Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on device with similar network settings?

Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on device with similar network settings?A . Command RunnerB . Template EditorC . Application PoliciesD . Authentication TemplateView AnswerAnswer: B Explanation: Cisco DNA Center provides an interactive editor called Template Editor to...

December 3, 2020 No Comments READ MORE +

Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly?

A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)A...

December 3, 2020 1 Comment READ MORE +

Which two statements about the EEM applet configuration are true?

Refer to the exhibit. Which two statements about the EEM applet configuration are true? (Choose two.)A . The EEM applet runs after the CLI command is executedB . The running configuration is displayed only if the letter Y is entered at the CLIC . The EEM applet runs before the...

December 2, 2020 No Comments READ MORE +

Drag and drop the description from the left onto the correct QoS components on the right.

Drag and drop the description from the left onto the correct QoS components on the right. View AnswerAnswer:

December 2, 2020 No Comments READ MORE +

Which IPv6 migration method relies on dynamic tunnels that use the 2002::/16 reserved address space?

Which IPv6 migration method relies on dynamic tunnels that use the 2002::/16 reserved address space?A . GREB . 6RDC . 6to4D . ISATAPView AnswerAnswer: C Explanation: 6to4 tunnel is a technique which relies on reserved address space 2002::/16 (you must remember this range). These tunnels determine the appropriate destination address...

December 2, 2020 No Comments READ MORE +

Which command accomplish this task?

Refer to the exhibit. An engineer must deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times. Which command accomplish this...

December 2, 2020 No Comments READ MORE +

Which algorithms are used to secure REST API from brute attacks and minimize the impact?

Which algorithms are used to secure REST API from brute attacks and minimize the impact?A . SHA-512 and SHA-384B . MD5 algorithm-128 and SHA-384C . SHA-1, SHA-256, and SHA-512D . PBKDF2, BCrypt, and SCryptView AnswerAnswer: D Explanation: One of the best practices to secure REST APIs is using password hash....

December 2, 2020 No Comments READ MORE +

An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WLAN Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on then OLTIs?

An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WLAN Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on then OLTIs?A . over the DSB . adaptive RC . 802.11VD . 802.11kView...

December 2, 2020 No Comments READ MORE +

Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?

Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?A . GLBPB . HSRP v2C . VRRPD . HSRP v1View AnswerAnswer: A

December 2, 2020 No Comments READ MORE +

Which two security features are available when implementing NTP? (Choose two)

Which two security features are available when implementing NTP? (Choose two)A . symmetric server passwordsB . dock offset authenticationC . broadcast association modeD . encrypted authentication mechanismE . access list-based restriction schemeView AnswerAnswer: D E Explanation: The time kept on a machine is a critical resource and it is strongly...

December 1, 2020 No Comments READ MORE +