Riverbed Certified Solutions Professional Exam! Trivia Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rgeneson
R
Rgeneson
Community Contributor
Quizzes Created: 1 | Total Attempts: 331
| Attempts: 331 | Questions: 200
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1. What does the -v parameter mean in the tcpdump command?

Explanation

The -v parameter in the tcpdump command stands for "verbose". When used, it provides a slightly more detailed output, giving additional information about the captured packets. This can be useful for troubleshooting network issues or analyzing network traffic.

Submit
Please wait...
About This Quiz
Riverbed Certified Solutions Professional Exam! Trivia Quiz - Quiz

This is an Rcsp Trivia Quiz: Riverbed Certified Solutions Professional Exam! It is created for all the students who are preparing to tackle the exam this year, do you feel ready to tackle it? Why don’t you give it a shot and keep an eye out for more like it... see moreto perfect your skills? All the best! see less

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. What problem does overlapping open solve?

Explanation

Overlapping open solves the problem of potential resource conflicts when multiple processes or tasks need to access the same resource simultaneously. By allowing processes to overlap their open operations, it ensures that resources can be efficiently shared without causing delays or blocking other processes. This can improve overall system performance and increase resource utilization.

Submit
3. True or False:

In overlapping open, the server steelhead handles file-locking operations on behalf of the client.

Explanation

In overlapping open, the server steelhead handles file-locking operations on behalf of the client. This means that when a client requests to open a file, the server steelhead is responsible for managing any file-locking operations that need to be performed, such as preventing other clients from modifying the file at the same time. This allows for efficient and streamlined file access in a networked environment.

Submit
4. Is overlapping open enabled by default on the SH?

Explanation

Overlapping open is not enabled by default on the SH.

Submit
5. When should you use a straight-through cable when wiring a SH appliance?

Explanation

You should use a straight-through cable when wiring a SH (Switch-Hub) appliance when connecting it to a computer or any other network device. Straight-through cables are used to connect devices of different types, such as a switch and a computer, where one end of the cable uses the TIA/EIA-568-A standard and the other end uses the TIA/EIA-568-B standard. This allows for proper transmission of data signals between the devices.

Submit
6. What appliance port(s) are used in in-path deployments?

Explanation

The correct answer is "lanx_x and wanx_x". In in-path deployments, the appliance ports used are typically labeled as "lanx_x" and "wanx_x". These ports are specifically designed to handle the traffic coming from the LAN (Local Area Network) and WAN (Wide Area Network) respectively. The other options "LAN and WAN" and "Lan and Wan" are incorrect as they do not specify the specific port names used in in-path deployments.

Submit
7. What appliance port(s) are used in virtual or logical in-path deployments?

Explanation

The correct answer is the WAN port. In virtual or logical in-path deployments, the WAN port is used as the appliance port. This port is responsible for connecting the appliance to the wide area network (WAN) and allows the appliance to monitor and control the traffic flowing through it. The WAN port is crucial in these deployments as it enables the appliance to perform its intended functions effectively.

Submit
8. What appliance port(s) are used in server-side out-of-path deployments?

Explanation

The correct answer for this question is "The primary port, Primary, PRI". In server-side out-of-path deployments, the primary port is used for connecting the appliance to the network infrastructure. It is the main port that handles the communication between the server and the network. Additionally, "Primary" and "PRI" are alternative names or abbreviations for the primary port.

Submit
9. If you receive a bad RST error (a RST packet sent from the client to the C-SH) what type of asymmetry is indicated?

Explanation

If a bad RST error is received, it indicates complete asymmetry. This means that there is a significant difference or lack of symmetry between the client and the server in terms of their communication and network behavior. The bad RST error suggests that the client is sending a reset packet to the server, which could indicate a problem or inconsistency in the communication between the two.

Submit
10. If you receive a bad SYN/ACK error (a SYN/ACK packet not on port 7800 from the server to the C-SH) what type of asymmetry is indicated?

Explanation

If a bad SYN/ACK error is received, it indicates server-side asymmetry. This means that there is a mismatch or inconsistency in the way the server is handling the SYN/ACK packets. It could be caused by a misconfiguration or a problem with the server's network setup. This type of asymmetry suggests that the server is not properly responding to the SYN/ACK packets, which can lead to communication issues between the server and the C-SH.

Submit
11. If you receive a no SYN/ACK error (no SYN/ACK returned from the S-SH) what type of asymmetry is indicated?

Explanation

If you receive a no SYN/ACK error, it indicates client-side asymmetry. This means that the client is not receiving the SYN/ACK response from the server-side host (S-SH). Asymmetry in this context refers to a situation where there is a mismatch or inconsistency between the client and server in terms of their communication behavior. In this case, the client is unable to establish a successful connection with the server due to the absence of the SYN/ACK response.

Submit
12. If you receive a probe-filtered (not-AR) error (unable to send SYN+ packets to the S-SH) what type of asymmetry is indicated?

Explanation

If you receive a probe-filtered (not-AR) error, it indicates a Multi-SYN Retransmit asymmetry. This means that the SYN+ packets sent to the S-SH are being filtered or blocked, preventing the successful transmission. This type of asymmetry occurs when there is a discrepancy in the filtering or blocking of packets between the sender and receiver, resulting in the retransmission of SYN+ packets.

Submit
13. What is the Datastore Sync port?

Explanation

The Datastore Sync port is 7744.

Submit
14. What is the MAPI Exchange 2003 port?

Explanation

The MAPI Exchange 2003 port is 7830. This port is used for communication between Microsoft Exchange Server 2003 and Microsoft Outlook clients. It allows Outlook to connect to the Exchange server and access email, calendars, and other features. By using port 7830, Exchange Server and Outlook can establish a secure and reliable connection to ensure smooth communication and data synchronization.

Submit
15. What is the NAT port?

Explanation

not-available-via-ai

Submit
16. What is the NSPI port?

Explanation

not-available-via-ai

Submit
17. What is the in-path port?

Explanation

The in-path port refers to port number 7800.

Submit
18. What is the connection forwarding (neighbor) port?

Explanation

not-available-via-ai

Submit
19. What is the out-of-path port?

Explanation

not-available-via-ai

Submit
20. What is the failover port?

Explanation

not-available-via-ai

Submit
21. What is the CLI command to reset the SH's password to factory default?

Explanation

The CLI command "/sbin/resetpw.sh" is used to reset the password of the SH (system host) to its factory default. This command allows users to restore the password to the original default value, which can be useful in cases where the current password is forgotten or needs to be changed back to the default setting. By executing this command, the user can reset the SH's password and regain access to the system.

Submit
22. Which models have a 1U profile?

Explanation

The models that have a 1U profile are 510, 1010, and 2010/2510.

Submit
23. Which models have a 3U profile?

Explanation

The models that have a 3U profile are the 3010/3510 and the 5010.

Submit
24. Which models have a 200 GB raw disk capacity?

Explanation

The models 510 and 1010 have a 200 GB raw disk capacity.

Submit
25. What is the raw disk capacity of the 2010/2510 models?

Explanation

The raw disk capacity of the 2010/2510 models is 400 GB.

Submit
26. What is the raw disk capacity of the 3010/3510 models?

Explanation

The raw disk capacity of the 3010/3510 models is 1000 GB.

Submit
27. What is the raw disk capacity of the 5010 model?

Explanation

The raw disk capacity of the 5010 model is 1500 GB. This means that the model has a storage capacity of 1500 gigabytes, which refers to the total amount of space available on the hard disk drive without any formatting or partitioning.

Submit
28. Which models have a 80 GB data store capacity?

Explanation

The models 510 and 1010 have a data store capacity of 80 GB.

Submit
29. What is the data store capacity of the 2010/2510 models?

Explanation

The data store capacity of the 2010/2510 models is 150 GB.

Submit
30. What is the data store capacity of the 3010/3510 models?

Explanation

The data store capacity of the 3010/3510 models is 250 GB. This means that these models can store up to 250 gigabytes of data.

Submit
31. What is the data store capacity of the 5010 model?

Explanation

The data store capacity of the 5010 model is 512 GB. This means that the device can store up to 512 gigabytes of data, including files, documents, photos, videos, and other digital content. This capacity allows users to store a large amount of data on the device without the need for external storage solutions.

Submit
32. Can you use PFS on 510 model hardware?

Explanation

The answer is "No" because PFS (Parallel File System) requires high-performance hardware and a significant amount of resources to function properly. The 510 model hardware may not meet the necessary requirements for PFS, such as sufficient processing power, memory, and storage capacity. Therefore, it is not feasible to use PFS on this specific hardware model.

Submit
33. What is the PFS capacity of the 1010 model?

Explanation

The PFS capacity of the 1010 model is 100 GB.

Submit
34. What is the PFS capacity of the 2010/2510, 3010/3510 and 5010 models?

Explanation

The PFS capacity of the 2010/2510, 3010/3510, and 5010 models is 210 GB.

Submit
35. What is the WAN capacity of the 510 model?

Explanation

The WAN capacity of the 510 model is 512 kbps.

Submit
36. What is the WAN capacity of the 1010 model?

Explanation

The WAN capacity of the 1010 model is 2 Mbps. This means that the maximum amount of data that can be transmitted over the Wide Area Network (WAN) connection for this model is 2 Megabits per second. This information is important for users who need to know the speed and capacity of the WAN connection when using the 1010 model.

Submit
37. What is the WAN capacity of the 2010 model?

Explanation

The WAN capacity of the 2010 model is 4 Mbps.

Submit
38. What is the WAN capacity of the 2510 model?

Explanation

The WAN capacity of the 2510 model is 6 Mbps. This means that the model is capable of supporting a maximum bandwidth of 6 Mbps for wide area network (WAN) connections. This information is important for understanding the network capabilities and limitations of the 2510 model.

Submit
39. What is the WAN capacity of the 3010 model?

Explanation

The WAN capacity of the 3010 model is 10 Mbps. This means that the model is capable of handling a maximum bandwidth of 10 Mbps for wide area network (WAN) connections. This capacity determines the maximum speed at which data can be transmitted between the 3010 model and the WAN network, ensuring efficient and reliable communication between the device and the network.

Submit
40. What is the WAN capacity of the 3510 model?

Explanation

The WAN capacity of the 3510 model is 20 Mbps.

Submit
41. What is the WAN capacity of the 5010 model?

Explanation

The WAN capacity of the 5010 model is 45 Mbps. This means that the model is capable of handling a maximum bandwidth of 45 Mbps for wide area network (WAN) connections. This capacity determines the speed at which data can be transmitted and received over the WAN, allowing for efficient and reliable communication between different network locations.

Submit
42. How many optimized TCP connections does the 510 model support (PFS disabled / PFS enabled)?

Explanation

The 510 model supports 200 optimized TCP connections when PFS (Perfect Forward Secrecy) is disabled. However, when PFS is enabled, the model does not support any optimized TCP connections.

Submit
43. How many optimized TCP connections does the 1010 model support (PFS disabled / PFS enabled)?

Explanation

The 1010 model supports 625 optimized TCP connections when PFS is disabled. When PFS is enabled, it can support 200 optimized TCP connections.

Submit
44. How many optimized TCP connections does the 2010 model support (PFS disabled / PFS enabled)?

Explanation

The 2010 model supports 1300 optimized TCP connections when PFS (Perfect Forward Secrecy) is disabled, and 650 optimized TCP connections when PFS is enabled.

Submit
45. How many optimized TCP connections does the 2510 model support (PFS disabled / PFS enabled)?

Explanation

The 2510 model supports 1500 optimized TCP connections when PFS (Perfect Forward Secrecy) is disabled. When PFS is enabled, the model supports 750 optimized TCP connections.

Submit
46. How many optimized TCP connections does the 3010 model support (PFS disabled / PFS enabled)?

Explanation

The 3010 model supports 2400 optimized TCP connections when PFS (Perfect Forward Secrecy) is disabled and 1300 optimized TCP connections when PFS is enabled. This means that the device can handle a higher number of connections without PFS enabled compared to when it is enabled. PFS is a security feature that adds an extra layer of encryption to the TCP connections, but it also requires additional processing power, which limits the number of connections that can be supported.

Submit
47. How many optimized TCP connections does the 3510 model support (PFS disabled / PFS enabled)?

Explanation

The 3510 model supports 2400 optimized TCP connections when PFS (Perfect Forward Secrecy) is disabled, and 1500 optimized TCP connections when PFS is enabled. PFS is a security feature that ensures that even if the private key of the server is compromised, the past sessions' encryption keys will not be compromised. Therefore, enabling PFS reduces the number of supported optimized TCP connections.

Submit
48. How many optimized TCP connections does the 5010 model support (PFS disabled / PFS enabled)?

Explanation

The 5010 model supports 4500 optimized TCP connections when PFS (Perfect Forward Secrecy) is disabled, and 2200 optimized TCP connections when PFS is enabled.

Submit
49. When sizing out an SH opportunity how many connections per user should be assumed?

Explanation

When sizing out an SH opportunity, it is assumed that there should be 5 connections per user. This means that each user should have the capability to establish and maintain 5 connections simultaneously. This assumption is important for determining the capacity and resources needed to support the anticipated number of users in the SH opportunity.

Submit
50. What internal redundancy options do the 3010, 3510 and 5010 models support?

Explanation

The 3010, 3510, and 5010 models support internal redundancy options such as dual power supplies and dual fans. These redundancy options ensure that the devices have backup power and cooling systems in case of any failures, thus increasing the reliability and availability of the system.

Submit
51. Can the primary and aux (auxiliary) ports of a steelhead appliance share the same subnet?

Explanation

The primary and auxiliary ports of a steelhead appliance cannot share the same subnet because they are used for different purposes. The primary port is used for WAN optimization, while the auxiliary port is used for management and troubleshooting. Therefore, they must be on separate subnets to ensure proper functionality and to avoid any conflicts or issues that may arise from sharing the same subnet.

Submit
52. Using the above questions as an example, write out dual-sided NAT on the LAN SH interfaces (which is supported).

Explanation

The given answer suggests that dual-sided NAT is being used on the LAN SH interfaces. This means that NAT is being performed on both the CSH (client-side) and SSH (server-side) interfaces. The CSH interface performs NAT on outgoing traffic from the client, while the SSH interface performs NAT on incoming traffic from the server. This configuration allows for translation of IP addresses and ports on both sides of the connection, ensuring proper communication between the client and server.

Submit
53. Using the above questions as an example, write out client-side NAT (which is supported).

Explanation

not-available-via-ai

Submit
54. Using the above questions as an example, write out server-side NAT (which is NEVER supported).

Explanation

not-available-via-ai

Submit
55. Using the above questions as an example, write out dual sided NAT (which is NEVER supported).

Explanation

This answer suggests that dual-sided NAT, where both the source and destination IP addresses are translated, is never supported. In this scenario, the source CSH (Client Server Host) is translated to NAT, then the destination NAT is translated to SSH (Secure Shell), and finally, SSH is translated to S (Server). This sequence of translations indicates that only one side of the connection is being translated at a time, which is a limitation of dual-sided NAT.

Submit
56. Convert AF22 to DSCP.

Explanation

not-available-via-ai

Submit
57. Convert AF43 to DSCP.

Explanation

not-available-via-ai

Submit
58. True or False:

Peering rules apply to how the client-side steelhead responds to probes.

Explanation

Peering rules do not apply to how the client-side steelhead responds to probes. The statement is false because peering rules actually govern the behavior of Steelhead appliances when they communicate with each other over a wide area network (WAN). The client-side steelhead, on the other hand, is responsible for optimizing and accelerating the traffic between the client and the server, but it does not directly respond to probes.

Submit
59. What are the three types of peering rules?

Explanation

The three types of peering rules are auto, accept, and pass. "Auto" means that the peering relationship is automatically established without any manual intervention. "Accept" means that the peering relationship is established only if the receiving party accepts the request. "Pass" means that the peering relationship is established regardless of whether the receiving party accepts or rejects the request. These rules determine how peering connections are established and maintained between networks.

Submit
60. What would the CLI command be to insert a peering rule before rule number 2 which passes all probes from the host 10.1.1.100?

Explanation

The CLI command "in-path peering rule pass peer 10.1.1.100 rulenum 2" would insert a peering rule before rule number 2 that passes all probes from the host 10.1.1.100.

Submit
61. What would the CLI command be to move peering rule three to the first place in the ruleset?

Explanation

The given CLI command "in-path peering move-rule 3 to 1" is used to move peering rule three to the first place in the ruleset. This command specifically instructs the CLI to move the rule with the index number 3 to the index number 1 in the peering ruleset. By executing this command, the order of the rules in the peering ruleset will be rearranged, placing rule three at the beginning.

Submit
62. What is the CLI command to write the changes to memory?

Explanation

The CLI command to write the changes to memory is "wr mem" or "write mem" or "write memory". These commands are used to save any configuration changes made in the device's running configuration to the device's non-volatile memory, ensuring that the changes are retained even after a reboot.

Submit
63. What is the CLI command to add a pass-through rule (into the first position) for host 10.1.1.100?

Explanation

This CLI command is used to add a pass-through rule for the host 10.1.1.100. The "in-path rule pass-through" command is used to specify that this is a pass-through rule. "srcaddr 10.1.1.100/32" specifies the source address as 10.1.1.100. "rulenum 1" indicates that this rule should be added in the first position.

Submit
64. What is the router command to troubleshoot WCCP service group 90 in detail?

Explanation

The correct answer is "show ip wccp 90 detail." This command is used to troubleshoot the WCCP (Web Cache Communication Protocol) service group 90 in detail. By using this command, the router will display detailed information about the WCCP service group 90, including its configuration, status, and any associated statistics or errors. This command can help in diagnosing and resolving issues related to the WCCP service group 90.

Submit
65. What is the router command to troubleshoot WCCP service group 90 generally?

Explanation

The correct answer is "show ip wccp 90 view." This command is used to troubleshoot the WCCP (Web Cache Communication Protocol) service group 90. It allows the user to view the configuration and status of the WCCP service group 90 on the router. By using this command, the user can check if the WCCP service group 90 is properly configured and functioning as expected.

Submit
66. Does netflow collect from the ingress or egress interface?

Explanation

Netflow collects data from the ingress interface. Ingress refers to the interface where the traffic enters a network or a device. Netflow is a network protocol that collects information about network traffic and flow data. By collecting data from the ingress interface, netflow can provide insights into the source, destination, and characteristics of the incoming traffic, helping network administrators analyze and optimize network performance, troubleshoot issues, and enhance security.

Submit
67. Does QoS get applied on the ingress or egress interface?

Explanation

QoS (Quality of Service) is a network feature that allows prioritizing and managing network traffic. It can be applied either on the ingress (incoming) or egress (outgoing) interface of a network device. In this case, the correct answer states that QoS is applied on the egress interface, meaning that it affects the outgoing traffic from the device.

Submit
68. By default, how often do inactive netflow cache entries flush?

Explanation

By default, inactive netflow cache entries flush every 15 seconds. This means that if an entry in the netflow cache has not received any new data within the last 15 seconds, it will be removed from the cache. This flushing process helps to keep the netflow cache updated and prevents it from becoming cluttered with inactive entries.

Submit
69. By default, how often do active netflow cache entries flush?

Explanation

Active netflow cache entries flush by default every 30 minutes. This means that after 30 minutes, the netflow cache entries will be cleared and new entries will be recorded. This flushing process helps to ensure that the netflow data is up to date and accurate. It also prevents the netflow cache from becoming too large and consuming excessive resources.

Submit
70. What other event will cause a netflow cache entry to flush?

Explanation

When the TCP FIN bit is set, it signifies the end of a TCP connection. This indicates that the sender has finished sending data and wants to close the connection. When the FIN bit is received, the receiver acknowledges it and also sets the FIN bit to close the connection. This event causes the netflow cache entry to flush because the connection is terminated, and the information related to that connection is no longer needed in the cache.

Submit
71. What is the CLI command to do a tcpdump from Marcas's notes?  Assume you want to capture off of wan0_0, you need to snapshot the first 1500 bytes of each packet and you want to save it to a file called filename.

Explanation

The command "tcpdump -i wan0_0 -s 1500 -w filename" is the correct CLI command to perform a tcpdump. The "-i wan0_0" flag specifies that the capture should be done on the interface "wan0_0". The "-s 1500" flag indicates that the first 1500 bytes of each packet should be captured. Lastly, the "-w filename" flag specifies that the captured packets should be saved to a file called "filename".

Submit
72. What is the CLI command to reset the SH appliance back to factory default settings?

Explanation

The CLI command "reset factory" is used to reset the SH appliance back to its factory default settings. This command will revert all configurations and settings made on the appliance to their original state, erasing any customizations or modifications that have been made. This command is useful in situations where the appliance needs to be restored to its original settings or when troubleshooting requires a clean slate.

Submit
73. Is auto-discovery the active or passive discovery process?

Explanation

Auto-discovery is the process by which devices or systems automatically detect and identify other devices or systems on a network. In this case, since the question is asking whether auto-discovery is an active or passive process, the correct answer of "passive" indicates that auto-discovery occurs without any active involvement or intervention from the user or administrator. Instead, it happens automatically in the background, with devices or systems listening for and responding to signals or messages from other devices or systems on the network.

Submit
74. The customer has an OC3 connection (155Mbps) with 50ms of round-trip latency and 1200-byte packets.  What should the router be set to?

Explanation

The router should be set to handle 807 packets. This is the correct answer because the customer has an OC3 connection with a bandwidth of 155Mbps and is using 1200-byte packets. To determine the number of packets that can be transmitted in a given time, we need to calculate the data rate. The data rate can be calculated by dividing the bandwidth (155Mbps) by the packet size (1200 bytes). This gives us a data rate of approximately 129166 packets per second. Multiplying this by the round-trip latency of 50ms gives us a total of 6458 packets. However, since the question asks for the number of packets that can be transmitted, we need to divide this by 2, resulting in 3229 packets. However, this answer is not one of the options provided, so the correct answer must be 807 packets, which is half of 1614 packets.

Submit
75. What is the TCP ECHO port? (An interactive port commonly passed through the SH appliance).

Explanation

The TCP ECHO port is commonly passed through the SH appliance and is used for interactive communication. The correct answer is 7.

Submit
76. What is the Telnet port?  (An interactive port commonly passed through the SH appliance).

Explanation

The Telnet port is port number 23. Telnet is a protocol that allows users to remotely access and manage devices or systems over a network. It provides an interactive terminal session where users can execute commands on the remote device. Port 23 is the default port used for Telnet communication.

Submit
77. What is the UDP/Time port?  (An interactive port commonly passed through the SH appliance).

Explanation

The UDP/Time port is port number 37. This port is commonly used for the Time Protocol, which allows computers to synchronize their clocks over a network. The Time Protocol is a simple protocol that sends the current time as a 32-bit binary number. By using the UDP protocol, the Time Protocol can provide a lightweight and efficient way to synchronize clocks without the need for a reliable connection.

Submit
78. What is the Remote Telnet Service port?  (An interactive port commonly passed through the SH appliance).

Explanation

The Remote Telnet Service port is commonly passed through the SH appliance and is associated with port number 107.

Submit
79. What is the Border Gateway Protocol (BGP) port?  (An interactive port commonly passed through the SH appliance).

Explanation

The Border Gateway Protocol (BGP) is a routing protocol used to exchange routing information between autonomous systems on the internet. The BGP port, which is port number 179, is the specific port through which BGP messages are exchanged between BGP routers. This port is commonly passed through the SH appliance, which refers to a network security appliance that monitors and filters network traffic.

Submit
80. What is the Remote Login port?  (An interactive port commonly passed through the SH appliance).

Explanation

The Remote Login port is 513.

Submit
81. What is the Shell port?  (An interactive port commonly passed through the SH appliance).

Explanation

The Shell port refers to port number 514. This port is commonly used as an interactive port that is passed through the SH (Secure Shell) appliance. It is likely that this port is used for secure remote access and communication with the SH appliance.

Submit
82. What are the Citrix ports?  (Two interactive ports commonly passed through the SH appliance).

Explanation

The Citrix ports commonly passed through the SH appliance are 1494 and 2598. These ports are used for communication between the Citrix client and server. Port 1494 is the default port for the Independent Computing Architecture (ICA) protocol, which is used for remote access to Citrix applications and desktops. Port 2598 is used for the Session Reliability feature, which ensures that the session remains active even if the connection is interrupted.

Submit
83. What is the MS WBT, TS/Remote Desktop port?  (An interactive port commonly passed through the SH appliance).

Explanation

The MS WBT, TS/Remote Desktop port is 3389. This port is commonly used for remote desktop connections and allows users to connect to a remote computer and access its desktop interface. By passing through the SH appliance, this interactive port enables users to establish remote connections and control remote computers from their own devices.

Submit
84. What is the PC Anywhere port?  (An interactive port commonly passed through the SH appliance).

Explanation

The PC Anywhere port is a specific port number (5631) that is commonly used for communication between a PC and a remote device or server. This port is often passed through a Secure Hospitality (SH) appliance, which allows for secure and interactive remote access to the PC. By using this port, users can remotely control and access their PC from another location, making it a convenient tool for remote troubleshooting, file transfer, and remote desktop access.

Submit
85. What are the VNC ports?  (A range of interactive ports commonly passed through the SH appliance).

Explanation

The VNC ports refer to a range of interactive ports that are commonly passed through the SH appliance. Specifically, the VNC ports are numbered from 5900 to 5903. These ports are used for Virtual Network Computing (VNC) protocol, which allows remote access and control of a computer over a network. By specifying the range of 5900-5903, it indicates that these ports are the ones typically used for VNC communication.

Submit
86. What is the X11 port?  (An interactive port commonly passed through the SH appliance).

Explanation

The X11 port is a commonly used interactive port that is often passed through the SH appliance. The number 600 is likely referring to the port number for X11, which is commonly used for remote graphical display on Unix-like systems.

Submit
87. What is the SSH port?  (A secure port commonly passed through the SH appliance).

Explanation

The SSH port is commonly used for secure remote access to a server or device. It is a standardized port number, and the correct answer is 22.

Submit
88. What is the TACACS port?  (A secure port commonly passed through the SH appliance).

Explanation

The TACACS port is port number 49. TACACS (Terminal Access Controller Access Control System) is a network protocol that provides centralized authentication, authorization, and accounting (AAA) services. It is commonly used for secure remote access to network devices. The TACACS protocol uses TCP port 49 for communication between the TACACS client and server.

Submit
89. What is the HTTPS port?  (A secure port commonly passed through the SH appliance).

Explanation

The HTTPS port is the port number used for secure communication over the internet. It is commonly passed through the SH (Security Hardware) appliance. The correct answer is 443.

Submit
90. What is the SMTPS port?  (A secure port commonly passed through the SH appliance).

Explanation

The SMTPS port is 465. This port is commonly used for secure communication between email clients and servers using the SMTP protocol. It is often passed through a secure email gateway or appliance (SH appliance) to ensure the confidentiality and integrity of email communication.

Submit
91. What is the NNTPS port?  (A secure port commonly passed through the SH appliance).

Explanation

The NNTPS port is a secure port commonly passed through the SH appliance. The correct answer is 563.

Submit
92. What is the IMAP4-SSL port?  (A secure port commonly passed through the SH appliance).

Explanation

The IMAP4-SSL port is 585. IMAP4-SSL is a secure version of the Internet Message Access Protocol (IMAP), which is used to retrieve and manage email messages. By using SSL (Secure Sockets Layer) encryption, IMAP4-SSL ensures that the communication between the email client and the email server is secure and protected from unauthorized access. Port 585 is commonly passed through the SH (Security Hardware) appliance, which indicates that it is commonly used for secure IMAP4 communication.

Submit
93. What is the SSHELL port?  (A secure port commonly passed through the SH appliance).

Explanation

not-available-via-ai

Submit
94. What is the LDAPS port?  (A secure port commonly passed through the SH appliance).

Explanation

LDAPS is a secure version of the Lightweight Directory Access Protocol (LDAP) that uses SSL/TLS encryption to secure the communication between the client and the server. The LDAPS port is the specific port number that is commonly used for LDAPS communication. In this case, the correct answer is 636, which indicates that LDAPS traffic is commonly passed through this port on the SH appliance.

Submit
95. What is the FTPS-DATA port?  (A secure port commonly passed through the SH appliance).

Explanation

The FTPS-DATA port is a secure port commonly passed through the SH appliance. In this case, the correct answer is 989, which indicates that the FTPS-DATA port is using port number 989 for secure data transfer.

Submit
96. What is the FTPS port?  (A secure port commonly passed through the SH appliance).

Explanation

The FTPS port is 990. FTPS (File Transfer Protocol Secure) is a secure version of FTP that uses SSL/TLS encryption for secure file transfers. Port 990 is the default port for FTPS connections. It is commonly passed through a Secure Hardware (SH) appliance, which ensures that the FTPS traffic is secure and protected.

Submit
97. What is the TelnetS port?  (A secure port commonly passed through the SH appliance).

Explanation

TelnetS is a secure version of the Telnet protocol, which is used for remote login and command execution on network devices. The TelnetS port refers to the specific port number that is commonly used for TelnetS traffic to pass through a Secure Hub (SH) appliance. In this case, the correct answer is 992, indicating that port 992 is the designated port for TelnetS communication through the SH appliance.

Submit
98. What is the IMAPS port?  (A secure port commonly passed through the SH appliance).

Explanation

IMAPS is the secure version of the Internet Message Access Protocol (IMAP) that allows users to access and manage their email on a remote mail server. The IMAPS port is the specific port number used for secure IMAP communication. Port 993 is commonly used for IMAPS and is often passed through the SH (Security Hardening) appliance, ensuring that the communication is encrypted and secure.

Submit
99. What is the POP3S port?  (A secure port commonly passed through the SH appliance).

Explanation

POP3S is a secure version of the POP3 protocol, which is used for retrieving emails from a mail server. The POP3S port is the designated port for secure POP3 communication, commonly passed through a security appliance known as the SH appliance. Port 995 is the correct answer as it is the standard port used for POP3S communication, ensuring that the data exchanged between the email client and the mail server is encrypted and secure.

Submit
100. What is the L2TP port?  (A secure port commonly passed through the SH appliance).

Explanation

The L2TP port is 1701. This port is commonly used for transmitting Layer 2 Tunneling Protocol (L2TP) traffic. L2TP is a protocol that allows the creation of virtual private networks (VPNs) over the internet. It is often used in combination with IPsec for secure communication. The L2TP port is typically passed through a security appliance, such as a firewall or router, to allow L2TP traffic to pass through and establish VPN connections.

Submit
101. What is the PPTP port?  (A secure port commonly passed through the SH appliance).

Explanation

The PPTP port is port number 1723. This port is commonly used for the Point-to-Point Tunneling Protocol (PPTP), which is a secure protocol used to create virtual private networks (VPNs). The PPTP port allows for the secure transmission of data between the client and server through the SH (Secure Hub) appliance.

Submit
102. What is the TFTP over TLS port?  (A secure port commonly passed through the SH appliance).

Explanation

The TFTP over TLS port is 3713. This port is commonly passed through the SH appliance for secure file transfers using the Trivial File Transfer Protocol (TFTP) over a TLS (Transport Layer Security) connection. TFTP over TLS adds an extra layer of security by encrypting the data being transferred, ensuring confidentiality and integrity during file transfers.

Submit
103. What speed should your terminal emulation software be set to to connect to a SH appliance via console?

Explanation

The speed at which your terminal emulation software should be set to connect to a SH appliance via console is typically 9600 baud. This speed is a commonly used standard for console connections and ensures a reliable and efficient communication between the terminal and the appliance.

Submit
104. How many data bits should your terminal emulation software be set to to connect to a SH appliance via console?

Explanation

The terminal emulation software should be set to 8 data bits in order to connect to a SH appliance via console. This setting ensures that the software can accurately transmit and receive data from the appliance.

Submit
105. What parity should your terminal emulation software be set to to connect to a SH appliance via console?

Explanation

The terminal emulation software should be set to "No Parity" in order to connect to a SH appliance via console.

Submit
106. How many stop bits should your terminal emulation software be set to to connect to a SH appliance via console?

Explanation

When connecting to a SH appliance via console, the terminal emulation software should be set to 1 stop bit. Stop bits are used to signal the end of a character and ensure proper synchronization between the sender and receiver. In this case, setting the software to 1 stop bit means that after each character is transmitted, there will be one additional bit (the stop bit) to indicate the end of the character. This is the standard configuration for most serial communication protocols, including connecting to a SH appliance via console.

Submit
107. What type of emulation should your terminal emulation software be set to to connect to a SH appliance via console?

Explanation

To connect to a SH appliance via console, your terminal emulation software should be set to VT100 emulation. VT100 is a type of terminal emulation that provides compatibility with older systems and allows for basic text-based communication. By setting the software to VT100 emulation, it will be able to understand and interpret the commands and data being sent from the SH appliance, ensuring a successful connection and communication between the two devices.

Submit
108. What flow control should your terminal emulation software be set to to connect to a SH appliance via console?

Explanation

No flow control should be set in the terminal emulation software to connect to a SH appliance via console. Flow control is a mechanism used to manage the flow of data between devices to prevent data loss or buffer overflow. However, in this case, it is recommended to disable flow control because the SH appliance may not support it or may have flow control disabled by default. Disabling flow control ensures a smooth and uninterrupted connection between the terminal emulation software and the SH appliance.

Submit
109. What is the CLI command to allow optimization to continue after the failure of a connection-forwarding peer (dangerous as if there is AR strange packets could show up at either side).

Explanation

The CLI command "in-path neighbor allow-failure" allows optimization to continue even after the failure of a connection-forwarding peer. However, this can be dangerous as it may result in strange packets showing up at either side if there is an Address Resolution (AR) issue.

Submit
110. What are the QoS class priorities (in order of priority)?

Explanation

The QoS class priorities are listed in order of priority, starting with Realtime as the highest priority, followed by interactive, business critical, normal priority, and finally low priority. This means that Realtime traffic is given the highest priority in terms of quality of service, followed by interactive, business critical, normal priority, and low priority traffic in descending order of importance.

Submit
111. What is the CLI command to enable in-path support?

Explanation

The CLI command "in-path enable" is used to enable in-path support. This command allows the system to process traffic passing through the in-path interface. By enabling in-path support, the system can perform various functions such as traffic monitoring, filtering, and redirection.

Submit
112. What is the CLI command to enable HTTP optimizations on ports 80 and 8080?

Explanation

The correct answer is "protocol http enable." This command is used in the Command Line Interface (CLI) to enable HTTP optimizations on ports 80 and 8080. By enabling HTTP optimizations, the system can enhance the performance and efficiency of HTTP traffic on these specific ports, potentially improving the overall network experience for users accessing web services.

Submit
113. What is the CLI command to enable wccp?

Explanation

The CLI command to enable WCCP (Web Cache Communication Protocol) is "ip wccp redirect ". This command is used to enable WCCP on a specific interface for a particular service, such as HTTP or HTTPS. The "version" parameter specifies the WCCP version to use, and the "service" parameter specifies the service number. The "redirect" keyword indicates that traffic should be redirected to a WCCP-enabled device for processing.

Submit
114. What is the CLI command to enable the steelhead optimization service?

Explanation

The CLI command "service enable" is used to enable the steelhead optimization service. This command activates the optimization service on the steelhead device, allowing it to optimize and accelerate network traffic. By enabling the service, the steelhead device can apply various techniques such as data compression, data deduplication, and TCP optimization to improve network performance and reduce bandwidth usage.

Submit
115. What is the CLI command to enable server-side out-of-path operation?

Explanation

The CLI command "out-of-path enable" is used to enable server-side out-of-path operation. This command allows the server to operate in an out-of-path mode, where it can handle network traffic without being directly in the data path. This can be useful in certain network configurations where the server needs to perform specific tasks without disrupting the normal flow of traffic. By enabling out-of-path operation, the server can effectively handle network traffic while remaining separate from the main data path.

Submit
116. What is the CLI command to re-run the initial configuration wizard?

Explanation

The CLI command "configuration jump-start" is used to re-run the initial configuration wizard. This command allows the user to quickly and easily configure the device with the initial settings, as if the wizard was being run for the first time. By running this command, the user can reset the device's configuration and start the initial configuration process again.

Submit
117. What is the CLI command to enable virtual or logical in-path functionality (L4, WCCP, PBR)?

Explanation

The CLI command "in-path oop enable" is used to enable virtual or logical in-path functionality, specifically for L4, WCCP, and PBR. This command allows the network device to perform these functions by redirecting traffic through a virtual or logical path, rather than the traditional physical path. By enabling this feature, the device can efficiently handle traffic redirection and apply policies such as load balancing, traffic shaping, and content filtering.

Submit
118. What is the CLI command to enable CIFS optimizations?

Explanation

The CLI command "protocol cifs enable" is used to enable CIFS (Common Internet File System) optimizations. This command allows the user to activate specific optimizations for CIFS, which is a network file-sharing protocol commonly used in Windows-based systems. By enabling these optimizations, the performance and efficiency of CIFS communication can be improved, resulting in faster file transfers and better overall network performance.

Submit
119. What is the CLI command to view your SH appliance's netflow export?

Explanation

The correct answer is "show ip flow-export". This command is used to view the netflow export configuration on a SH (Security Host) appliance. Netflow is a network protocol used to collect and analyze network traffic data. By using this command, users can check the current settings and configuration related to netflow export on their SH appliance.

Submit
120. What is the CLI command to upload the debug file mixtron.cap to the ftp server frodo.effer.com with user:pass ryan:leonard?

Explanation

The correct CLI command to upload the debug file mixtron.cap to the ftp server frodo.effer.com with the username:password ryan:leonard is "file debug-dump upload mixtron.cap ftp://ryan:[email protected]". This command specifies the file to be uploaded (mixtron.cap) and the FTP server address (ftp://frodo.effer.com) along with the username (ryan) and password (leonard) for authentication.

Submit
121. When setting up auto-registration to the CMC what hostname must exist in the customer's DNS?

Explanation

The hostname "riverbedcmc" must exist in the customer's DNS when setting up auto-registration to the CMC. This means that the customer's DNS system should have a record for the hostname "riverbedcmc" that can be resolved to an IP address. This is necessary for the auto-registration process to function properly and for the CMC to be accessible using this hostname.

Submit
122. What is the CLI command to disable logical in-path functionality?

Explanation

The CLI command "no in-path oop enable" is used to disable logical in-path functionality. By using the "no" keyword, we are negating the command "in-path oop enable" which enables the logical in-path functionality. So, executing this command will disable the logical in-path functionality.

Submit
123. What is the CLI command to view the current in-path configuration?

Explanation

The CLI command "show in-path rules" is used to view the current in-path configuration. By executing this command, the user can access and display the rules that are currently in effect for the in-path configuration. This command provides a way to examine and verify the settings and rules that are applied to the in-path configuration, allowing users to ensure that the correct rules are in place and functioning as expected.

Submit
124. What is the CLI command to enable netflow exports?

Explanation

The CLI command "ip flow-export enable" is used to enable netflow exports. Netflow is a network protocol that collects and analyzes network traffic data. By enabling netflow exports, the network devices can send flow records to a collector for further analysis. This command allows the device to start exporting netflow data.

Submit
125. What is the CLI command to force the SH appliance to optimize SMB signed CIFS connections?

Explanation

The CLI command "protocol cifs secure-sig-opt enable" is used to force the SH appliance to optimize SMB signed CIFS connections. By enabling this option, the appliance will prioritize and optimize the performance of SMB signed CIFS connections, ensuring secure and efficient communication between the client and server. This command helps to enhance the overall performance and security of CIFS connections on the SH appliance.

Submit
126. What is the CLI command to verify that the SSH can reach the CSH?

Explanation

The correct answer is "tproxytrace -i inpathx_x {ipaddr}:{port}". This command is used to verify if SSH can reach the CSH. The "tproxytrace" command is a tool that allows tracing of packets through a transparent proxy. The "-i inpathx_x" option specifies the interface to use for tracing. The "{ipaddr}:{port}" argument should be replaced with the actual IP address and port number of the CSH. By running this command, it will test the connectivity between the SSH and CSH to determine if they can communicate successfully.

Submit
127. What is the CLI command to set up a netflow export?

Explanation

The correct answer is "ip flow-export destination {ipaddr} {port}". This command is used to set up a netflow export on a device. Netflow is a network protocol that collects and analyzes network traffic data. By using this command, the device will export netflow data to the specified IP address and port number. This allows for the monitoring and analysis of network traffic patterns and helps in identifying potential issues or optimizing network performance.

Submit
128. What is the CLI command to show the in-path routing table for a specific interface?

Explanation

The CLI command "show ip in-path route inpathx_x" is used to display the in-path routing table for a specific interface. This command provides information about the routes that are currently being used by the in-path interface for forwarding traffic. By specifying the interface "inpathx_x", the command filters the output to show only the routing table entries related to that particular interface.

Submit
129. What is the CLI command to revert to the last saved configuration?

Explanation

The CLI command "configuration revert saved" is used to revert to the last saved configuration. This command allows the user to undo any changes made since the last configuration was saved and restore the device to its previous state. By using this command, the device will discard any unsaved configuration changes and revert back to the last saved configuration.

Submit
130. What is the CLI command to disable CIFS write optimizations?

Explanation

The CLI command "protocol cifs disable write optimization" is used to disable CIFS write optimizations. This command specifically targets the CIFS (Common Internet File System) protocol and disables the write optimization feature. By disabling write optimization, the system may prioritize data integrity over performance, ensuring that all write operations are immediately committed to the storage device.

Submit
131. What is the CLI command to test for AR with a flood-ping?

Explanation

The correct command to test for AR with a flood-ping is "ping -f -I {in-path ipaddr} -s 1400 {destination ipaddr}". This command uses the "ping" utility with the "-f" option to enable flood-ping, which sends a continuous stream of ICMP echo requests to the destination IP address. The "-I" option specifies the source IP address to use, which is the in-path IP address in this case. The "-s" option sets the size of the ICMP packets to 1400 bytes.

Submit
132. What is the CLI command to enable CIFS dynamic write throttling?

Explanation

The CLI command "protocol cifs dw-throttling enable" is used to enable CIFS dynamic write throttling. This command allows the system to regulate the rate at which data can be written to a CIFS share, preventing excessive write operations that could potentially overwhelm the system. By enabling dynamic write throttling, administrators can ensure a balanced and efficient use of system resources while maintaining optimal performance for CIFS file transfers.

Submit
133. What are the 8 logging levels in order of severity?

Explanation

The correct answer lists the logging levels in order of severity. The logging levels are arranged in a hierarchical manner, with "Emergency" being the most severe and "Debug" being the least severe. This order allows for prioritizing and categorizing log messages based on their importance and impact.

Submit
134. Type in the command used to show information regarding the current heath (status) of a SH, the current version, the uptime, and the model number.

Explanation

The command "show info" is used to display information about the current health (status) of a SH, the current version, the uptime, and the model number. This command provides a comprehensive overview of the SH's status and key details such as its version, uptime, and model number.

Submit
135. How do you view the full configuration in the CLI?

Explanation

To view the full configuration in the CLI, the command "show config full" is used. This command retrieves and displays the complete configuration settings and parameters in the command line interface. It allows users to see all the details and settings of the current configuration, providing a comprehensive view of the system's setup.

Submit
136. List the available in-path rule types:

Explanation

The available in-path rule types are auto-discovery, pass-through, fixed-target, discard, and deny. These rule types determine how traffic is handled within the network. Auto-discovery allows the system to automatically discover and configure in-path rules for specific applications. Pass-through allows traffic to pass through the network without any modification. Fixed-target directs traffic to a specific destination. Discard drops the traffic, and deny blocks it entirely.

Submit
137. What is the CLI command to list all the tcpdump files that have been generated?

Explanation

The CLI command "show files tcpdump" is used to list all the tcpdump files that have been generated. This command allows users to view and access the tcpdump files stored in the system. It provides a convenient way to retrieve and manage these files for further analysis or troubleshooting purposes.

Submit
138. What interfaces are used for netflow exports?

Explanation

The correct answer is PRI and AUX. Netflow exports are used to collect and analyze network traffic data. The PRI (Primary Rate Interface) and AUX (Auxiliary) interfaces are commonly used for exporting this data. The PRI interface is a physical interface that provides high-speed digital communication channels, while the AUX interface is an auxiliary serial interface used for connecting devices such as modems or console ports. Both interfaces can be configured to export netflow data, allowing for efficient monitoring and analysis of network traffic.

Submit
139. What are the three types of peering rules?

Explanation

The three types of peering rules are auto, accept, and pass. Auto peering rule means that the system automatically establishes peering connections without any manual intervention. Accept peering rule allows the system to accept incoming peering connections from other systems. Pass peering rule means that the system will pass through the peering connection to another system without processing any traffic. These peering rules help in managing and controlling the establishment and functioning of peering connections between systems.

Submit
140. If a SH appliance has 4 or more ports which interface should be used for peering?

Explanation

The inpath0_0 interface should be used for peering if a SH appliance has 4 or more ports.

Submit
141. In a failover set-up which interface is used to communicate with the backup SH appliance?

Explanation

In a failover set-up, the AUX interface is used to communicate with the backup SH (Security and Health) appliance. The AUX interface, also known as the auxiliary port, is typically used for out-of-band management and is commonly used for connecting to a console or terminal server. In the context of a failover set-up, the AUX interface allows for communication between the primary and backup appliances, ensuring that they can synchronize data and maintain high availability in case of a failure.

Submit
142. What is the first command to enable Data-Store Sync (it defines the data-store peer)?

Explanation

The first command to enable Data-Store Sync is "datastore sync peer-ip {ipaddr}". This command is used to define the data-store peer by specifying the IP address of the peer. By using this command, the Data-Store Sync feature can be enabled and the data-store peer can be configured for synchronization.

Submit
143. What is the second command to enable Data-Store Sync (it defines the port)?

Explanation

The given command "datastore sync port "7744"" is the correct answer to enable Data-Store Sync and define the port. By specifying the port number "7744", the command configures the synchronization of data stores to use that specific port for communication. This ensures that the data stores are synchronized and can exchange information effectively.

Submit
144. What is the third command to enable Data-Store Sync (it defines the timeout)?

Explanation

The third command to enable Data-Store Sync is "datastore sync reconnect "30"". This command defines the timeout for the sync process. By specifying a value of "30", it sets the timeout to 30 units of time (which could be seconds, minutes, or any other unit depending on the specific system). This timeout ensures that if the sync process takes longer than the defined time, it will automatically reconnect and resume syncing.

Submit
145. What is the forth command to enable Data-Store Sync (it defines the master/slave relationship)?

Explanation

The correct answer is "datastore sync master." This command is used to enable Data-Store Sync and define the master/slave relationship. By using this command, the master datastore can sync its data with the slave datastore, ensuring that both databases are updated and consistent. This is particularly useful in distributed systems where data needs to be replicated across multiple nodes for redundancy and fault tolerance.

Submit
146. What is the fifth command to enable Data-Store Sync (it turns it on)?

Explanation

The fifth command to enable Data-Store Sync is the command "enable data-store-sync." This command activates the Data-Store Sync feature, allowing for synchronization of data between different data stores.

Submit
147. What is the command to ready the receiving SH appliance for a one-time datastore synchronization?

Explanation

The correct answer is "datastore receive port {port}". This command is used to prepare the receiving SH (Search Head) appliance for a one-time datastore synchronization. By specifying the port number, the command ensures that the receiving SH is ready to receive the data from another appliance for synchronization purposes.

Submit
148. What is the command to ready the sending SH appliance for a one-time datastore synchronization?

Explanation

The command "datastore send addr {ipaddr} port {port}" is used to ready the sending SH (Search Head) appliance for a one-time datastore synchronization. This command specifies the IP address and port of the receiving SH appliance to which the data will be sent. By executing this command, the sending SH appliance prepares itself to synchronize its datastore with the specified receiving appliance.

Submit
149. What types of optimization policy exist?

Explanation

The given answer states that there are four types of optimization policies: Normal, SDR-Only, Compression-Only, and None. This suggests that these are the different approaches or strategies that can be employed for optimization purposes. "Normal" implies a standard or default optimization policy, while "SDR-Only" and "Compression-Only" suggest specific methods focused on either SDR (Software-Defined Radio) or compression techniques. Lastly, "None" indicates the absence of any optimization policy.

Submit
150. What is the router command to view the Cisco access list?

Explanation

The correct answer is "show access-lists {access_list_number}". This command is used to view the Cisco access list. By replacing {access_list_number} with the actual number of the access list, the command will display the details of that specific access list. It allows network administrators to check the configured access control entries and their associated parameters, such as source and destination IP addresses, protocols, and ports.

Submit
151. CLI Command to restart the optimization service and clear the data store?

Explanation

The correct answer is "restart clean" because this CLI command is used to restart the optimization service and clear the data store. By using this command, the optimization service will be restarted, allowing any changes or updates to take effect. Additionally, the data store will be cleared, removing any existing data and starting fresh. This command ensures that the optimization service is reset and ready to perform optimally with a clean data store.

Submit
152. CLI Command to just restart optimization?

Explanation

The correct answer is "restart" because it is the CLI command that specifically restarts the optimization process. By entering this command, the optimization process will be stopped and then started again, allowing for any changes or updates to take effect.

Submit
153. CLI Command to reboot the SH appliance?

Explanation

The correct answer is "reload." This command is used to reboot the SH (Security and Health) appliance. By entering this command, the system will initiate a restart, allowing any necessary updates or changes to take effect. It is a common command used in network administration to ensure the smooth operation of the appliance.

Submit
154. CLI Command to Shutdown the SH appliance?

Explanation

The CLI command "reload halt" is used to shut down the SH (Security Harvesting) appliance. This command initiates a reload of the appliance and halts all processes and services, effectively shutting it down.

Submit
155. CLI Command to show the version of the software, the build information, the product model and the system specs?

Explanation

The "show version" command is used to display information about the software version, build information, product model, and system specifications. This command provides a comprehensive overview of the system's configuration and helps in troubleshooting and identifying compatibility issues. By using this command, users can quickly access important information about the software and hardware components of the system.

Submit
156. CLI Command to display the RIOS boot image?

Explanation

The correct answer is "show bootvar" because this CLI command is used to display the boot image on a RIOS device. By entering this command, the user can view the current boot image and its associated details, such as the file name, version, and location. This information is helpful for troubleshooting purposes or when managing the boot process on the device.

Submit
157. CLI Command to display high-speed TCP (HSTCP) settings?

Explanation

The correct CLI command to display high-speed TCP (HSTCP) settings is "show tcp highspeed". This command is used to view the configuration and settings related to high-speed TCP, which is a feature that optimizes the performance of TCP connections over high-speed networks. By using this command, users can access information such as the current status of HSTCP, any enabled options, and other relevant details.

Submit
158. CLI Command to display available RIOS images loaded onto the appliance?

Explanation

The command "show images" is used to display the available RIOS images that are loaded onto the appliance. This command provides a list of the images that can be used for the appliance's operating system. It allows users to see the different versions or variations of the RIOS image that are available for selection.

Submit
159. CLI Command to display the SH appliance interfaces?

Explanation

XXX can be aux, primary, lanX_X, wanX_X

Submit
160. CLI Command to clear all statistics?

Explanation

The CLI command "stats clear-all" is used to clear all statistics. By executing this command, all the accumulated statistics data will be reset or erased. This can be useful in situations where you want to start collecting fresh statistics or if you need to clear the existing statistics for any specific reason.

Submit
161. CLI Command to clear the hardware-related event log?

Explanation

The correct CLI command to clear the hardware-related event log is "clear hardware error-log". This command is used to remove any error logs or events related to the hardware components of a device. By executing this command, the event log will be cleared, allowing for a fresh start in tracking any new hardware-related errors or events.

Submit
162. CLI Command to set the connection pooling thread count?

Explanation

The given CLI command "service connection pooling 0.0.0.0 0 {value}" is used to set the connection pooling thread count. The "{value}" in the command represents the desired number of threads for connection pooling. By using this command, the user can configure the connection pooling settings to allocate a specific number of threads for handling incoming connections, which can help optimize the performance and resource utilization of the system.

Submit
163. CLI Command to set the default in-path port for the SH appliance?

Explanation

The CLI command "service default-port {port}" is used to set the default in-path port for the SH appliance. By specifying the desired port number in place of "{port}", the command configures the appliance to use that particular port as the default in-path port. This allows the appliance to receive and process network traffic through the specified port, enabling it to perform its intended functions effectively.

Submit
164. CLI Command to set the VLAN tag for the VLAN the appliance belongs to?

Explanation

The correct CLI command to set the VLAN tag for the VLAN the appliance belongs to is "in-path interface inpathx_x vlan xx". This command is used to configure the in-path interface on the appliance and specify the VLAN tag for the corresponding VLAN. By specifying the appropriate inpathx_x interface and VLAN number, the command ensures that the appliance is correctly configured to operate within the desired VLAN.

Submit
165. CLI Command to enable connection forwarding (failover)?

Explanation

The CLI command "in-path neighbor enable" is used to enable connection forwarding or failover. This command allows the device to forward traffic to a neighbor device in case of a failure or congestion in the primary path. By enabling in-path neighbor, the device can seamlessly switch the traffic to an alternate path, ensuring continuous connectivity and minimizing disruptions.

Submit
166. CLI Command to configure a connection forwarding partner?

Explanation

This CLI command is used to configure a connection forwarding partner in a network device. By specifying the IP address and port of the neighbor, the device can establish a connection and forward traffic to it. The "in-path" keyword indicates that the device will intercept and forward traffic in the network path. The command allows for flexibility by providing an optional port parameter, which can be used to specify a specific port for the connection.

Submit
167. CLI Command to allow the SH to initiate a WCCP connection GRE but actually return L2 packets (performance optimization)?

Explanation

The correct answer is "wccp l2-return enable". This command enables the return of Layer 2 packets instead of Layer 3 packets in a WCCP connection using GRE. This can be used as a performance optimization technique, as returning Layer 2 packets can reduce processing overhead and improve overall network performance.

Submit
168. CLI Command to setup the active netflow timer?

Explanation

The correct CLI command to setup the active netflow timer is "ip flow-setting active_to xx". This command is used to configure the active timeout value for NetFlow data records. The "active_to" parameter specifies the time interval after which an active flow entry will be exported if there is no activity. The "xx" represents the desired timeout value in minutes. By setting this value, the network administrator can control how long an active flow should be idle before it is exported.

Submit
169. CLI Command to setup the inactive netflow timer?

Explanation

The correct CLI command to setup the inactive netflow timer is "ip flow-setting inactive_to xx". This command allows the user to specify the amount of time (in seconds) that a flow can be inactive before it is considered expired and removed from the netflow cache. By setting the value of "xx" to a desired number of seconds, the user can configure the netflow timer according to their specific requirements.

Submit
170. CLI Command to set the in-path gateway address for the SH appliance?

Explanation

The correct CLI command to set the in-path gateway address for the SH appliance is "ip in-path-gateway inpathx_x {ipaddr}". This command is used to configure the in-path gateway address for the SH (Security Heartbeat) appliance, where "inpathx_x" represents the specific in-path interface and "{ipaddr}" represents the IP address of the gateway. By using this command, the administrator can specify the gateway address for the SH appliance, allowing it to communicate with other devices on the network.

Submit
171. CLI Command (on a Cisco router) to force the router to verify the availability of the next-hop address in PBR?

Explanation

The correct answer is "set ip next-hop verify-availability." This command is used on a Cisco router to force the router to verify the availability of the next-hop address in Policy-Based Routing (PBR). PBR allows the router to make forwarding decisions based on policies defined by the network administrator. By using the "verify-availability" option with the "set ip next-hop" command, the router will check if the next-hop address is reachable before forwarding traffic to it. This helps ensure that the router only forwards traffic to available next-hop addresses, improving network reliability and performance.

Submit
172. CLI Command to set the logging level of the SH appliance?

Explanation

The CLI command "logging local xx" is used to set the logging level of the SH (Security and Health) appliance. The "xx" represents the desired logging level, which can be a number between 0 and 7. This command allows administrators to control the amount of logging information generated by the appliance, with higher numbers indicating more detailed logging. By setting the logging level, administrators can customize the level of detail they require for troubleshooting and monitoring purposes.

Submit
173. CLI command to set the syslog trap level?

Explanation

The correct answer is "logging trap xx". This CLI command is used to set the syslog trap level. The "logging trap" command is followed by the desired trap level, represented by "xx". This command allows the user to specify the severity level at which syslog messages should be logged and sent to the syslog server. By setting the trap level to a specific value, the user can control which types of events are logged and reported.

Submit
174. CLI command to display the IPSEC configuration information and connections?

Explanation

The correct CLI command to display the IPSEC configuration information and connections is "show ip security". This command will provide detailed information about the IPSEC configuration, including the security policies, encryption algorithms, authentication methods, and active IPSEC connections. It allows administrators to monitor and troubleshoot IPSEC connections on the network.

Submit
175. CLI command to generate a system dump?

Explanation

The correct CLI command to generate a system dump is "debug generate dump". This command is used to create a system dump, which is a snapshot of the current state of the system. System dumps are useful for troubleshooting and diagnosing issues, as they provide detailed information about the system's processes, memory usage, and other important data. By using this command, administrators can capture and analyze system information to identify and resolve problems effectively.

Submit
176. CLI command to display the system dump files?

Explanation

The CLI command "show files debug-dump" is used to display the system dump files. This command allows users to view the dump files generated by the system for debugging purposes. By using this command, users can access and analyze the dump files to troubleshoot any issues or errors that may have occurred in the system.

Submit
177. CLI command to delete existing debug files?

Explanation

The given CLI command "file debug-dump delete {filename}" is the correct command to delete existing debug files. It specifies the "file debug-dump" command to delete debug files and uses the "delete" option followed by the name of the file to be deleted within curly braces. This command effectively removes the specified debug file from the system.

Submit
178. What is the directory path to the binaries?

Explanation

The directory path to the binaries is "/opt/rbt/bin".

Submit
179. What is the directory path to the kernel modules?

Explanation

The directory path to the kernel modules is the location where the kernel modules are stored in the file system. It is typically found in the /lib/modules directory. The kernel modules are important components of the operating system that can be dynamically loaded and unloaded to provide additional functionality or support for hardware devices. The directory path is necessary for managing and configuring the kernel modules.

Submit
180. What is the directory path to the core dumps?

Explanation

The directory path to the core dumps is /var/opt/tms/snapshots/.

Submit
181. What is the directory path to the system dumps?

Explanation

The correct answer is /var/opt/tms/sysdumps/. This is the directory path where the system dumps are stored. The "/var" directory is typically used for variable data files, while "/opt" is used for optional or third-party software. The "tms" directory likely refers to a specific software or system. Finally, the "sysdumps" directory is where the system dumps are located, which are typically files that contain information about the state of the system at a specific point in time.

Submit
182. What is the directory path to the TCP dumps?

Explanation

The directory path to the TCP dumps is "/var/opt/tms/tcpdumps/". This means that the TCP dumps can be found in the "tcpdumps" folder, which is located within the "tms" folder, which in turn is located within the "opt" folder, which is finally located within the "var" directory.

Submit
183. What is the directory path to the upgrade RIOS images?

Explanation

The directory path to the upgrade RIOS images is "/var/opt/tms/images/". This means that the upgrade RIOS images can be found in the "images" folder, which is located within the "tms" folder, which in turn is located within the "opt" folder, which is finally located within the "var" folder.

Submit
184. What is the CLI command for a tcpdump (from the tcpdump page of the flashcards)?  Assume you are listening on the lan0_0 interface, that you need to snapshot the first 576 bytes of each packet and that you want to save it to a file called client-lan00.cap.

Explanation

The correct CLI command for a tcpdump is "tcpdump -i lan0_0 -s 576 -w client-lan00.cap". This command specifies the interface to listen on as "lan0_0", sets the snapshot length to 576 bytes, and saves the captured packets to a file named "client-lan00.cap".

Submit
185. What does the -s parameter mean in the tcpdump command?

Explanation

The -s parameter in the tcpdump command refers to the length of each packet snapshot in bytes. It determines the amount of data that will be captured from each packet during the network traffic analysis. By specifying the value for this parameter, the user can control the level of detail in the captured packets.

Submit
186. What does the -w parameter mean in the tcpdump command?

Explanation

The -w parameter in the tcpdump command is used to specify the file where the raw packets will be written. It allows the user to save the captured network traffic into a file for later analysis or reference. By using this parameter, the user can define the filename or path where the raw packets will be stored. This option is useful when there is a need to capture and analyze network traffic for troubleshooting or security purposes.

Submit
187. What does the -i parameter mean in the tcpdump command?

Explanation

The -i parameter in the tcpdump command is used to specify the interface on which tcpdump should listen for network traffic. By providing the interface name as an argument to the -i parameter, tcpdump will capture and display all the packets flowing through that specific interface. This allows users to monitor and analyze network traffic on a specific network interface, helping in troubleshooting and network analysis tasks.

Submit
188. What does the -r parameter mean in the tcpdump command?

Explanation

The -r parameter in the tcpdump command is used to read packets from a specified file. By using this parameter, tcpdump can analyze the contents of the file and display the information about the captured network traffic. This allows users to examine packets that have been previously captured and saved to a file, providing a way to review and analyze network activity at a later time.

Submit
189. Which of these are valid logging levels?

Explanation

The valid logging levels in this question are Error, Warning, and Notice. These levels are commonly used in logging systems to categorize and prioritize log messages based on their severity or importance. Error level is used to indicate critical errors or failures, Warning level is used for potential issues or non-critical errors, and Notice level is used for general informational messages. The options Problem and Algorithm are not valid logging levels as they are not commonly used or recognized in logging systems.

Submit
190. What types of authentication to the SH appliance are supported?

Explanation

The SH appliance supports multiple types of authentication, including Local, Radius, and TACACS+. Local authentication allows users to authenticate using credentials stored locally on the SH appliance. Radius authentication enables users to authenticate using a remote Radius server. TACACS+ authentication allows users to authenticate using a TACACS+ server. These authentication methods provide flexibility and options for users to securely access the SH appliance based on their specific requirements and preferences.

Submit
191. Which of these are valid logging levels?

Explanation

The valid logging levels are "Info" and "Debug". Logging levels are used to categorize the severity or importance of log messages. "Info" level is used to provide general information about the program's execution, while "Debug" level is used for more detailed and low-level information that is useful for debugging purposes. "Commercial" is not a valid logging level as it does not convey any meaningful information about the program's execution or debugging process.

Submit
192. What are the three default licenses on the SH appliance?

Explanation

The three default licenses on the SH appliance are SDR (Scalable Data Referencing), Windows file servers (CIFS), and Microsoft Exchange (MAPI).

Submit
193. What are the valid WCCP control messages?

Explanation

The valid WCCP control messages are "Here I am," "I see you," "Redirect Assign," and "Removal Query." These messages are used in the Web Cache Communication Protocol (WCCP) to facilitate communication between a cache engine and a router. "Here I am" is a message sent by a cache engine to announce its presence to the router. "I see you" is a message sent by the router to acknowledge the cache engine's presence. "Redirect Assign" is a message sent by the router to assign a cache engine to a specific traffic flow. "Removal Query" is a message sent by the router to inquire about the status of a cache engine.

Submit
194. Which of these are valid logging levels?

Explanation

The valid logging levels in this question are Emergency, Alert, and Critical. These levels are commonly used in logging systems to categorize the severity of events or messages. Emergency level represents the highest level of severity, indicating a system-wide failure or a critical situation. Alert level signifies a condition that requires immediate attention. Critical level indicates a serious issue that needs to be addressed. Fine and Hazard are not recognized logging levels in most logging systems, hence they are not valid options.

Submit
195. A customer is seeking a performance improvement for a one-time bulk CIFS drag and drop of already-compressed data.  Which contributes most significantly to the performance improvement in this environment?

Explanation

Application Streamlining (CIFS Transaction Prediction) contributes most significantly to the performance improvement in this environment. This feature predicts and caches future CIFS transactions, reducing the amount of data that needs to be transferred over the network. This can greatly improve the performance of a one-time bulk CIFS drag and drop of already-compressed data by reducing the overall data transfer and optimizing the network usage. SDR, Limpel-Zev (LZ) Compression, and TCP Optimizations may also contribute to performance improvement, but Application Streamlining specifically targets CIFS transactions and can have a more significant impact in this scenario.

Submit
196. What types of IPSEC encryption are supported?

Explanation

The types of IPSEC encryption supported are DES and Null. DES (Data Encryption Standard) is a symmetric encryption algorithm that uses a 56-bit key. It is widely used but considered less secure compared to newer encryption algorithms. Null encryption, on the other hand, does not provide any encryption and is used when confidentiality is not required.

Submit
197. What are the three ways to improve WCCP performance?

Explanation

The three ways to improve WCCP performance are: using L2 return packets, using redirect IN on the router, and using fixed target rules to avoid WCCP altogether. Using L2 return packets allows the return traffic to bypass the WCCP router, improving performance. Using redirect IN on the router allows the router to redirect the traffic to the cache engine, reducing the load on the router. Using fixed target rules to avoid WCCP altogether eliminates the need for WCCP and its associated performance overhead. By implementing these methods, WCCP performance can be significantly improved.

Submit
198. What types of NAT are never supported by the SH appliances?  The arrow indicates the WAN router pair.

Explanation

not-available-via-ai

Submit
199. Which of the below are valid steps for resetting the SH password

Explanation

The correct answer is to first connect with the serial console and select E (GRUB), then select 'Kernel boot parameter' and delete "console=tty0". After that, press B to boot. Once the system is booted, use the CLI command to reset the password. Finally, type reboot and hit enter to restart the system.

Submit
200. What types of NAT are supported by the SH appliances?  The arrow indicates the WAN router pair.

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 27, 2009
    Quiz Created by
    Rgeneson
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What does the -v parameter mean in the tcpdump command?
What problem does overlapping open solve?
True or False:In overlapping open, the server steelhead handles...
Is overlapping open enabled by default on the SH?
When should you use a straight-through cable when wiring a SH...
What appliance port(s) are used in in-path deployments?
What appliance port(s) are used in virtual or logical in-path...
What appliance port(s) are used in server-side out-of-path...
If you receive a bad RST error (a RST packet sent from the client to...
If you receive a bad SYN/ACK error (a SYN/ACK packet not on port 7800...
If you receive a no SYN/ACK error (no SYN/ACK returned from the S-SH)...
If you receive a probe-filtered (not-AR) error (unable to send SYN+...
What is the Datastore Sync port?
What is the MAPI Exchange 2003 port?
What is the NAT port?
What is the NSPI port?
What is the in-path port?
What is the connection forwarding (neighbor) port?
What is the out-of-path port?
What is the failover port?
What is the CLI command to reset the SH's password to factory default?
Which models have a 1U profile?
Which models have a 3U profile?
Which models have a 200 GB raw disk capacity?
What is the raw disk capacity of the 2010/2510 models?
What is the raw disk capacity of the 3010/3510 models?
What is the raw disk capacity of the 5010 model?
Which models have a 80 GB data store capacity?
What is the data store capacity of the 2010/2510 models?
What is the data store capacity of the 3010/3510 models?
What is the data store capacity of the 5010 model?
Can you use PFS on 510 model hardware?
What is the PFS capacity of the 1010 model?
What is the PFS capacity of the 2010/2510, 3010/3510 and 5010 models?
What is the WAN capacity of the 510 model?
What is the WAN capacity of the 1010 model?
What is the WAN capacity of the 2010 model?
What is the WAN capacity of the 2510 model?
What is the WAN capacity of the 3010 model?
What is the WAN capacity of the 3510 model?
What is the WAN capacity of the 5010 model?
How many optimized TCP connections does the 510 model support (PFS...
How many optimized TCP connections does the 1010 model support (PFS...
How many optimized TCP connections does the 2010 model support (PFS...
How many optimized TCP connections does the 2510 model support (PFS...
How many optimized TCP connections does the 3010 model support (PFS...
How many optimized TCP connections does the 3510 model support (PFS...
How many optimized TCP connections does the 5010 model support (PFS...
When sizing out an SH opportunity how many connections per user should...
What internal redundancy options do the 3010, 3510 and 5010 models...
Can the primary and aux (auxiliary) ports of a steelhead appliance...
Using the above questions as an example, write out dual-sided NAT on...
Using the above questions as an example, write out client-side NAT...
Using the above questions as an example, write out server-side NAT...
Using the above questions as an example, write out dual sided NAT...
Convert AF22 to DSCP.
Convert AF43 to DSCP.
True or False:Peering rules apply to how the client-side steelhead...
What are the three types of peering rules?
What would the CLI command be to insert a peering rule before rule...
What would the CLI command be to move peering rule three to the first...
What is the CLI command to write the changes to memory?
What is the CLI command to add a pass-through rule (into the first...
What is the router command to troubleshoot WCCP service group 90 in...
What is the router command to troubleshoot WCCP service group 90...
Does netflow collect from the ingress or egress interface?
Does QoS get applied on the ingress or egress interface?
By default, how often do inactive netflow cache entries flush?
By default, how often do active netflow cache entries flush?
What other event will cause a netflow cache entry to flush?
What is the CLI command to do a tcpdump from Marcas's notes? ...
What is the CLI command to reset the SH appliance back to factory...
Is auto-discovery the active or passive discovery process?
The customer has an OC3 connection (155Mbps) with 50ms of round-trip...
What is the TCP ECHO port? (An interactive port commonly passed...
What is the Telnet port?  (An interactive port commonly passed...
What is the UDP/Time port?  (An interactive port commonly passed...
What is the Remote Telnet Service port?  (An interactive port...
What is the Border Gateway Protocol (BGP) port?  (An interactive...
What is the Remote Login port?  (An interactive port commonly...
What is the Shell port?  (An interactive port commonly passed...
What are the Citrix ports?  (Two interactive ports commonly...
What is the MS WBT, TS/Remote Desktop port?  (An interactive port...
What is the PC Anywhere port?  (An interactive port commonly...
What are the VNC ports?  (A range of interactive ports commonly...
What is the X11 port?  (An interactive port commonly passed...
What is the SSH port?  (A secure port commonly passed through the...
What is the TACACS port?  (A secure port commonly passed through...
What is the HTTPS port?  (A secure port commonly passed through...
What is the SMTPS port?  (A secure port commonly passed through...
What is the NNTPS port?  (A secure port commonly passed through...
What is the IMAP4-SSL port?  (A secure port commonly passed...
What is the SSHELL port?  (A secure port commonly passed through...
What is the LDAPS port?  (A secure port commonly passed through...
What is the FTPS-DATA port?  (A secure port commonly passed...
What is the FTPS port?  (A secure port commonly passed through...
What is the TelnetS port?  (A secure port commonly passed through...
What is the IMAPS port?  (A secure port commonly passed through...
What is the POP3S port?  (A secure port commonly passed through...
What is the L2TP port?  (A secure port commonly passed through...
What is the PPTP port?  (A secure port commonly passed through...
What is the TFTP over TLS port?  (A secure port commonly passed...
What speed should your terminal emulation software be set to to...
How many data bits should your terminal emulation software be set to...
What parity should your terminal emulation software be set to to...
How many stop bits should your terminal emulation software be set to...
What type of emulation should your terminal emulation software be set...
What flow control should your terminal emulation software be set to to...
What is the CLI command to allow optimization to continue after the...
What are the QoS class priorities (in order of priority)?
What is the CLI command to enable in-path support?
What is the CLI command to enable HTTP optimizations on ports 80 and...
What is the CLI command to enable wccp?
What is the CLI command to enable the steelhead optimization service?
What is the CLI command to enable server-side out-of-path operation?
What is the CLI command to re-run the initial configuration wizard?
What is the CLI command to enable virtual or logical in-path...
What is the CLI command to enable CIFS optimizations?
What is the CLI command to view your SH appliance's netflow export?
What is the CLI command to upload the debug file mixtron.cap to the...
When setting up auto-registration to the CMC what hostname must exist...
What is the CLI command to disable logical in-path functionality?
What is the CLI command to view the current in-path configuration?
What is the CLI command to enable netflow exports?
What is the CLI command to force the SH appliance to optimize SMB...
What is the CLI command to verify that the SSH can reach the CSH?
What is the CLI command to set up a netflow export?
What is the CLI command to show the in-path routing table for a...
What is the CLI command to revert to the last saved configuration?
What is the CLI command to disable CIFS write optimizations?
What is the CLI command to test for AR with a flood-ping?
What is the CLI command to enable CIFS dynamic write throttling?
What are the 8 logging levels in order of severity?
Type in the command used to show information regarding the current...
How do you view the full configuration in the CLI?
List the available in-path rule types:
What is the CLI command to list all the tcpdump files that have been...
What interfaces are used for netflow exports?
What are the three types of peering rules?
If a SH appliance has 4 or more ports which interface should be used...
In a failover set-up which interface is used to communicate with the...
What is the first command to enable Data-Store Sync (it defines the...
What is the second command to enable Data-Store Sync (it defines the...
What is the third command to enable Data-Store Sync (it defines the...
What is the forth command to enable Data-Store Sync (it defines the...
What is the fifth command to enable Data-Store Sync (it turns it on)?
What is the command to ready the receiving SH appliance for a one-time...
What is the command to ready the sending SH appliance for a one-time...
What types of optimization policy exist?
What is the router command to view the Cisco access list?
CLI Command to restart the optimization service and clear the data...
CLI Command to just restart optimization?
CLI Command to reboot the SH appliance?
CLI Command to Shutdown the SH appliance?
CLI Command to show the version of the software, the build...
CLI Command to display the RIOS boot image?
CLI Command to display high-speed TCP (HSTCP) settings?
CLI Command to display available RIOS images loaded onto the...
CLI Command to display the SH appliance interfaces?
CLI Command to clear all statistics?
CLI Command to clear the hardware-related event log?
CLI Command to set the connection pooling thread count?
CLI Command to set the default in-path port for the SH appliance?
CLI Command to set the VLAN tag for the VLAN the appliance belongs to?
CLI Command to enable connection forwarding (failover)?
CLI Command to configure a connection forwarding partner?
CLI Command to allow the SH to initiate a WCCP connection GRE but...
CLI Command to setup the active netflow timer?
CLI Command to setup the inactive netflow timer?
CLI Command to set the in-path gateway address for the SH appliance?
CLI Command (on a Cisco router) to force the router to verify the...
CLI Command to set the logging level of the SH appliance?
CLI command to set the syslog trap level?
CLI command to display the IPSEC configuration information and...
CLI command to generate a system dump?
CLI command to display the system dump files?
CLI command to delete existing debug files?
What is the directory path to the binaries?
What is the directory path to the kernel modules?
What is the directory path to the core dumps?
What is the directory path to the system dumps?
What is the directory path to the TCP dumps?
What is the directory path to the upgrade RIOS images?
What is the CLI command for a tcpdump (from the tcpdump page of the...
What does the -s parameter mean in the tcpdump command?
What does the -w parameter mean in the tcpdump command?
What does the -i parameter mean in the tcpdump command?
What does the -r parameter mean in the tcpdump command?
Which of these are valid logging levels?
What types of authentication to the SH appliance are supported?
Which of these are valid logging levels?
What are the three default licenses on the SH appliance?
What are the valid WCCP control messages?
Which of these are valid logging levels?
A customer is seeking a performance improvement for a one-time bulk ...
What types of IPSEC encryption are supported?
What are the three ways to improve WCCP performance?
What types of NAT are never supported by the SH appliances?  The...
Which of the below are valid steps for resetting the SH password
What types of NAT are supported by the SH appliances?  The arrow...
Alert!

Advertisement