Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Riverbed RCSP-NPM 299-01 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 299-01 Premium Access

View all detail and faqs for the 299-01 exam


490 Students Passed

97% Average Score

90% Same Questions
Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions
Questions # 1:

What data do I need from netflow sources for the Cascade Profiler report-by "network segments" to work correctly?

Options:

A.

Netflow V5 or V9 with TTL export configured.

B.

NetflowV9 with TTL export configured.

C.

Any version of Netflow since they all export in/out interface information.

D.

UDP port.

Questions # 2:

What is the maximum number of Cascade Profilers that can be configured in the Cascade Shark appliance as receivers of flows?

Options:

A.

1

B.

2

C.

3

D.

4

E.

Unlimited

Questions # 3:

In order for the Cascade solution to track an application based on its fingerprint, data can be used from which devices? (Select 3)

Options:

A.

Packeteer Device

B.

Cascade Gateway

C.

Cascade Sensor

D.

Cisco NBAR device

Questions # 4:

What can be configured on the Cascade Profiler to detect utilization for an interface? (Select 2)

Options:

A.

Manually configure the interface speeds on the Devices/Interfaces page.

B.

Configure and enable SNMP access to the reporting devices on the Devices/Interfaces page.

C.

Enable NBAR on the routers.

D.

Check the "Interface Utilization" box under the Devices/Interfaces page for each router and/or Steelhead desired.

E.

Configure the appropriate Device Interface Analytic.

Questions # 5:

How does Cascade Profiler track Resets?

Options:

A.

TCP Resets are tracked via reading the TCP header on the Sensor.

B.

TCP Resets are tracked by collecting the flag via NetFlow.

C.

Both A and B.

D.

Cascade does not track Resets.

Questions # 6:

When designing a Cascade deployment which of the following is important to consider about sizing?

Options:

A.

Cascade is sized based upon the number of sources that will be sending NetFlow to a Gateway, and the number of Gateway's sending data to a Profiler. Each Gateway is sized to handle a certain number of sources, and each Profiler a certain number of Sensors and Gateways.

B.

Cascade is sized by the packet volume across the environment. Each Sensor and Gateway component can handle a certain packet rate.

C.

The primary measures are flow-rate and topology. Flow-rate drives the size of the solution; topology can determine the placement of Sensors. As a secondary sizing method we can use host count and rule-of-thumb host/flows ratio to estimate the flow-rate.

D.

Cascade is sized purely based upon the number of Servers being monitored in the environment.

Questions # 7:

What is the chart granularity possible through the Cascade Pilot UI? (Select 2)

Options:

A.

1 second on a local System, 10 milliseconds on Cascade Sharks.

B.

1 millisecond for any View.

C.

1 millisecond for specific Views.

D.

Generally minimum 1 second, maximum 1 day.

Questions # 8:

Within Cascade Pilot, reports can be createD. (select 3)

Options:

A.

From views in the main workspace in PDF, Word, HTML and other formats.

B.

From events that have occurred, also referred to as watches.

C.

With customized information such as company logo and client name.

D.

Including notes that are entered in Chart notes.

E.

Including status of all remote devices (Cascade Shark appliances).

Questions # 9:

Cascade Profiler is able to report traffic using two different approaches (centricities). Two approaches can result in different results when using the same report criteria due to the way data is aggregated and counted. What are these two approaches? (Select 2)

Options:

A.

Interface centric

B.

Application centric

C.

Host centric

D.

Port centric

E.

The Cascade Profiler does not have two approaches

Questions # 10:

Cascade security baselines model all host-to-host interactions. A host is identified by:

Options:

A.

AD user name if available, falling back to MAC address if available, falling back to IP address.

B.

MAC address if available, falling back to IP address if available, falling back to AD user name.

C.

AD user name if available, falling back to IP address.

D.

MAC address if available, falling back to IP address.

Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.