Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

299-01 Riverbed Certified Solutions Professional - Network Performance Management Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Riverbed 299-01 Riverbed Certified Solutions Professional - Network Performance Management certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 4
Total 245 questions

Which of the following configuration changes can be used to reduce the number of alerts generated overall for a Service?

A.

Edit each Service policy to increase the Tolerance slider for Low and High alerts.

B.

Edit each Service policy and set a noise floor to specify the minimum amount of change that the policy can treat as deviation from normal behavior.

C.

Edit the Service and select fewer metrics to monitor for each segment that comprises the Service.

D.

Modify the location host group type used for monitoring end user traffic to use fewer groups (for example, Region instead of Site).

E.

A, B, C, and D.

F.

A and B only.

On Cascade Profiler, in terms of retention of completed reports and reporting sources (one minute flow and rollup files), which of the following is true? (Select 4)

A.

One minute flow records are deleted from the file system FIFO (oldest first) once the appliance has filled the space that is allocated.

B.

There is a fixed amount of space on the filesystem for completed reports.

C.

A report template can be marked "keep until I delete it" so that any reports that are scheduled with this template are not automatically deleted from the filesystem.

D.

When the flows or rollup records have been deleted from the filesystem, any saved report that was generated from those flow sources is no longer available.

E.

Users have the ability to allocate additional space to the 1 min flow logs in order to increase retention. This is done at the expense of other rollup resolutions.

What do you need to configure on the Profiler to detect utilization for an interface?

A.

You have to manually configure the interface speeds on the Devices/Interfaces page.

B.

You have to configure SNMP access to the reporting devices on the Devices/Interfaces page.

C.

One of either A or B above.

D.

None of the above; Cascade will figure this out automatically.

A SPAN port or Port Mirror differs from RSPAN technology in which way:

A.

A SPAN port captures traffic locally, an RSPAN captures traffic remotely

B.

A SPAN port captures traffic consistently, an RSPAN captures traffic randomly

C.

A SPAN port captures multiple ports while an RSPAN is "relational" and captures multiple VLANs (Relational LANs)

D.

They are both the same with different terms being used by different vendors

E.

A SPAN port is used on a Switch while a RSPAN is used on a Router

Which of the following metrics can Cascade Profiler create dependency (Connection Graphs) for? (Select 3)

A.

Average drops

B.

Average retransmits

C.

Average response time

D.

Average utilization

E.

Total bandwidth bits

Cascade Profiler's Switch Integration feature uses SNMP and adds the capability for Cascade to report on which of the followinG. (Select 2)

A.

User name

B.

Host IP address

C.

Host MAC address

D.

The physical switch port a specific host is connected to

E.

Switch port traffic levels

F.

Switch port status

G.

SNMP traps from the switch

When working with capture job traces on a Cascade Shark appliance from Cascade Pilot:

A.

Views should always be applied directly to the job trace.

B.

Trace clips should first be created, and views applied to them.

C.

Packets should be exported from the capture job trace before beginning analysis.

D.

The capture job trace should first be indexed by right-clicking on it and selecting "Index".

If a VLAN SPAN (VLAN101) is configured and monitored by Cascade Shark, which of the following is true? (Select 2)

A.

Inter VLAN101 traffic will be monitored; Intra VLAN101 traffic will not.

B.

Intra VLAN101 traffic will be monitored; Inter VLAN101 traffic will not.

C.

Both inter and intra VLAN101 traffic will be monitored.

D.

It is a best practice to configure the Cascade Shark monitoring port (the SPAN destination) with 'deduplication' enabled.

E.

It is a best practice to configure the Cascade Shark monitoring port (the SPAN destination) without 'deduplication' enabled.

In this scenario, you have created a host group called My_Computers on Cascade Profiler. In that group you have included the subnet 192.168.1.0/25.

You have 10 devices in that group 192.168.1.1-10. The rest of the addresses are unused. While running reports on this segment of the network you notice that when a report is run using the entire subnet you see traffic destined for 192.168.1.120. When you run the same report specifying the host group the traffic does not appear. Why is this happening?

A.

192.168.1.120 is not in the 192.168.1.0/25 subnet

B.

192.168.1.120 has been input as a trusted host in a security policy

C.

Traffic to 192.168.1.120 was not picked up by a Sensor

D.

Traffic to 192.168.1.120 was not picked up by a Gateway

E.

192.168.1.120 never sent any traffic

How do Cascade Performance Analytics assist with Performance Monitoring?

A.

By setting intelligent static thresholds for Application metrics and Interface metrics, tolerance can be determined. Cascade will use these thresholds and tolerances to report on deviations indicative of performance problems.

B.

The Customer only needs to identify their critical hosts, interfaces and/or applications, and Cascade will automatically baseline their behavior and report on deviations indicative of performance problems.

C.

The Performance Analytics use knowledge of hosts, interfaces, and/or applications are able to detect security threats such as host scans and worms.

D.

After baselining is completed, Cascade can re-route congested traffic to avoid congested application delivery paths.

Within Cascade Pilot a Watch can: (Select 3)

A.

Send an email when the traffic reaches at least 1MB/sec.

B.

Notify all Cascade Pilot users connected to a specific Cascade Shark appliance when a specified traffic event occurs.

C.

Create a Web traffic report with a specific time window.

D.

Start a Capture Job each time the VoIP traffic goes below 2MB/sec.

Which version of SNMP traps can the Cascade Profiler and Cascade Express send?

A.

SNMPv1 Only

B.

SNMPv2 Only

C.

SNMPv1 and SNMPv2

D.

SNMPv1 and SNMPv3

Trace clips in Cascade Pilot allow you to:

A.

Save a time window to a trace file for post-capture analysis.

B.

Save a time window and apply Views to analyze a portion of a Capture Job.

C.

Analyze an indexed capture job with Views that support indexing.

D.

Clip a trace file to your desktop.

A system administrator needs to update their Cascade Profiler host group settings to remove references to a decommissioned office on the 10.63.32.0/24 subnet.

What is the best way to do this?

A.

echo "delete from hostinfo where ipaddr = '10.63.32.0/24';" | psql mazu postgres

B.

Edit the Definition and remove the entry for 10.63.32.0/24 Bracknell_UK

C.

echo "delete from hostinfo where group = 'Bracknell_UK;" | psql mazu postgres write_community_string

D.

Go to Host Groups and insert " #10.63.32.0/24 Bracknell_UK"

On the Cascade Shark appliance, packet de-duplication should be enabled when:

A.

Capturing packets from a SPAN-Port/Port-Mirror whose configuration may generate duplicate packets

B.

Capturing packets from an aggregating TAP

C.

Removing duplicate flows across multiple interfaces

D.

Capturing packets from a 10GB link

Which TCP port is used for Cascade Profiler web based management interfaces?

A.

80/tcp

B.

8080/tcp

C.

8090/tcp

D.

443/tcp

E.

22/tcp

What is a benefit that Cascade Profiler might provide to Security Operations? (Select 3)

A.

Ability to identify Scanners and Worm Propagations.

B.

Ability to provide information for a firewall rule when a user defined policy is violated.

C.

Ability to alert on security policy (e.g. an insecure policies, such as FTP, is in use).

D.

Ability to identify Worms by name.

Which parameters can be used to set up an Application Performance analytic on Cascade Profiler?

A.

Applications, Ports/Protocols, QOS, Servers, Clients

B.

Ports/Protocols, QOS, Servers, Clients

C.

Applications, Ports/Protocols,

D.

Applications, Ports/Protocols, QOS, Servers, Clients, Interfaces

Some common protocols which may be observed on a network with visibility tools are listed below. Match the protocol name with the most common port used.

1. HTTP a) TCP/25

2. HTTPS b) TCP/445

3. HTTPS through a proxy c) TCP/443

4. SMTP d) TCP/80

5. CIFS e) TCP/8080

A.

1-d; 2-b; 3-c; 4-a; 5-b

B.

1-e; 2-c; 3-d; 4-a; 5-b

C.

1-d; 2-c; 3-e; 4-b; 5-a

D.

1-d; 2-c; 3-e; 4-a; 5-b

E.

1-e; 2-d; 3-c ; 4-b; 5-a

In the Cascade Profiler GUI, where can you mark a TCP port as a Server Port?

A.

Definitions->Host Groups

B.

Definitions->Applications

C.

Definitions->Port Names

D.

Definitions->Port Groups

E.

Integration->Switch Port Discovery

Page: 3 / 4
Total 245 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved