Which command set must be applied to the NewYork switch to resolve the issue?
Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?A . NewYork(config)#no interface po1 NewYork(config)#interface range fa0/1-2 NewYork(config-if)#channel-group 1 mode negotiate NewYork(config-if)#end NewYork# B. NewYork(config)#no interface po1 NewYork(config)#interface range fa0/1-2 NewYork(config-if)#channel-group 1 mode on...
What is a characteristic of a virtual machine?
What is a characteristic of a virtual machine?A . It must be aware of other virtual machines, in order to allocate physical resources for them B. It is deployable without a hypervisor to host it C. It must run the same operating system as its host D. It relies on...
Which JSON syntax is valid?
Which JSON syntax is valid?A . {“switch”:”name”:”dist1″,”interfaces”:[“gig1″,”gig2″,”gig3”]} B. {„switch‟:(„name‟:‟dist1′,‟interfaces‟:[„gig1′,‟gig2′,‟gig3‟])} C. {“switch”:{“name”:”dist1″,”interfaces”:[“gig1″,”gig2″,”gig3”]}} D. {/”switch/”:{/”name/”:”dist1″,/”interfaces/”:[“gig1″,”gig2″,”gig3”]}}View AnswerAnswer: C Explanation: This JSON can be written as follows: { 'switch': { 'name': 'dist1', 'interfaces': ['gig1', 'gig2', 'gig3'] } }
What is a fact about Cisco EAP-FAST?
What is a fact about Cisco EAP-FAST?A . It does not require a RADIUS server certificate. B. It requires a client certificate. C. It is an IETF standard. D. It operates in transparent mode.View AnswerAnswer: A
Which protocol does the design include?
A customer requests a network design that supports these requirements: Which protocol does the design include?A . HSRP version 2 B. VRRP version 2 C. GLBP D. VRRP version 3View AnswerAnswer: D
Which router is the designated router on the segment 192.168.0.0/24?
Refer the exhibit. Which router is the designated router on the segment 192.168.0.0/24?A . This segment has no designated router because it is a nonbroadcast network type. B. This segment has no designated router because it is a p2p network type. C. Router Chicago because it has a lower router...
Which algorithms are used to secure REST API from brute attacks and minimize the impact?
Which algorithms are used to secure REST API from brute attacks and minimize the impact?A . SHA-512 and SHA-384 B. MD5 algorithm- 128 and SHA-384 C. SHA- 1, SHA-256, and SHA-512 D. PBKDF2, BCrypt, and SCryptView AnswerAnswer: D Explanation: One of the best practices to secure REST APIs is using...
Drag and drop the characteristics from the left onto the orchestration tools they describe on the right
DRAG DROP Drag and drop the characteristics from the left onto the orchestration tools they describe on the right. View AnswerAnswer:
Which protocol does REST API rely on to secure the communication channel?
Which protocol does REST API rely on to secure the communication channel?A . TCP B. HTTPS C. SSH D. HTTPView AnswerAnswer: B Explanation: The REST API accepts and returns HTTP (not enabled by default) or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents. You...
What is the effect of this configuration?
Refer to the exhibit. What is the effect of this configuration?A . When users attempt to connect to vty lines 0 through 4, the device will authenticate them against TACACS+ if local authentication fails B. The device will authenticate all users connecting to vty lines 0 through 4 against TACACS+...