Which statement about TLS is accurate when using RESTCONF to write configurations on network devices?

Which statement about TLS is accurate when using RESTCONF to write configurations on network devices?A . It requires certificates for authenticationB . It is provided using NGINX acting as a proxy web serverC . It is used for HTTP and HTTPS requestsD . It is not supported on Cisco devicesView...

August 4, 2022 No Comments READ MORE +

At which Layer does Cisco DNA Center support REST controls?

At which Layer does Cisco DNA Center support REST controls?A . EEM applets or scriptsB . Session layerC . YMAL output from responses to API callsD . Northbound APIsView AnswerAnswer: D

August 4, 2022 No Comments READ MORE +

Which method can a client use to authenticate to the network?

Refer to the exhibit. Based on the configuration in this WLAN security setting. Which method can a client use to authenticate to the network?A . text stringB . username and passwordC . certificateD . RADIUS tokenView AnswerAnswer: A

August 4, 2022 No Comments READ MORE +

Which configuration achieves this goal?

Refer to the exhibit. Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?A . line vty 0 15 absolute-timeout 600B . line vty 0 15 exec-timeoutC . line vty 01 5 exec-timeout 10 0D . line vty 0 4 exec-timeout 600View AnswerAnswer:...

August 4, 2022 No Comments READ MORE +

Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?

An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?A . wlcbostname.domain.comB . cisco-capwap-controller.domain.comC . ap-manager.domain.comD . primary-wlc.domain.comView AnswerAnswer: B Explanation: DNS: If you have configured your DHCP server to provide both...

August 4, 2022 No Comments READ MORE +

When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?

When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?A . NTP serverB . PKI serverC . RADIUS serverD . TACACS serverView AnswerAnswer: C

August 4, 2022 No Comments READ MORE +

What does the output verify?

A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?A . The tunnel will be established and work as expectedB . The tunnel destination will be known via the tunnel interfaceC . The tunnel keepalive is configured incorrectly because they must...

August 4, 2022 No Comments READ MORE +

Drag and drop the threat defense solutions from the left onto their descriptions on the right

DRAG DROP Drag and drop the threat defense solutions from the left onto their descriptions on the right. View AnswerAnswer:

August 4, 2022 No Comments READ MORE +

How does the RIB differ from the FIB?

How does the RIB differ from the FIB?A . The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.B . The FIB includes many routes a single destination. The RIB is the best route to a single destination.C...

August 3, 2022 No Comments READ MORE +

Which method of account authentication does OAuth 2.0 within REST APIs?

Which method of account authentication does OAuth 2.0 within REST APIs?A . username/role combinationB . access tokensC . cookie authenticationD . basic signature workflowView AnswerAnswer: B Explanation : The most common implementations of OAuth (OAuth 2.0) use one or both of these tokens: + access token: sent like an API...

August 3, 2022 No Comments READ MORE +