Which option does FlexVPN leverage?
A. IKEv1
B. IKEv2
C. IKEv3
D. IKEv1 and IKEv2
Which two characteristics comprise a hybrid WAN design? (Choose two.)
A. L2TP VPN
B. premium transport (MPLS)
C. dial-up modem
D. best-effort transport (Internet)
E. static routing protocol
What is NBAR2, which is a component of Cisco AVC?
A. a classification engine that recognizes and classifies a variety of application protocols
B. a mechanism for WFQ
C. another name for Cisco IOS Flexible NetFlow
D. a mechanism for balancing traffic flow over multiple links
Why has visibility into network applications become a problem for IT?
A. IT has no tools that can look inside an Ethernet packet.
B. New protocols are being used.
C. HTTP has become the primary transport protocol for most applications.
D. Visibility into applications is not an issue.
Which type of Cisco Prime dashboard provides a broad overview of the health of the network and sites?
A. Network Interface
B. Application View
C. Service Health
D. Router Detail
In which way does Cisco PfRv2 active monitoring work to ensure link quality?
A. by generating synthetic data of each application type and monitoring for any link issues
B. by generating generic synthetic data and monitoring for any link issues
C. by listening to all traffic on the link for any issues
D. by listening to application-specific traffic on the link and monitoring for any link issues
Why are application acceleration and bandwidth re-education key functions in the Cisco IWAN design?
A. to sell more Cisco WAAS appliances
B. to provide a higher level of application performance for mission-critical applications
C. to enable independence of the transport overlay
D. to ensure that voice calls are of the highest quality
Cisco WAAS Central Manager can provide application information even without the use of which option?
A. data
B. agents
C. feeds
D. connectors
What optimizes application traffic flow on the WAN side of the network?
A. Akamai
B. Cisco AppNAV
C. Cisco WAAS for IWAN
D. Cisco Unified Border Element
On what is the Cisco security approach based?
A. attack lifecycle
B. first-hop security
C. the inability of cyber criminals to exploit zero-day vulnerabilities
D. deployment of traditional security architecture that eliminates cyber threats within a campus or branch