Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which is a true statement regarding choosing between a 2U and a 3U Cascade Shark base appliancE. (Select 2)

A.

You must consider how many capture cards are required.

B.

You must consider how much disk space is required.

C.

You must consider the write-to-disk speed required.

D.

You must consider how many Cascade Pilot consoles will be connecting.

E.

You must consider how many Cascade Profilers the appliance will export to.

Full Access
Question # 5

Which of the following is information that Netflow v5 provides to the Cascade solution? (Select 2)

A.

End time of Flow

B.

Source MAC address

C.

Layer 4 Protocol Type

D.

TCP Checksum Validation Result

Full Access
Question # 6

Can the same IP Address exist in Multiple Host Groups on Cascade Profiler?

A.

No, you cannot do this.

B.

Yes, either within the same Group Type, or across Group Types.

C.

Yes, but only if the Host Groups are in different Group Types.

D.

Yes, but only in the ByFunction Group Type.

E.

Yes, but only in the ByLocation Group Type.

Full Access
Question # 7

Which version of SNMP is supported for Switch Port Discovery on Cascade Profiler?

A.

SNMPv1 Only

B.

SNMPv2 Only

C.

SNMPv1 and SNMPv2

D.

SNMPv1 and SNMPv3

Full Access
Question # 8

Which of the following data is required for Cascade Profiler to correctly calculate Round-Trip-Time (RTT) between a branch and the datacenter for Steelhead optimized traffic? (Select 2)

A.

NetFlow from router on WAN side of branch Steelhead

B.

NetFlow from router on LAN side of branch Steelhead

C.

CascadeFlow from branch Steelhead

D.

CascadeFlow from Data center Steelhead

E.

Sensor at Data center

F.

Sensor-VE sending Cascade flow data

Full Access
Question # 9

The Cascade Profiler and Express define a service as all servers, clients, applications and ports involved in the end-to-end delivery of a network service. A service is composed of one or more _______________ that can be monitored, reported and alerted on individually.

A.

Data Component

B.

Segments

C.

Report Criteria

D.

Router

E.

User(s)

Full Access
Question # 10

In the Cascade Profiler Dashboard GUI, which formats are available for Top "item" content blocks? (Select 3)

A.

Line Graphs

B.

Stacked Area Graphs

C.

Pie Charts

D.

Bar Charts

E.

Tables

F.

Connection Graphs

Full Access
Question # 11

In the Cascade Profiler GUI, what are two default dashboards that are automatically created for each user account? (Select 2)

A.

WAN Dashboard

B.

Application Dashboard

C.

Devices/Interfaces View

D.

Network Operations Dashboard

E.

Network Security Dashboard

Full Access
Question # 12

What are possible explanations for no Server Delay measurement being reported for a particular flow? (Select 4)

A.

The flow includes the UDP protocol.

B.

The traffic was not reported by a Cascade Sensor or Cascade Shark appliance.

C.

The traffic was not reported by a Steelhead appliance's CascadeFlow

D.

The start time for the connection was prior to the timeframe selected for the traffic query.

E.

The packets involved in the initial setup of the TCP connection were not seen by a Cascade Sensor or Cascade Shark appliance.

Full Access
Question # 13

Which DHCP Server Product(s) are supported with the Cascade DHCP integration?

A.

QIP

B.

ISC

C.

Infoblox

D.

Windows DHCP

E.

All of the above

F.

None of the above

Full Access
Question # 14

On Cascade Profiler, Active Directory user names and login information are obtained via the Active Directory Connector from:

A.

On demand queries to the AD server(s)

B.

A10 networks ID Series appliance

C.

Active Directory audit logs

D.

RADIUS

Full Access
Question # 15

What CIDR block would you use to define a group on Cascade Profiler that will include all hosts ending in .1 in the 10/8 subnet?

A.

10.0.0.0/255.255.255.255

B.

0.0.0.1/255.0.0.0

C.

10.0.0.1/255.255.0.255

D.

10.0.0.0/255.0.255.0

E.

10.0.0.1/255.0.0.255

Full Access
Question # 16

Cascade accepts lease data from DHCP servers in order to: (Select 2)

A.

obtain MAC addresses.

B.

improve accuracy of the security baseline.

C.

force lease extensions longer to make tracking unique PCs easier.

D.

obtain an IP for itself.

Full Access
Question # 17

In order for the Cascade solution to track an application based on its fingerprint, data can be used from which devices? (Select 3)

A.

Packeteer Device

B.

Cascade Gateway

C.

Cascade Sensor

D.

Cisco NBAR device

Full Access
Question # 18

Which of the following is valid syntax for defining host groups? (Select 3)

A.

192.168.0.100/255.255.0.255 Philadelphia

B.

192/8 Baltimore

C.

172.168.1.1 Phoenix

D.

10/16 Chicago

Full Access
Question # 19

What best describes the Rebalance and Reallocate buttons on the Configuration/Flow Log page of the Cascade Profiler? (Select 2)

A.

Rebalance moves flows among analysers in a Cascade Enterprise Profiler.

B.

Reallocate varies the storage space dedicated for templates and saved reports.

C.

Rebalance optimizes the use of the allocated space that allows you to get a longer retention time out of the same amount of disk space.

D.

Reallocate allows the users to decide the percent of total disk storage capacity that is allocated to the various flow logs.

E.

Rebalancing and Reallocating must be done simultaneously.

Full Access
Question # 20

When changing the priority for a Layer 4 mapping on Cascade Profiler best practices indicate that Application Mappings should be given higher priorities based on:

A.

Longest Match

B.

Shortest Match

C.

IP & Port

D.

IP

Full Access
Question # 21

When saving a new application performance analytic on Cascade Profiler, which of the following is true?

A.

You must have at least three days of history of 15 minute rollups before saving the analytic.

B.

You must have at least three days of history of 15 minute rollups before the analytic initializes.

C.

If you include all possible metrics, but there is no possibility of measuring response time due to lack of Sensor coverage, the analytic will fail to initialize.

D.

The analytic will not alert for a minimum of 1 week during baseline collection.

E.

Both B and C.

Full Access
Question # 22

On an Enterprise Profiler, which Cascade software module usually runs on hardware with another software module, but can be placed on its own hardware to support extremely large clusters?

A.

Event Manager

B.

Dispatcher

C.

User Interface

D.

Database

Full Access
Question # 23

Trace clips that no longer have data because their packet data and trend data is no longer available in the parent capture job trace:

A.

Appear with a red lightning bolt icon within Cascade Pilot.

B.

Appear with a lock icon within Cascade Pilot.

C.

Appear with a grey lightning bolt icon within Cascade Pilot.

D.

Appear with a yellow lightning bolt icon within Cascade Pilot.

E.

Appear with the trace clip name in red text within Cascade Pilot.

Full Access
Question # 24

On the Cascade Shark appliance, packet de-duplication should be enabled when:

A.

Capturing packets from a SPAN-Port/Port-Mirror whose configuration may generate duplicate packets

B.

Capturing packets from an aggregating TAP

C.

Removing duplicate flows across multiple interfaces

D.

Capturing packets from a 10GB link

Full Access
Question # 25

In the Cascade Profiler GUI, what is a Port Group?

A.

A combination of IP Address and Port Number

B.

One or more protocol/port combinations mapped to a name

C.

Names mapped to IP subnets

D.

Layer-2 switch ports grouped into a logical name

E.

NetFlow interfaces grouped into a logical name

Full Access
Question # 26

On Cascade Profiler, Which of the following account role permissions is not unique to administrator accounts?

A.

Creating or modifying custom host groups.

B.

Grant other users the ability to run user reports.

C.

Set or modify passwords for other users.

D.

View the audit trail page.

E.

Specify mitigation actions.

Full Access
Question # 27

Which of the following types of hosts are included in Cascade grouping on Cascade Profiler?

A.

Internal hosts only

B.

External hosts only

C.

All hosts

D.

Internal and External hosts only

E.

Specified internal hosts plus the non-routable subnets

Full Access
Question # 28

Which content block can be used to compare traffic between two time periods on the Cascade Profiler Dashboard?

A.

Watched list as a bar chart

B.

Watched list as a stacked area chart

C.

Watched list as a line graph

D.

Watched list as a pie chart

E.

Top list as a bar chart

Full Access
Question # 29

Cascade Profiler provides identity information collected from Active Directory 2008 by installing and correctly configuring the 'Cascade Connector' agent software on:

A.

Every DNS server in the AD environment

B.

Any server in the MS domain

C.

Every client desktop in the AD environment

D.

Every NTP server in the MS domain

E.

The Microsoft Event Collector component in the AD environment

Full Access
Question # 30

In order to analyze data captured by a Cascade Shark appliancE. (Select 3)

A.

You can connect directly to the Cascade Shark with Cascade Pilot to begin analysis.

B.

You can connect directly to the Cascade Shark with Cascade Gateway to begin analysis.

C.

You can start analysis on the Cascade Profiler based upon flow data that has been sent from Cascade Shark to Cascade Profiler.

D.

You can export data from a capture job directly to a packet capture (pcap) file and open in any tool that accepts pcap format.

E.

You can start by loading views of the data from the Cascade Shark Appliance Web GUI before export to Wireshark.

Full Access
Question # 31

When editing a previously configured service policy, what options become available if you click the 'show advanced settings' checkbox? (Select 3)

A.

Allows enabling/disabling the detection of dips in the metric.

B.

Allows tuning of the tolerance range of the metric.

C.

Allows setting of a noise floor for the metric.

D.

Allows adjusting the notifications for the metric.

E.

Allows enabling/disabling the detection of spikes in the metric.

Full Access
Question # 32

What do you need to configure on the Profiler to detect utilization for an interface?

A.

You have to manually configure the interface speeds on the Devices/Interfaces page.

B.

You have to configure SNMP access to the reporting devices on the Devices/Interfaces page.

C.

One of either A or B above.

D.

None of the above; Cascade will figure this out automatically.

Full Access
Question # 33

Trace clips in Cascade Pilot allow you to:

A.

Save a time window to a trace file for post-capture analysis.

B.

Save a time window and apply Views to analyze a portion of a Capture Job.

C.

Analyze an indexed capture job with Views that support indexing.

D.

Clip a trace file to your desktop.

Full Access
Question # 34

What report on Cascade Profiler would be used to show both sides of a conversation and the ports they communicated on?

A.

Peers

B.

Peers and Ports

C.

Host Pairs

D.

Ports

E.

Host Pairs and Ports

Full Access
Question # 35

How do all the Cascade components stay time synchronized?

A.

They all point to the same NTP server.

B.

The Profiler, ideally, points to an NTP server (although it can use local time as well), the Gateway and Sensor get their time information from the Profiler which acts as their NTP Server.

C.

For security reasons, all components use local time. The same time should be set on each component.

D.

They all synchronize their time via timestamps in Netflow sources.

Full Access
Question # 36

On the Cascade Profiler, which of the following is not a Scanner Choice under Vulnerability Scan Setup? (Select 2)

A.

Nessus

B.

Rapid7

C.

Qualys

D.

Retina

E.

nCircle

F.

MBSA

Full Access