Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

299-01 Riverbed Certified Solutions Professional - Network Performance Management Questions and Answers

Questions 4

How many items can be displayed in a single watched list in a Profiler Dashboard Content Block?

Options:

A.

Unlimited

B.

Ten

C.

Four

D.

Twenty

Buy Now
Questions 5

Filtering in Cascade Pilot: (Select 2)

Options:

A.

Is either a BPF or Wireshark Display filter only.

B.

Can be created from a chart.

C.

Can be changed after applying a View.

D.

Is the equivalent of the Wireshark " display filter input " .

Buy Now
Questions 6

How do all the Cascade components stay time synchronized?

Options:

A.

They all point to the same NTP server.

B.

The Profiler, ideally, points to an NTP server (although it can use local time as well), the Gateway and Sensor get their time information from the Profiler which acts as their NTP Server.

C.

For security reasons, all components use local time. The same time should be set on each component.

D.

They all synchronize their time via timestamps in Netflow sources.

Buy Now
Questions 7

Which of the following capabilities are supported by the Cascade Sensor appliance but are not supported by the Cascade Sensor-VE RSP packagE. (Select 2)

Options:

A.

Network Round Trip measurement

B.

Packet logging

C.

Server Delay measurement

D.

Connection Throughput measurement

E.

Retransmission measurement

F.

L7 application fingerprint checking

Buy Now
Questions 8

A system administrator needs to update their Cascade Profiler host group settings to remove references to a decommissioned office on the 10.63.32.0/24 subnet.

299-01 Question 8

What is the best way to do this?

Options:

A.

echo " delete from hostinfo where ipaddr = ' 10.63.32.0/24 ' ; " | psql mazu postgres

B.

Edit the Definition and remove the entry for 10.63.32.0/24 Bracknell_UK

C.

echo " delete from hostinfo where group = ' Bracknell_UK; " | psql mazu postgres write_community_string

D.

Go to Host Groups and insert " #10.63.32.0/24 Bracknell_UK "

Buy Now
Questions 9

What integrations are available when an enterprise already owns an SNMP monitoring technology (such as Solarwinds or HPOV)? (Select 2)

Options:

A.

Cascade Profiler can use switch port discovery to retrieve ARP and CAM tables directly from the NMS.

B.

Most NMS ' can be configured to SNMP Poll Cascade Profiler to retrieve conversation information.

C.

Network API (from NMS via URL strings to get Cascade Reports)

D.

There are no integrations; NMS ' are competitors to Cascade Profiler.

E.

External Links (from Cascade Profiler via URL strings to NMS)

Buy Now
Questions 10

If a prospective customer has 2000 users what would be a reasonable estimated number of flows per minute used in sizing Profiler?

Options:

A.

2000

B.

4000

C.

20000

D.

40000

E.

200000

F.

400000

Buy Now
Questions 11

When defining a service which of the following are supported ways of aggregating the results? (Select 2)

Options:

A.

Client Ports

B.

Applications

C.

Ports

D.

Server

Buy Now
Questions 12

For DNS reverse lookup, Cascade Profiler caches as follows:

Options:

A.

Cache the most recent 500 IPs.

B.

Obey DNS TTLs.

C.

Cascade does not cache DNS responses.

D.

For 24 hours.

Buy Now
Questions 13

On Cascade Profiler, in terms of retention of completed reports and reporting sources (one minute flow and rollup files), which of the following is true? (Select 4)

Options:

A.

One minute flow records are deleted from the file system FIFO (oldest first) once the appliance has filled the space that is allocated.

B.

There is a fixed amount of space on the filesystem for completed reports.

C.

A report template can be marked " keep until I delete it " so that any reports that are scheduled with this template are not automatically deleted from the filesystem.

D.

When the flows or rollup records have been deleted from the filesystem, any saved report that was generated from those flow sources is no longer available.

E.

Users have the ability to allocate additional space to the 1 min flow logs in order to increase retention. This is done at the expense of other rollup resolutions.

Buy Now
Questions 14

When changing the priority for a Layer 4 mapping on Cascade Profiler best practices indicate that Application Mappings should be given higher priorities based on:

Options:

A.

Longest Match

B.

Shortest Match

C.

IP & Port

D.

IP

Buy Now
Questions 15

What are the two (at a minimum) devices you need to configure in Cascade Profiler for Switch Port Discovery integration to work for a portion of the network?

Options:

A.

At least one NetFlow sources (router, switch, or steelhead).

B.

At least one lookup router and at least one access tier switch.

C.

A Vulnerability Scanner and a Netflow source (router, switch, or steelhead).

D.

A Vulnerability Scanner and an External Link.

Buy Now
Questions 16

In this scenario, you have created a host group called My_Computers on Cascade Profiler. In that group you have included the subnet 192.168.1.0/25.

You have 10 devices in that group 192.168.1.1-10. The rest of the addresses are unused. While running reports on this segment of the network you notice that when a report is run using the entire subnet you see traffic destined for 192.168.1.120. When you run the same report specifying the host group the traffic does not appear. Why is this happening?

Options:

A.

192.168.1.120 is not in the 192.168.1.0/25 subnet

B.

192.168.1.120 has been input as a trusted host in a security policy

C.

Traffic to 192.168.1.120 was not picked up by a Sensor

D.

Traffic to 192.168.1.120 was not picked up by a Gateway

E.

192.168.1.120 never sent any traffic

Buy Now
Questions 17

In order to create an interactive view on Cascade Pilot:

Options:

A.

Select two views from the views panel using control-click then right click on one and select " Create Interactive View " from the drop-down menu.

B.

After a Drill-Down from one view to another, right click on the Drill-Down view in the sources panel and select " Create Interactive View " from the drop-down menu.

C.

Select any item (such as a host IP Address, Port or Protocol name) in the main workspace and right click on the item, then select " Create Interactive View " from the drop-down menu.

D.

Select any view in the views panel, right-click it and select " Create Interactive View " from the drop-down menu.

E.

Open the filters panel, apply an existing or new filter to the view then select " save as interactive view " from the home menu.

Buy Now
Questions 18

What is the maximum number of Cascade Profilers that can be configured in the Cascade Shark appliance as receivers of flows?

Options:

A.

1

B.

2

C.

3

D.

4

E.

Unlimited

Buy Now
Questions 19

In the Cascade Profiler Dashboard GUI, which formats are available for Watched item content blocks? (Select 5)

Options:

A.

Line Graphs

B.

Stacked Area Graphs

C.

Pie Charts

D.

Bar charts

E.

Connection Graphs

F.

Tables

Buy Now
Questions 20

What do you need to configure on the Profiler to detect utilization for an interface?

Options:

A.

You have to manually configure the interface speeds on the Devices/Interfaces page.

B.

You have to configure SNMP access to the reporting devices on the Devices/Interfaces page.

C.

One of either A or B above.

D.

None of the above; Cascade will figure this out automatically.

Buy Now
Questions 21

In order to analyze data captured by a Cascade Shark appliancE. (Select 3)

Options:

A.

You can connect directly to the Cascade Shark with Cascade Pilot to begin analysis.

B.

You can connect directly to the Cascade Shark with Cascade Gateway to begin analysis.

C.

You can start analysis on the Cascade Profiler based upon flow data that has been sent from Cascade Shark to Cascade Profiler.

D.

You can export data from a capture job directly to a packet capture (pcap) file and open in any tool that accepts pcap format.

E.

You can start by loading views of the data from the Cascade Shark Appliance Web GUI before export to Wireshark.

Buy Now
Questions 22

The Discovery Wizard has been used to map a complex application to be monitored by Cascade ' s service monitoring for a company with 25 remote locations and one data center, each defined as a group within the group type used. There are two front-end segments to signify incoming end user connections, and 15 back-end connections among all of the servers. The only metric/policy activated for each segment is the ' Response Time ' metric. How many policies on the Cascade Profiler will this service consume?

Options:

A.

40

B.

65

C.

17

D.

55

E.

425

Buy Now
Questions 23

Which of the following is information that Netflow v5 provides to the Cascade solution? (Select 2)

Options:

A.

End time of Flow

B.

Source MAC address

C.

Layer 4 Protocol Type

D.

TCP Checksum Validation Result

Buy Now
Questions 24

Which of the following does the Cascade Sensor device provide that the Cascade Sensor-VE does not? (Select 2)

Options:

A.

Layer-7 Application Fingerprinting

B.

Connection Duration Statistics

C.

Riverbed RiOS Integration

D.

Rotating Packet Log

Buy Now
Questions 25

Technologies used for switching traffic between Virtual Machines under ESXi include:

Options:

A.

Traffic between Virtual machines is not switched; it is routed by the standard vRouter included with ESXi

B.

A standard or distributed vSwitch which comes with ESXi must be used, there is not 3rd party software available

C.

A 3rd party virtual switch is required such as the CISCO Nexus 1000v as no standard vSwitch exists with ESXi

D.

The included standard vSwitch of the CISCO Nexus 7000

E.

The included standard vSwitch or the CISCO Nexus 1000v

Buy Now
Questions 26

What defines a " Recipient " for Cascade Profiler Notifications?

Options:

A.

An Email Address only

B.

An SNMP receiver only

C.

An SNMP receiver only tied to a set of Host Groups

D.

An Email Address and/or one or two SNMP receivers optionally tied to a set of Host Groups

E.

An Email Address and/or one or two SNMP receivers optionally tied to a set of User Accounts

F.

A User Account

Buy Now
Questions 27

Refer to the exhibit.

299-01 Question 27

Traffic that is not analyzed by a Cascade Sensor such as Unclassified, under Override Policy, applies to which of the following conditions:

Options:

A.

Unconditionally overwrite any existing layer 7 application mapping.

B.

Apply to flows that are either Unclassified, or did not match any known layer 7 signatures

C.

Apply only to flows that are not seen by a Cascade Sensor or other layer 7 signature-based device.

D.

None of the above.

Buy Now
Questions 28

When saving a new application performance analytic on Cascade Profiler, which of the following is true?

Options:

A.

You must have at least three days of history of 15 minute rollups before saving the analytic.

B.

You must have at least three days of history of 15 minute rollups before the analytic initializes.

C.

If you include all possible metrics, but there is no possibility of measuring response time due to lack of Sensor coverage, the analytic will fail to initialize.

D.

The analytic will not alert for a minimum of 1 week during baseline collection.

E.

Both B and C.

Buy Now
Questions 29

If there is a Layer 7 fingerprint and a Layer 4 mapping for a particular application, which of the following is truE. (Select 5)

Options:

A.

If the Layer 4 mapping override policy is not " Unknown/Unclassified " , the Layer 4 mapping applies to flows not passing a Sensor or other application fingerprinting device as well as to flows not matching any defined Layer 7 fingerprint

B.

If the Layer 4 mapping override policy is " Always " , then the Layer 7 fingerprint will never be used for flows matching both criteria

C.

If the Layer 4 mapping override policy is " Unclassified " , the Layer 4 mapping only applies to flows not passing a Sensor or other application fingerprinting device

D.

If the Layer 4 mapping override policy is " Unknown/Unclassified " , the Layer 4 mapping applies to flows not passing a Sensor or other application fingerprinting device as well as to flows not matching any defined Layer 7 fingerprint

E.

Care must be taken when defining reports and policies to reflect overlapping definitions and the Layer 4 override policy

F.

The traffic Expression " app L7_fingerprint or app L4_mapping " will catch all traffic flows for the application data in a report

Buy Now
Questions 30

Which of the following metrics are monitored in an Application Performance Policy? (Select 4)

Options:

A.

Increase in Server Delay

B.

Decrease in Average Connection Application-level Throughput

C.

Increases in the number of TCP retransmissions

D.

Decreases in the number of new connections to the application servers

E.

Increase in the number of Active Connections

Buy Now
Questions 31

How does Cascade Profiler obtain switch port discovery and population information?

Options:

A.

Switch Port Discovery Protocol (SPDP)

B.

Merging of CAM + ARP tables, both gathered via SNMP

C.

Merging of IF and ARP tables, both gathered via SNMP

D.

Merging of IF and CAM tables, both gathered via SNMP

Buy Now
Questions 32

What is the minimum number of physical appliances required when building Cascade solution that will collect and process 3.6 million unique (de-duplicated) flows/minute from NetFlow sources?

Options:

A.

11 for the Cascade Profiler, 3 Cascade Gateways

B.

10 for the Cascade Profiler, 3 Cascade Gateways

C.

11 for the Cascade Profiler, 5 Cascade Gateways

D.

10 for the Cascade Profiler, 5 Cascade Gateways

E.

12 for the Cascade Profiler, 4 Cascade Gateways

Buy Now
Questions 33

What is the relationship between a Host Group and a Host Group Type in Cascade Profiler?

Options:

A.

A Host Group Type is a container that may contain multiple Host Groups.

B.

A Host Group Type defines the name of the Host Group.

C.

They are the same thing.

D.

Each Host Group must be defined by the Type of application it serves; this is the Host Group Type.

Buy Now
Questions 34

On Cascade Profiler, what does " tunneled " indicate when used as a keyword for an Application?

Options:

A.

When the traffic flow matches more than one Application signature. This indicates that the one Application may have been tunneled over the other.

B.

When an Application runs over a non-standard port (such as TELNET traffic on Port 80).

C.

When a " port definition " is non-standard (e.g. when you change tcp/80 ' s definition from http to telnet).

D.

When a Layer-4 Application Mapping is defined.

Buy Now
Questions 35

In Cascade Profiler, what is the minimum amount of historical flow data required for an Application Performance analytic to initialize?

Options:

A.

Three weeks

B.

Three days

C.

One day

D.

Configurable from one minute to three weeks

Buy Now
Questions 36

The " Policies Usage " that is reported under System – Information pertains to which of the following:

Options:

A.

All Service-based application performance policies

B.

All Service-based policies plus all Performance and Availability analytic policies

C.

All Service-based policies plus all Performance and Availability analytic policies plus all User-Defined Policies

D.

All Service-based policies plus all Performance and Availability analytic policies plus all User-Defined Policies plus all Security policies

E.

None of the above

Buy Now
Questions 37

Within Cascade Pilot, Sequence Diagrams represent TCP Errors in which of the following ways: (Select 2)

Options:

A.

By listing lost packets in the expert window

B.

By using dotted-dashed lines for out-of-sequence segments

C.

By placing error names on the messages within the diagram

D.

By color-coding the messages on the diagram

E.

By using a thicker line for messages that include errors

Buy Now
Questions 38

A router that has been recently configured to send NetFlow to a Cascade Gateway has yet to appear in the Devices/Interfaces page on the Cascade Profiler. What are the most likely thing to check?

Options:

A.

Traffic is being sent across the router ' s interfaces configured for flow export.

B.

There are no firewalls blocking communication between router and Cascade Gateway.

C.

There are no firewalls blocking communication between Cascade Gateway and Cascade Profiler.

D.

The port being used for export on the router matches that which has been configured on the Cascade Gateway.

E.

All of the above.

Buy Now
Questions 39

On Cascade Profiler, what is the purpose of a Service Segment when creating a new service?

Options:

A.

A service segment is the update time period when devices send Netflow to Cascade Gateways.

B.

A service segment is defined by its components and the applications and/or ports in use between them.

C.

A service segment is defined as the front-end tier that directly services end users with an application.

D.

A service segment is the update time period when Cascade Sensors send MNMP Flow to Cascade Profilers.

Buy Now
Questions 40

On an Enterprise Profiler, which Cascade software module usually runs on hardware with another software module, but can be placed on its own hardware to support extremely large clusters?

Options:

A.

Event Manager

B.

Dispatcher

C.

User Interface

D.

Database

Buy Now
Questions 41

Which of the following is false in regards to Cascade Profiler reporting and alerting? (Select 2)

Options:

A.

Any dependency (connection graph) can be exported to SVG (Visio) format.

B.

Reports are real time and can not be scheduled.

C.

Reports can be sent via PDF, HTML, CSV, or DOC format.

D.

Events can be sent via email or SNMP v1 or v3 traps.

E.

Events can be sent to both an email list AND SNMP target.

Buy Now
Questions 42

Cascade accepts lease data from DHCP servers in order to: (Select 2)

Options:

A.

obtain MAC addresses.

B.

improve accuracy of the security baseline.

C.

force lease extensions longer to make tracking unique PCs easier.

D.

obtain an IP for itself.

Buy Now
Questions 43

Which Cascade device actually polls for the SNMP information in the switch port Discovery process?

Options:

A.

Application Sensor

B.

Gateway

C.

Profiler

D.

All of the above

E.

None of the above

Buy Now
Questions 44

What is one way Cascade obtains information about retransmissions in the network?

Options:

A.

It obtains L2 retransmissions from switches and routers via SNMP.

B.

It obtains TCP retransmissions by tracking TCP sessions via the Cascade Sensor.

C.

Cascade does not track retransmissions.

D.

Cascade obtains retransmissions from NetFlow and/or sFlow marked with the TCP push flag.

Buy Now
Questions 45

When drilling down from a Cascade Profiler traffic report to analyze the underlying packets in Cascade Pilot, which of the following is NOT required?

Options:

A.

The flows that are being viewed in Cascade Profiler must be reported by a Shark appliance.

B.

The user ' s workstation requires a licensed copy of Cascade Pilot.

C.

The user ' s workstation requires access to the Cascade Shark appliance on the appropriate TCP Port.

D.

If there are multiple capture jobs configured on the Cascade Shark appliance, the user must select which one to apply the trace clip against.

E.

All of the above.

Buy Now
Questions 46

A user wants to use the link congestion analytic policy on Cascade Profiler to monitor five key WAN links for an increase in traffic outside of the expected traffic that includes TCP/80, TCP/443, TCP25, and UDP/53. Can the link congestion policy be used for this scenario?

Options:

A.

No, because a link analytic can monitor only a single interface.

B.

Yes, one can define separate link congestion analytic policies for each WAN interface.

C.

No, because one can only define specific ports to include on a link congestion policy.

D.

Yes, because one can define a port group that includes every UDP and TCP port except for those that include the expected traffic, and that port group can be used for the link congestion analytic policy.

E.

No, and both A and C include valid reasons.

Buy Now
Questions 47

Which of the following are TRUE concerning packet capture jobs on the Cascade Shark appliancE. (Select 4)

Options:

A.

Packets can be captured from multiple capture ports on one Cascade Shark appliance.

B.

The maximum length the packet data can be specified.

C.

Packets can be filtered on host IP addresses.

D.

SSL traffic can be decoded if the appropriate certificate are loaded in the Cascade Shark appliance.

E.

The maximum storage bandwidth for the job can be specified in bits/sec.

F.

Multiple packet capture jobs can run concurrently.

Buy Now
Questions 48

When using Network Performance Monitoring solutions the following statements are truE. (select 2)

Options:

A.

HTTP Object load times can be analyzed with full packet capture

B.

SSL Decryption can be used without any special key imports provided the start of the TCP conversation is captured

C.

Software Agents are required on Servers in order to measure the Network Round trip time of applications

D.

ICMP (ping echo/response) must be used in order to measure Network Round Trip time

E.

NetFlow records can be summarized to provide utilization on a router interface

Buy Now
Questions 49

Within Cascade Profiler, what can be done to prevent a data resolution from being available for selection on the Report Criteria section of traffic reports?

Options:

A.

Set the disk space for that data resolution to 0 in Configuration > Flow Log.

B.

Set the disk space for that data resolution to -1 in Configuration > Flow Log.

C.

Set the disk space for that data resolution to -1 in Configuration > General Settings.

D.

Set the disk space for that data resolution to 0 in Configuration > General Settings.

Buy Now
Questions 50

How are trace clips created in Cascade Pilot? (Select 2)

Options:

A.

Select a Capture Job, right-click, and select " Create Trace Clip " .

B.

Drag a bar from a Bar Chart to the Capture Job.

C.

Click the + button in the Capture Job item and select a time window.

D.

Select a time window and apply a Cascade Pilot filter.

Buy Now
Questions 51

In the Cascade Profiler GUI, what are two default dashboards that are automatically created for each user account? (Select 2)

Options:

A.

WAN Dashboard

B.

Application Dashboard

C.

Devices/Interfaces View

D.

Network Operations Dashboard

E.

Network Security Dashboard

Buy Now
Questions 52

For a worm security event to be triggered on Cascade Profiler, what event must have occurred first?

Options:

A.

Host Scan

B.

Port Scan

C.

Link Availability

D.

Suspicious Connection

E.

There is no event that triggers before a worm event.

Buy Now
Questions 53

How is the Cascade Pilot license activated?

Options:

A.

The license key is entered during installation. The license is activated either through an Internet connection or by phone.

B.

The license key is entered during installation. The license must be activated through an Internet connection.

C.

The license key is entered during installation. There is no activation but Cascade Pilot will detect if the license is already in use on the network.

D.

There is no license key activation. The software image is shipped with the license key installed.

Buy Now
Questions 54

What must happen prior to running WAN Optimization reports on Cascade Profiler?

Options:

A.

Host Groups must be configured.

B.

Cascade Profiler must be successfully polling Steelhead appliances via SNMP.

C.

The WAN-Steelhead interface group must be populated with WAN interfaces for all Steelhead appliances.

D.

The Profiler baseline collection must be complete.

E.

A WAN Optimization reporting template must be configured.

Buy Now
Questions 55

Which configuration option is it highly recommended that every Cascade Profiler Deployment implement?

Options:

A.

Host Baseline Profiles

B.

Custom Port Definitions

C.

Host Groupings

D.

Mitigation Configuration

E.

Firewall Configuration

Buy Now
Questions 56

A capture job definition on Cascade Shark may includE. (select 3)

Options:

A.

A BPF packet filter

B.

A disk space allocation

C.

Time-based display resolution

D.

Trend/Indexing parameters

E.

Access credential information

Buy Now
Questions 57

What CIDR block would you use to define a group on Cascade Profiler that will include all hosts ending in .1 in the 10/8 subnet?

Options:

A.

10.0.0.0/255.255.255.255

B.

0.0.0.1/255.0.0.0

C.

10.0.0.1/255.255.0.255

D.

10.0.0.0/255.0.255.0

E.

10.0.0.1/255.0.0.255

Buy Now
Questions 58

How is QoS data obtained in a Cascade Profiler? (Select 2)

Options:

A.

From packets via the Cascade Sensor or Shark

B.

From NetFlow and other standard flow protocols

C.

From IP SLAs on any network-attached device

D.

From CDP

E.

From NBAR

Buy Now
Questions 59

WAN optimization reports on Cascade Profiler require that the WAN interfaces for all Steelheads performing optimization are included in a WAN Interface group and are marked as Steelhead interfaces. Which of the following is true?

Options:

A.

If the Steelhead is running a RioS version older than 5.5.3, the Steelhead WAN interfaces need to be manually added, and marked as Steelhead interfaces.

B.

If the Steelhead is running a RioS version 5.5.3 or higher, the Steelhead WAN interfaces are automatically added to the WAN page, but the user must manually mark them as Steelhead interfaces.

C.

If the Steelhead is running a RioS version 6.0.1 or higher, the Steelhead WAN interfaces are automatically added to the WAN page and are also be marked as a Steelhead interface.

D.

All of the above are true.

E.

A and C only are true.

Buy Now
Questions 60

In Cascade, how are custom Layer 7 applications configured?

Options:

A.

On the Sensor, you must define either a hex string, text string, or URL.

B.

On the Profiler, you must define either a hex string, text string, or URL.

C.

On the Gateway, you must define either a hex string, text string, or URL.

D.

You have to first enable security analytics on the Profiler, then you define either a string or URL on either the Profiler or the Sensor.

E.

Custom applications cannot be defined, but the Sensor can identify most off-the-shelf programs.

Buy Now
Questions 61

Refer to the exhibit.

299-01 Question 61

What is the meaning of the configuration option shown?

Options:

A.

Determines the lowest value that can be used to create a service mapping for one application segment.

B.

Specifies the minimum real value (fixed threshold) that will trigger an alert.

C.

Sets the highest value that can be used to create a service mapping for one application segment.

D.

Specifies the minimum amount of change that the policy can treat as a deviation from normal behavior when creating an Analytic.

Buy Now
Questions 62

Which of the following is valid syntax for defining host groups? (Select 3)

Options:

A.

192.168.0.100/255.255.0.255 Philadelphia

B.

192/8 Baltimore

C.

172.168.1.1 Phoenix

D.

10/16 Chicago

Buy Now
Questions 63

What is the purpose of the snmp-server ifindex-persist command in regards to Riverbed Steelhead appliances and Cascade Profiler? (Select 2)

Options:

A.

Guarantees that the ifIndex values for various interfaces remain stable across Steelhead appliance reboots and reconfiguration.

B.

Guarantees that the ifIndex values for various interfaces remain stable across network disruptions preventing re-polling

C.

Guarantees that the ifdescription values for various interfaces remain correctly mapped across Steelhead appliance reboots and reconfiguration.

D.

Guarantees that the ifdescription values for various interfaces are remapped across Steelhead appliance service shutdowns.

Buy Now
Questions 64

On a newly created capture job on Cascade Shark appliance, by default, trending/indexing arE. (Select 2)

Options:

A.

Enabled

B.

Disabled

C.

Set to retain up to 1 week or 10GB of indexing/trending data

D.

Set to retain up to 1 week or 10GB of packets

E.

Set to keep the indexing/trending data indefinitely

Buy Now
Questions 65

Cascade Pilot supports the following filter languages: (Select 4)

Options:

A.

Perl Regex

B.

Cascade Pilot Filter

C.

Wireshark Capture Filter (BPF)

D.

Wireshark Display Filter

E.

Time Interval

F.

Visual Basic

Buy Now
Questions 66

Which is a true statement regarding choosing between a 2U and a 3U Cascade Shark base appliancE. (Select 2)

Options:

A.

You must consider how many capture cards are required.

B.

You must consider how much disk space is required.

C.

You must consider the write-to-disk speed required.

D.

You must consider how many Cascade Pilot consoles will be connecting.

E.

You must consider how many Cascade Profilers the appliance will export to.

Buy Now
Questions 67

One advantage of using a trace clip for analysis within Cascade Pilot instead of its parent capture job trace is:

Options:

A.

The trace clip is likely smaller in size, so views load faster.

B.

The trace clip is moved to the local system, so views load faster.

C.

The trace clip has a base set of views pre-applied, so analysis is faster.

D.

The trace clip is guaranteed to have trend/index data, so views load faster.

Buy Now
Questions 68

Which parameters can be used to set up an Application Performance analytic on Cascade Profiler?

Options:

A.

Applications, Ports/Protocols, QOS, Servers, Clients

B.

Ports/Protocols, QOS, Servers, Clients

C.

Applications, Ports/Protocols,

D.

Applications, Ports/Protocols, QOS, Servers, Clients, Interfaces

Buy Now
Questions 69

Which of the following best describes any limits that are enforced on the number of service, performance and availability policies that are supported on any Cascade Profiler?

Options:

A.

Stratified policy limits ranging from 5000 for Cascade Profiler Express platforms to 10,000 for Cascade Enterprise Profiler platforms

B.

5,000 for all platforms

C.

15,000 for all platforms

D.

The Analytics license provides for an unlimited number of policies

E.

None of the above

Buy Now
Questions 70

When analyzing a large (100GB, for example) trace file within Cascade Pilot, you should:

Options:

A.

Copy the file onto a Cascade Shark to ensure better performance.

B.

Create an index so that processing of the View analytics will be faster.

C.

Apply a View with a specific filter.

D.

Use Wireshark tools to split the trace file in multiple and smaller trace files.

Buy Now
Questions 71

To better analyze live traffic on Cascade Shark from Cascade Pilot you should:

Options:

A.

Apply a View on the live interface and then start a Capture Job on the capture port to analyze traffic later.

B.

Start a Capture Job on the capture port with a BPF filter and apply a View on the live interface for the same capture job.

C.

Start a Capture Job on the capture port, apply a View on the live interface and create a trace clip for the time window of interest.

D.

Never create a Capture Job to prevent packet drops.

Buy Now
Questions 72

On Cascade Profiler, Which of the following account role permissions is not unique to administrator accounts?

Options:

A.

Creating or modifying custom host groups.

B.

Grant other users the ability to run user reports.

C.

Set or modify passwords for other users.

D.

View the audit trail page.

E.

Specify mitigation actions.

Buy Now
Questions 73

Which content block can be used to compare traffic between two time periods on the Cascade Profiler Dashboard?

Options:

A.

Watched list as a bar chart

B.

Watched list as a stacked area chart

C.

Watched list as a line graph

D.

Watched list as a pie chart

E.

Top list as a bar chart

Buy Now
Exam Code: 299-01
Exam Name: Riverbed Certified Solutions Professional - Network Performance Management
Last Update: Apr 30, 2026
Questions: 245

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now 299-01 testing engine

PDF (Q&A)

$43.57  $124.49
buy now 299-01 pdf