How was spanning-tree configured on this interface?

Refer to the exhibit How was spanning-tree configured on this interface?A . By entering the command spanning-tree portfast trunk in the interface configuration mode. B. By entering the command spanning-tree portfast in the interface configuration mode C. By entering the command spanning-tree mst1 vlan 10,20,30,40 in the global configuration mode...

March 17, 2023 No Comments READ MORE +

Which method of account authentication does OAuth 2.0 within REST APIs?

Which method of account authentication does OAuth 2.0 within REST APIs?A . username/role combination B. access tokens C. cookie authentication D. basic signature workflowView AnswerAnswer: B Explanation: The most common implementations of OAuth (OAuth 2.0) use one or both of these tokens: + access token: sent like an API key,...

March 17, 2023 No Comments READ MORE +

Which configuration should the engineer use?

Refer to the exhibit. The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use? A. event manager applet EEM_IP_SLA event...

March 17, 2023 No Comments READ MORE +

Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?

Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?A . Adjust the resource reservation limits B. Live migrate the VM to another host C. Reset the VM D. Reset the hostView AnswerAnswer: A

March 17, 2023 No Comments READ MORE +

A network engineer configures NAT on R1 and enters the show command to verity the configuration What does the output confirm?

Refer to the exhibit. A network engineer configures NAT on R1 and enters the show command to verity the configuration What does the output confirm?A . The first pocket triggered NAT to add on entry to NAT table B. R1 is configured with NAT overload parameters C. A Telnet from...

March 17, 2023 No Comments READ MORE +

What are two characteristics of VXLAN? (Choose two)

What are two characteristics of VXLAN? (Choose two)A . It uses VTEPs to encapsulate and decapsulate frames. B. It has a 12-bit network identifier C. It allows for up to 16 million VXLAN segments D. It lacks support for host mobility E. It extends Layer 2 and Layer 3 overlay...

March 17, 2023 No Comments READ MORE +

What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?

Refer to Exhibit. MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?A . The packet arrives...

March 17, 2023 No Comments READ MORE +

Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?

Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?A . least privilege B. fail-safe defaults C. economy of mechanism D. complete mediationView AnswerAnswer: B

March 17, 2023 No Comments READ MORE +

Which explanation of this behavior is true?

165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which explanation of this behavior is true?A . Access control lists that are applied outbound to a router interface do...

March 17, 2023 No Comments READ MORE +

What are two benefits of YANG? (Choose two.)

What are two benefits of YANG? (Choose two.)A . It enforces the use of a specific encoding format for NETCONF. B. It collects statistical constraint analysis information. C. It enables multiple leaf statements to exist within a leaf list. D. It enforces configuration semantics. E. It enforces configuration constraints.View AnswerAnswer:...

March 17, 2023 No Comments READ MORE +