Search Header Logo

SDWAN - Attributes and Policy Criteria

Authored by Marjory Sy

Professional Development

Professional Development

SDWAN - Attributes and Policy Criteria
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A remote site needs a connection to send confidential company information to headquarters with a minimum data rate of 50 Mbps at all times. It should be limited to 200 Mbps at maximum.

 

Which policy is appropriate?

<polA [<ENCRYPTION, Required-Always>
 <INTERNET-BREAKOUT, Disabled>
 <PUBLIC-PRIVATE, Private-Only>
 <BILLING-METHOD, Flat-rate-Only>
 <BACKUP, Enabled> <BANDWIDTH, 50Mbps, none>]>

<polA [<ENCRYPTION, Required-Always>
 <INTERNET-BREAKOUT, Disabled>
 <PUBLIC-PRIVATE, Private-Only>
 <BILLING-METHOD, Flat-rate-Only>
 <BACKUP, Enabled> <BANDWIDTH, 50Mbps, 200Mbps>]>

<polA [<ENCRYPTION, Required-Always>
 <INTERNET-BREAKOUT, Disabled>
 <PUBLIC-PRIVATE, Private-Only>
 <BILLING-METHOD, Flat-rate-Only>
 <BACKUP, Enabled> <BANDWIDTH, 150Mbps, 50Mbps>]>

<polA [<ENCRYPTION, Required-Always >
 <INTERNET-BREAKOUT, Disabled>
 <PUBLIC-PRIVATE, Private-Only>
 <BILLING-METHOD, Flat-rate-Only>
 <BACKUP, Enabled> <BANDWIDTH, none, 50Mbps>]>

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An SD-WAN is deployed to a marketing firm to connect their four branches and its headquarters.  At the request of the firm, the Service Provider designed it to limit Internet traffic at each branch.  During the rollout, employees discover they are unable to access the Internet.  Investigating the issue, the Service Provider discovers:

  • Inter-branch communications works correctly.

  • The INTERNET-BREAKOUT Policy is set to Enabled

  • The local Internet UCS is working at each branch.

What should the Service Provider verify next?

ENCRYPTION Policy criteria

BANDWIDTH Policy criteria

PUBLIC-PRIVATE Policy criteria 

BACKUP Policy criteria 

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A legacy branch office is being integrated into an SD-WAN network.  The office currently has a primary and backup MPLS UCS via two ports on a single router.  The office needs Local Internet Breakout and site-to-site access.  What needs to be done to accomplish this?

Add a Private UCS. 

Set INTERNET-BREAKOUT to Enabled for all flows over the current UCS.

Add a second router. 

Add a Public UCS.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

A school district is connecting Student and Faculty traffic across an SD-WAN Service.
Each SWVC End Point explicitly maps policies to the Application Flow\Zone matchup as shown above.
Use the following Zones and Zone-wide policies below:

Zone Faculty

·      IP range = [172.16.0.0/12, 192.168.0.0/23]

·      Policies = [Web ¬  policy2, Voice ¬  policy3]

Zone Student

·      IP range = [10.2.0.0/16]

·      Policies = [Web ¬  policy3]

A packet arrives at UNI 3 with the following attributes:

·      Application Flow of Office-365

·      Source IP = 172.16.30.99

What is the result?

The Zone is Faculty and the policy applied is policy2.

The Zone is Student and the policy applied is policy2.

The Zone is Faculty and the policy applied is policy1.

The packet is discarded.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

A school district has a primary and backup set of data centers for three school locations;
all connected using an SD-WAN Service Provider Network as shown above.
Student traffic between schools needs to be allowed. However, Faculty data should only be shared with the primary/backup data center locations.

What is the correct virtual topology that should be deployed by the SD-WAN Service Provider for the school district?

  • (Student, multipoint-to-multipoint ([X,Y]))

  • (Faculty, Rooted-multipoint, ([A,B,C])

  • (Student, multipoint-to-multipoint ([A,B,C]))

  • (Faculty, Rooted-multipoint, ([A,B,C],[X,Y]))

  • (Student, multipoint-to-multipoint ([A,B,C]))

  • (Faculty, Rooted-multipoint, ([X,Y],[A,B,C])

  • (Student, multipoint-to-multipoint ([A,B,C]))

  • (Faculty, Rooted-multipoint, ([X,Y],[A,B,C],[ ])

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

After implementing SD-WAN services, the SD-WAN customer has a security audit performed. The results of the security audit indicate security vulnerabilities in all of the applications that require a secure connection.

BILLING-METHOD Policy 

OVERLAY Policy

ENCRYPTION Policy 

UNDERLAY Policy 

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An HTTP packet that originated at 10.1.1.2 is sent to a web server at destination 10.2.2.17.  Three Application Flows are defined as follows:

A  SDAV4 = 10.2.2.0/24,   DPORT= 80

B  SAV4 = 10.1.1.0/24,     SPORT = 80

C  DAV4 = 10.1.1.0/24,    SDPORT = 80

Which of the follow Application Flows will it be associated with?

Application Flow C 

None; the traffic is discarded.

Application Flow A 

Application Flow B 

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development