What is the issue?

Refer to the exhibit. POSTMAN is showing an attempt to retrieve network device information from Cisco DNA Center API. What is the issue?A . The URI string is incorrect B. The token has expired. C. Authentication has failed D. The JSON payload contains the incorrect UUIDView AnswerAnswer: A

November 4, 2022 No Comments READ MORE +

Which two actions fix this issue?

A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)A . Remove UNII-2...

November 3, 2022 No Comments READ MORE +

Which command should the engineer apply to switch SW2 to resolve this issue?

Refer to the exhibit. An engineer attempts to configure a trunk between switch sw1 and switch SW2 using DTP, but the trunk does not form. Which command should the engineer apply to switch SW2 to resolve this issue?A . switchport mode dynamic desirable B. switchport nonegotiate C. no switchport D....

November 3, 2022 No Comments READ MORE +

Which algorithms are used to secure REST API from brute attacks and minimize the impact?

Which algorithms are used to secure REST API from brute attacks and minimize the impact?A . SHA-512 and SHA-384 B. MD5 algorithm-128 and SHA-384 C. SHA-1, SHA-256, and SHA-512 D. PBKDF2, BCrypt, and SCryptView AnswerAnswer: D Explanation: One of the best practices to secure REST APIs is using password hash....

November 3, 2022 No Comments READ MORE +

What is the Json syntax that is formed from the data?

Refer to the exhibit. What is the Json syntax that is formed from the data?A . {Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]} B. {"Name": "Bob Johnson", "Age": 75, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]} C. {"˜Name': "˜Bob Johnson', "˜Age': 75, "˜Alive': True, "˜Favorite...

November 3, 2022 No Comments READ MORE +

What is the difference between CEF and process switching?

What is the difference between CEF and process switching?A . CEF processes packets that are too complex for process switching to manage. B. CEF is more CPU-intensive than process switching. C. CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet. D....

November 3, 2022 No Comments READ MORE +

Which two methods are used to reduce the AP coverage area? (Choose two)

Which two methods are used to reduce the AP coverage area? (Choose two)A . Reduce channel width from 40 MHz to 20 MHz B. Disable 2.4 GHz and use only 5 GHz. C. Reduce AP transmit power. D. Increase minimum mandatory data rate E. Enable FastlaneView AnswerAnswer: C,D

November 2, 2022 No Comments READ MORE +

What does the response indicate?

An engineer runs the code against an API of Cisco DMA Center, and the platform returns this output. What does the response indicate?A . The authentication credentials are incorrect B. The URl string is incorrect. C. The Cisco DNA Center API port is incorrect D. The HTTP method is incorrectView...

November 2, 2022 No Comments READ MORE +

Based on the output, which action resolves this issue?

Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?A . Configure less member ports on Switch2. B. Configure the same port channel interface number on both switches C. Configure...

November 2, 2022 No Comments READ MORE +

Drag and drop the characteristics from the left onto the orchestration tools they describe on the right

DRAG DROP Drag and drop the characteristics from the left onto the orchestration tools they describe on the right. View AnswerAnswer:

November 2, 2022 No Comments READ MORE +