Which three methods does Cisco DNA Centre use to discover devices? (Choose three)

Which three methods does Cisco DNA Centre use to discover devices? (Choose three)A . CDPB . SNMPC . LLDPD . pingE . NETCONFF . a specified range of IP addressesView AnswerAnswer: A, C, F Explanation:

March 24, 2024 No Comments READ MORE +

Which command set must be configured on switch1 to achieve the following results on port fa0/1?

Refer to the Exhibit. Rapid PVST+ is enabled on all switches. Which command set must be configured on switch1 to achieve the following results on port fa0/1? ✑ When a device is connected, the port transitions immediately to a forwarding state. ✑ The interface should not send or receive BPDUs....

March 24, 2024 No Comments READ MORE +

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?A . MACsecB . IPsecC . SSLD . Cisco TrustsecView AnswerAnswer: A Explanation: MACsec, defined in 802.1AE, provides MAC-layer encryption over wired networks by using out-ofband methods for encryption keying. The MACsec Key Agreement...

March 24, 2024 No Comments READ MORE +

Which command accomplish this task?

Refer to the exhibit. An engineer must deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times. Which command accomplish this...

March 24, 2024 No Comments READ MORE +

Which statement about TLS is accurate when using RESTCONF to write configurations on network devices?

Which statement about TLS is accurate when using RESTCONF to write configurations on network devices?A . It requires certificates for authenticationB . It is provided using NGINX acting as a proxy web serverC . It is used for HTTP and HTTPS requestsD . It is not supported on Cisco devicesView...

March 24, 2024 No Comments READ MORE +

What does the status show?

Refer to the Exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?A . ISAKMP SA is authenticated and can be used for Quick Mode.B . Peers have exchanged keys, but ISAKMP SA remains unauthenticated.C . VPN...

March 24, 2024 No Comments READ MORE +

What is used to perform OoS packet classification?

What is used to perform OoS packet classification?A . the Options field in the Layer 3 headerB . the Type field in the Layer 2 frameC . the Flags field in the Layer 3 headerD . the TOS field in the Layer 3 headerView AnswerAnswer: D Explanation: Type of service,...

March 23, 2024 No Comments READ MORE +

Which algorithms are used to secure REST API from brute attacks and minimize the impact?

Which algorithms are used to secure REST API from brute attacks and minimize the impact?A . SHA-512 and SHA-384B . MD5 algorithm-128 and SHA-384C . SHA-1, SHA-256, and SHA-512D . PBKDF2, BCrypt, and SCryptView AnswerAnswer: D Explanation: One of the best practices to secure REST APIs is using password hash....

March 23, 2024 No Comments READ MORE +

In an SD-Access solution what is the role of a fabric edge node?

In an SD-Access solution what is the role of a fabric edge node?A . to connect external Layer 3- network to the SD-Access fabricB . to connect wired endpoint to the SD-Access fabricC . to advertise fabric IP address space to external networkD . to connect the fusion router to...

March 23, 2024 No Comments READ MORE +

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

Which measurement is used from a post wireless survey to depict the cell edge of the access points?A . SNRB . NoiseC . RSSID . CCIView AnswerAnswer: A Explanation: Coverage defines the ability of wireless clients to connect to a wireless AP with a signal strength and quality high enough...

March 23, 2024 No Comments READ MORE +