Which exhibit displays a valid JSON file?
Which exhibit displays a valid JSON file? A) B) C) D) A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: D
Which two actions fix this issue?
A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)A . Remove UNII-2...
What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?
Refer to Exhibit. MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?A . The packet arrives...
What is a characteristic of MACsec?
What is a characteristic of MACsec?A . 802.1AE provides encryption and authentication services B. 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session C. 802.1AE is bult between the host and switch...
What are two characteristics of VXLAN? (Choose two)
What are two characteristics of VXLAN? (Choose two)A . It uses VTEPs to encapsulate and decapsulate frames. B. It has a 12-bit network identifier C. It allows for up to 16 million VXLAN segments D. It lacks support for host mobility E. It extends Layer 2 and Layer 3 overlay...
Which method of account authentication does OAuth 2.0 within REST APIs?
Which method of account authentication does OAuth 2.0 within REST APIs?A . username/role combination B. access tokens C. cookie authentication D. basic signature workflowView AnswerAnswer: B Explanation: The most common implementations of OAuth (OAuth 2.0) use one or both of these tokens: + access token: sent like an API key,...
Which configuration achieves this goal?
Refer to the exhibit. Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?A . line vty 0 15 absolute-timeout 600 B. line vty 0 15 exec-timeout C. line vty 01 5 exec-timeout 10 0 D. line vty 0 4 exec-timeout 600View AnswerAnswer:...
Which line must be added in the Python function to return the JSON object {"cat_9k": “FXS193202SE")?
Which line must be added in the Python function to return the JSON object {"cat_9k": “FXS193202SE")? A) B) C) D) A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: D
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?A . MACsec B. IPsec C. SSL D. Cisco TrustsecView AnswerAnswer: A Explanation: MACsec, defined in 802.1AE, provides MAC-layer encryption over wired networks by using out-ofband methods for encryption keying. The MACsec Key Agreement...
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?A . event manager applet ondemand event register action 1.0 syslog priority critical msg 'This is a message from ondemand' B. event manager applet ondemand event manual action 1.0 syslog priority critical msg...