Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Riverbed 299-01 Riverbed Certified Solutions Professional - Network Performance Management Exam Practice Test

Demo: 36 questions
Total 245 questions

Riverbed Certified Solutions Professional - Network Performance Management Questions and Answers

Question 1

On Cascade Profiler, in terms of retention of completed reports and reporting sources (one minute flow and rollup files), which of the following is true? (Select 4)

Options:

A.

One minute flow records are deleted from the file system FIFO (oldest first) once the appliance has filled the space that is allocated.

B.

There is a fixed amount of space on the filesystem for completed reports.

C.

A report template can be marked "keep until I delete it" so that any reports that are scheduled with this template are not automatically deleted from the filesystem.

D.

When the flows or rollup records have been deleted from the filesystem, any saved report that was generated from those flow sources is no longer available.

E.

Users have the ability to allocate additional space to the 1 min flow logs in order to increase retention. This is done at the expense of other rollup resolutions.

Question 2

Which of the following are available integrations for Cascade Profiler? (Select 3)

Options:

A.

SNMP to send traps to trap receivers.

B.

SNMP to discover switch ports associated with IP addresses.

C.

SNMP to discover router interface capacities.

D.

SNMP to discover router CPU utilization.

Question 3

A user wants to use the link congestion analytic policy on Cascade Profiler to monitor five key WAN links for an increase in traffic outside of the expected traffic that includes TCP/80, TCP/443, TCP25, and UDP/53. Can the link congestion policy be used for this scenario?

Options:

A.

No, because a link analytic can monitor only a single interface.

B.

Yes, one can define separate link congestion analytic policies for each WAN interface.

C.

No, because one can only define specific ports to include on a link congestion policy.

D.

Yes, because one can define a port group that includes every UDP and TCP port except for those that include the expected traffic, and that port group can be used for the link congestion analytic policy.

E.

No, and both A and C include valid reasons.

Question 4

Which of the following metrics are monitored in an Application Performance Policy? (Select 4)

Options:

A.

Increase in Server Delay

B.

Decrease in Average Connection Application-level Throughput

C.

Increases in the number of TCP retransmissions

D.

Decreases in the number of new connections to the application servers

E.

Increase in the number of Active Connections

Question 5

The Discovery Wizard has been used to map a complex application to be monitored by Cascade's service monitoring for a company with 25 remote locations and one data center, each defined as a group within the group type used. There are two front-end segments to signify incoming end user connections, and 15 back-end connections among all of the servers. The only metric/policy activated for each segment is the 'Response Time' metric. How many policies on the Cascade Profiler will this service consume?

Options:

A.

40

B.

65

C.

17

D.

55

E.

425

Question 6

If there is a Layer 7 fingerprint and a Layer 4 mapping for a particular application, which of the following is truE. (Select 5)

Options:

A.

If the Layer 4 mapping override policy is not "Unknown/Unclassified", the Layer 4 mapping applies to flows not passing a Sensor or other application fingerprinting device as well as to flows not matching any defined Layer 7 fingerprint

B.

If the Layer 4 mapping override policy is "Always", then the Layer 7 fingerprint will never be used for flows matching both criteria

C.

If the Layer 4 mapping override policy is "Unclassified", the Layer 4 mapping only applies to flows not passing a Sensor or other application fingerprinting device

D.

If the Layer 4 mapping override policy is "Unknown/Unclassified", the Layer 4 mapping applies to flows not passing a Sensor or other application fingerprinting device as well as to flows not matching any defined Layer 7 fingerprint

E.

Care must be taken when defining reports and policies to reflect overlapping definitions and the Layer 4 override policy

F.

The traffic Expression "app L7_fingerprint or app L4_mapping" will catch all traffic flows for the application data in a report

Question 7

How do I run a report on Cascade Profiler to show all hosts that have talked to server "192.168.1.100" on TCP port 25?

Options:

A.

Under the traffic reports Advanced Tab, place "192.168.1.100" in the Host field – select "Acting as Server" in the drop down, enter "tcp/25" in the Protocol field and select "Hosts" in the "report-by" pull down.

B.

Under the traffic reports Advanced Tab, place "192.168.1.100" in the Host field – select "Acting as Server" in the drop down, enter "tcp/25" in the Protocol field and select "Peers Hosts" in the "report-by" pull down.

C.

Under the traffic reports Advanced Tab, place "192.168.1.100" in the Host field – select "Acting as Client and Server" in the drop down, enter "tcp-25" in the Protocol field and select "Hosts" in the "report-by" pull down.

D.

Under the "Quick Reports" pull down from the dashboard page, select "Host" enter the IP Address and hit return.

Question 8

Cascade Profiler provides identity information collected from Active Directory 2008 by installing and correctly configuring the 'Cascade Connector' agent software on:

Options:

A.

Every DNS server in the AD environment

B.

Any server in the MS domain

C.

Every client desktop in the AD environment

D.

Every NTP server in the MS domain

E.

The Microsoft Event Collector component in the AD environment

Question 9

Which of the following configuration changes can be used to reduce the number of alerts generated overall for a Service?

Options:

A.

Edit each Service policy to increase the Tolerance slider for Low and High alerts.

B.

Edit each Service policy and set a noise floor to specify the minimum amount of change that the policy can treat as deviation from normal behavior.

C.

Edit the Service and select fewer metrics to monitor for each segment that comprises the Service.

D.

Modify the location host group type used for monitoring end user traffic to use fewer groups (for example, Region instead of Site).

E.

A, B, C, and D.

F.

A and B only.

Question 10

Trace clips that no longer have data because their packet data and trend data is no longer available in the parent capture job trace:

Options:

A.

Appear with a red lightning bolt icon within Cascade Pilot.

B.

Appear with a lock icon within Cascade Pilot.

C.

Appear with a grey lightning bolt icon within Cascade Pilot.

D.

Appear with a yellow lightning bolt icon within Cascade Pilot.

E.

Appear with the trace clip name in red text within Cascade Pilot.

Question 11

Which of the following statements is true regarding SNMP polling and NTP syncing among Cascade components?

Options:

A.

Cascade Gateway's poll via SNMP sources of Netflow, while Cascade Profiler, Cascade Gateway and Cascade Sensor sync NTP from a common source.

B.

Cascade Profiler's poll via SNMP sources of Netflow, while Cascade Profiler, Cascade Gateway and Cascade Sensor sync NTP from a common source.

C.

Cascade Profiler, Cascade Gateway and Cascade Sensor sync NTP from different sources, while Cascade Profiler's poll via SNMP sources of Netflow.

D.

Cascade Profiler, Cascade Gateway and Cascade Sensor sync NTP from different sources, while Cascade Gateway's poll via SNMP sources of Netflow.

E.

Cascade Profiler does all SNMP polling and is also the source of all NTP.

Question 12

When editing a previously configured service policy, what options become available if you click the 'show advanced settings' checkbox? (Select 3)

Options:

A.

Allows enabling/disabling the detection of dips in the metric.

B.

Allows tuning of the tolerance range of the metric.

C.

Allows setting of a noise floor for the metric.

D.

Allows adjusting the notifications for the metric.

E.

Allows enabling/disabling the detection of spikes in the metric.

Question 13

On Cascade Profiler, what does "tunneled" indicate when used as a keyword for an Application?

Options:

A.

When the traffic flow matches more than one Application signature. This indicates that the one Application may have been tunneled over the other.

B.

When an Application runs over a non-standard port (such as TELNET traffic on Port 80).

C.

When a "port definition" is non-standard (e.g. when you change tcp/80's definition from http to telnet).

D.

When a Layer-4 Application Mapping is defined.

Question 14

Trace clips in Cascade Pilot allow you to:

Options:

A.

Save a time window to a trace file for post-capture analysis.

B.

Save a time window and apply Views to analyze a portion of a Capture Job.

C.

Analyze an indexed capture job with Views that support indexing.

D.

Clip a trace file to your desktop.

Question 15

What are two differences between NetFlow version 5 and NetFlow version 9 (select 2)

Options:

A.

NetFlow version 5 generally support ingress flow export only; NetFlow version 9 supports both ingress and egress export.

B.

NetFlow version 5 is used for Switches, NetFlow version 9 is used for Routers.

C.

NetFlow version 9 includes information about CPU, Power-status and other router performance characteristics; NetFlow version 5 does not.

D.

NetFlow version 9 includes the ability to export the Time-To-Live (TTL); NetFlow version 5 does not.

E.

NetFlow version 9 includes the ability to export the packet latency, NetFlow version 5 does not.

Question 16

Cascade dependency mapping (Connection Graphs) have multiple 'layouts' for showing dependencies. Which of the following is not an option?

Options:

A.

Symmetric

B.

Radial tree

C.

Vertical client/server dependency

D.

Starburst

E.

Horizontal tree

Question 17

On Cascade Profiler, Which of the following account role permissions is not unique to administrator accounts?

Options:

A.

Creating or modifying custom host groups.

B.

Grant other users the ability to run user reports.

C.

Set or modify passwords for other users.

D.

View the audit trail page.

E.

Specify mitigation actions.

Question 18

Voice over IP (VoIP) monitoring by Network Performance Management systems typically includes, but is not limited to, the following metrics (select 3):

Options:

A.

MOS scores voice quality issues

B.

ABC-threshold

C.

Signal-to-noise ratio

D.

Jitter

E.

Packet Loss

Question 19

Which of the listed versions of NetFlow are supported by Cascade?

Options:

A.

v1 and v5

B.

v7

C.

v9

D.

all of the above

E.

none of the above

Question 20

A SPAN port is often limited in which way:

Options:

A.

Can only capture traffic from a single port.

B.

Can only capture traffic that is routed (not switched)

C.

Can only capture traffic that is ingress or received by the device

D.

The number that can be configured is oftentimes limited to two

E.

Requires at least two monitoring ports to capture a single link

Question 21

Before running your first report on Cascade Profiler after installation, where is the best place to go to verify traffic flows are currently being received?

Options:

A.

System Information > Devices/Interfaces

B.

System Information > Profiler

C.

Dashboard

D.

Log in to the shell and view the /usr/mazu/var/log/Sensor.log

E.

Ping devices on UDP port 2055 to see if they are up and running

Question 22

Which configuration option is it highly recommended that every Cascade Profiler Deployment implement?

Options:

A.

Host Baseline Profiles

B.

Custom Port Definitions

C.

Host Groupings

D.

Mitigation Configuration

E.

Firewall Configuration

Question 23

To install Cascade Shark, the best practice to initially configure the IP Address to be used on the network is:

Options:

A.

Connect a cross-over cable from your laptop to the Ethernet management port and connect through the Web browser to the default IP Address of 192.168.1.10.

B.

Connect a cross-over cable from your laptop to the Auxiliary Ethernet port and connect through the Web browser to the default IP Address of 192.168.1.10.

C.

Connect by KVM or Serial Console and run the command line tool, sa_wizard, to perform the initial configuration.

D.

Connect to the appliance using the Riverbed Central Management Console (CMC) on its default IP Address and perform the initial configuration.

Question 24

Which of the following describes how a Cascade Gateway transfers flow data to a Cascade Profiler? (Select 2)

Options:

A.

It uses IETF's IPFIX protocol.

B.

Is uses whichever flow protocol it received the data on.

C.

It uses a proprietary compressed and encrypted connection.

D.

It sends data over SYSLOG port 514 which is compressed and encrypted via proprietary technology.

E.

It sends data over TCP/41017.

Question 25

When defining a Layer 4 application signature, what are the valid options for flows already tagged with a Layer 7 application signature? (Select 3)

Options:

A.

Always – remove the layer 7 tag and apply the layer 4 tag instead.

B.

Unclassified – remove the layer 7 tag and apply the layer 4 tag only if the flow is already tagged unclassified.

C.

Unknown – remove the layer 7 tag and apply the layer 4 tag only if the flow is already tagged unknown.

D.

Unknown/Unclassified – remove the layer 7 tag and apply the layer 4 tag only if flow is tagged as both unknown and unclassified.

E.

Unknown/Unclassified – remove the layer 7 tag and apply the layer 4 tag only if flow is tagged as unknown or unclassified.

Question 26

For Service policies that get applied to End User segments, by default separate policies are tracked by location for the client traffic. Which of the following is NOT true regarding flexibility in configuration of these End User segments?

Options:

A.

The default hostgroup type used can be changed from Configuration > General Settings.

B.

Different hostgroup types can be used for monitoring End User segments for each Service.

C.

While editing the Service one has the capability to select all sites or a subset of sites to include for monitoring.

D.

When adding a Service Health by Location widget to a dashboard, one has the capability to include all locations or a subset (maximum of 10).

E.

The default hostgroup type used for monitoring End User segments is ByLocation.

Question 27

Cascade provides a means for contacting other network devices for additional information about a host or user of interest. Right-clicking a host name, IP address, MAC address or port number and choosing _________________ from the shortcut menu sends a query to the other network device.

Options:

A.

View Packets

B.

Error Report

C.

Restart Service

D.

View Switch Port

E.

External Link

Question 28

The Cascade Profiler and Express define a service as all servers, clients, applications and ports involved in the end-to-end delivery of a network service. A service is composed of one or more _______________ that can be monitored, reported and alerted on individually.

Options:

A.

Data Component

B.

Segments

C.

Report Criteria

D.

Router

E.

User(s)

Question 29

When you create an index within Cascade Pilot for a trace filE. (Select 2)

Options:

A.

The index will be removed when Cascade Pilot is closed.

B.

The operation can take a few minutes.

C.

You cannot apply Views that do not support indexing.

D.

The trace file icon changes to a lightning bolt to indicate that it is indexed.

Question 30

Hosts that do not match group definitions within a group type are:

Options:

A.

Placed in an unassigned group.

B.

Not placed into a group within the group type.

C.

Not allowed

D.

Flagged as an error.

E.

Likely to cause errors in the future.

Question 31

When using Network Performance Monitoring solutions the following statements are truE. (select 2)

Options:

A.

HTTP Object load times can be analyzed with full packet capture

B.

SSL Decryption can be used without any special key imports provided the start of the TCP conversation is captured

C.

Software Agents are required on Servers in order to measure the Network Round trip time of applications

D.

ICMP (ping echo/response) must be used in order to measure Network Round Trip time

E.

NetFlow records can be summarized to provide utilization on a router interface

Question 32

What can be configured on the Cascade Profiler to detect utilization for an interface? (Select 2)

Options:

A.

Manually configure the interface speeds on the Devices/Interfaces page.

B.

Configure and enable SNMP access to the reporting devices on the Devices/Interfaces page.

C.

Enable NBAR on the routers.

D.

Check the "Interface Utilization" box under the Devices/Interfaces page for each router and/or Steelhead desired.

E.

Configure the appropriate Device Interface Analytic.

Question 33

Cascade Profiler is able to report traffic using two different approaches (centricities). Two approaches can result in different results when using the same report criteria due to the way data is aggregated and counted. What are these two approaches? (Select 2)

Options:

A.

Interface centric

B.

Application centric

C.

Host centric

D.

Port centric

E.

The Cascade Profiler does not have two approaches

Question 34

If a Cascade Profiler customer wants to understand if poor user experience for a particular application is due to application inefficiency or not, what report parameters should you look at?

Options:

A.

RTT

B.

Server delay

C.

Response time

D.

Server delay relative to Network RTT

E.

Number of active connections

Question 35

In Cascade Profiler, which of the following is available as a Dashboard content block? (Select 3)

Options:

A.

Top Hosts

B.

Top URLs

C.

Watched Interfaces

D.

Current Events

Question 36

Time Control within Cascade Pilot is used for:

Options:

A.

Controlling the portion of a packet capture (pcap) file analysed in the current view.

B.

Creating a trace clip from a Cascade Shark appliance Capture job.

C.

Controlling the size of a Capture Job created on a Cascade Shark appliance.

D.

A and B

E.

A, B, and C.

Demo: 36 questions
Total 245 questions