Which two statements regarding Cisco SD-WAN vEdge routers can mitigate DoS attacks against the infrastructure? (Choose two.)
A. Open Certificate Authority and automated enrollment feature.
B. By default, all incoming traffic is denied at the transport (WAN) side interfaces.
C. Only authorized controllers are allowed to communicate back to the vEdge router after the vEdge router establishes connections with the controllers.
D. In case of direct Internet access, the only traffic allowed back is the traffic matching the state table entries on the vEdge router.
E. The vEdge routers run on hardened Linux operating systems.
What are the three foundational elements required for the new operational paradigm? (Choose three.)
A. centralization
B. assurance
C. application QoS
D. multiple technologies at multiple OSI layers
E. policy-based automated provisioning of network
F. fabric
Which two Cisco ISE use cases typically involve the highest level of implementation complexity? (Choose two.)
A. Guest and wireless access
B. Software-defined access
C. Device management
D. Asset visibility
E. Software-defined segmentation
Which three ways are SD-Access and ACI Fabric similar? (Choose three.)
A. use of overlays
B. use of Virtual Network IDs
C. focus on user endpoints
D. use of group policy
E. use of Endpoint Groups
F. use of Scalable Group Tags
Which is a benefit of a cloud-based SD-WAN deployment?
A. might be required for compliance with industry standards
B. controller availability never an issue
C. security never an issue
D. agility of change dependent only on your own internal IT processes
E. instant scale
Which are two Cisco recommendations that demonstrates SDA? (Choose two.)
A. Use the CLI to perform as much of the configuration as possible.
B. Show the customer how to integrate ISE into DNA Center at the end of the demo.
C. Focus on business benefits.
D. Keep the demo at a high level.
E. Be sure you explain the major technologies such as VXLAN and LISP in depth.
Which two statements are true regarding Cisco ISE? (Choose two.)
A. The major business outcomes of ISE are enhanced user experience and secure VLAN segmentation.
B. ISE plays a critical role in SD-Access.
C. Without integration with any other product, ISE can track the actual physical location of a wireless endpoint as it moves.
D. ISE can provide data about when a specific device connected to the network.
E. An ISE deployment requires only a Cisco ISE network access control appliance.
What are three ways in which Cisco ISE learns information about devices? (Choose three.)
A. user authentication to the ISE
B. SMTP agents
C. RPC mechanism via HTTPS
D. traffic generated by the device
E. network servers the device has accessed
F. RADIUS attributes
Which two statements are true regarding SD-WAN demonstrations? (Choose two.)
A. As a Cisco SD-WAN SE, you should spend your time learning about the technology rather than contributing to demo innovation.
B. Use demonstrations primarily for large opportunities and competitive situations.
C. During a demo, you should demonstrate and discuss what the team considers important details.
D. There is a big difference between demos that use a top down approach and demos that use a bottom up approach.
E. During a demo, you should consider the target audience and the desired outcome.
Which three key differentiators that DNA Assurance provides that our competitors are unable match? (Choose three.)
A. Support for Overlay Virtual Transport
B. On-premise and cloud-base analytics
C. Apple Insights
D. VXLAN support
E. Proactive approach to guided remediation
F. Network time travel