Which data is properly formatted with JSON?
Which data is properly formatted with JSON? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A
Which interface or interface or interface are able to establish OSPF adjacency?
Refer to the exhibit. A network engineer configures OSPF and reviews the router configuration. Which interface or interface or interface are able to establish OSPF adjacency?A . GigabitEthemet0/1 and GigabitEthernet0/1.40B . only GigabitEthernet0/1C . only GigabttEthernet0/0D . Gigabit Ethernet0/0 and GigabitEthemet0/1View AnswerAnswer: C
Which two threats does AMP4E have the ability to block? (Choose two.)
Which two threats does AMP4E have the ability to block? (Choose two.)A . DDoSB . ransomwareC . Microsoft Word macro attackD . SQL injectionE . email phishingView AnswerAnswer: BC Explanation: https://www.cisco.com/c/dam/en/us/products/collateral/security/amp-for-endpoints/c11-742008-00-cisco-amp-for-endpoints-wp-v2a.pdf
Which protocol does REST API rely on to secure the communication channel?
Which protocol does REST API rely on to secure the communication channel?A . TCPB . HTTPSC . SSHD . HTTPView AnswerAnswer: B Explanation: The REST API accepts and returns HTTP (not enabled by default) or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents. You...
Refer to the exhibit
DRAG DROP Refer to the exhibit. Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used View AnswerAnswer:
Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?
Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?A . vBondB . vSmartC . vManageD . PNP serverView AnswerAnswer: A
Which two commands are needed to allow for full reachability between AS 1000 and AS 2000?
Refer to the exhibit. Which two commands are needed to allow for full reachability between AS 1000 and AS 2000? (Choose two)A . R1#network 192.168.0.0 mask 255.255.0.0B . R2#no network 10.0.0.0 255.255.255.0C . R2#network 192.168.0.0 mask 255.255.0.0D . R2#network 209.165.201.0 mask 255.255.192.0E . R1#no network 10.0.0.0 255.255.255.0View AnswerAnswer: B, C
Which explanation of this behavior is true?
Refer to the exhibit. An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which explanation...
Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?
An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?A . wlcbostname.domain.comB . cisco-capwap-controller.domain.comC . ap-manager.domain.comD . primary-wlc.domain.comView AnswerAnswer: B Explanation: DNS: If you have configured your DHCP server to provide both...
In an SD-Access solution what is the role of a fabric edge node?
In an SD-Access solution what is the role of a fabric edge node?A . to connect external Layer 3- network to the SD-Access fabricB . to connect wired endpoint to the SD-Access fabricC . to advertise fabric IP address space to external networkD . to connect the fusion router to...