New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Riverbed 299-01 Riverbed Certified Solutions Professional - Network Performance Management Exam Practice Test

Page: 1 / 25
Total 245 questions

Riverbed Certified Solutions Professional - Network Performance Management Questions and Answers

Question 1

In this scenario, you have created a host group called My_Computers on Cascade Profiler. In that group you have included the subnet 192.168.1.0/25.

You have 10 devices in that group 192.168.1.1-10. The rest of the addresses are unused. While running reports on this segment of the network you notice that when a report is run using the entire subnet you see traffic destined for 192.168.1.120. When you run the same report specifying the host group the traffic does not appear. Why is this happening?

Options:

A.

192.168.1.120 is not in the 192.168.1.0/25 subnet

B.

192.168.1.120 has been input as a trusted host in a security policy

C.

Traffic to 192.168.1.120 was not picked up by a Sensor

D.

Traffic to 192.168.1.120 was not picked up by a Gateway

E.

192.168.1.120 never sent any traffic

Question 2

What does Cascade use as the flow key to identify a unique flow?

Options:

A.

sourceIP, destIP, protocol, sourcePort, destPort, QoS

B.

sourceIP, destIP, protocol, destPort

C.

sourceIP, destIP, protocol, sourcePort, destPort

D.

destIP, protocol, destPort

E.

sourceIP, destIP, protocol

Question 3

What is a benefit that Cascade Profiler might provide to Security Operations? (Select 3)

Options:

A.

Ability to identify Scanners and Worm Propagations.

B.

Ability to provide information for a firewall rule when a user defined policy is violated.

C.

Ability to alert on security policy (e.g. an insecure policies, such as FTP, is in use).

D.

Ability to identify Worms by name.

Question 4

When links in a network are using WAN optimization, it is best if the Cascade Profiler or Express receives data from a _________or _________ monitoring traffic on the LAN side of the Steelhead that is located on the server side of the optimized connection. This is necessary in order to determine server delay.

(Select 2)

Options:

A.

Cascade Shark

B.

Router

C.

Layer 3 switch

D.

Steelhead appliance

E.

Cascade Sensor

Question 5

If a VLAN SPAN (VLAN101) is configured and monitored by Cascade Shark, which of the following is true? (Select 2)

Options:

A.

Inter VLAN101 traffic will be monitored; Intra VLAN101 traffic will not.

B.

Intra VLAN101 traffic will be monitored; Inter VLAN101 traffic will not.

C.

Both inter and intra VLAN101 traffic will be monitored.

D.

It is a best practice to configure the Cascade Shark monitoring port (the SPAN destination) with 'deduplication' enabled.

E.

It is a best practice to configure the Cascade Shark monitoring port (the SPAN destination) without 'deduplication' enabled.

Question 6

For DNS reverse lookup, Cascade Profiler caches as follows:

Options:

A.

Cache the most recent 500 IPs.

B.

Obey DNS TTLs.

C.

Cascade does not cache DNS responses.

D.

For 24 hours.

Question 7

If there is a Layer 7 fingerprint and a Layer 4 mapping for a particular application, which of the following is truE. (Select 5)

Options:

A.

If the Layer 4 mapping override policy is not "Unknown/Unclassified", the Layer 4 mapping applies to flows not passing a Sensor or other application fingerprinting device as well as to flows not matching any defined Layer 7 fingerprint

B.

If the Layer 4 mapping override policy is "Always", then the Layer 7 fingerprint will never be used for flows matching both criteria

C.

If the Layer 4 mapping override policy is "Unclassified", the Layer 4 mapping only applies to flows not passing a Sensor or other application fingerprinting device

D.

If the Layer 4 mapping override policy is "Unknown/Unclassified", the Layer 4 mapping applies to flows not passing a Sensor or other application fingerprinting device as well as to flows not matching any defined Layer 7 fingerprint

E.

Care must be taken when defining reports and policies to reflect overlapping definitions and the Layer 4 override policy

F.

The traffic Expression "app L7_fingerprint or app L4_mapping" will catch all traffic flows for the application data in a report

Question 8

Which of the following statements is true regarding SNMP polling and NTP syncing among Cascade components?

Options:

A.

Cascade Gateway's poll via SNMP sources of Netflow, while Cascade Profiler, Cascade Gateway and Cascade Sensor sync NTP from a common source.

B.

Cascade Profiler's poll via SNMP sources of Netflow, while Cascade Profiler, Cascade Gateway and Cascade Sensor sync NTP from a common source.

C.

Cascade Profiler, Cascade Gateway and Cascade Sensor sync NTP from different sources, while Cascade Profiler's poll via SNMP sources of Netflow.

D.

Cascade Profiler, Cascade Gateway and Cascade Sensor sync NTP from different sources, while Cascade Gateway's poll via SNMP sources of Netflow.

E.

Cascade Profiler does all SNMP polling and is also the source of all NTP.

Question 9

When editing a previously configured service policy, what options become available if you click the 'show advanced settings' checkbox? (Select 3)

Options:

A.

Allows enabling/disabling the detection of dips in the metric.

B.

Allows tuning of the tolerance range of the metric.

C.

Allows setting of a noise floor for the metric.

D.

Allows adjusting the notifications for the metric.

E.

Allows enabling/disabling the detection of spikes in the metric.

Question 10

Which of the following configuration changes can be used to reduce the number of alerts generated overall for a Service?

Options:

A.

Edit each Service policy to increase the Tolerance slider for Low and High alerts.

B.

Edit each Service policy and set a noise floor to specify the minimum amount of change that the policy can treat as deviation from normal behavior.

C.

Edit the Service and select fewer metrics to monitor for each segment that comprises the Service.

D.

Modify the location host group type used for monitoring end user traffic to use fewer groups (for example, Region instead of Site).

E.

A, B, C, and D.

F.

A and B only.

Question 11

Which of the following capabilities are supported by the Cascade Sensor appliance but are not supported by the Cascade Sensor-VE RSP packagE. (Select 2)

Options:

A.

Network Round Trip measurement

B.

Packet logging

C.

Server Delay measurement

D.

Connection Throughput measurement

E.

Retransmission measurement

F.

L7 application fingerprint checking

Question 12

Within Cascade Pilot a Watch can: (Select 3)

Options:

A.

Send an email when the traffic reaches at least 1MB/sec.

B.

Notify all Cascade Pilot users connected to a specific Cascade Shark appliance when a specified traffic event occurs.

C.

Create a Web traffic report with a specific time window.

D.

Start a Capture Job each time the VoIP traffic goes below 2MB/sec.

Question 13

When analyzing a large (100GB, for example) trace file within Cascade Pilot, you should:

Options:

A.

Copy the file onto a Cascade Shark to ensure better performance.

B.

Create an index so that processing of the View analytics will be faster.

C.

Apply a View with a specific filter.

D.

Use Wireshark tools to split the trace file in multiple and smaller trace files.

Question 14

How does Cascade Profiler obtain switch port discovery and population information?

Options:

A.

Switch Port Discovery Protocol (SPDP)

B.

Merging of CAM + ARP tables, both gathered via SNMP

C.

Merging of IF and ARP tables, both gathered via SNMP

D.

Merging of IF and CAM tables, both gathered via SNMP

Question 15

Cascade Profiler provides identity information collected from Active Directory 2008 by installing and correctly configuring the 'Cascade Connector' agent software on:

Options:

A.

Every DNS server in the AD environment

B.

Any server in the MS domain

C.

Every client desktop in the AD environment

D.

Every NTP server in the MS domain

E.

The Microsoft Event Collector component in the AD environment

Question 16

Within Cascade Profiler you can set the recipient for policy notifications under Advanced configuration to:

Options:

A.

Log Only, SNMP Only, Email Only, SNMP and Email

B.

Log Only, Default, Owner, or any defined recipient

C.

Log Only, Default, Owner or any User Account

D.

Log Only, Default, Owner or any User Name obtained via the Identity Integration

Question 17

A system administrator needs to update their Cascade Profiler host group settings to remove references to a decommissioned office on the 10.63.32.0/24 subnet.

Question # 17

What is the best way to do this?

Options:

A.

echo "delete from hostinfo where ipaddr = '10.63.32.0/24';" | psql mazu postgres

B.

Edit the Definition and remove the entry for 10.63.32.0/24 Bracknell_UK

C.

echo "delete from hostinfo where group = 'Bracknell_UK;" | psql mazu postgres write_community_string

D.

Go to Host Groups and insert " #10.63.32.0/24 Bracknell_UK"

Question 18

When defining a service which of the following are supported ways of aggregating the results? (Select 2)

Options:

A.

Client Ports

B.

Applications

C.

Ports

D.

Server

Question 19

What is the maximum number of Cascade Profilers that can be configured in the Cascade Shark appliance as receivers of flows?

Options:

A.

1

B.

2

C.

3

D.

4

E.

Unlimited

Question 20

Within Cascade Profiler, what can be done to prevent a data resolution from being available for selection on the Report Criteria section of traffic reports?

Options:

A.

Set the disk space for that data resolution to 0 in Configuration > Flow Log.

B.

Set the disk space for that data resolution to -1 in Configuration > Flow Log.

C.

Set the disk space for that data resolution to -1 in Configuration > General Settings.

D.

Set the disk space for that data resolution to 0 in Configuration > General Settings.

Question 21

Which of the listed versions of NetFlow are supported by Cascade?

Options:

A.

v1 and v5

B.

v7

C.

v9

D.

all of the above

E.

none of the above

Question 22

What is the maximum number of custom applications that can be defined on a Cascade Profiler?

Options:

A.

Yes, 25

B.

Yes, 50

C.

Yes, 100

D.

Yes 500

E.

No Limit

Question 23

For switch port Discovery on Cascade Profiler what device provides the MAC to IP address mapping?

Options:

A.

ARP table on a layer 3 device (router)

B.

CAM (Content Addressable Memory) on a layer 2 device (switch)

C.

Both the ARP and CAM tables from a layer 2 device (switch)

D.

All of the above

E.

None of the above

Question 24

Where is one place Cascade Profiler can obtain Identity (user) information for use in reporting user activity on a network?

Options:

A.

Through Radius Server(s)

B.

From Domain Controller(s)

C.

Through LDAP queries

D.

Via SNMP queries

Question 25

For an analytic policy that monitors TCP retransmission bandwidth, which of the following best describes what is minimally required before a baseline can be established?

Options:

A.

Three weeks of historical traffic between the clients and servers defined on the policy.

B.

Three days of historical traffic between the clients and servers defined on the policy.

C.

Three weeks of historical traffic between the clients and servers defined on the policy, where retransmissions were reported in more than 50% of the 15 min windows over the three week period.

D.

Three days of historical traffic between the clients and servers defined on the policy, where retransmissions were reported in more than 50% of the 15 min windows over the three day period.

E.

The timeframe required to collect the baseline is not fixed, and is based on the variance of the traffic being monitored.

Question 26

Which of the following is valid syntax for defining host groups? (Select 3)

Options:

A.

192.168.0.100/255.255.0.255 Philadelphia

B.

192/8 Baltimore

C.

172.168.1.1 Phoenix

D.

10/16 Chicago

Question 27

What is one way Cascade obtains information about retransmissions in the network?

Options:

A.

It obtains L2 retransmissions from switches and routers via SNMP.

B.

It obtains TCP retransmissions by tracking TCP sessions via the Cascade Sensor.

C.

Cascade does not track retransmissions.

D.

Cascade obtains retransmissions from NetFlow and/or sFlow marked with the TCP push flag.

Question 28

What is the typical retention time of packets of a CSK-01100 Cascade Shark appliance with 1 capture job?

Options:

A.

About 34 hours with a captured length of 65535 bytes and a packet rate of 400kbps

B.

About 9 hours with a captured length of 1000 bytes and an average traffic rate of 1Gbps.

C.

About 18 hours with a captured length of 65535 bytes and an average traffic rate of 500Mbps.

D.

About 20 hours with a captured length of 500 bytes and an average packet rate of 400kbps.

Question 29

When drilling down from a Cascade Profiler traffic report to analyze the underlying packets in Cascade Pilot, which of the following is NOT required?

Options:

A.

The flows that are being viewed in Cascade Profiler must be reported by a Shark appliance.

B.

The user's workstation requires a licensed copy of Cascade Pilot.

C.

The user's workstation requires access to the Cascade Shark appliance on the appropriate TCP Port.

D.

If there are multiple capture jobs configured on the Cascade Shark appliance, the user must select which one to apply the trace clip against.

E.

All of the above.

Question 30

What is the Active Timeout requirement on flow sources sending NetFlow to Cascade?

Options:

A.

Any active timeout can be used; Cascade will calculate the statistics accordingly and update the dashboard accordingly.

B.

60 Seconds.

C.

60 Milliseconds.

D.

15 Minutes.

Question 31

Refer to the Exhibit.

Question # 31

For a user defined host policy on Cascade Profiler, what would trigger this policy to generate an alert?

Options:

A.

Any traffic using application "X" or port range "Y"

B.

Any internal-only traffic using application "X" or port range "Y"

C.

Any internal-only traffic using application "X" and port range "Y"

D.

Any traffic between internal and external hosts using application "X" or port range "Y"

E.

Any traffic between internal and external hosts using application "X" and port range "Y"

F.

Any traffic from internal clients to external servers using application "X" or port range "Y"

G.

Any traffic from internal clients to external servers using application "X" and port range "Y"

Question 32

Which of the following are default user-defined policies on Cascade Profiler? (Select 3)

Options:

A.

P2P application Activity

B.

SpamBot Activity

C.

Email traffic surge

D.

Port Scan

E.

P2P Port Activity

Question 33

WAN optimization reports on Cascade Profiler require that the WAN interfaces for all Steelheads performing optimization are included in a WAN Interface group and are marked as Steelhead interfaces. Which of the following is true?

Options:

A.

If the Steelhead is running a RioS version older than 5.5.3, the Steelhead WAN interfaces need to be manually added, and marked as Steelhead interfaces.

B.

If the Steelhead is running a RioS version 5.5.3 or higher, the Steelhead WAN interfaces are automatically added to the WAN page, but the user must manually mark them as Steelhead interfaces.

C.

If the Steelhead is running a RioS version 6.0.1 or higher, the Steelhead WAN interfaces are automatically added to the WAN page and are also be marked as a Steelhead interface.

D.

All of the above are true.

E.

A and C only are true.

Question 34

Once the Cascade Shark appliance has an initial configuration with an IP Address set to 10.1.1.1 you can connect to it from a web browser using the URL:

Options:

A.

http://10.1.1.1

B.

https://10.1.1.1

C.

https://10.1.1.1:443

D.

https://10.1.1.1:8080

E.

http://10.1.1.1:8080

Question 35

Which of the following does the Cascade Sensor device provide that the Cascade Sensor-VE does not? (Select 2)

Options:

A.

Layer-7 Application Fingerprinting

B.

Connection Duration Statistics

C.

Riverbed RiOS Integration

D.

Rotating Packet Log

Question 36

Which of the following is false in regards to Cascade Profiler reporting and alerting? (Select 2)

Options:

A.

Any dependency (connection graph) can be exported to SVG (Visio) format.

B.

Reports are real time and can not be scheduled.

C.

Reports can be sent via PDF, HTML, CSV, or DOC format.

D.

Events can be sent via email or SNMP v1 or v3 traps.

E.

Events can be sent to both an email list AND SNMP target.

Page: 1 / 25
Total 245 questions