Which two operations are valid for RESTCONF? (Choose two.)

Which two operations are valid for RESTCONF? (Choose two.)A . HEADB . REMOVEC . PULLD . PATCHE . ADDF . PUSHView AnswerAnswer: AD Explanation: RESTCONF operations include OPTIONS, HEAD, GET, POST, PATCH, DELETE.

August 8, 2022 No Comments READ MORE +

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?A . logging host 10.2.3.4 vrf mgmt transport tcp port 6514B . logging host 10.2.3.4 vrf mgmt transport udp port 6514C . logging host 10.2.3.4 vrf mgmt transport tcp port 514D ....

August 8, 2022 No Comments READ MORE +

Based on the output, which action resolves this issue?

Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?A . Configure less member ports on Switch2.B . Configure the same port channel interface number on both switchesC . Configure...

August 8, 2022 No Comments READ MORE +

What does the output confirm?

Refer to the exhibit. A network engineer configures NAT on R1 and enters the show command to verity the configuration. What does the output confirm?A . The first pocket triggered NAT to add on entry to NAT tableB . R1 is configured with NAT overload parametersC . A Telnet from...

August 8, 2022 No Comments READ MORE +

Which algorithms are used to secure REST API from brute attacks and minimize the impact?

Which algorithms are used to secure REST API from brute attacks and minimize the impact?A . SHA-512 and SHA-384B . MD5 algorithm-128 and SHA-384C . SHA-1, SHA-256, and SHA-512D . PBKDF2, BCrypt, and SCryptView AnswerAnswer: D Explanation: One of the best practices to secure REST APIs is using password hash....

August 8, 2022 No Comments READ MORE +

Which JSON syntax is valid?

Which JSON syntax is valid?A . {“switch”:”name”:”dist1″,”interfaces”:[“gig1″,”gig2″,”gig3”]}B . {„switch‟:(„name‟:‟dist1′,‟interfaces‟:[„gig1′,‟gig2′,‟gig3‟])}C . {“switch”:{“name”:”dist1″,”interfaces”:[“gig1″,”gig2″,”gig3”]}}D . {/”switch/”:{/”name/”:”dist1″,/”interfaces/”:[“gig1″,”gig2″,”gig3”]}}View AnswerAnswer: C Explanation: This JSON can be written as follows: { 'switch': { 'name': 'dist1', 'interfaces': ['gig1', 'gig2', 'gig3'] } }

August 8, 2022 No Comments READ MORE +

Which action reduces the user impact?

Wireless users report frequent disconnections from the wireless network. While troubleshooting a network engineer finds that after the user a disconnect, the connection re-establishes automatically without any input required. The engineer also notices these message logs. Which action reduces the user impact?A . increase the AP heartbeat timeoutB . increase...

August 8, 2022 No Comments READ MORE +

Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?

Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?A . Option 43B . Option 60C . Option 67D . Option 150View AnswerAnswer: A

August 7, 2022 No Comments READ MORE +

In a Cisco SD-Access solution, what is the role of the Identity Services Engine?

In a Cisco SD-Access solution, what is the role of the Identity Services Engine?A . It is leveraged for dynamic endpoint to group mapping and policy definition.B . It provides GUI management and abstraction via apps that share context.C . it is used to analyze endpoint to app flows and...

August 7, 2022 No Comments READ MORE +

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?A . Layer 3B . inter-xTRC . auto anchorD . fast roamView AnswerAnswer: B Explanation: A fabric edge node provides onboarding...

August 7, 2022 No Comments READ MORE +