Which two protocols are used with YANG data models? (Choose two.)

Which two protocols are used with YANG data models? (Choose two.)A . TLSB . RESTCONFC . SSHD . NETCONFE . HTTPSView AnswerAnswer: BD

October 2, 2020 No Comments READ MORE +

Which requirement for an Ansible-managed node is true?

Which requirement for an Ansible-managed node is true?A . It must have an SSH server running.B . It must be a Linux server or a Cisco device.C . It must support ad hoc commands.D . It must have an Ansible Tower installed.View AnswerAnswer: A

October 1, 2020 No Comments READ MORE +

Which exhibit displays a valid JSON file?

Which exhibit displays a valid JSON file? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: D

October 1, 2020 No Comments READ MORE +

Which configuration accomplishes this task?

The login method is configured on the VTY lines of a router with these parameters. - The first method for authentication is TACACS - If TACACS is unavailable, login is allowed without any provided credentials Which configuration accomplishes this task? A ) B) C) D) A . Option AB ....

October 1, 2020 No Comments READ MORE +

Which statement about route targets is true when using VRF-Lite?

Which statement about route targets is true when using VRF-Lite?A . Route targets control the import and export of routes into a customer routing table.B . When BGP is configured, route targets are transmitted as BGP standard communities.C . Route targets allow customers to be assigned overlapping addresses.D . Route...

October 1, 2020 No Comments READ MORE +

Which statements are used for error handling in Python?

Which statements are used for error handling in Python?A . try/catchB . catch/releaseC . block/rescueD . try/exceptView AnswerAnswer: D

October 1, 2020 No Comments READ MORE +

Which command should be entered on the ports that are connected to Link2 to resolve the issue?

Refer to the exhibit. Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning-tree...

September 30, 2020 No Comments READ MORE +

What are two common sources of interference for Wi-Fi networks? (Choose two.)

What are two common sources of interference for Wi-Fi networks? (Choose two.)A . LED lightsB . radarC . fire alarmD . conventional ovenE . rogue APView AnswerAnswer: BE

September 30, 2020 No Comments READ MORE +

Which command ensures that SW3 receives frames only from VLAN 50?

Refer to the exhibit. VLANs 50 and 60 exist on the trunk links between all switches. All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server. Which command ensures that SW3 receives frames only from VLAN 50?A . SW1(config)#vtp mode transparentB . SW3(config)#vtp mode...

September 30, 2020 No Comments READ MORE +

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?A . SSLB . Cisco TrustSecC . MACsecD . IPsecView AnswerAnswer: C

September 30, 2020 No Comments READ MORE +