Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 8
Total 73 questions
Exam Code: 299-01                Update: Jul 14, 2025
Exam Name: Riverbed Certified Solutions Professional - Network Performance Management

Riverbed Riverbed Certified Solutions Professional - Network Performance Management 299-01 Exam Dumps: Updated Questions & Answers (July 2025)

Question # 1

If there is a Layer 7 fingerprint and a Layer 4 mapping for a particular application, which of the following is truE. (Select 5)

A.

If the Layer 4 mapping override policy is not "Unknown/Unclassified", the Layer 4 mapping applies to flows not passing a Sensor or other application fingerprinting device as well as to flows not matching any defined Layer 7 fingerprint

B.

If the Layer 4 mapping override policy is "Always", then the Layer 7 fingerprint will never be used for flows matching both criteria

C.

If the Layer 4 mapping override policy is "Unclassified", the Layer 4 mapping only applies to flows not passing a Sensor or other application fingerprinting device

D.

If the Layer 4 mapping override policy is "Unknown/Unclassified", the Layer 4 mapping applies to flows not passing a Sensor or other application fingerprinting device as well as to flows not matching any defined Layer 7 fingerprint

E.

Care must be taken when defining reports and policies to reflect overlapping definitions and the Layer 4 override policy

F.

The traffic Expression "app L7_fingerprint or app L4_mapping" will catch all traffic flows for the application data in a report

Question # 2

What is the relationship between a Host Group and a Host Group Type in Cascade Profiler?

A.

A Host Group Type is a container that may contain multiple Host Groups.

B.

A Host Group Type defines the name of the Host Group.

C.

They are the same thing.

D.

Each Host Group must be defined by the Type of application it serves; this is the Host Group Type.

Question # 3

The "Policies Usage" that is reported under System – Information pertains to which of the following:

A.

All Service-based application performance policies

B.

All Service-based policies plus all Performance and Availability analytic policies

C.

All Service-based policies plus all Performance and Availability analytic policies plus all User-Defined Policies

D.

All Service-based policies plus all Performance and Availability analytic policies plus all User-Defined Policies plus all Security policies

E.

None of the above

Question # 4

Is there a way to look at who owns the Domain for an external IP Address shown in the Cascade Profiler GUI?

A.

No.

B.

Yes, you can do this with the "ARIN" lookup in "external links". The customer can also add additional external links if they have other sites they use to look up IP Addresses.

C.

This is available as a column in any report that displays the IP Address.

D.

This is available under IP Host Group Type.

Question # 5

When creating an analytic service, the discovery process requires a minimum of:

A.

At least three days of data available.

B.

At least three weeks of data available.

C.

The application specialist available.

D.

Some historical data and some starting point (a server, port, application).

E.

A customer network diagram available.

Question # 6

Dynamic Host Configuration Protocol can be used by Cascade Profiler to:

A.

Allow user defined policies the ability to dynamically re-configure host IP parameters when the host triggers an event.

B.

Obtain an IP address on the Management interface on initial power-up.

C.

Obtain an IP address on the Auxiliary interface on initial power-up.

D.

Obtain host MAC address.

E.

A, B, C.

Question # 7

What integrations are available when an enterprise already owns an SNMP monitoring technology (such as Solarwinds or HPOV)? (Select 2)

A.

Cascade Profiler can use switch port discovery to retrieve ARP and CAM tables directly from the NMS.

B.

Most NMS' can be configured to SNMP Poll Cascade Profiler to retrieve conversation information.

C.

Network API (from NMS via URL strings to get Cascade Reports)

D.

There are no integrations; NMS' are competitors to Cascade Profiler.

E.

External Links (from Cascade Profiler via URL strings to NMS)

Question # 8

How many Group Types Can you create on your Cascade Profiler?

A.

5

B.

20

C.

15

D.

10

E.

Unlimited

Question # 9

Cascade Shark can export flow data to a Cascade Profiler. When configuring Cascade Shark, flow export can be configured:

A.

Per each capture job

B.

Per each trace clip

C.

Per each capture port

D.

Per each capture board/aggregating port

E.

Per each Cascade Shark appliance

Question # 10

The Cascade Shark de-duplication mode should be used:

A.

To de-duplicate duplicate flows sent to the Cascade Profiler appliance caused by the way different Cascade Shark ports may see the same UDP/TCP sessions.

B.

To de-duplicate duplicate flows sent to the Cascade Profiler appliance caused by use of the Aggregating Port seeing the same UDP/TCP sessions.

C.

To de-duplicate duplicate packets that may be collected by the Cascade Shark caused by the way Port Mirroring is configured on a switch.

D.

To de-duplicate duplicate packets that may be collected by the Cascade Shark caused by the way filtering is used on a capture job.

E.

All of the above

Page: 1 / 8
Total 73 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Jul 2025