Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

299-01 Exam Dumps - Riverbed RCSP-NPM Questions and Answers

Question # 24

What can be configured on the Cascade Profiler to detect utilization for an interface? (Select 2)

Options:

A.

Manually configure the interface speeds on the Devices/Interfaces page.

B.

Configure and enable SNMP access to the reporting devices on the Devices/Interfaces page.

C.

Enable NBAR on the routers.

D.

Check the "Interface Utilization" box under the Devices/Interfaces page for each router and/or Steelhead desired.

E.

Configure the appropriate Device Interface Analytic.

Buy Now
Question # 25

To assure the packet data in a trace clip is preserved from Cascade Pilot, you should:

Options:

A.

Lock the trace clip.

B.

Send the trace clip packets to file.

C.

Detach the trace clip from the capture job trace.

D.

A and B

E.

A, B, and C.

Buy Now
Question # 26

Which version of SNMP is supported for Switch Port Discovery on Cascade Profiler?

Options:

A.

SNMPv1 Only

B.

SNMPv2 Only

C.

SNMPv1 and SNMPv2

D.

SNMPv1 and SNMPv3

Buy Now
Question # 27

On Cascade Profiler, Active Directory user names and login information are obtained via the Active Directory Connector from:

Options:

A.

On demand queries to the AD server(s)

B.

A10 networks ID Series appliance

C.

Active Directory audit logs

D.

RADIUS

Buy Now
Question # 28

Cascade is being used to detect application traffic using both Layer 7 fingerprinting technology and Layer 4 mappings. Which statement below best characterizes the priority of traffic being tagged?

Options:

A.

Layer 7 fingerprint matches always take priority over Layer 4 matches.

B.

Layer 4 mappings with a higher priority number take precedence over Layer 4 mappings with a lower priority number.

C.

Layer 4 mappings always take priority over Layer 7 fingerprint matches when the override is set to Unknown/Unclassified.

D.

Layer 4 mappings with a lower priority number take precedence over Layer 4 mappings with a higher priority number when the override is set to Always.

E.

C & D.

F.

A, B & C.

Buy Now
Question # 29

In Cascade, how are custom Layer 7 applications configured?

Options:

A.

On the Sensor, you must define either a hex string, text string, or URL.

B.

On the Profiler, you must define either a hex string, text string, or URL.

C.

On the Gateway, you must define either a hex string, text string, or URL.

D.

You have to first enable security analytics on the Profiler, then you define either a string or URL on either the Profiler or the Sensor.

E.

Custom applications cannot be defined, but the Sensor can identify most off-the-shelf programs.

Buy Now
Question # 30

Once the Cascade Shark appliance has an initial configuration with an IP Address set to 10.1.1.1 you can connect to it from a web browser using the URL:

Options:

A.

http://10.1.1.1

B.

https://10.1.1.1

C.

https://10.1.1.1:443

D.

https://10.1.1.1:8080

E.

http://10.1.1.1:8080

Buy Now
Question # 31

If you use overlapping IP address ranges (for example 10.0.0.0/8, 10.1.2/16, and 10.2.3/24) in a host group definition on Cascade Profiler which of the following is true?:

Options:

A.

The Profiler assigns a host to all overlapping custom groups.

B.

The Profiler assigns a host to the custom group whose definitions has the shortest matching prefix.

C.

The Profiler assigns a host to the custom group whose definitions has the longest matching prefix.

D.

An error message is generated.

Buy Now
Question # 32

The "Policies Usage" that is reported under System – Information pertains to which of the following:

Options:

A.

All Service-based application performance policies

B.

All Service-based policies plus all Performance and Availability analytic policies

C.

All Service-based policies plus all Performance and Availability analytic policies plus all User-Defined Policies

D.

All Service-based policies plus all Performance and Availability analytic policies plus all User-Defined Policies plus all Security policies

E.

None of the above

Buy Now
Question # 33

The Cascade Profiler authenticates users before logging them in. What are the possible choices for authentication? (Select 3)

Options:

A.

Cascade Profiler local database

B.

User account specifies authentication by RADIUS

C.

TACACS

D.

RADIUS server to authenticate the user

Buy Now
Exam Code: 299-01
Exam Name: Riverbed Certified Solutions Professional - Network Performance Management
Last Update: Feb 22, 2025
Questions: 245
299-01 pdf

299-01 PDF

$25.5  $84.99
299-01 Engine

299-01 Testing Engine

$28.5  $94.99
299-01 PDF + Engine

299-01 PDF + Testing Engine

$40.5  $134.99