Which router is the designated router on the segment 192.168.0.0/24?

Refer the exhibit. Which router is the designated router on the segment 192.168.0.0/24?A . This segment has no designated router because it is a nonbroadcast network type. B. This segment has no designated router because it is a p2p network type. C. Router Chicago because it has a lower router...

May 22, 2023 No Comments READ MORE +

Which algorithms are used to secure REST API from brute attacks and minimize the impact?

Which algorithms are used to secure REST API from brute attacks and minimize the impact?A . SHA-512 and SHA-384 B. MD5 algorithm- 128 and SHA-384 C. SHA- 1, SHA-256, and SHA-512 D. PBKDF2, BCrypt, and SCryptView AnswerAnswer: D Explanation: One of the best practices to secure REST APIs is using...

May 22, 2023 No Comments READ MORE +

Drag and drop the characteristics from the left onto the orchestration tools they describe on the right

DRAG DROP Drag and drop the characteristics from the left onto the orchestration tools they describe on the right. View AnswerAnswer:

May 22, 2023 No Comments READ MORE +

Which protocol does REST API rely on to secure the communication channel?

Which protocol does REST API rely on to secure the communication channel?A . TCP B. HTTPS C. SSH D. HTTPView AnswerAnswer: B Explanation: The REST API accepts and returns HTTP (not enabled by default) or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents. You...

May 21, 2023 No Comments READ MORE +

What is the effect of this configuration?

Refer to the exhibit. What is the effect of this configuration?A . When users attempt to connect to vty lines 0 through 4, the device will authenticate them against TACACS+ if local authentication fails B. The device will authenticate all users connecting to vty lines 0 through 4 against TACACS+...

May 21, 2023 No Comments READ MORE +

What is the Json syntax that is formed from the data?

Refer to the exhibit. What is the Json syntax that is formed from the data?A . {Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]} B. {"Name": "Bob Johnson", "Age": 75, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]} C. {"˜Name': "˜Bob Johnson', "˜Age': 75, "˜Alive': True, "˜Favorite...

May 21, 2023 No Comments READ MORE +

Which type of antenna is show on the radiation patterns?

Refer to the exhibit. Which type of antenna is show on the radiation patterns?A . Dipole B. Yagi C. Patch D. OmnidirectionalView AnswerAnswer: A

May 21, 2023 No Comments READ MORE +

How is 802.11 traffic handled in a fabric-enabled SSID?

How is 802.11 traffic handled in a fabric-enabled SSID?A . centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLC B. converted by the AP into 802.3 and encapsulated into VXLAN C. centrally switched back to WLC where the user traffic is mapped...

May 21, 2023 No Comments READ MORE +

What does the output verify?

A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?A . The tunnel will be established and work as expected B. The tunnel destination will be known via the tunnel interface C. The tunnel keepalive is configured incorrectly because they must...

May 21, 2023 No Comments READ MORE +

What is used to perform OoS packet classification?

What is used to perform OoS packet classification?A . the Options field in the Layer 3 header B. the Type field in the Layer 2 frame C. the Flags field in the Layer 3 header D. the TOS field in the Layer 3 headerView AnswerAnswer: D Explanation: Type of service,...

May 21, 2023 No Comments READ MORE +