Skip to content

Domain 1 Answer Key

Agent Types

1.1 Question 1

An architect needs to analyze network path metrics from their internal network, specifically from the access layer to a cloud-hosted web server. Which ThousandEyes agent is most appropriate for this task?

  • A) Synthetic Agent
  • B) Enterprise Agent
  • C) Cloud Agent
  • D) Endpoint Agent
Explanation

The correct answer is B) Enterprise Agent because it:

  • Meets all requirements, especially collecting the path from the internal network to the cloud provider
  • Can be installed on access switches, as implicitly asked in the question

Incorrect answers:

  • A) This answer is a distractor, as all ThousandEyes agents are synthetic agents
  • C) Would not provide insights from the internal network
  • D) Good for internal network insights but cannot be installed on access switches

1.1 Question 2

A network engineer is investigating widespread reports of poor performance for a data center-hosted web application. Which ThousandEyes agent type would be most effective for quickly identifying the root cause?

  • A) Synthetic Agent
  • B) Enterprise Agent
  • C) Endpoint Agent
  • D) Cloud Agent
Explanation

The correct answer is D) Cloud Agent because:

  • They are pre-deployed by ThousandEyes and immediately available
  • They provide diverse geographical perspectives without requiring infrastructure ownership
  • There are 200+ observation points worldwide

Incorrect answers:

  • A) This answer is a distractor, as all ThousandEyes agents are synthetic agents
  • B) This answer choice could be a distractor if the reader misinterprets the data center as the observation point rather than the target
  • C) Would need to be installed on machines where customers are connecting, which is a less practical solution for this scenario

1.1 Question 3

An architect needs to measure end-user experience for internal web applications and SaaS products. Which ThousandEyes agent should be deployed for this purpose?

  • A) Synthetic Agent
  • B) Enterprise Agent
  • C) Cloud Agent
  • D) Endpoint Agent
Explanation

The correct answer is D) Endpoint Agent because:

  • It is directly installed on the user’s workstation which provides individual insights on any problem the web application and SaaS platforms may experience

Incorrect answers:

  • A) This answer is a distractor, as all ThousandEyes agents are synthetic agents
  • B) Cannot be deployed to the user’s machine
  • C) You can’t select the location of the agent, as they are pre-deployed, making it difficult to use for a specific user location to measure end-user experience.

Agent Location

1.2 Question 1

A network engineer wants to measure their SD-WAN performance metrics. Which agent deployment method is most suitable for this scenario?

  • A) Install an agent on the overlay network
  • B) Install an agent on the DMZ
  • C) Install an agent on their LAN
  • D) Install an agent on the underlay network
Explanation

The correct answer is A) Install an agent on the overlay network because:

  • It proactively measures and monitors SD-WAN performance and routing policy validation which is the overlay

Incorrect answers:

  • B) Installing an agent on the DMZ does not guarantee being able to run tests on the Overlay network
  • C) The LAN is the wrong location as this is an internal network, not part of the SD-WAN tunnel
  • D) This is if you want to gain hop-by-hop visibility into the network underlay, not measure SD-WAN

1.2 Question 2

A network engineer needs to monitor the performance of a business-critical web application accessed by remote employees connecting through a Cisco AnyConnect VPN. Which two agent deployment methods are most suitable for this scenario? (Choose two)

  • A) Deploy ThousandEyes Cloud Agents in the same geographical regions as the remote employees
  • B) Integrate ThousandEyes with Cisco AppDynamics to monitor application performance from the server-side
  • C) Deploy ThousandEyes Enterprise Agents on the VPN concentrator where the AnyConnect clients terminate
  • D) Utilize the ThousandEyes Endpoint Agent and deploy it on a subset of remote employee machines running Cisco AnyConnect
  • E) Configure ThousandEyes tests from Enterprise Agents located in the data center where the web application is hosted
Explanation

This question tests the understanding of various agent types and their deployment methods in the context of monitoring VPN-connected users.

Correct Answers:

  • C) Deploying Enterprise Agents on the VPN concentrator provides visibility into the VPN tunnel itself. This helps identify if issues stem from the VPN infrastructure or beyond.
  • D) Deploying Endpoint Agents on employee machines offers a true representation of the end-user experience, encompassing everything from the user's device, home network, and the VPN connection to the application.

Incorrect Answers:

  • A) While helpful for general internet performance insights, Cloud Agents won't have visibility into the VPN tunnel.
  • B) AppDynamics focuses on application performance monitoring (APM), providing server-side insights. While valuable, it doesn't replace network-level monitoring for VPN users.
  • E) Data center-based tests lack visibility into the remote employee's network path, including the VPN connection.

Active and Passive Monitoring

1.3 Question 1

Which of the following is an example of active monitoring in network performance management?

  • A) Analyzing SNMP data to observe interface utilization on a router
  • B) Capturing packets on a network segment to identify the top talkers
  • C) Sending a continuous ping from one office to another to measure latency
  • D) Collecting NetFlow records to analyze traffic patterns over time
Explanation

The correct answer is C) Sending a continuous ping from one office to another to measure latency because it generates and injects synthetic traffic into the network to directly measure performance metrics such as latency, allowing for proactive testing of network performance.

Incorrect Answers:

  • A) Analyzing SNMP data is passive monitoring
  • B) Capturing packets is passive monitoring
  • D) Collecting NetFlow records is passive monitoring

1.3 Question 2

What is a primary advantage of passive monitoring over active monitoring?

  • A) Passive monitoring can measure the network's performance under synthetic conditions
  • B) Passive monitoring can provide real-time data on network performance without adding traffic to the network
  • C) Passive monitoring allows for the generation of test traffic to simulate user behavior
  • D) Passive monitoring can directly measure the performance of specific network services or protocols
Explanation

The correct answer is B) Passive monitoring can provide real-time data on network performance without adding traffic to the network because it highlights a key advantage of passive monitoring, which is the ability to monitor the network using actual traffic without introducing additional load or overhead

Incorrect answers:

  • A) This is an active monitoring technique, as this will generate synthetic traffic and can potentially add load to the network
  • C) Passive monitoring allows for the generation of test traffic to simulate user behavior: This is an active monitoring technique, as this will generate synthetic traffic and can potentially add load to the network
  • D) This is an active monitoring technique, as this will generate synthetic traffic and can potentially add load to the network

WAN Insights

1.4 Question 1

A network administrator observes a recurring pattern in their Cisco SD-WAN: during peak business hours, users at a specific branch office experience poor voice call quality, characterized by choppy audio and delays. The administrator suspects that network congestion is contributing to this issue and wants to leverage ThousandEyes WAN Insights to improve the situation proactively. Which capability of WAN Insights is most relevant to this scenario?

  • A) Monitoring the public internet paths to the voice call service provider and identifying outages or performance bottlenecks.
  • B) Analyzing historical SD-WAN performance data during peak hours and recommending alternative paths that prioritize voice traffic based on its SLA.
  • C) Generating synthetic voice traffic to proactively test network paths and identify potential congestion points during peak hours.
  • D) A set of network management tools that leverage SNMP and flow protocols into a single dashboard
  • E) Providing real-time alerts on security threats targeting voice traffic within the SD-WAN.
Explanation

By considering past network conditions and the specific performance needs of voice traffic (defined by SLAs), WAN Insights can recommend alternative paths that are better equipped to handle the load and maintain call quality, even during peak hours. This allows administrators to proactively address congestion before it significantly impacts users.

1.4 Question 2

ThousandEyes WAN Insights integrates with Cisco SD-WAN to provide visibility into network performance and generate path recommendations. Which two data sources from the SD-WAN environment are essential for WAN Insights to function?

  • A) Configuration data from vManage, such as device templates and centralized policy settings.
  • B) Historical network performance metrics collected by vAnalytics, including loss, latency, and jitter for SD-WAN tunnels.
  • C) Data collected from ThousandEyes endpoint agents installed on end-user devices within the SD-WAN.
  • D) Application traffic flow data from the SD-WAN data plane, categorized by vManage application lists.
  • E) Syslog messages from SD-WAN edge routers, indicating device events and errors related to tunnel establishment.
Explanation

WAN Insights requires two primary data sources: historical performance metrics from vAnalytics (like loss, latency, and jitter) and application traffic flow data categorized by vManage application lists. This data allows WAN Insights to understand past network conditions and how different applications are performing on various paths.

Cisco Integrations

1.5 Question 1

What type of agent is typically installed on Cisco SD-WAN devices as part of the ThousandEyes integration with vManage?

  • A) Cloud Agent
  • B) Browser Agent
  • C) Enterprise Agent
  • D) Endpoint Agent
Explanation

The correct answer is C) Enterprise Agent because Enterprise Agents are deployed within the Cisco SD-WAN devices to provide detailed network performance data and insights, which can be managed through the vManage console.

Incorrect answers:

  • A) Cloud Agents live on the ThousandEyes managed infrastructure
  • B) ThousandEyes has a browser extension but is not considered an agent and is used to monitor user browser sessions from the Endpoint Agent
  • D) Endpoint Agents cannot be deployed to Cisco SD-WAN devices

1.5 Question 2

What is the primary purpose of integrating ThousandEyes with Meraki?

  • A) To deploy Endpoint Agents for VPN connectivity monitoring
  • B) To monitor external applications and services from SD-WAN sites
  • C) To enhance cloud security and compliance
  • D) To manage user access policies and permissions
Explanation

The correct answer is B) To monitor external applications and services from SD-WAN sites because the integration of ThousandEyes with Meraki enables distributed organizations to effectively monitor external applications and services from their SD-WAN sites.

Incorrect answers:

  • A) This is not a supported deployment type for the Meraki integration
  • C) Monitoring services and applications can be viewed as a means to meet security and compliance standards
  • D) The primary function is to monitor the remote employee connecting through these branches, enforcing access policies is outside the scope of the Meraki-ThousandEyes integration

1.5 Question 3

What type of data does ThousandEyes use to diagnose when integrated with Cisco Secure Client?

  • A) Data related to network hardware configurations
  • B) Data related to user activity and behavior
  • C) Network performance data from the user's device
  • D) Data related to secure web gateway performance
Explanation

The correct answer is C) Network performance data from the user's device because when integrated with Cisco Secure Client, ThousandEyes collects network performance data directly from the user's device to monitor and diagnose issues related to remote connectivity, including VPN performance.

Incorrect answers:

  • A) While network hardware configurations are important, ThousandEyes primarily focuses on network performance metrics rather than hardware configuration details.
  • B) ThousandEyes is a network intelligence platform that monitors network performance. It does not focus on user activity and behavior which would be more relevant to user monitoring.
  • D) ThousandEyes doesn't user data related to secure web gateway performance when integrated with Cisco Secure Client.

1.5 Question 4

What advantage does the integration of ThousandEyes with Cisco technologies offer for troubleshooting?

  • A) It eliminates the need for manual data entry.
  • B) It provides real-time virtual assistance to end-users.
  • C) It automates network configuration changes based on user feedback.
  • D) It allows for quick identification and resolution of performance issues.
Explanation

The correct answer is D) It allows for quick identification and resolution of performance issues. because the integration of ThousandEyes with Cisco technologies provides comprehensive monitoring and visibility into network performance, enabling IT teams to quickly identify and troubleshoot issues.

Incorrect answers:

  • A) While ThousandEyes can complement network management by providing visibility into network performance, it is not specifically a network management tool for configuring and managing Cisco routers and switches.
  • B) ThousandEyes does provide visibility into networks within and outside the network engineer's control which helps identify security attacks such as DDoS, BGP Hijacks and Route Leaks quickly but it does not automate the prevention of such attacks.
  • C) While automation may be a feature of some Cisco technologies, the integration of ThousandEyes itself does not automate network configuration changes base don user feedback.

1.5 Question 5

The network team has deployed Webex RoomOS Endpoint Agents and integrated Webex Control Hub with ThousandEyes. The VoIP team wants to know which metrics they can collect from the Webex Control Hub view. Where does the VoIP team find the network data?

  • A) Devices
  • B) Network Path
  • C) Users
  • D) Settings
Explanation

The correct answer is B) Network Path because this network visualization pane displays what is known as path visualization in ThousandEyes, where the hop-by-hop network nodes from the device to the Webex server are shown.

Incorrect answers:

  • A) In this section you can add or manage all the devices for your organization that are assigned to a user or part of a place.
  • C) This is the section for user management.
  • D) In this section you can configure and customize organization-wide settings for Webex.

Metric Baseline

1.6 Question 1

A network administrator wants to establish a baseline for CPU utilization on their core routers. Which data source would be MOST appropriate for this purpose?

  • A) DNS resolution time from ThousandEyes tests
  • B) HTTP Server response times from ThousandEyes tests
  • C) SNMP data collected from the routers
  • D) Network path visualization from ThousandEyes tests
Explanation

The correct answer is C) SNMP data collected from the routers because SNMP is specifically designed for collecting device-level metrics like CPU utilization, memory usage, and interface statistics.

Incorrect answers:

  • A) DNS resolution is an unrelated metric to device performance.
  • B) HTTP is an unrelated metric to device performance.
  • D) Path visualization is a graphical representation of the traces sent from the agent to the destination.

1.6 Question 2

What is an important consideration when choosing a time period for collecting data to establish a baseline for interface utilization on a critical network link?

  • A) Selecting the time period with the lowest network traffic volume.
  • B) Ensuring the time period aligns with the organization's financial year.
  • C) Capturing both peak and off-peak traffic patterns for a representative view.
  • D) Limiting the time period to minimize the amount of data that needs to be analyzed.
Explanation

The correct answer is C) Capturing both peak and off-peak traffic patterns for a representative view because it's essential to capture the full spectrum of network behavior, including both peak and off-peak traffic patterns. This provides a more accurate and representative understanding of how the interface is utilized under different load conditions.

Incorrect answers:

  • A) Choosing a time period with the lowest network traffic volume would not provide a representative baseline for interface utilization. It is important to capture data that reflects normal operating conditions, including both high and low traffic periods.
  • B) Taking only the organization's financial year would not be an accurate representation to establishing a baseline for network interface utilization. The focus should be on capturing typical network usage patterns rather than aligning with financial cycles.
  • D)While it may be convenient to limit the amount of data for analysis, doing so could result in an incomplete or skewed baseline that does not accurately reflect the network link's utilization. It is important to collect enough data over a sufficient time period to ensure the baseline is representative of actual usage.

Integration Types

1.7 Question 1

Your organization wants to be notified of an event as soon as it is triggered by an alert threshold. This notification should be sent to their ITSM and generate an incident so it can be responded to appropriately. Select a valid built-in integration that could be used:

  • A) ServiceNow Integration
  • B) DNA Center Integration
  • C) Custom Webhooks
  • D) Alerts API
Explanation

The correct answer is A) ServiceNow Integration because it is the only built-in option available.

Important note:

While option C) Custom Webhooks is another route to create alerts if ITSM is not already available as a built-in option, but the scenario does not mention that the ITSM is not available, making this the second-best choice.

1.7 Question 2

You have been tasked with creating a dashboard in your organization’s Observability platform. This dashboard should have data that is streamed in real-time and used to populate data for tables, graphs, charts, and other formats. What kind of integration should you use?

  • A) API Endpoints
  • B) OpenTelemetry
  • C) DNA Center Integration
  • D) Alert Thresholds
Explanation

The correct answer is B) OpenTelemetry because:

  • OpenTelemetry is used for streaming metrics from tests in real-time to an observability platform. These streams can be processed to create helpful graphs, charts, tables, or other visualizations.

Incorrect answers:

  • A) While the API is extremely flexible and can give data to be presented in any method you see fit, it is not streamed in real-time. The API is queried only as frequently as it is configured to be called.
  • C) The DNA Center Integration leverages the ThousandEyes API to present relevant data to be displayed within the DNA Center interface.
  • D) Alert Thresholds are used to send alert notifications when their conditions are met. While these notifications are sent shortly after the alert thresholds are reached, they are not a real-time stream of the data produced by the tests.

1.7 Question 3

ThousandEyes offers several native integrations for receiving instant event notifications triggered by alerts. Which of the following integrations are available directly within the ThousandEyes platform? Select all that apply.

  • A) ServiceNow
  • B) PagerDuty
  • C) MS Teams
  • D) Splunk
  • E) AWS
  • F) AppDynamics
  • G) Webex
  • H) Slack
Explanation

The correct answer are A) ServiceNow, B) PagerDuty, E) AWS, F) AppDynamics, and H) Slack

Incorrect answers:

  • C) MS Teams: Supported through custom webhooks, but not natively integrated at the time of writing
  • D) Splunk: Alert notifications are possible via email A separate Splunk integration exists for data collection with OTEL, but not for alerts
  • G) Webex: While a Webex Control Hub integration exists, it doesn't support alert notifications

Cisco Network Assurance Platforms Selection

1.8 Question 1

You are a network engineer at a multinational corporation responsible for ensuring optimal performance and security across various environments, including remote hybrid workers, branch offices, and cloud services. Select a SaaS-based Network Assurance platform that enables comprehensive monitoring and visibility into hybrid worker activities, internet traffic, and branch office connectivity.

  • A) Meraki Insights
  • B) AppDynamics
  • C) ThousandEyes
  • D) Catalyst Center
Explanation

The correct answer is C) ThousandEyes because:

  • ThousandEyes provides Internet/ISP path visibility to applications and services wherever they are hosted. Endpoint Agents cover hybrid workers, while Enterprise Agents cover branch offices and cloud services.

Incorrect answers:

  • A) Provides valuable insights for Meraki networks but may not comprehensively cover hybrid workers, internet traffic, and branch offices if different hardware/vendors are used.
  • B) Focuses on application performance monitoring, not network assurance
  • D) An on-premises solution, not SaaS-based

1.8 Question 2

As a network engineer, you need to select a network assurance platform that provides end-to-end visibility and metrics for remote workers accessing SaaS applications. The solution should monitor the user experience from the endpoint device, through the VPN, across the internet, and to the SaaS provider. Which platform is best suited for this use case?

  • A) Catalyst Center
  • B) AppDynamics
  • C) Meraki Insights
  • D) ThousandEyes
Explanation

The correct answer is D) ThousandEyes because:

  • ThousandEyes Endpoint Agents can monitor the user experience from the remote worker’s device, providing metrics on WiFi, VPN, and system performance.
  • Tests can measure network and application metrics from the endpoint across the internet to the SaaS provider, giving end-to-end visibility.

Incorrect answers:

  • A) Focuses on managing on-premises Cisco networks and lacks the SaaS and internet visibility needed here.
  • B) Is application-centric and would require integration with ThousandEyes for the network visibility aspects.
  • C) Is valuable for Meraki-based networks but may not cover the end-to-end visibility from the remote endpoint to the SaaS provider if other network components are involved.

1.8 Question 3

Which network assurance platform is best for providing network visibility and performance across any network, where metrics can be correlated with application-level metrics, including for services in multi-cloud deployments?

  • A) Catalyst Center
  • B) AppDynamics
  • C) Meraki Insights
  • D) ThousandEyes
Explanation

The correct answer is D) ThousandEyes because it's a network intelligence platform specifically designed for comprehensive network visibility. It monitors any network and correlates network metrics with application performance, making it ideal for campus networks and multi-cloud deployments.

Incorrect answers:

  • A) Catalyst Center: Focuses on network management and automation, not network performance visibility
  • B) AppDynamics: Primarily an application performance management (APM) tool. While it offers some network visibility, it's not its core strength
  • C) Meraki Insights: Provides network insights but is often tied to Meraki hardware and may not be as comprehensive as ThousandEyes, especially in multi-cloud environments