Question 101
            
                    
                    
When VPNs are grouped to create destination zone, how many zones can a VPN be part of?
                        
                        
                        
                            
                                A. two 
                            
                            
                        
                        
                        
                            
                                B. four 
                            
                            
                        
                        
                        
                            
                                C. one 
                            
                            
                        
                        
                        
                            
                                D. three 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 102
            
                    
                    
Which scheduling method is configured by default for the eight queues in the cloud vEdge router?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. weighted round robin 
                            
                            
                        
                        
                        
                            
                                B. priority queue 
                            
                            
                        
                        
                        
                            
                                C. low latency queue 
                            
                            
                        
                        
                        
                            
                                D. weighted random early detection 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 103
            
                    
                    
At which layer does the application-aware firewall block applications on a WAN Edge?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. 3 
                            
                            
                        
                        
                        
                            
                                B. 5 
                            
                            
                        
                        
                        
                            
                                C. 2 
                            
                            
                        
                        
                        
                            
                                D. 7 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 104
            
                    
                    
What is a benefit of the application-aware firewall?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. It blocks traffic by MTU of the packet 
                            
                            
                        
                        
                        
                            
                                B. It blocks encrypted traffic 
                            
                            
                        
                        
                        
                            
                                C. It blocks traffic by application 
                            
                            
                        
                        
                        
                            
                                D. It blocks traffic by MAC address 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 105
            
                    
                    Refer to the exhibit. Which QoS treatment results from this configuration after the access list acl-guest is applied inbound on the vpn1 interface?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. A TCP packet sourcing from 172.16.10.1 and destined to 172.16.20.1 is dropped 
                            
                            
                        
                        
                        
                            
                                B. A UDP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted 
                            
                            
                        
                        
                        
                            
                                C. A UDP packet sourcing from 172.16.10.1 and destined to 172.16.20.1 is dropped 
                            
                            
                        
                        
                        
                            
                                D. A TCP packet sourcing from 172.16.20.1 and destined to 172.16.10.1 is accepted 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                 
             
     
     
     
     
	
     
     
            
            Question 106
            
                    
                    Which configuration changes the packet loss priority from low to high?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. 
                            
                            
                                
                            
                            
                        
                        
                        
                            
                                B. 
                            
                            
                                
                            
                            
                        
                        
                        
                            
                                C. 
                            
                            
                                
                            
                            
                        
                        
                        
                            
                                D. 
                            
                            
                                
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                 
             
     
     
     
     
     
            
            Question 107
            
                    
                    
Which software security feature is supported by the Cisco ISR 4451 router?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. IPsec/GRE cloud proxy 
                            
                            
                        
                        
                        
                            
                                B. reverse proxy 
                            
                            
                        
                        
                        
                            
                                C. Enterprise Firewall with Application Awareness 
                            
                            
                        
                        
                        
                            
                                D. Cloud Express service 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 108
            
                    
                    
Which two mechanisms are used to guarantee the integrity of data packets in the Cisco SD-WAN architecture data plane? (Choose two.)
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. certificates 
                            
                            
                        
                        
                        
                            
                                B. transport locations 
                            
                            
                        
                        
                        
                            
                                C. authentication headers 
                            
                            
                        
                        
                        
                            
                                D. encapsulation security payload 
                            
                            
                        
                        
                        
                            
                                E. TPM chip 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 109
            
                    
                    
Which value is verified in the certificates to confirm the identity of the device?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Serial Number 
                            
                            
                        
                        
                        
                            
                                B. OTP 
                            
                            
                        
                        
                        
                            
                                C. System-IP 
                            
                            
                        
                        
                        
                            
                                D. Chassis-ID 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 110
            
                    
                    
Which hardware component is involved in the Cisco SD-WAN authentication process for ISR platforms?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. ZTP 
                            
                            
                        
                        
                        
                            
                                B. OTPC 
                            
                            
                        
                        
                        
                            
                                C. SUDI 
                            
                            
                        
                        
                        
                            
                                D. TPMD