Which design practice hardens a network device implementation?

Management protocols like NETCONF access network elements on well-known ports. Which design practice hardens a network device implementation?A . Specify the source interface for SSC . Limit access to port 830, well-known clients, and SSH VTE . Enable CoPG . Configure ip http secure-server.View AnswerAnswer: B

December 9, 2018 No Comments READ MORE +

Which two statements about the NX-API are true? (Choose two.)

Which two statements about the NX-API are true? (Choose two.)A . NX-API supports XML-RPCB . NX-API is enabled by defaultC . NX-API supports JSON-RPE . The nxapi_auth cookie expires in 30 minutes.F . NX-API maps to NX-05 NETCONView AnswerAnswer: CD

December 8, 2018 No Comments READ MORE +

Visore uses which protocol to retrieve information from the Cisco ARIC?

Visore uses which protocol to retrieve information from the Cisco ARIC?A . REST APIB . OpFiexC . gRPCD . Visore APIE . MongoDBView AnswerAnswer: C

December 6, 2018 No Comments READ MORE +

Which two statements about OpenFlow are true? (Choose two.)

Which two statements about OpenFlow are true? (Choose two.)A . The Open Flow table contains header fields, counters, and actions.B . OpenFlow automatically determines network forwarding rules.C . OpenFlow interfaces with the management plane.D . OpenFlow is a southbound protocol.E . OpenFlow is an agentless technology, like Ansible.F . OpenFlow...

December 5, 2018 No Comments READ MORE +

Where is the node-ui.log stored on the Cisco APIC-EM appliance?

Where is the node-ui.log stored on the Cisco APIC-EM appliance?A . in the /var/log/grapevine/services/node-ui directory within the container that is running the node-ui instanceB . in the Cassandra database instance that is running within the container that is running the node-ui instanceC . in the /opt/CSCOapicem/logs/node-ui directory within the Cisco...

December 3, 2018 No Comments READ MORE +

Which ACI object is used to divide two applications that use the same IP address?

Which ACI object is used to divide two applications that use the same IP address?A . bridge domainB . EPGC . VRFD . tenantView AnswerAnswer: C

November 28, 2018 No Comments READ MORE +

Which technology should the organization consider for the southbound interface?

An organization leverages a multivendor network to sell connectivity services using Layer 3 VPN and VPLS. Where possible, the organization wants to use common APis across vendors, in order to automate the configuration of network services. Which technology should the organization consider for the southbound interface?A . BGP-LSB . OpFlexC...

November 28, 2018 No Comments READ MORE +

Which two security techniques are important to implement a secured management network that is used to access the management plane of a Cisco ARC cluster? (Choose two.)

Which two security techniques are important to implement a secured management network that is used to access the management plane of a Cisco ARC cluster? (Choose two.)A . MPPB . NATC . ip filterD . ACLsE . route mapsView AnswerAnswer: AD Explanation: The Management Plane Protection (MPP) feature in Cisco...

November 27, 2018 No Comments READ MORE +

Drag and drop the technology on the left to its appropriate use case on the right.

Drag and drop the technology on the left to its appropriate use case on the right. View AnswerAnswer:

November 24, 2018 No Comments READ MORE +

What is a possible reason this delay?

Cisco APIC-EM is used to add a network-wide marking policy for Cisco Spark users who are connected to a Cisco Catalyst 6500 device. After this change, wireless users complain about a delay in other applications. What is a possible reason this delay?A . The DSCP-to-CoS mappings were configured incorrectly.B ....

November 21, 2018 No Comments READ MORE +