REVIEWER Flashcards
Inter-Frame Delay Variation is _____.
Select one:
a. The time required to transmit a Service Frame from ingress UNI to egress UNI
b. The measure of the number of lost frames between the ingress UNI and egress UNI expressed as a percentage
c. The percentage of time that a service is usable
d. The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance
d. The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance
Inter-Frame Delay Variation (IFDV) is how much the delay varies between two frames. For example, if one delay is 15ms and the second is 17ms, the IFDV is 2ms.
An SDCP candidate should focus on the fact that Frame Delay (FD), Inter-Frame Delay Variation (IFDV), Frame Loss Ratio (FLR), and Availability are four metrics that are used to measure performance of an SD-WAN service.
The purpose of DSCP is to ______________.
a. Apply CoS
b. Secure the packet
c. Support Layer 1
d. Deliver the frame
a. Apply CoS
Differentiated services code point (DSCP) is one method to identify a class of service for traffic.
What specification standardizes Ethernet?
Select one:
a. IEEE 802.1ad
b. IETF 1492
c. ANSI T1.105
d. IEEE 802.3
d. IEEE 802.3
IEEE standardized Ethernet definition in its 802.3 standard.
A VLAN is a _______.
Select one:
a. Packet based technology specified using the IEEE 802.1Q
b. Jumbo framed
c. Layer 2 broadcast domains
d. Packet
c. Layer 2 broadcast domains
A Virtual LAN (VLAN) is used to partition a network into smaller groups (for example, individual departments within a company’s building). When implemented, each VLAN creates a broadcast domain at Layer 2, such that a broadcast from any member of the VLAN is transmitted to all members of that VLAN.
A WAN connects ________________.
Select one:
a. Q in Q” or S-Tags
b. LANs and MANs
c. Controllers
d. Switches
b. LANs and MANs
Local Area Networks (LANs) and Metro Area Networks (MANs) are often interconnected over geographically larger Wide Area Networks (WANs).
What is a LAN?
Select one:
a. Jumbo frames
b. A switch
c. 1518
d. Two or more connected computers, normally in a small area
d. Two or more connected computers, normally in a small area
A Local Area Network (LAN) is a collection of computers and other equipment connected together, generally in a single building.
What is the subnet of the network 10.2.3.48/28?
Select one:
a. 10.2.3.48-10.2.3.63
b. 10.2.3.48-10.2.3.55
c. 10.2.3.33-10.2.3.48
d. 10.2.3.40-10.2.3.48
a. 10.2.3.48-10.2.3.63
A /28 subnet results in range of 16 addresses. This subnet starts with 10.2.3.48 and runs through 10.2.3.63.
A VLAN-ID is ____ bits.
Select one:
a. 1024
b. 12
c. 1518
d. 4096
b. 12
Each VLAN tag is 4 bytes or 32 bits. (A byte is equal to 8 bits.) The ID of the VLAN is one component within the tag and that specific field is 12 bits long.
Underlay Connectivity Services provide ____________.
Select one:
a. LAN Services
b. WAN Services
c. WLAN Services
d. PAN Services
b. WAN Services
SD-WAN is based on WAN services.
Ping6 is:
Select one:
a. Ping for IPv6
b. Not used
c. A new version of ping for IPv4
d. A Layer 1 tool
a. Ping for IPv6
Pingv6 is the IPv6 equivalent of a ping.
BFD can detect a link failure in less than _____.
Select one:
a. 1 second
b. 5,000 nanoseconds
c. 50 milliseconds
d. 15 seconds
c. 50 milliseconds
50 milliseconds is a common time span that is used as a standard to react to changes or outages in a network.
A standard ethernet frame without a single 802.1Q tag is how long?
A. 1526
B. 1518
C. 9000
D. 1522
B. 1518
TRUE OR FALSE. With an active-active connection, each connection actively carries data and has enough bandwidth to handle the committed traffic from all the application flows in case of failure.
A. False
B. True
B. True
Two-Way Active Measurement Protocol (TWAMP) measures what?
A. The time required to transmit a Service Frame from an Ingress UNI to an Egress UN
B. The difference in delay of two Service Frames belonging to the same Class of Service instance
C. Network performance between any two devices in a network
D. The number of lost frames between an Ingress and an Egress UNI
C. Network performance between any two devices in a network
Which of the following is used by network devices to track and store information about the status of components within that device?
A. ICMP
B. SNMP
C. Traceroute
D. Ping
B. SNMP
Active Path Testing involves what?
A. Actual customer traffic and excludes link selection
B. Emulated traffic and excludes link selection
C. Emulated traffic and include link selection
D. Actual customer traffic and includes link selection
C. Emulated traffic and include link selection
Which of the following locations will a packet with a destination address of 88.0.0.130 be sent to?
A. 88.0.0.192/27
B. 88.0.0.128/30
C. 88.0.0.64/26
D. 88.0.0.184/29
B. 88.0.0.128/30
Which of the following locations will a packet with a destination address of 129.71.4.97 be sent to?
A. 129.71.4.0/27
B. 129.71.4.48/28
C. 129.71.4.96/28
D. 129.71.4.64/29
C. 129.71.4.96/28
Which if the following locations will a packet with a destination address of 201.255.255.60 be sent to?
A. 201.255.255.96/28
B. 201.255.255.64/29
C. 201.255.255.0/27
D. 201.255.255.48/28
D. 201.255.255.48/28
Which of the following represent the loopback in IPv4 and IPv6?
A. 127.0.0.1 and ::127/128
B. 0.0.0.1 and ::1/128
C. 0.0.0.1 and ::127/128
D. 127.0.0.1 and ::1/128
D. 127.0.0.1 and ::1/128
SD-WAN enables WAN connections that are: (Choose three)
A. Simple
B. Policy driven
C. Orchestrated
D. Application aware
B. Policy driven
C. Orchestrated
D. Application aware
An SD-WAN service:
A. Uses MPLS labels to encode specific application policy
B. Should always be encrypted using SSL
C. Provides a logical Layer 3 Virtual Private Network (L3 VPN) for a Subscriber that conveys IP packets over multiple disparate Underlay Connectivity Services between Subscriber sites
D. Exclusively uses Carrier Ethernet services
C. Provides a logical Layer 3 Virtual Private Network (L3 VPN) for a Subscriber that conveys IP packets over multiple disparate Underlay Connectivity Services between Subscriber sites
A ground transportation company currently runs a number of enterprise applications and has a mobile trucking application running in their trucks. In the future, they anticipate implementing self-driving technology and may have latency requirements for some of their application needs in the future.
SD-WAN offers what benefits to this company now and in the future?
A. Applications flows can be forwarded based on next shortest path
B. Forwarding occurs based on cost of the UCS
C. Application flows can be forwarded based on next hop
D. With SD-WAN, forwarding occurs based on performance metrics that can be applied now (uptime and bandwidth), and in the future
D. With SD-WAN, forwarding occurs based on performance metrics that can be applied now (uptime and bandwidth), and in the future
A large law practice has a number of law offices. Each office has an MPLS VPN UCS to the headquarters in New York City and Public Internet UCS. In the near future, the law practice wants to increase the use of online legal applications for its clients. The firm runs internal applications, like voice and video over IP, legal applications, etc.
Why are SD-WAN services going to be a benefit to this legal practice?
A. Application flows can be forwarded base on next shortest path
B. Application flows can be forwarded based on next hop
C. With SD-WAN, the law practice has greater flexibility in forwarding decisions based on both application and network performance to support the new office locations, and future business plans with customer facing applications
D. Forwarding occurs base on cost of the UCS
C. With SD-WAN, the law practice has greater flexibility in forwarding decisions based on both application and network performance to support the new office locations, and future business plans with customer facing applications
A service provider company would like to start offering SD-WAN service to its customers. What are the benefits of using SD-WAN services over more traditional WAN services?
A. Application flows are always forwarded based on the next hop
B. Application flows can be forwarded based on the shortest path
C. Forwarding occurs based on the costs of the UCS
D. With SD-WAN, the service provider allows forwarding decisions to be made by their customers, based on performance metrics from the application and the network, in real-time, so the best forwarding path can be selected
D. With SD-WAN, the service provider allows forwarding decisions to be made by their customers, based on performance metrics from the application and the network, in real-time, so the best forwarding path can be selected
A company is suffering from regular bouts of excessive delay on their existing WAN. What selling point of SD-WAN could be used to convince the ownership to convert to a solution using SD-WAN?
A. SD-WAN forwards traffic based on performance metrics
B. SD-WAN forwards traffic based on circuit cost
C. SD-WAN forwards traffic based on number of hops
D. SD-WAN forwards traffic based on available bandwidth on links
A. SD-WAN forwards traffic based on performance metrics
An existing Legacy WAN has 60% Bandwidth utilization, intermittent outages, and 100-150 ms latency. Encryption is implemented, and a policy-based Firewall is needed.
What is the benefit of going to SD-WAN?
A. Greater Bandwidth
B. Greater Resiliency
C. More security
B. Greater Resiliency
A healthcare corporation runs a medical imaging application that requires latency and delay to be below a specific metric. This application’s bandwidth also changes throughout the day and week. The healthcare corporation has two MPLS based, private UCSs and a public Internet connection. Implementing SD-WAN offers what benefit to this latency, delay, and bandwidth sensitive application?
A. Forwarding occurs based on cost of the UCS
B. Forwarding occurs based on shortest path
C. Forwarding occurs based on performance metrics
D. Applications flows can be forwarded based on next hop
C. Forwarding occurs based on performance metrics
What is an advantage of SD-WAN versus traditional WAN?
A. Greater application performance
B. Increased bandwidth
C. Highly Available WAN
D. Higher WAN utilization
C. Highly Available WAN
Which of the following is not an advantage of an SD-WAN service over a private multi-point connectivity service?
A. SD-WAN can forward packets to the public Internet, but a private multi-point connectivity service cannot
B. SD-WAN can use different paths for different applications, but a private multi-point connectivity service cannot
C. SD-WAN can change routes taken by packets based on recent performance metrics, but a private multi-point connectivity service cannot
D. SD-WAN can forward packets between two UNIs that are not directly connected by a connectivity service, but a private multi-point connectivity service cannot
D. SD-WAN can forward packets between two UNIs that are not directly connected by a connectivity service, but a private multi-point connectivity service cannot
A MEF SD-WAN Service consists of all of the follow EXCEPT which one?
A. Exactly one SWVC which based on a set of SWVC Service Attributes
B. One or more SWVC End Points for the SWVC at each of those UNIs, where each SWVC End Point is based on a set of SWVC End Point Service Attributes
C. One or more Underlay Connectivity Services and corresponding UCS UNIs and UCS End Points and corresponding Service Attributes for each of them
D. One or more SD-WAN UNIs where the Subscriber accesses the SD-WAN service. Each based on a set of UNI Service Attributes
B. One or more SWVC End Points for the SWVC at each of those UNIs, where each SWVC End Point is based on a set of SWVC End Point Service Attributes
Application traffic is being sent from Site A to Site C.
At the SD-WAN Edge for both Site A and site C, what is the correct UNI Application Flow (Ingress or Egress)
A. Site A is Ingress UNI, Site C is Ingress UNI
B. Site A is Egress UNI, Site C is Egress UNI
C. Site A is Egress UNI, Site C Ingress UNI
D. Site A is Ingress UNI, Site C is Egress UNI
D. Site A is Ingress UNI, Site C is Egress UNI
Ingress IPv4 packets that have the Strict Source and Record Router (SSRR) option set arrive at a Service Provider. How should they handle the packets?
A. Reflect them back to the source
B. Drop them
C. Record them for monitoring applications
B. Drop them
Examine the two graphics. Which of the following is correct?
A. Both graphics are incorrect. Only one User to Network interface (UNI) is allowed per SD-WAN Edge
B. From the SD-WAN Edge point of view, the two examples are equivalent
C. All traffic must belong to the same VLAN or Subnet in order to be accepted at the User to Network Interfaces (UNIs). Both examples are incorrect.
D. The top graphic is incorrect while the bottom is acceptable, because traffic from the same Ethernet interface must belong to the same subnet
B. From the SD-WAN Edge point of view, the two examples are equivalent
Which of the following is true regarding Tunnel Virtual Connection (TVCs)?
A. Multiple Tunnel Virtual Connections (TVCs) can be created between the same two SD-WAN Edges but they be assigned the same security
B. A path Between two SD-WAN UNIs is a single Tunnel Virtual Connection (TVC) between the SD-WAN Edges where the UNIs are located, or set of concatenated TVCs that link those SD-WAN Edges
C. Multiple Tunnel Virtual Connections (TVCs) can be created between the same two SD-WAN Edges but they must share the same Class of Service and performance characteristics
D. A path between two SD-WAN UNIs is a single Tunnel Virtual Connections (TVC) between the SD-WAN Edges, but more than one TVC between SD-WAN Edges in not permitted
B. A path Between two SD-WAN UNIs is a single Tunnel Virtual Connection (TVC) between the SD-WAN Edges where the UNIs are located, or set of concatenated TVCs that link those SD-WAN Edges
What are all the valid shortest paths between SD-WAN Edge #3 and SD-WAN Edge #4?
A. TVCs A and F, TVCs C then G
B. TVCs A then B, TVCs C then B, TVCs B then F
C. There are no valid paths
D. TVCs A then F, TVCs C then G, TVCs D then G
D. TVCs A then F, TVCs C then G, TVCs D then G
A healthcare corporation runs medical imaging application that has delay requirements. The healthcare corporation has multiple hospitals that need to connect to its data center, which provides the medical imaging application.
The healthcare corporation has two MPLS based, private UCSs and a public internet connection at each hospital location
Radiologist are complaining their medical imaging application is taking many minutes to load the images for each patient when the images should appear in less than a second
What should the SDCP professional do to fix this issue?
A. Connect the branch SD-WAN UNI to controller
B. Request that the SP choose TVC based on latency performance and bandwidth availability
C. Configure the medical application data to use the Internet Breakout
D. Add another UCS to each branc
B. Request that the SP choose TVC based on latency performance and bandwidth availability
A financial company involved with making trades on a stock exchange runs applications that are sensitive to latency and delay. The company has s SD-WAN service with two MPLS based private UCS. There are multiple reports from end users complaining of delay and sluggishness when using this application. What should be done to fix this sluggishness and delay issue?
A. Add another UCS
B. Configure an Internet Breakout at the financial company
C. Connect an SD-WAN UNI to an SD-WAN Edge
D. Request that the SP choose a TVC based on latency performance
D. Request that the SP choose a TVC based on latency performance
What is correct about the SD-WAN Virtual Connection End Point (SWVC EP) at Subscriber Network Site C?
A. The SD-WAN Edge network function determines the correct TVC based on routing policy only
B. The SD-WAN Edge is the network function between the SD-WAN UNI and one or more Underlay Connectivity Service User to Network Interface (UCS UNIs)
C. The SD-WAN Edge determines how Application Flows should be handled. If a given Application Flow matches to a TVC, it will bypass the UCS UNI
D. SD-WAN Edge interfaces cannot be physical connections if they are to carry Tunnel Virtua Connections (TVCs)
B. The SD-WAN Edge is the network function between the SD-WAN UNI and one or more Underlay Connectivity Service User to Network Interface (UCS UNIs)
A subscriber chooses to centralize their internet feed at their headquarters location. Each of 4 branches and the headquarter were using 100Mbps each for Internet Breakout. After changing from Local Internet Breakout at each branch to Breakout through the headquarters and configuring the Internet Breakout at headquarters for 500 Mbps, a marked drop in the rate of TCP-based Internet traffic is noted. Non-Internet traffic is flowing as before. What could cause this?
A. Larger Delay
B. Bandwidth limitation at the Headquarters
C. Larger Delay Variation
D. Greater packet loss
A. Larger Delay
Which Policy assignment takes precedence over all other assignments?
A. Zone-wide Policy assigned to an Application Flow Specification by the SWVC List of Zones Service Attribute
B. Zone-wide Policy assigned to an Application Flow Specification Group by the SWVC List of Zones Service Attribute
C. Policy assigned to an Application Flow Specification in a Zone using the SWVC End Point Policy Map Service Attribute
D. Policy assigned to an Application Flow Specification Group in a Zone using the SWVC End Point Policy Map Service Attribute
C. Policy assigned to an Application Flow Specification in a Zone using the SWVC End Point Policy Map Service Attribute
A school district is connection Student and Faculty traffic across an SD-WAN Service. Each SD-WAN End Point explicitly maps policies to the Application Flow/Zone matchup as shown above. Use the following Zones and Zone-wide policies below:
Zone Faculty
IP range = [172.16.0.0/12, 192.168.0.0/23]
Policies = [Office-365 - policy1, Voice - policy1]
Zone Student
IP range = [10.2.0.0/16]
Policies = [Wed - policy2]
A packet arrives at UNI 2 with the following attributes:
Application Flow of Web
Source IP = 10.2.255.3
What is the result?
A. The Zone is Student and the policy is policy2
B. The packet is discarded
C. The Zone is faculty and the policy applied is policy3
D. The Zone is Student and the Policy is Policy3
A. The Zone is Student and the policy is policy2
A school district is connection Student and Faculty traffic across an SD-WAN Service. Each SWVC End Point explicitly maps policies to the Application Flow/Zone matchup as shown above. Use the following Zones and Zone-wide policies below:
Zone Faculty
IP range = [172.16.0.0/12, 192.168.0.0/23]
Policies = [Office-365 - policy1, Voice - policy1]
Zone Student
IP range = [10.2.0.0/16]
Policies = [Wed - policy2]
A packet arrives at UNI 3 with the following attributes:
Application Flow of Office-365
Source IP = 172.16.30.99
What is the result?
A. The Packet is discarded
B. The Zone is Faculty and the policy applied is policy1
C. The Zone is Faculty and the policy applied is policy2
D. The Zone is Student and the policy applied is policy2
B. The Zone is Faculty and the policy applied is policy1
A school district is connection Student and Faculty traffic across an SD-WAN Service. Each SWVC End Point explicitly maps policies to the Application Flow/Zone matchup as shown above. Use the following Zones and Zone-wide policies below:
Zone Faculty
IP range = [172.16.0.0/12, 192.168.0.0/23]
Policies = [Web - policy2, Voice - policy3]
Zone Student
IP range = [10.2.0.0/16]
Policies = [Wed - policy3]
A packet arrives at UNI 1 with the following attributes:
Application Flow of email
Source IP = 10.2.97.100
What is the result?
A. The Zone is Faculty and the policy applied is policy1
B. The Zone is Student and the policy is policy3
C. The packet is discarded
D. The Zone is Student and the policy is policy2
C. The packet is discarded
An HTTP packet that originated at 10.1.1.2 is sent to a web server at destination 10.2.2.17. Three Application Flows are defined as follows:
A SDAV4 = 10.2.2.0/24, DPORT = 80
B SAV4 = 10.1.1.0/24, SPORT = 80
C DAV4 = 10.1.1.0/24, SDPORT = 80
Which of the follow Application Flows will it be associated with?
A. None; the traffic is discarded
B. Application Flow B
C. Application Flow A
D. Application Flow C
C. Application Flow A
An enterprise has many voice IP applications. An SD-WAN service connects branch offices to the main headquarters. At each branch office, there are at least 2 UCS. At all branch offices, the end users are complaining of audio breaking up intermittently.
What should be done to address this issue?
A. Connect the branch SD-WAN UNI to the controller
B. Configure an Internet Breakout at each branch
C. Request that the SP choose a TVC based on latency performance
D. Add another UCS to each branch
C. Request that the SP choose a TVC based on latency performance
An SDCP is designing a solution for a potential Subscriber with a headquarters and two remote offices.
The Subscriber has several needs:
- The Subscriber has approved a public a private UCS for each site
- Each remote office has 30 Mbps of traffic, which flows to and from the headquarters only
- One-third of the traffic is designated for the private UCS with the remaining traffic using Public UCS.
- Each underlay can be used by any traffic in the case of failure of the other UCS
How would the SDCP analyze the design? (Choose two)
A. Provision the Underlay connectivity at 30 Mbps public and 30 Mbps private at each remote office
B. Designate one UCS as Backup
C. Provision the Underlay connectivity 60 Mpbs public and 60 Mbps private at the headquarters
D. Set the SWVC List of Policies Service Attribute policy criteria, PUBLIC-PRIVATE = Prefer-Public
A. Provision the Underlay connectivity at 30 Mbps public and 30 Mbps private at each remote office
C. Provision the Underlay connectivity 60 Mpbs public and 60 Mbps private at the headquarters
An SDCP is designing a solution for a potential Subscriber.
- The Subscriber has some Audio/Video (A/V) traffic that cannot tolerate major loss nor latency and must be highly available
- They also have other traffic that us not as sensitive to the above requirements
- They have a high-cost Private UCS, with a very strict Service Level Specification (SLS) and a low-cost Public UCS with a more lenient SLS
How should the traffic be provisioned? (Choose three)
A. The non-A/V traffic should be sent over the Public UCS, since it is cheaper
B. The PUBLIC-PRIVATE policy criteria should be set to Public-Only to keep the non-A/V to flow over the Public UCS only
C. Keep the A/V traffic on a TVC on the Private UCS with the more stringent SLS versus a TVC on the Public UCS
D. The PUBLIC-PRIVATE policy criteria should be set to Either to allow the A/V to flow over whichever is available if a UCS is unavailable
A. The non-A/V traffic should be sent over the Public UCS, since it is cheaper
C. Keep the A/V traffic on a TVC on the Private UCS with the more stringent SLS versus a TVC on the Public UCS
D. The PUBLIC-PRIVATE policy criteria should be set to Either to allow the A/V to flow over whichever is available if a UCS is unavailable
As SD-WAN featuring a remote office and a main office connected by a single Public UCS had Local Internet Breakout for TCP based Internet traffic originating at the remote office. Upon changing the remote office to using Internet Breakout through the main office, the traffic dropped in overall speed.
Consider the following. Which one of these options will cause this issue?
A. Higher speed access to the UCS at the remote versus the main site
B. A higher Frame Loss Ratio on the UCS versus going direct to the Internet
C. Increased delay Variation on the TVC to the main office
D. Increased Delay when going via the main office
D. Increased Delay when going via the main office
An SDCP is in the process of migrating from a legacy design to SD-WAN. The Subscriber has the following needs:
* Low cost
* A limit of two UCSs at each location
* Local Internet Breakout
* Privacy for all business transactions on the SD-WAN
* No VoIP except through a designated corporate VoIP application
* Redundancy for all traffic
What actions must the SDCP do to fulfill the Subscriber’s needs? (Choose two)
A. Provision one UCS to achieve low cost
B. Provision two Public UCS
C. Provision three UCS for redundancy, enable ecryption for each to address privacy
D. Provision no UCS as backup
B. Provision two Public UCS
D. Provision no UCS as backup
The SVWC List of Application Flow Specifications Service Attribute is defines as follows:
<A, [<PROTV4,1,2><SAV4,10.1.1.0/24>, <DAV4,192.5.1.0/24>], none>
<B, [<PROTV4,1,2><SAV4,10.1.1.0/24>, <DAV4,192.5.2.0/24>], none>
<C, [<PROTV4,1,2><SAV4,10.1.2.0/24>, <DAV4,192.5.1.0/24>], none>
<D, [<PROTV4,1,2><SAV4,10.1.2.0/24>, <DAV4,192.5.2.0/24>], none>
Which flow will the following packets be associated with?
Packet 1
IP Protocol 1
Source IP 10.1.2.17
Destination IP 192.5.1.100
Packet 2
IP Protocol 2
Source IP 10.1.2.254
Destination IP 192.5.2.255
Packet 3
IP Protocol 8
Source IP 10.1.2.17
Destination IP 192.5.1.100
A. Packet 1 will map to Flow D
B. Packet 2 will map to Flow C
C. Packet 3 will map to Flow C
D. Packet 3 will be blocked
D. Packet 3 will be blocked
A new Subscriber has a legacy MPLS private network connecting their three offices and is migrating to SD-WAN. The Subscriber has several requirements that the new SD-WAN must satisfy:
* Each office must have redundant access to the Internet through local Internet Breakout
* Redundancy for all traffic
* An internal application has strict performance needs
What option should an SDCP recommend?
A. Add a Public UCS at each office | Remove the MPLS network | Enable Internet Breakout at each office
B. Add a Public UCS at each office | Retain the MPLS network | Enable Internet Breakout at each office
C. Add two Public UCS at each office | Remove the MPLS network | Enable Internet Breakout at each office
D. Add two Public UCS at each office | Retain the MPLS network | Enable Internet Breakout at each office
D. Add two Public UCS at each office | Retain the MPLS network | Enable Internet Breakout at each office
A school district has a primary and backup set of data centers for three school locations; all connected using an SD-WAN Service Provider Network as shown above. Student traffic between schools need to be allowed. However, Faculty data should only be shared with the primary/backup data center locations.
What is the correct virtual topology that should be deployed by the SD-WAN Service Provider for the school district?
A. (Student, multipoint-to-multipoint ([A,B,C])) | (Faculty, Rooted-multipoint, ([X,Y],[A,B,C],[]))
B. (Student, multipoint-to-multipoint ([A,B,C])) | (Faculty, Rooted-multipoint, ([A,B,C],[X,Y]))
C. (Student, multipoint-to-multipoint ([A,B,C])) | (Faculty, Rooted-multipoint, ([X,Y],[A,B,C]))
D. (Student, multipoint-to-multipoint ([X,Y])) | (Faculty, Rooted-multipoint, ([A,B,C]))
C. (Student, multipoint-to-multipoint ([A,B,C])) | (Faculty, Rooted-multipoint, ([X,Y],[A,B,C]))
A school has applied Block Lists for the category of gambling websites to prevent student and faculty access. Unfortunately, one website is incorrectly being blocked as a gambling website when students should be allowed access. How should the school go about modifying the Block List as a Subscriber?
A. As a Subscriber, the school can make a request to the Provider web-portal page. The Service Provider will give a time frame as to when the update will happen
B. The school can update the Block List which will over-write the Provider’s database to push to other Subscribers
C. Subscriber cannot make changes not request changes be made to the Block List; otherwise sync issues can arise
D. The school can put in a request, but it is not the Service Providers responsibility to give a time frame as to when the request will be fulfilled
A. As a Subscriber, the school can make a request to the Provider web-portal page. The Service Provider will give a time frame as to when the update will happen
A subscriber has a single HTTP and FTP server at 124.1.1.100. They need all HTTP traffic that is headed to it to be associated to a single Application Flow. What criteria should be used?
A. DAV4=124.1.1.100
B. SAV4=124.1.1.100
C. SPORT=80
D. DPORT=80
D. DPORT=80
The requirement for an SD-WAN service is to apply one policy to all HTTP traffic to or from server 10.10.1.2 and another policy to all other HTTP traffic.
A. <afs1, [<DPORT,80>, <SDAV4,10.10.1.2>]> <AFS2, [<DPORT,80>]>
B. <afs1, [<SDPORT,80>]> <afs2, [<SDPORT,80>, <SAV4,10.10.1.2>]>
C. <afs1, [<SPORT,80>]> <afs2, [<SPORT,80>, <SAV4,10.10.1.2>]>
D. <afs1, [<SDPORT,80>, <SDAV4,10.10.1.2>]> <AFS2, [<SDPORT,80>]>
A. <afs1, [<DPORT,80>, <SDAV4,10.10.1.2>]> <AFS2, [<DPORT,80>]>
You receive complaints that some tagged traffic is not being delivered. The L2 MAX frame size is set to 1518 and the UNI L2 interface Service Attribute is CVLAN 3024. What do you do to resolve the issue?
A. Increase the BANDWIDTH policy
B. Change the UNI L2 Interface Service Attribute to 1518
C. Increase the L2 MAX frame size to 1522
D. Enable the BACKUP policy attribute
C. Increase the L2 MAX frame size to 1522
A Subscriber notices that some frames transmitted to one SD-WAN Edge are not being delivered to other SD-WAN Edges. The Subscriber investigates and finds that the SD-WAN UNI Maximum L2 Interface Frame Size is set to 1518. The value of the SD-WAN UNI L2 Interface Service Attribute value is CVLAN 34.
Which action should be taken to address this issue?
A. Change the SD-WAN UNI L2 Interface Service Attribute value to CVLAN 35
B. Increase SD-WAN UNI Maximum L2 Interface Frame Size 1520
C. Remove the VLAN tag on every frame
D. Increase SD-WAN UNI Maximum L2 Interface Frame Size 1522
D. Increase SD-WAN UNI Maximum L2 Interface Frame Size 1522
After implementing SD-WAN services, the SD-WAN customer has a security audit performed. The results of the security audit indicate security vulnerabilities in all of the applications that require a secure connection.
Which policy should be investigated?
A. OVERLAY policy
B. BILLING-METHOD policy
C. ENCRYPTRION policy
D. UNDERLAY policy
C. ENCRYPTRION policy
A medical practice upgrades to SD-WAN service. During the upgrade, the doctors express concern about the confidentiality of patient’s records. What can be configured to ensure this?
A. ECRYPTION = Required-Always
B. BACKUP = Disables
C. PUBLIC-PRIVATE = Private Only
D. INTERNET BREAKOUT = Disables
A. ECRYPTION = Required-Always
Which of the following is true?
A. A UNI can be encrypted
B. A UCS can be encrypted
C. An SWVC Endpoint can be encrypted
D. A TVC can be encrypted
D. A TVC can be encrypted
What settings ensure data is encrypted when transmitted over an SD-WAN?
A. The SWVC Policy Criteria ENCRYPTION is set to Required-Always and the UCS is encrypted
B. The SWVC Policy Criteria ENCRYPTION is set to Required-Always and the TVC is encrypted
C. The UNI attribute ENCRYPTION is set to Required-Always and the TVC is encrypted
D. The UNI attribute ENCRYPTION is set to Required-Always and the UCS is encrypted
B. The SWVC Policy Criteria ENCRYPTION is set to Required-Always and the TVC is encrypted
A legacy branch is being integrated into an SD-WAN network. The office currently has a primary and backup MPLS UCS via two ports on a single router. The office needs Local Internet Breakout and site-to-site access. What needs to be done to accomplish this?
A. Add a second router
B. Set INTERNET-BREAKOUT to Enabled for all flows over the current UCS
C. Add a Private UCS
D. Add a Public UCS
D. Add a Public UCS
A company has 3 locations that use an SD-WAN service. The locations use a mix of Public and Private UCS.
Due to a security issue at the London office, the value of the UCS End Point Breakout Service Attribute for the Public UCS in London is Disabled. Some users in Lindon require access to SaaS applications on the Internet.
How are these SaaS Application Flows forwarded?
A. They are forwarded over the SWVC to an SD-WAN UNI that has access to the Internet
B. They cannot be forwarded to the Internet using Internet Breakout and will be dropped
C. They are forwarded over SWVC to another SD-WAN Edge connected to a Public UCS that allows Internet Breakout at the UCS End Point
D. They are forwarded over the local Internet UCS since the INTERNET-BREAKOUT Policy overrides the UCS End Point Breakout Service Attribute
C. They are forwarded over SWVC to another SD-WAN Edge connected to a Public UCS that allows Internet Breakout at the UCS End Point
An Enterprise has an SD-WAN service with both flat-rate and usage-based UCS. The enterprise does not want the billing method to have an impact on how Application Flows are forwarded.
Which value of the BILLING-METHOD Policy Criterion meets this requirement?
A. Flat-Rate
B. Both
C. Usage-Based
D. Either
D. Either
A hospital uses SD-WAN service to prioritize multiple Paths for outbound traffic to a COTS (Commercial off-the-shelf) application that is sensitive to Packet Delay. The SD-WAN Provider has applied the following PERFORMANCE Policy Criterion:
«“One-way Packet Delay”, 20ms>, <None>></None>
What metric should be examined to explain why the application is having performance issues?
A. Packet Delay is over the threshold
B. One-way Packet Loss Ratio is not being accounted for
C. The path priority is based on Packet Delay
D. Packet Delay is under the threshold
C. The path priority is based on Packet Delay
The PERFORMANCE Policy Criterion is:
PERFORMANCE «“One-way Packet Delay”, 20ms>
<”One-way Packet Loss Ratio”, 0.03%»
Imaging also, three Paths to destination A, B, and C: A = <10ms, 0.01%> B = <12 ms, 0.01%> C = <12 ms, 0.02%>
Which statement is incorrect?
A. B and C could be in the other order since they have same value for the primary Performance Metric. But in this case, it is reasonable to assume that an implementation might order these Paths based on the secondary Performance Metric
B. A will be first, followed by either B or C, since they are ties for delay
C. All values are less than the thresholds and the list is ordered correctly based on the primary Performance Metric, the One-way Packet Delay
D. One-way Packet Loss Ratio is the primary metric and One-way Packet Delay is the secondary
D. One-way Packet Loss Ratio is the primary metric and One-way Packet Delay is the secondary
The PERFORMANCE Policy Criterion is:
PERFORMANCE «“One-way Packet Delay”, 20ms>
<”One-way Packet Loss Ratio”, 0.03%»
Imaging also, three Paths to destination A, B, and C:
A = <10ms, 0.04%>
B = <12 ms, 0.01%>
C = <12 ms, 0.02%>
Which of the following is true when evaluating the three paths listed?
A. Path A is the top priority since it has the lowest One-way Packet Delay, which is the primary metric
B. Packet drops is worst than having the packet gets delayed, and should be avoided at all cost, so the top priority should be path B since it has the lowest One-way Packet Loss Ratio
C. Path A should be taken out of the list and should not be considered as a forwarding path since it has exceeded the threshold for One-way Packet Loss Ratio of 0.3%
D. Path A has a One-way Loss Ratio above the 0.03% threshold; therefore, the Path is placed at the end of the list even though it has the best One-way Packet Delay. B and C are ties for delay, so they can be either order - but above A.
D. Path A has a One-way Loss Ratio above the 0.03% threshold; therefore, the Path is placed at the end of the list even though it has the best One-way Packet Delay. B and C are ties for delay, so they can be either order - but above A.
The PERFORMANCE Policy Criterion is:
PERFORMANCE «“One-way Packet Delay”, 20ms>, <”One-way Packet Loss Ratio”, 0.03%»
Imaging also, three Paths to destination A, B, and C:
A = <10ms, 0.035%>
B = <21ms, 0.01%>
C = <12ms, 0.02%>
Which statement is not correct?
A. Since the primary metric is One-way Packet Delay, the correct path order is Path A is the top preferred, followed by Path C, with Patch B as the worst path placed at the bottom
B. Path B’s delay exceeds the threshold
C. Path A’s One-way Packet Loss Ratio is above the threshold
D. Both Path A and Path B is moved to the end of the list and Path C is the favored Path
A. Since the primary metric is One-way Packet Delay, the correct path order is Path A is the top preferred, followed by Path C, with Patch B as the worst path placed at the bottom
A hospital uses an SD-WAN service to prioritize multiple Paths for outbound traffic to one of the hospital’s COTS (Commercial off-the-shelf) applications that is sensitive to Packet Delay. The SD-WAN Provider has applied the following PERFORMANCE Policy Criterion:
«“One-way Packet Delay”, 15ms>, <”One-way Packet Loss Ratio”, 0.06%»
The three paths to the application are:
Path A = <10ms, 0.05%>
Path C = <14ms, 0.03%>
Path B = <16ms, 0.01%>
Which of the following is true when evaluating the three paths listed?
A. Path B should be removed from the list given that 16ms is above the threshold for that Performance Metric
B. Path A is correctly assigned first in priority
C. Path C should be assigned first in priority
D. Path B should be the first Path option instead of Path A given that it has the most desirable “One-way Packet Loss Ratio
B. Path A is correctly assigned first in priority
A hospital uses an SD-WAN service to prioritize multiple Paths for outbound traffic to one of the hospital’s COTS (Commercial off-the-shelf) applications that is sensitive to Packet Delay. The SD-WAN Provider has applied the following PERFORMANCE Policy Criterion:
«“One-way Packet Delay”, 20ms>, <”One-way Packet Loss Ratio”, 0.05%»
The four paths to this application are:
Path B = <8ms, 0.05%>
Path C = <14ms, 0.03%>
Path A = <5ms, 0.07%>
Path D = <25ms, 0.10%>
Which of the following is true when evaluating the four paths listed?
A. Path A is correctly place at the end of the list
B. Path A should be re-ordered to the first option in the list
C. Path D should be removed from the list
D. Path B should be moved below Path C
C. Path D should be removed from the list
A collection of MPLS label switch routers is called a ____________.
a. UCS
b. EGP
c. MPLS Cloud
d. IGP
c. MPLS Cloud
An MPLS cloud is the collection of routers that make up an MPLS network. Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) are the two broad categories of routing protocols. Underlay connection service (UCS) are what SD-WAN services are built on top of.
The correct answer is: MPLS Cloud
Frame Loss Ratio is _____.
a. The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance
b. The time required to transmit a Service Frame from ingress UNI to egress UNI
c. The percentage of time that a service is usable
d. The measure of the number of lost frames between the ingress UNI and egress UNI expressed as a percentage
d. The measure of the number of lost frames between the ingress UNI and egress UNI expressed as a percentage
Frame Loss Ratio (FLR) is the percentage of frames that are sent but not received correctly. For example, if 100 frames get sent and 98 frames are received directly, this results in 2% FLR.
An SDCP candidate should focus on the fact that Frame Delay (FD), Inter-Frame Delay Variation (IFDV), Frame Loss Ratio (FLR), and Availability are four metrics that are used to measure performance of an SD-WAN service.
The correct answer is: The measure of the number of lost frames between the ingress UNI and egress UNI expressed as a percentage
When BGP is used as the routing protocol between Autonomous Systems, it is called _______.
a. eBGP
b. IS-IS
c. iBGP
d. 803.1
a. eBGP
Interior BGP (iBGP) is used within one Autonomous System (AS). Exterior BGP (eBGP) is used between Autonomous Systems.
The correct answer is: eBGP
How does SLAAC differ from DHCP?
a. SLAAC is for both IPv6 and IPv4, DHCP is not.
b. DHCP only issues IPv6 addresses. SLACC only issues IPv5 addresses.
c. SLAAC can be used to assign addresses without a DHCP server.
d. DHCP is newer, SLACC is older.
c. SLAAC can be used to assign addresses without a DHCP server.
Stateless Address Autoconfiguration (SLAAC) is a technique used in IPv6 to assign addresses. Unlike DHCP, it does not require a server.
The correct answer is: SLAAC can be used to assign addresses without a DHCP server.
Availability is _____.
a. Time required to transmit a Service Frame from ingress UNI to egress UNI
b. Percentage of time that a service is usable
c. The difference in delay of two Service Frames belonging to the same Class of Service (CoS) instance
d. Measure of the number of lost frames between the ingress UNI and egress UNI expressed as a percentage
b. Percentage of time that a service is usable
Availability is the percentage of overall time that the service is used by the subscriber (versus is down with an outage).
An SDCP candidate should focus on the fact that Frame Delay (FD), Inter-Frame Delay Variation (IFDV), Frame Loss Ratio (FLR), and Availability are four metrics that are used to measure performance of an SD-WAN service.
The correct answer is: Percentage of time that a service is usable
OSPF is a link state protocol that uses _________ to update routing topologies.
a. TLV
b. BGP
c. LSA
d. NLRI
c. LSA
Link State Advertisements are used to update routers that run OSPF.
The correct answer is: LSA
Which of the following IP addresses is in the 10.7.8.0/28 network?
a. 10.7.28.2
b. 10.7.8.28
c. 10.2.8.7
d. 10.7.8.2
d. 10.7.8.2
Your answer is correct.
The range of the 10.7.8.0/28 subnet is 10.7.8.0-10.7.8.15.
The correct answer is: 10.7.8.2
DHCP is used to _______________________.
a. Dynamically compute the path a packet takes
b. Promote Layer 2 address throughout the network.
c. Assign IPv4 and IPv6 addresses to hosts
d. Secure packets from source to destination
c. Assign IPv4 and IPv6 addresses to hosts
Dynamic Host Control Protocol (DHCP) servers assigns IP addresses to host computers that request them.
The correct answer is: Assign IPv4 and IPv6 addresses to hosts
IEEE 802.1ad is also known as ___________________.
a. TLVs
b. NLRI
c. DSCP
d. “Q in Q” or S-Tags
d. “Q in Q” or S-Tags
802.1ad defines the use of two tags (a S-Tag and C-tag). Tags where originally defined in the 802.1Q standard and have acquired the nickname of Q- tags. Thus Q in Q refers to the fact that one Q tag is encapsulated behind the second.
The correct answer is: “Q in Q” or S-Tags