Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A VACL is sometimes used in which way for network performance monitoring:

A.

It is used to export NetFlow for intra-VLAN traffic.

B.

It is used to capture packets when no SPAN ports are available on the switch

C.

It is used to collect SNMP statistics from VLAN traffic

D.

It is used to configure SPANs remotely using network management tools

E.

It is used to allow SNMP write Access to a switch or router

Cascade is being used to detect application traffic using both Layer 7 fingerprinting technology and Layer 4 mappings. Which statement below best characterizes the priority of traffic being tagged?

A.

Layer 7 fingerprint matches always take priority over Layer 4 matches.

B.

Layer 4 mappings with a higher priority number take precedence over Layer 4 mappings with a lower priority number.

C.

Layer 4 mappings always take priority over Layer 7 fingerprint matches when the override is set to Unknown/Unclassified.

D.

Layer 4 mappings with a lower priority number take precedence over Layer 4 mappings with a higher priority number when the override is set to Always.

E.

C & D.

F.

A, B & C.

Within Cascade Profiler, what can be done to prevent a data resolution from being available for selection on the Report Criteria section of traffic reports?

A.

Set the disk space for that data resolution to 0 in Configuration > Flow Log.

B.

Set the disk space for that data resolution to -1 in Configuration > Flow Log.

C.

Set the disk space for that data resolution to -1 in Configuration > General Settings.

D.

Set the disk space for that data resolution to 0 in Configuration > General Settings.

Which of the following is valid syntax for defining host groups? (Select 3)

A.

192.168.0.100/255.255.0.255 Philadelphia

B.

192/8 Baltimore

C.

172.168.1.1 Phoenix

D.

10/16 Chicago

What protocol/port does the Gateway use to collect NetFlow?

A.

UDP, TCP, or SCTP on any defined port

B.

UDP only for any port or ports as defined by the operator

C.

UDP only for a single port as defined by the operator

D.

UDP and TCP for any port as defined by the operator

E.

UDP/2055

In order for the Cascade solution to track an application based on its fingerprint, data can be used from which devices? (Select 3)

A.

Packeteer Device

B.

Cascade Gateway

C.

Cascade Sensor

D.

Cisco NBAR device

Cascade provides a means for contacting other network devices for additional information about a host or user of interest. Right-clicking a host name, IP address, MAC address or port number and choosing _________________ from the shortcut menu sends a query to the other network device.

A.

View Packets

B.

Error Report

C.

Restart Service

D.

View Switch Port

E.

External Link

Cascade Profiler is able to report traffic using two different approaches (centricities). Two approaches can result in different results when using the same report criteria due to the way data is aggregated and counted. What are these two approaches? (Select 2)

A.

Interface centric

B.

Application centric

C.

Host centric

D.

Port centric

E.

The Cascade Profiler does not have two approaches

Within Cascade Profiler the Event Policy categories for which you can receive alerts includE. (Select 4)

A.

Performance and Availability

B.

TCP Health

C.

VoIP

D.

Security

E.

Health

F.

User-defined Policy

What can be configured on the Cascade Profiler to detect utilization for an interface? (Select 2)

A.

Manually configure the interface speeds on the Devices/Interfaces page.

B.

Configure and enable SNMP access to the reporting devices on the Devices/Interfaces page.

C.

Enable NBAR on the routers.

D.

Check the "Interface Utilization" box under the Devices/Interfaces page for each router and/or Steelhead desired.

E.

Configure the appropriate Device Interface Analytic.