Which algorithms are used to secure REST API from brute attacks and minimize the impact?

Which algorithms are used to secure REST API from brute attacks and minimize the impact?A . SHA-512 and SHA-384 B. MD5 algorithm-128 and SHA-384 C. SHA-1, SHA-256, and SHA-512 D. PBKDF2, BCrypt, and SCryptView AnswerAnswer: D Explanation: One of the best practices to secure REST APIs is using password hash....

November 3, 2022 No Comments READ MORE +

What is the Json syntax that is formed from the data?

Refer to the exhibit. What is the Json syntax that is formed from the data?A . {Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]} B. {"Name": "Bob Johnson", "Age": 75, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]} C. {"˜Name': "˜Bob Johnson', "˜Age': 75, "˜Alive': True, "˜Favorite...

November 3, 2022 No Comments READ MORE +

What is the difference between CEF and process switching?

What is the difference between CEF and process switching?A . CEF processes packets that are too complex for process switching to manage. B. CEF is more CPU-intensive than process switching. C. CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet. D....

November 3, 2022 No Comments READ MORE +

Which two methods are used to reduce the AP coverage area? (Choose two)

Which two methods are used to reduce the AP coverage area? (Choose two)A . Reduce channel width from 40 MHz to 20 MHz B. Disable 2.4 GHz and use only 5 GHz. C. Reduce AP transmit power. D. Increase minimum mandatory data rate E. Enable FastlaneView AnswerAnswer: C,D

November 2, 2022 No Comments READ MORE +

What does the response indicate?

An engineer runs the code against an API of Cisco DMA Center, and the platform returns this output. What does the response indicate?A . The authentication credentials are incorrect B. The URl string is incorrect. C. The Cisco DNA Center API port is incorrect D. The HTTP method is incorrectView...

November 2, 2022 No Comments READ MORE +

Based on the output, which action resolves this issue?

Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?A . Configure less member ports on Switch2. B. Configure the same port channel interface number on both switches C. Configure...

November 2, 2022 No Comments READ MORE +

Drag and drop the characteristics from the left onto the orchestration tools they describe on the right

DRAG DROP Drag and drop the characteristics from the left onto the orchestration tools they describe on the right. View AnswerAnswer:

November 2, 2022 No Comments READ MORE +

Which action resolves this issue?

Refer to the exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue?A . Change the access-list destination mask to a wildcard. B. Change the source network...

November 2, 2022 No Comments READ MORE +

Which command resolves the issue?

Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. Which command resolves the issue?A . SW1(config-if)#channel-group 10 mode desirable B. SW1(config-if)#channel-group 10 mode active C. SW2(config-if)#switchport mode trunk D. SW2(config-if)#channel-group 10 mode onView AnswerAnswer: B

November 2, 2022 No Comments READ MORE +

Which single security feature is recommended to provide Network Access Control in the enterprise?

Refer to the exhibit. Which single security feature is recommended to provide Network Access Control in the enterprise?A . MAB B. 802.1X C. WebAuth D. port security sticky MACView AnswerAnswer: B

November 2, 2022 No Comments READ MORE +