each 105Mbps with strict Service Level Specifications

C. Two public; one 10Mbps, one 105Mbps designated as BACKUP

D. Three; one private 10Mbps, one private 10Mbps designated as BACKUP to the critical Application Flow, and one public 95Mbps with Internet Breakout

A

D. Three; one private 10Mbps, one private 10Mbps designated as BACKUP to the critical Application Flow, and one public 95Mbps with Internet Breakout

125
Q

An existing SD-WAN subscriber wants to minimize the use of firewalls by migrating to a solution that limits Internet access to only their corporate headquarters. Each branch features:

Two 250Mbps UCS, one Public and one Private
250Mbps of SD-WAN traffic sent towards the headquarters
100Mbps of Internet traffic
Additionally, the Subscriber needs resilience for the Internet bound traffic

Which of the following is appropriate for the customer?

A. Set INTERNET-BREAKOUT to Disabled at each branch
Set PUBLIC-PRIVATE to Either for all Application Flows bound for the Internet
Upgrade both UCS 350Mbps

B. Set PUBLIC-PRIVATE to Private-Only for all
Application Flows bound for the Internet
Upgrade both UCS 350Mbps

C. Set INTERNET-BREAKOUT to Disabled at each site
Upgrade the public UCS to 350Mbps
Backhaul traffic over TVCs on the Public Service

D. Set INTERNET-BREAKOUT to Disabled at each branch
Set PUBLIC-PRIVATE to Private-Only at each branch
Upgrade Private UCS to 350Mbps

A

A. Set INTERNET-BREAKOUT to Disabled at each branch
Set PUBLIC-PRIVATE to Either for all Application Flows bound for the Internet
Upgrade both UCS 350Mbps

125
Q

A Subscriber has an Application Flow of 50Mbps of product “pictures” from an application component in Data Center 1 to another application component running in Data Center 2 using a costly Private UCS.

At certain times, data needs to double to 100Mbps.
At Data Center 1 and 2, there is also a low-cost Public UCS.
The SD-WAN controller is programmed to switch the Application Flow of product “pictures” to the Public UCS and change the CoS to favor the product pictures over general Internet and other Application Flows.
This process is automated to respond to a failure.

A. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, Disabled> <PUBLIC-PRIVATE, Either> <BILLING-METHOD, Flat-rate-only> <BACKUP, Disabled> <BANDWIDTH, 100Mbps,100Mbps>]>

B. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, Disabled> <PUBLIC-PRIVATE, Private-Only> <BILLING-METHOD, Flat-rate-only> <BACKUP, Disabled> <BANDWIDTH, 100Mbps,100Mbps>]>

C. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, Disabled> <PUBLIC-PRIVATE, Either> <BILLING-METHOD, Flat-rate-only> <BACKUP, Disabled> <BANDWIDTH, 100Mbps,None>]>

D. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, Disabled> <PUBLIC-PRIVATE, Either> <BILLING-METHOD, Flat-rate-only> <BACKUP, Enable> <BANDWIDTH, 100Mbps,100Mbps>]>

A

D. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, Disabled> <PUBLIC-PRIVATE, Either> <BILLING-METHOD, Flat-rate-only> <BACKUP, Enable> <BANDWIDTH, 100Mbps,100Mbps>]>

126
Q

You need to size the Underlay Connectivity Services for 2 remote sites and a headquarters laid out in a hub and spoke design. The customer requires:
All traffic flows between remote sites and headquarters only.
100Mbps of traffic each way between each remote site and the headquarters.
One Public and one Private Underlay will be configured at each site, with 80% of the traffic on the Public and 20% on the Private at each location.
Both Underlays are available to all traffic in case of failure.

Which is the best choice for sizing?

A. Provision 100Mbps for the Public Underlay and 100Mbps for the Private Underlay at each remote site
Provision 200Mbps for the Public Underlay and 200Mbps for the Private Underlay at headquarters

B. Provision 80Mbps for the Public Underlay and 20Mbps for the Private Underlay at each remote site
Provision 160Mbps for the Public Underlay and 40Mbps for the Private Underlay at headquarters
Set the BACKUP service attribute to Enabled in SWVC policies

C. Provision 100Mbps for the Public Underlay and 100Mbps for the Private Underlay at each remote site
Provision 160Mbps for the Public Underlay and 40Mbps for the Private Underlay at headquarters

D. Provision 50Mbps for the Public Underlay and 50Mbps for the Private Underlay at each remote site
Provision 200Mbps for the Public Underlay and 200Mbps for the Private Underlay at headquarters
Set PUBLIC-PRIVATE service attribute to Either in SWVC policies

A

D. Provision 50Mbps for the Public Underlay and 50Mbps for the Private Underlay at each remote site
Provision 200Mbps for the Public Underlay and 200Mbps for the Private Underlay at headquarters
Set PUBLIC-PRIVATE service attribute to Either in SWVC policies

126
Q

A Subscriber has an Application Flow of 50Mbps of product ‘picture’ from an application component in Data Center 1 to another application component running in Data Center 2 using a costly Private UCS.

At certain times, data needs to double to 100Mbps.
At Data Center 1 and 2, there is also a low-cost Public UCS.
The SD-WAN controller is programmed to switch the Application Flow of product ‘pictures’ over general Internet and other Application flows. This process is automated to respond to failure.

Which UCS, if any, should be designated as Backup?

A. Private UCS is designated as Backup
B. No UCS is designated Backup
C. Both UCSs are designated Backup
D. Public UCS is designated as Backup

A

D. Public UCS is designated as Backup

127
Q

A Subscriber has an Application Flow of 50Mbps of product “pictures” from an application component in Data Center 1 to another application component running in Data Center 2 using a costly Private UCS.

At certain times, data needs to double to 100Mbps.
At Data Center 1 and 2, there is also a low-cost Public UCS.
The SD-WAN controller is programmed to switch the Application Flow of product “pictures” to the Public UCS and change the CoS to favor the product pictures over general Internet and other Application Flows.
This process is automated to respond to a failure.

If the Subscriber wanted 20% of the traffic to flow over the Private UCS and the remainder to use the Public UCS, while keeping both available in case of failure. How would that change the policy?

A. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, Disabled> <PUBLIC-PRIVATE, Either> <BILLING-METHOD, Flat-rate-only> <BACKUP, Disabled> <BANDWIDTH, 20Mbps,80Mbps>]>

Neither UCS is designated as BACKUP
B. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, Disabled> <PUBLIC-PRIVATE, Private-Only> <BILLING-METHOD, Flat-rate-only> <BACKUP, Enabled> <BANDWIDTH, 20Mbps,80Mbps>]>

Neither UCS is designated as BACKUP
C. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, Disabled> <PUBLIC-PRIVATE, Either> <BILLING-METHOD, Flat-rate-only> <BACKUP, Enabled> <BANDWIDTH, 100Mbps, None>]>
Neither UCS is designated as BACKUP

D. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, Disabled> <PUBLIC-PRIVATE, Either> <BILLING-METHOD, Flat-rate-only> <BACKUP, Enabled> <BANDWIDTH, 100Mbps,100Mbps>]>
Neither UCS is designated as BACKUP

A

D. <polA [<ENCRYPTION, Required-Always> <INTERNET-BREAKOUT, Disabled> <PUBLIC-PRIVATE, Either> <BILLING-METHOD, Flat-rate-only> <BACKUP, Enabled> <BANDWIDTH, 100Mbps,100Mbps>]>
Neither UCS is designated as BACKUP

128
Q

An SD-WAN gateway is used for?

A. Interconnecting as SD-WAN UNI ti an SD-WAN Edge
B. Interconnecting non-SD-WAN services to an SD-WAN Edge
C. Interconnection two SD-WAN UNIs
D. Interconnecting two SD-WAN services

A

B. Interconnecting non-SD-WAN services to an SD-WAN Edge

129
Q

A Subscriber has six field offices and a corporate headquarters. What will be found at each site field office?

A. Local Internet Access
B. SD-WAN Controller
C. SD-WAN Edge
D. Service Orchestrator

A

C. SD-WAN Edge

130
Q

What is used to integrate an SD-WAN service to Subscriber sites connected via another VPN service?

A. SD-WAN Controller
B. Service Orchestrator
C. SD-WAN Edge VNF
D. SD-WAN gateway

A

D. SD-WAN gateway

131
Q

An SD-WAN Gateway is a special case of an:

A. Orchestrator that interconnects non-SD-WAN services to an SD-WAN Edge

B. SD-WAN Edge that interconnects non-SD-WAN services to an SD-WAN Edge

C. SD-WAN Edge that interconnects non-SD-WAN services to an Orchestrator

D. Orchestrator that interconnects non-SD-WAN services to an orchestrator

A

B. SD-WAN Edge that interconnects non-SD-WAN services to an SD-WAN Edge

132
Q

What is directly in charge of the SD-WAN Edges and SD-WAN Gateways?

A. Service Orchestrator
B. Subscriber Web Portal
C. Controller
D. OSS/BSS Applications

A

C. Controller

133
Q

The SD-WAN Controller and Service Orchestrator communication via which LSO interface?

A. Legato
B. Adaigo
C. Presto
D. Canata

A

C. Presto

134
Q

A Subscriber has issues with repeated misconfiguration of individual edge devices at their field offices. They are convinced to implement as SD-WAN solution to minimize this issue.

Which of the following Management Interface Reference Points will minimize the issue?

A. Legato
B. Adaigo
C. Allegro
D. Presto

A

B. Adaigo

135
Q

A Subscriber has six field offices and a corporate headquarters. How many controllers will be needed?

A. 7
B. 2
C. 1
D. 6

A

C. 1

136
Q

The Cantata LSO interface communicates with the OSS/BSS applications and what else?

A. Subscriber Web Portal
B. SD-WAN Edge
C. Service Orchestrator
D. SD-WAN Controller

A

A. Subscriber Web Portal

137
Q

The Allegro LSO interface communicates with the Service Orchestrator and what else?

A. SD-WAN Controller
B. Subscriber Web Portal
C. SD-WAN Edge
D. OSS/BSS Applications

A

B. Subscriber Web Portal

138
Q

What is responsible for the bigger picture, ensuring that policies are implemented throughout the infrastructure?

A. SD-WAN Edge
B. SD-WAN Gateway
C. Service Orchestrator
D. SD-WAN Controller

A

C. Service Orchestrator

139
Q

A Policy has an error. Where is the correct place to resolve this?

A. SD-WAN Edge
B. UNI
C. Controller
D. Orchestrator

A

D. Orchestrator

140
Q

Where are changes ultimately implemented when a policy is changed?

A. Orchestrator
B. OSS Applications
C. Controller
D. UNI

A

C. Controller

141
Q

The OSS/BSS Applications and Service Orchestrator communicate via which LSO interface?

A. Presto
B. Legato
C. Adagio
D. Cantata

A

B. Legato

142
Q

Which of the following security threats is NOT addresses by applying a Malware Detection and Removal Security Function to an SD-WAN Application Flow?

A. Computer Virus
B. Trojan Horse
C. Computer Worm
D. DDoS

A

D. DDoS

143
Q

Which of the following is true?

A. SD-WAN UNIs may be encrypted
B. SD-WAN Edges may be encrypted
C. SD-WAN Services offer encryption between SD-WAN Edges
D. SD-WAN Services must be encrypted between SD-WAN Edges

A

C. SD-WAN Services offer encryption between SD-WAN Edges

144
Q

Which of the following can filter Application Flows down to the application component level?

A. IDS Systems
B. SD-WAN Orchestrator
C. DPI Firewalls
D. SD-WAN Controller

A

C. DPI Firewalls

145
Q

In an SD-WAN deployment, where are firewalls most often found?

A. Behind the UCS UNI
B. On each ECS
C. On each TVC
D. Behind the SD-WAN Edge

A

D. Behind the SD-WAN Edge

146
Q

What does TLS not support?

A. Web Browsers
B. TCP
C. UDP
D. VoIP

A

C. UDP

147
Q

Which of the following is true?

A. SNMP encrypts transmissions of HTTP pages
B. IPSec does not encrypt the header for efficiency
C. TLS is more secure than SSL
D. GRE cannot be used in a tunnel

A

C. TLS is more secure than SSL

148
Q

IPSec operates in which two modes?

A. Tunnel and TCP
B. Transport and TCP
C. TCP and UDP
D. Tunnel and transport

A

D. Tunnel and transport

149
Q

Which of the following is true?

A. SNMP encrypts transmissions of HTTP Pages
B. SSL is more secure than TLS
C. GRE cannot be used in a tunnel
D. IPSec can encrypt both the header and data

A

D. IPSec can encrypt both the header and data

150
Q

When using IPSec, what advantage does using tunnel mode have over transport mode?

A. Tunnel mode encrypts both the header and payload of the original packet
B. Tunnel mode is a successor to the deprecated transport mode
C. Tunnel mode allows routing to remain intact end-to-end
D. Tunnel mode encrypts only the header

A

A. Tunnel mode encrypts both the header and payload of the original packet

151
Q

When using IPsec for end-to-end encryption of Application Flows what enables routing to remain intact?

A. Tunnel Mode
B. Galois Counter Mode
C. Transport Mode
D. Asynchronous Transfer Mode

A

C. Transport Mode

152
Q

A Subscriber needs some Application Flows encrypted. Where should the Service Providers set the configuration to ensure the traffic is encrypted?

A. The encryption attribute for the SWVC End Point
B. The encryption attribute on the Application Flow and the TVC
C. The encryption attribute for the SD-WAN UNI
D. The encryption attribute for the Application Flow

A

B. The encryption attribute on the Application Flow and the TVC

153
Q

A bank is examining the different Security Functions available in their SD-WAN solution.
Which Security Function enables the following features?

Decrypts TLS sessions so that other Security Functions like MD+R (Malware Detection and Removal) can work
Re-encrypts the TLS session once these other Security Functions have been applied

A. Certificate Authority
B. Proxy Filtering
C. MBF (Middle-Box Function)
D. Firewall

A

C. MBF (Middle-Box Function)

154
Q

An SD-WAN Subscriber has failed to obtain the most recent up-to-date database of security threats to guard against from the Service Provider. What is the result?

A. The Service Provider classification takes precedence and updates the SD-WAN Subscriber’s threat database

B. The user’s device blocks the traffic regardless of the SD-WAN Subscriber threat database

C. The SD-WAN Subscriber classification takes precedence and updates the providers threat database

D. The Service provider classification takes precedence and traffic is blocked at the Subscriber before the threat database is updated

A

A. The Service Provider classification takes precedence and updates the SD-WAN Subscriber’s threat database

155
Q

An SD-WAN Subscriber and an SD-WAN Service provider have different threat database contents for a particular Security Function. The Service provider’s database matches a specific Application Flow to a security threat. The Subscriber’s database does not.

The Subscriber does not view the application as a threat. How is this situation handled?

A. The Provider’s classification takes precedence, and the Application Flow will be blocked. The Subscriber accesses the Provider’s threat database and removes the application

B. The Subscriber’s classification takes precedence, and the Application Flow will be allowed. No changes are necessary.

C. The provider’s classification takes precedence, and the Application Flow will be blocked. The Provider must request a change using a predefined process.

D. The provider’s classification takes precedence, and the Application Flow will be blocked. The Subscriber must request an update using a predefined process

A

D. The provider’s classification takes precedence, and the Application Flow will be blocked. The Subscriber must request an update using a predefined process

156
Q

A school using their SD-WAN solution, wishes to block access to a specific FTP server IP address on destination port 8022 and from a source network address range of 10.1.0.0/16.

Which Security Function should be implemented?

A. URLF (URL Filtering)
B. DPF (DNS Protocol Filtering)
C. MBF (Middle-Box Function)
D. IPPF (IP, port and Protocol Filtering)

A

D. IPPF (IP, port and Protocol Filtering)

157
Q

A hospital is using a third-party DNS service instead of the Service Provider’s DNS servers. The Hospital only uses an SD-WAN Subscriber Security Function that checks DNS Protocol Filtering (DPF). What is applied to DNS messages from the Hospital?

A. All DNS messages can be checked regardless of whether it is encrypted or unencrypted

B. Only unencrypted DNS can be checked. Encrypted DNS messages are handled as another other packet in the Application Flow

C. Only encrypted DNS can be checked. Unencrypted DNS messages are handled as another other packet in the Application Flow

D. Neither encrypted not unencrypted DNS traffic can be checked

A

B. Only unencrypted DNS can be checked. Encrypted DNS messages are handled as another other packet in the Application Flow

158
Q

An SD-WAN Subscriber is sending DNS lookups over a secure HTTPS connection to a DNS server at the main office. If no Security Functions are needed, what MBF (Middle-Box Function) parameter should be assigned to DNS Application Flows?

A. Enables using an MBF Unsupported List containing DNS over HTTPS (DoH)

B. Enabled using MBF matching DNS over HTTPS (DoH)

C. Enabled using an MBG Allow List containing DNS over HTTP (DoH) only

D. Disabled for DNS over HTTPS (DoH) Application Flows

A

D. Disabled for DNS over HTTPS (DoH) Application Flows

159
Q

A hospital is using the Service Provider’s DNS servers to resolve DNS lookups. The hospital only uses an SD-WAN Subscriber Security Function that checks DNS Protocol Filtering (DPF).

What is applied to DNS messages from the Hospital?

A. Neither encrypted nor unencrypted DNS traffic can be checked

B. Only encrypted DNS can be checked. Unencrypted DNS messages are handled as another other packet in the Application Flow

C. All DNS messages can be checked regardless of whether it is encrypted or unencrypted

D. Only unencrypted DNS can be checked. Encrypted DNS messages are handled as another other packet in the Application Flow

A

C. All DNS messages can be checked regardless of whether it is encrypted or unencrypted

160
Q

A school wishes to filter out gambling websites from students and faculty. How should the school go about enforcing this as a Subscriber?

A. The school provides the category to be blocked and the Provider uses Machine Learning and Artificial Intelligence to override any false positive matches.

B. Each site must be blocked individually by the Subscriber’s IT Staff, regardless of the Service Provider

C. The Subscriber provides the category to be blocked to the Service Provider (SP). The SP then dynamically updates the Blocked database to the Subscriber with detailed match criteria for that category

D. The Subscriber policy provides individual sites to the blocked and the Service Provider can approve or deny each entry

A

C. The Subscriber provides the category to be blocked to the Service Provider (SP). The SP then dynamically updates the Blocked database to the Subscriber with detailed match criteria for that category

160
Q

A bank requires that all user traffic is encrypted. The bank has enabled SD-WAN with Internet Breakout. If the bank wishes to restrict users from accessing blocked websites, which Security Functions are required?

A. Disable MBF and IPPF (Middle-Box Function and IP, Port and Protocol Filtering)

B. Enable URLF and DPF (URL Filtering and DNS Protocol Filtering)

C. Enable MBF and URLF (Middle-Box Filtering and URL Filtering)

D. Enable IPPF and DPF (IP, Port and Protocol Filtering and DNS Protocol Filtering)

A

C. Enable MBF and URLF (Middle-Box Filtering and URL Filtering)

161
Q

A bank encrypts SD-WAN Application traffic using TLS encryption. They wish to block restricted Social Media Sites.
What security function should be used?

A. MD+R using DNF (Malware Detection and Removal using Domain Name Filtering)

B. MBF using IPPF (Middle-Box Function using IP, Port and Protocol Filtering)

C. MBF and URLF (Middle-Box Function using URL Filtering)

D. MD+R using IPPF (Malware Detection and Removal using IP, Port and protocol Filtering)

A

C. MBF and URLF (Middle-Box Function using URL Filtering)

162
Q

The Subscriber allows access to a limited number of Internet websites from their factory location and otherwise blocks Internet access.
What is the appropriate security function or functions to be enabled in order to accomplish this restriction? (Choose two)

A. MBF: Middle-box Function
B. IPPF: IP, Port and Protocol Filtering
C. DPF: DNS Protocol Filtering
D. DNF: Domain Name Filtering
E. URLF: URL Filtering
F. MD+R: Malware Detection and Removal

A

B. IPPF: IP, Port and Protocol Filtering
C. DPF: DNS Protocol Filtering

163
Q

The Subscriber has an Application Flow supporting the Wi-Fi zone providing access to the Internet via Internet Breakout. On this Application Flow, the Subscriber wants to allow just specific web pages and deny the rest, including http and https traffic.
Which appropriate security function should be enabled to fulfill the Subscriber requirement?

A. MBF: Middle-box Function
B. IPPF: IP, Port and Protocol Filtering
C. DPF: DNS Protocol Filtering
D. DNF: Domain Name Filtering
E. URLF: URL Filtering
F. MD+R: Malware Detection and Removal

A

A. MBF: Middle-box Function
E. URLF: URL Filtering

164
Q

An SD-WAN Subscriber needs to verify connectivity between two or more UCS End Point Ordered Pairs (SD-WAN Edges).
Which feature should be implemented?

A. Measured Information Rate (MIR)
B. Generator Test Function (GTF)
C. Collector Test Function (CTF)
D. Service Readiness Test (SRT)

A

D. Service Readiness Test (SRT)

165
Q

A school district is working to connect different schools together using an SD-WAN service. The Service Provider decides to run Service Readiness Testing (SRT) to verify connectivity between existing schools and a newly added school.
How should SRT be implemented?

A. Use the SRT to test connectivity between the Controller and the SD-WAN Edge

B. Use the SRT to test connectivity between the Orchestrator and the SD-WAN Edge

C. Use the Service Readiness Measurement Point (SRMP) at the SD-WAN Edge to test the UCS End Point Ordered Pairs connectivity

D. Use the Service Readiness Measurement Point (SRMP) at the SWVC (SD-WAN Virtual Connection) to test the UCS End Point Ordered Pairs connectivity.

A

C. Use the Service Readiness Measurement Point (SRMP) at the SD-WAN Edge to test the UCS End Point Ordered Pairs connectivity

166
Q

A school district is working to connect different schools together using an SD-WAN service. The video Application Flow has been assigned a high-availability Policy. With the deployment SD-WAN at a test school, two UCSs have been added to the SD-WAN service. The school IT staff has enabled Service Readiness Testing (SRT).

Which UCS Service Attribute reported by the SD-WAN Service Provider SRT, must be confirmed to meet the high-availability requirement before enabling the video Application Flow?

A. UCS Type is set to Public
B. UCS End Point Backup is reported as Enabled
C. UCS End Point Breakout is reported as Disabled
D. UCS Billing Method is set to Usage-Based

A

B. UCS End Point Backup is reported as Enabled

167
Q

A bank uses an SD-WAN service to connect its branches. The bank has an Application Flow that needs high availability. The Policy assigned to this Application Flow is designed to support the high availability requirements. The bank adds a new branch with two underlay connectivity services to its SD-WAN service.

What must be confirmed by the Service Readiness Test (SRT) to ensure the high availability requirements are met before enabling the Application Flow and assigning the Policy to it at the new branch?

A. SD-WAN Service provider SRT reports the value of the UCS End Point Backup = Enabled for one of the UCS

B. SD-WAN Service Provider SRT reports the Application Flow Performance Metric test results for both UCSs

C. SD-WAN Service Provider SRT reports the value of the BACKUP Ingress Policy - Enabled for the Application Flow

D. SD-WAN Service Provider SRT reports the value of the UCS UNI ID

A

A. SD-WAN Service provider SRT reports the value of the UCS End Point Backup = Enabled for one of the UCS

168
Q

What is a requirement of Service Readiness Criteria (SRC) in determining if a Service Readiness Test (SRT) passes of fails?

A. Subscribers take precedence over the Service Provider whenever a mismatch SRC occurs.

B. SRCs are used only by the Service Provider and are not utilized at the Subscriber

C. The SRC MUST be agreed to by the Subscriber and Service provider

D. The Service Provider take precedence over the Subscriber whenever a mismatched SRC occurs

A

C. The SRC MUST be agreed to by the Subscriber and Service provider

169
Q

A company uses several mission-critical and real-time applications.
Which performance metric is critical to the path selection for forwarding these Application Flows?

A. Bandwidth
B. Re-Transmit Window
C. Signal Strength
D. Delay Variation

A

D. Delay Variation

169
Q

Which of the following is used to measure the One-Way Delay Variation of a specific application’s data? Select one:

A. Application Flow Measurement Point (AFMP)
B. Service Activation Test (SAT)
C. Service Readiness Test (SRT)
D. Tunnel Virtual Connection Measurement Point (TVC MP)

A

A. Application Flow Measurement Point (AFMP)

170
Q

Examine the SWVC EP (SW-WAN virtual Connection End Point) shown.
Where are the correct locations of the Ingress and Egress Application Flow Measured Information Rate (AF MIR) Byte Counters shown?

A. Ingress B | Egress D
B. Ingress B | Egress C
C. Ingress A | Egress D
D. Ingress A | Egress C

A

A. Ingress B | Egress D

171
Q

A school district is working to connect different schools together using an SD-WAN service. A new Application Flow Names Students has been added to all school locations. However, the schools are complaining about the performance of the new Student traffic. What should be updated in the Monitored Performance Metric agreement with the SD-WAN Service Provider (SP)?

A. Add the Ingress and Egress Measured Information Rate (IMIR/EMIR) between UNI pairs. Add all Application Flow (AF) Performance Metrics at each school location

B. Add the Ingress and Egress Measured Information rate (IMIR/EMIR) between UNI (User Network Interface) pairs. Add all Application Flow (AF) Performance Metrics between UNI pairs

C. Add the Ingress and Egress Measured Information Rate (IMIR/EMIR) at each school location. Add all Application Flow (AF) Performance Metrics at each school location

D. Add the Ingress and Egress Measured Information Rate (IMIR/EMIR) at each school location. Add all Application Flow (AF) Performance Metrics between UNI pairs

A

D. Add the Ingress and Egress Measured Information Rate (IMIR/EMIR) at each school location. Add all Application Flow (AF) Performance Metrics between UNI pairs

172
Q

A Subscriber has an SD-WAN Service connecting its offices. They have a strict requirement that Application Flows are forwarded over Paths that do NOT exceed a given One-Way Mean Packet Delay as defined in PERFORMANCE Policy Criterion in the associated Policies. How should an SDCP advise their Service Provider to monitor the TVCs’ performance to ensure this? Select one:

A. Use an Ingress Service Readiness Measurement Point that is located after where the Policy is enforced
Use an Egress TVC Measurement Point that is located after where the Policy is enforced

B. Use an Ingress TVC Measurement Point that is located after where the Policy is enforced
Use an Egress TVC Measurement Point that is located before where the Policy is enforced

C. Use an Ingress TVC Measurement Point that is located before where the Policy is enforced
Use an Egress TVC Measurement Point that is located after where the Policy is enforced

D. Use an Ingress Service Readiness Measurement Point that us located before where the Policy is enforced
use an Egress TVC Measurement Point that is located before where the Policy is enforced

A

B. Use an Ingress TVC Measurement Point that is located after where the Policy is enforced
Use an Egress TVC Measurement Point that is located before where the Policy is enforced

173
Q

What are the available Threshold Crossing Alert (TCA) Severity levels?

A. Critical, Major, Minor, Warning, Indeterminate, Cleared
B. Critical, Major, Minor, Warning, or Acknowledged
C. Critical, Major, Minor, Warning, or Cleared
D. Severe, High, Medium, Low or None

A

C. Critical, Major, Minor, Warning, or Cleared

174
Q

Which describes Stateful Threshold Crossing Alerts (TCAs)?

A. TCAs are generated, once the initial TCA is generated, for each PM Metric Calculation Interval that meets or exceeds the TCA Performance Threshold Value for as long as the degradation lasts.

B. Use the following TCA criteria to determine if a TCA should be set:
TCA Performance Threshold Value
PM Metric Calculation Interval
PM Metric Value

C. An issue that exists for several PM Metric Calculation Intervals can result in a flood of TCAs

D. Provide a notification when a degradation is first encountered, followed by another when the degradation is resolved

A

D. Provide a notification when a degradation is first encountered, followed by another when the degradation is resolved

175
Q

With stateful TCA reporting of PM (Performance Monitoring) Metrics, what is mandatory to avoid a condition where the SET and CLEAR criteria are met at the same time?

A. The number of PM metric Calculation Intervals defined by SET-TCA Window Threshold is greater than the number defined by the CLEAR-TCA Window Threshold

B. The number of PM metric Calculation Intervals defined by SET-TCA Window Threshold is less than the number defined by the CLEAR-TCA Window Threshold

C. The number of PM metric Calculation Intervals defined by SET-TCA Window Threshold is equal to the number defined by the CLEAR-TCA Window Threshold

D. SET and CLEAR criteria are never capable of being met at the same time regardless of values

A

B. The number of PM metric Calculation Intervals defined by SET-TCA Window Threshold is less than the number defined by the CLEAR-TCA Window Threshold

176
Q

A new Subscriber is concerned about the performance of their service. They have several Audio/Visual Applications that are sensitive to Delay and Delay Variation. The Subscriber makes the following requests:

Immediate notification if any Performance metrics EXCEEDS its threshold value for half or more of any 6 periods
All performance metrics should be calculated over a period of 50ms

How should the Service Provider respond? Select one:

A. Set up Stateful Threshold Crossing Alerts (TCA)
Configure the SET-TCA Windows Threshold = 3
Configure the TCS Window Size = 6
Set the PM Metric Calculation Interval = 100ms

B. Set up Stateful Threshold Crossing Alerts (TCA)
Configure the TCS Window Size = 6
Configure the PM Metric Calculation Interval for 50ms

C. Set up Stateful Threshold Crossing Alerts (TCA)
Configure the SET-TCA Dampening Factor = 6
Configure the PM Metric Calculation Interval for 50ms

D. Set up Stateful Threshold Crossing Alerts (TCA)
Configure the SET-TCA Windows Threshold = 3
Configure the TCS Window Size = 6
Set the PM Metric Calculation Interval = 50ms

A

D. Set up Stateful Threshold Crossing Alerts (TCA)
Configure the SET-TCA Windows Threshold = 3
Configure the TCS Window Size = 6
Set the PM Metric Calculation Interval = 50ms

177
Q

A Stateless TCA Function uses which Threshold Crossing Alert (TCA) criteria to determine if a TCA should be set?

A. TCA Window Threshold
TCA Window Size
PM Metric Calculation Interval
PM Metric Value

B. TCA Performance Threshold Value
PM Metric Calculation Interval
PM Metric Value

C. TCA Window Threshold
TCA Window Size
PM Metric Value

D. TCA performance Threshold Value only

A

B. TCA Performance Threshold Value
PM Metric Calculation Interval
PM Metric Value

178
Q

Both Stateful and Stateless Threshold Crossing Alerts must use which of the following TCA Function Parameters? Select one:

A. Damping Factor
B. TCA Window Size
C. TCA Window Threshold
D. TCA Performance Threshold Value

A

D. TCA Performance Threshold Value

179
Q

A school is monitoring the performance of Tunnel Virtual Connections (TVCs) to the Main Office. The desired policy is as follows:

Notify the school should the Performance Metrics (PMs) exceed any of the threshold values
Measure PMs every 75ms
Notify the School if the PMs remain greater that the Threshold for more the 1500ms

The SD-WAN Service Provider builds a policy using Stateless Threshold Crossing Alert. What should the settings be?

A. PM Metric Calculation Interval = 15ms
Damping Factor = 5

B. PM Metric Calculation Interval = 150ms
Damping Factor = 0.5

C. PM Metric Calculation Interval = 75ms
Damping Factor = 1

D. PM Metric Calculation Interval = 75ms
Damping Factor = 20

A

D. PM Metric Calculation Interval = 75ms
Damping Factor = 20

180
Q

Stateless Threshold Crossing Alerts (TCAs) MUST contain Date/Time, Performance Metric Name, TCA Performance Threshold Value, Performance Metric (PM) Calculation Value, TCA Type (Stateless) and what other value?

A. Indicators of Compromise (IOC)
B. Dampening Factor
C. Severity Level
D. Generator Test Function (GTF)

A

C. Severity Level

181
Q

An SDCP is in charge of deploying a new SD-WAN for a Subscriber. The SD-WAN will have two UCSs connecting all Subscriber sites, one Public and one Private. Which of the following must they ensure is monitored?

A. One-way Packet Loss Ratio for all TVCs on both UCSs

B. One-way Packet Loss Ratio for a single TVC on both UCSs

C. One-way Packet Loss Ratio for all TVCs on the private UCS

D. One-way Packet Loss Ratio for a single TVC on the private UCS

A

A. One-way Packet Loss Ratio for all TVCs on both UCSs

182
Q
  1. An SDCP is troubleshooting a medical center’s applications. Employees are reporting poor performance of a remote imaging application. The manufacturer of the application states that minimizing packet delay should be a priority and requires delay must not be more than 25ms and packet loss no more than 0.75%. Testing of each of the paths available for the remote imaging application’s use shows:

A Policy us currently applied with a PERFORMANCE Policy Criterion of
«“One-way Packet Loss Ratio”, 0.75%>, <”One-way Mean Packet Delay”, 25ms»

What should the SDCP recommend to improve the performance?

A. <”One-way Mean Packet Delay”, 25ms>, none>

B. «“One-way Mean Packet Delay”, 25ms>, <”One-way Packet Loss Ratio”, 0.75%»

C. «“One-way Packet Loss Ratio”, 0.75%>, none»

D. «“One-way Packet Loss Ratio”, 0.75%>, <”One-way Mean Packet Delay”, 23ms»

A

B. «“One-way Mean Packet Delay”, 25ms>, <”One-way Packet Loss Ratio”, 0.75%»