Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which component of the SD-Access fabric is responsible for communicating with networks that are external to the fabric?

A.

border nodes

B.

edge nodes

C.

control plane nodes

D.

intermediate nodes

Which two statements describes Cisco SD-Access? (Choose two.)

A.

an overlay for the wired infrastructure in which traffic is tunneled via a GRE tunnel to a mobility controller for policy and application visibility

B.

software-defined segmentation and policy enforcement based on user identity and group membership

C.

an automated encryption/decryption engine for highly secured transport requirements

D.

a collection of tools and applications that are a combination of loose and tight couping

E.

programmable overlays enabling network virtualization across the campus

Which element of the Cisco SD-WAN architecture facilitates the functions of controller discovery and NAT traversal?

A.

vManage

B.

vEdge

C.

vBond orchestrator

D.

vSmart controller

Which Cisco vEdge router offers 20 Gb of encrypted throughput?

A.

Cisco vEdge 1000

B.

Cisco vEdge 2000

C.

Cisco vEdge 5000

D.

Cisco vEdge 100

What statement is true regarding the current time in Enterprise Networking history?

A.

advent of loT

B.

pace of change

C.

pervasive use of mobile devices

D.

advent of cloud computing

What should you do if you are looking at a strategic win with a customer and the customer wants to examine Cisco ISE for longer than a few weeks?

A.

Point them to our dCloud demo library.

B.

Give them our ISE YouTube videos.

C.

Set them up with a dCloud account.

D.

Give them some of our flash files that can be played on any browser.

E.

Provide them with a downloadable POV kit.

F.

Set them up with an account on a Cisco UCS server that hosts ISE.

Which two statements are true regarding Cisco ISE? (Choose two.)

A.

ISE plays a critical role in SD-Access.

B.

ISE can provide data about when a specific device connected to the network.

C.

The major business outcomes of ISE are enhanced user experience and secure VLAN segmentation.

D.

An ISE deployment requires only a Cisco ISE network access control appliance.

E.

Without integration with any other product, ISE can track the actual physical location of a wireless endpoint as it moves.

Which are two advantages of a “one switch at a time” approach to integrating SD-Access into an existing brownfield environment? (Choose two.)

A.

appropriate for campus and remote site environments

B.

ideal for protecting recent investment s while upgrading legacy hardware

C.

involves the least risk of all approaches

D.

allows simplified roll back

E.

opens up many new design and deployment opportunities

F.

allows simplified testing prior to cutover

What are the three foundational elements required for the new operational paradigm? (Choose three.)

A.

multiple technologies at multiple OSI layers

B.

application QoS

C.

fabric

D.

assurance

E.

policy-based automated provisioning of network

F.

centralization

Which two activities should occur during an SE’s demo process? (Choose two.)

A.

identifying which capabilities require demonstration

B.

highlighting opportunities that although not currently within scope would result in lower operational costs and complexity

C.

asking the customer to provide network drawings or white board the environment for you

D.

determining whether the customer would like to dive deeper during a follow -up

E.

leveraging a company such as Complete Communications to build a financial case