Pass the Riverbed RCSA 201-01 Questions and answers with CertsForce

Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions
Questions # 1:

One of the theories behind NetProfiler Services is:

Options:

A.

Many organizations do not know all the aspects of a given application or service they provide, which makes it difficult to fully map that service and monitor it from end to end. NetProfiler has visibility into many different areas and can often see connections used by different parts of a service that may be unknown to different administrators. This visibility allows NetProfiler to identify all the different components of a service and prov


B.

When monitoring an application, it is often necessary to think of that application as a service instead of an application. By utilizing NetProfiler Services, you are able to take your application and easily convert it to a service. This conversion allows you to treat the application differently so it can be more effectively monitored.


C.

Applications are large and complex and often traverse different groups within a single organization. Without the concept of a service in NetProfiler, it would not be possible to monitor the traffic from a single application since each group would have no purchase their own NetProfiler to monitor their individual aspect of the application.


D.

None of the above.


Expert Solution
Questions # 2:

Which of the following remote user authentications and authorizations are supported by NetProfiler? (Choose two.)

Options:

A.

Kerberos


B.

RADIUS


C.

Diameter


D.

TACACS+


E.

802.1x


Expert Solution
Questions # 3:

From the perspective of reporting from the Cascade Profiler, what are the differences between flow reported by a Cascade Sensor (minimum version 9.0) and a Cascade Shark (minimum version 3)?

Options:

A.

Flows reported by Cascade Shark will not include an application tag triggered by matching known signatures within the first 1000 bytes of the flow.


B.

The Cascade Shark can forward flow to only one destination Cascade Profiler.


C.

The communication between the Cascade Shark and Cascade Profiler is NOT encrypted as it is with Cascade Sensor and Cascade Profiler communication.


D.

All of the Above.


Expert Solution
Questions # 4:

Which Cascade product runs under Riverbed Service Platform (RSP)?

Options:

A.

Sensor-VE


B.

Gateway-VE


C.

Express RSP


D.

Pilot


Expert Solution
Questions # 5:

Flow-based data can be exported from NetShark using which of the following protocols? (Choose two.)

Options:

A.

sFlow


B.

NetFlow v5


C.

IPFIX


D.

NetFlow v9


E.

NetProfiler Flow (MNMP)


Expert Solution
Questions # 6:

Network Round-Trip-Time is measured by Cascade sensors as:

Options:

A.

Time from 1st ACK to 1st DATA.


B.

Time from (SYNACK to 1st DATA) – client delay.


C.

Time from SYN to 1st DATA.


D.

Time from SYN to 1st ACK.


Expert Solution
Questions # 7:

In the Database Performance Module, the Response Time (First Response) (sec) metric refers to:

Options:

A.

The cold cache response time, when the information is first requested from the database.


B.

The response time from the warm cache, known as the First Response table.


C.

The response time measured from the start of the database query to the receipt of the first response packet.


D.

The response time measured from the start of the database query to the receipt of the final response packet.


E.

The response time for stored procedure queries into the database.


Expert Solution
Questions # 8:

Which of the following are valid data sources for Flow Gateway? (Choose four.)

Options:

A.

sFlow


B.

Netflow (v5 and v9)


C.

IPFIX


D.

SteelFlow-Net sources


E.

Syslog


Expert Solution
Questions # 9:

Which mode should be enabled to monitor traffic in high-throughput environments such as server farms or data centers?

Options:

A.

Database Performance mode


B.

Application Stream Analysis boost mode


C.

Server Boost mode


D.

Web Transaction Analysis mode


Expert Solution
Questions # 10:

Host Name Resolution can be modified in Configuration/UI Preferences. What are the three choices that you can select for resolution? (Select 3)

Options:

A.

Resolve host names using DNS


B.

Resolve host names using /etc/hosts


C.

Resolve host names for hosts managed by DHCP


D.

Suppress DHCP/DNS search domains (ce.lab.nbttech.com,nbttech.com) from resolved hosts


Expert Solution
Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions