Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Riverbed 201-01 - Riverbed Certified Solutions Associate - Network Performance Management

Page: 2 / 8
Total 245 questions

What statements are true regarding Cascade Sensors? (Select 3)

A.

use mirror ports or passive taps to collect data from a network segment.

B.

can forward packets to other network management systems.

C.

provide deep packet inspection to identify the application being accessed by a host.

D.

can decrypt secure protocols.

E.

communicate with Profiler appliance using compressed and encrypted data.

To change the page refresh rate for the Cascade Profiler UI from one minute to ten minutes for a specific user which page would you navigate to?

A.

Configuration

B.

Setup Page

C.

UI Preference

D.

Personal Dashboard

E.

Configuration/General Settings

A NetFlow type that the Cascade system can process include:

A.

NetFlow v5

B.

CascadeFlow

C.

IPFix

D.

cflowd

E.

NetFlow v9

F.

All of the above

In the Cascade Profiler GUI, what are the different ways an “Application” is defined? (Select 2)

A.

Using a Layer4 Mapping (combination of IP Address and TCP/UDP Port)

B.

Using a Layer7 Deep Packet Inspection

C.

Using a Host Group

D.

Using Switch Port Discovery

E.

Using Firewall Policy Import

Which mode should be enabled to monitor traffic in high-throughput environments such as server farms or data centers?

A.

Database Performance mode

B.

Application Stream Analysis boost mode

C.

Server Boost mode

D.

Web Transaction Analysis mode

Authentication mechanisms supported by the Cascade Profiler arE. (Select 2)

A.

Local user accounts

B.

Active Directory

C.

TACACS+

D.

RADIUS

E.

LDAP

When you create a trace clip with Packet Analyzer, the packets are selected from the Job Trace and copied to a new repository in the remote probe.

A.

TRUE

B.

FALSE

When Cascade Pilot is connected to Cascade Shark:

A.

Cascade Shark interfaces and captures job traces appear under the devices tab within the sources panel.

B.

Cascade Shark interfaces appear under the devices tab of the sources panel AND Cascade Shark capture job traces appear under the files tab of the sources panel.

C.

Cascade Shark interfaces and captures job traces appear in the views panel.

D.

Cascade Shark interfaces must be selected from the home menu to begin a capture.

Which of the following are valid data sources for Flow Gateway? (Choose four.)

A.

sFlow

B.

Netflow (v5 and v9)

C.

IPFIX

D.

SteelFlow-Net sources

E.

Syslog

What is a benefit of Cascade’s Deep-Packet Inspection? (Select 4)

A.

Cascade can determine every URL that a client goes to out on the internet.

B.

Cascade can identify applications at Layer7 which will aid in determining business versus non-business use-age of resources.

C.

Cascade can identify applications that use multiple common ports based upon Layer7 to more readily track application dependencies.

D.

Cascade can be configured with URLs, match those URL’s to application names and, in order to understand which applications are utilized on web servers that host multiple web applications over the same TCP port.

E.

Cascade can identify unencrypted applications such as FTP and TELNET regardless of port number, and other applications (such as Peer to Peer) that may violate a company’s security policies.