Which data is properly formatted with JSON?

Which data is properly formatted with JSON? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A

July 30, 2022 No Comments READ MORE +

Which interface or interface or interface are able to establish OSPF adjacency?

Refer to the exhibit. A network engineer configures OSPF and reviews the router configuration. Which interface or interface or interface are able to establish OSPF adjacency?A . GigabitEthemet0/1 and GigabitEthernet0/1.40B . only GigabitEthernet0/1C . only GigabttEthernet0/0D . Gigabit Ethernet0/0 and GigabitEthemet0/1View AnswerAnswer: C

July 30, 2022 No Comments READ MORE +

Which two threats does AMP4E have the ability to block? (Choose two.)

Which two threats does AMP4E have the ability to block? (Choose two.)A . DDoSB . ransomwareC . Microsoft Word macro attackD . SQL injectionE . email phishingView AnswerAnswer: BC Explanation: https://www.cisco.com/c/dam/en/us/products/collateral/security/amp-for-endpoints/c11-742008-00-cisco-amp-for-endpoints-wp-v2a.pdf

July 30, 2022 No Comments READ MORE +

Which protocol does REST API rely on to secure the communication channel?

Which protocol does REST API rely on to secure the communication channel?A . TCPB . HTTPSC . SSHD . HTTPView AnswerAnswer: B Explanation: The REST API accepts and returns HTTP (not enabled by default) or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents. You...

July 30, 2022 No Comments READ MORE +

Refer to the exhibit

DRAG DROP Refer to the exhibit. Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used View AnswerAnswer:

July 29, 2022 No Comments READ MORE +

Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?

Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?A . vBondB . vSmartC . vManageD . PNP serverView AnswerAnswer: A

July 29, 2022 No Comments READ MORE +

Which two commands are needed to allow for full reachability between AS 1000 and AS 2000?

Refer to the exhibit. Which two commands are needed to allow for full reachability between AS 1000 and AS 2000? (Choose two)A . R1#network 192.168.0.0 mask 255.255.0.0B . R2#no network 10.0.0.0 255.255.255.0C . R2#network 192.168.0.0 mask 255.255.0.0D . R2#network 209.165.201.0 mask 255.255.192.0E . R1#no network 10.0.0.0 255.255.255.0View AnswerAnswer: B, C

July 29, 2022 No Comments READ MORE +

Which explanation of this behavior is true?

Refer to the exhibit. An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which explanation...

July 29, 2022 No Comments READ MORE +

Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?

An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?A . wlcbostname.domain.comB . cisco-capwap-controller.domain.comC . ap-manager.domain.comD . primary-wlc.domain.comView AnswerAnswer: B Explanation: DNS: If you have configured your DHCP server to provide both...

July 29, 2022 No Comments READ MORE +

In an SD-Access solution what is the role of a fabric edge node?

In an SD-Access solution what is the role of a fabric edge node?A . to connect external Layer 3- network to the SD-Access fabricB . to connect wired endpoint to the SD-Access fabricC . to advertise fabric IP address space to external networkD . to connect the fusion router to...

July 29, 2022 No Comments READ MORE +