Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Hosts that do not match group definitions within a group type are:

A.

Placed in an unassigned group.

B.

Not placed into a group within the group type.

C.

Not allowed

D.

Flagged as an error.

E.

Likely to cause errors in the future.

When the Discovery wizard presents all newly discovered application-ports as candidates to be included as segments for monitoring within a Service, which of the following actions will save the segment as part of the Service, but will not implement monitoring of the traffic? This action will also suppress the same application-ports from being presented in any future discovery.

A.

Merge

B.

Add

C.

Drop

D.

Delete

E.

Discover

You can analyze data on Cascade Pilot received from live interfaces iF. (Select 2)

A.

Cascade Pilot is started with administrator privileges.

B.

Cascade Shark is configured to show capture ports.

C.

You apply a View to the interface and create a Watch on Web traffic.

D.

You have privileges to do so in your user profile.

Cascade Profiler Dashboard can be configured to show: (Select 3)

A.

The top applications for the previous week.

B.

Only the IPs that a user is authorized to see.

C.

Bandwidth for a host group over the previous day.

D.

Bandwidth for interfaces from devices NOT sending flow data.

E.

Connections for interfaces from devices sending flow data.

How many Cascade Notification Policy Levels are there?

A.

1

B.

2

C.

3

D.

4

E.

5

How many signatures can a Layer-7 Fingerprint have?

A.

1

B.

2

C.

5

D.

8

E.

10

The Cascade Shark de-duplication mode should be used:

A.

To de-duplicate duplicate flows sent to the Cascade Profiler appliance caused by the way different Cascade Shark ports may see the same UDP/TCP sessions.

B.

To de-duplicate duplicate flows sent to the Cascade Profiler appliance caused by use of the Aggregating Port seeing the same UDP/TCP sessions.

C.

To de-duplicate duplicate packets that may be collected by the Cascade Shark caused by the way Port Mirroring is configured on a switch.

D.

To de-duplicate duplicate packets that may be collected by the Cascade Shark caused by the way filtering is used on a capture job.

E.

All of the above

Cascade accepts lease data from DHCP servers in order to: (Select 2)

A.

obtain MAC addresses.

B.

improve accuracy of the security baseline.

C.

force lease extensions longer to make tracking unique PCs easier.

D.

obtain an IP for itself.

Which of the following are true about Trend/Index data on a Cascade Shark appliancE. (Select 3)

A.

Allows Cascade Pilot to load views that take advantage of the Index more quickly.

B.

Includes the number of bytes and packets for each conversation seen by the Cascade Shark appliance.

C.

It is configured on a per-port basis.

D.

It is configured using the sa-wizard as part of the initial configuration.

E.

It is enabled by default per capture job.

On Cascade Profiler, Active Directory user names and login information are obtained via the Active Directory Connector from:

A.

On demand queries to the AD server(s)

B.

A10 networks ID Series appliance

C.

Active Directory audit logs

D.

RADIUS