Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?
Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?A . efficient scalabilityB . virtualizationC . storage capacityD . supported systemsView AnswerAnswer: A
At which Layer does Cisco DNA Center support REST controls?
At which Layer does Cisco DNA Center support REST controls?A . EEM applets or scriptsB . Session layerC . YMAL output from responses to API callsD . Northbound APIsView AnswerAnswer: D
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?A . monitor session 2 source interface gigabitethernet0/3 tx monitor session 2 filter vlan 3B . monitor session 2 source interface gigabitethernet0/3 tx monitor session 2...
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?A . MTUB . Window sizeC . MRUD . MSSView AnswerAnswer: D Explanation: The TCP Maximum Segment Size (TCP MSS) defines the maximum amount of data that a host is willing to accept in a single...
Which two methods are used to reduce the AP coverage area? (Choose two)
Which two methods are used to reduce the AP coverage area? (Choose two)A . Reduce channel width from 40 MHz to 20 MHzB . Disable 2.4 GHz and use only 5 GHz.C . Reduce AP transmit power.D . Increase minimum mandatory data rateE . Enable FastlaneView AnswerAnswer: C D
What does the snippet of code achieve?
Refer to the exhibit. What does the snippet of code achieve?A . It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.B . It opens a tunnel and encapsulates the login information, if the host key is correct.C . It...
How is 802.11 traffic handled in a fabric-enabled SSID?
How is 802.11 traffic handled in a fabric-enabled SSID?A . centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLCB . converted by the AP into 802.3 and encapsulated into VXLANC . centrally switched back to WLC where the user traffic is mapped...
Which two operations are valid for RESTCONF? (Choose two.)
Which two operations are valid for RESTCONF? (Choose two.)A . HEADB . REMOVEC . PULLD . PATCHE . ADDF . PUSHView AnswerAnswer: AD Explanation: RESTCONF operations include OPTIONS, HEAD, GET, POST, PATCH, DELETE.
Which configuration achieves this goal?
Refer to the exhibit. Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?A . line vty 0 15 absolute-timeout 600B . line vty 0 15 exec-timeoutC . line vty 01 5 exec-timeout 10 0D . line vty 0 4 exec-timeout 600View AnswerAnswer:...
Refer to the Exhibit
DRAG DROP Refer to the Exhibit. Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used View AnswerAnswer: