Which requirement for an Ansible-managed node is true?

Which requirement for an Ansible-managed node is true?A . It must have an SSH server running.B . It must be a Linux server or a Cisco device.C . It must support ad hoc commands.D . It must have an Ansible Tower installed.View AnswerAnswer: A

July 27, 2020 No Comments READ MORE +

Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?

Refer to the exhibit. Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?A . text stringB . username and passwordC . RADIUS tokenD . certificateView AnswerAnswer: A

July 27, 2020 No Comments READ MORE +

applied to a REST API session?

Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session?A . HTTP Status Code: 200B . HTTP Status Code: 302C . HTTP Status Code: 401D . HTTP Status Code: 504View AnswerAnswer: C Explanation: Reference: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401

July 27, 2020 No Comments READ MORE +

What are two benefits of virtualizing the server with the use of VMs in a data center environment? (Choose two.)

What are two benefits of virtualizing the server with the use of VMs in a data center environment? (Choose two.)A . reduced rack space, power, and cooling requirementsB . smaller Layer 2 domainC . increased securityD . speedy deploymentE . reduced IP and MAC address requirementsView AnswerAnswer: AD

July 27, 2020 No Comments READ MORE +

Which IP address becomes the active next hop for 192.168.102.0/24 when 192.168.101.2 fails?

Refer to the exhibit. Which IP address becomes the active next hop for 192.168.102.0/24 when 192.168.101.2 fails?A . 192.168.101.10B . 192.168.101.14C . 192.168.101.6D . 192.168.101.18View AnswerAnswer: D

July 27, 2020 No Comments READ MORE +

Which function does a fabric edge node perform in an SD-Access deployment?

Which function does a fabric edge node perform in an SD-Access deployment?A . Connects endpoints to the fabric and forwards their traffic.B . Encapsulates end-user data traffic into LISD . Connects the SD-Access fabric to another fabric or external Layer 3 networks.E . Provides reachability between border nodes in the...

July 26, 2020 No Comments READ MORE +

Which two mechanisms are available to secure NTP? (Choose two.)

Which two mechanisms are available to secure NTP? (Choose two.)A . IPsecB . IP prefix list-basedC . encrypted authenticationD . TACACS-based authenticationE . IP access list-basedView AnswerAnswer: CE Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/ios-xml/ios/bsm/configuration/xe­3se/3650/bsm-xe-3se-3650-book.html

July 26, 2020 No Comments READ MORE +

Which statement allows this traffic?

A client with IP address 209.165.201.25 must access a web server on port 80 at 209.165.200.225. To allow this traffic, an engineer must add a statement to an access control list that is applied in the inbound direction on the port connecting to the web servers. Which statement allows this...

July 26, 2020 2 Comments READ MORE +

What is a benefit of data modeling languages like YANG?

What is a benefit of data modeling languages like YANG?A . They create more secure and efficient SNMP OIDs.B . They provide a standardized data structure, which results in configuration scalability and consistency.C . They enable programmers to change or write their own applications within the device operating system.D ....

July 25, 2020 No Comments READ MORE +

Which statements are used for error handling in Python?

Which statements are used for error handling in Python?A . try/catchB . catch/releaseC . block/rescueD . try/exceptView AnswerAnswer: D

July 25, 2020 No Comments READ MORE +