Which requirement for an Ansible-managed node is true?
Which requirement for an Ansible-managed node is true?A . It must have an SSH server running.B . It must be a Linux server or a Cisco device.C . It must support ad hoc commands.D . It must have an Ansible Tower installed.View AnswerAnswer: A
Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?
Refer to the exhibit. Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?A . text stringB . username and passwordC . RADIUS tokenD . certificateView AnswerAnswer: A
applied to a REST API session?
Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session?A . HTTP Status Code: 200B . HTTP Status Code: 302C . HTTP Status Code: 401D . HTTP Status Code: 504View AnswerAnswer: C Explanation: Reference: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401
What are two benefits of virtualizing the server with the use of VMs in a data center environment? (Choose two.)
What are two benefits of virtualizing the server with the use of VMs in a data center environment? (Choose two.)A . reduced rack space, power, and cooling requirementsB . smaller Layer 2 domainC . increased securityD . speedy deploymentE . reduced IP and MAC address requirementsView AnswerAnswer: AD
Which IP address becomes the active next hop for 192.168.102.0/24 when 192.168.101.2 fails?
Refer to the exhibit. Which IP address becomes the active next hop for 192.168.102.0/24 when 192.168.101.2 fails?A . 192.168.101.10B . 192.168.101.14C . 192.168.101.6D . 192.168.101.18View AnswerAnswer: D
Which function does a fabric edge node perform in an SD-Access deployment?
Which function does a fabric edge node perform in an SD-Access deployment?A . Connects endpoints to the fabric and forwards their traffic.B . Encapsulates end-user data traffic into LISD . Connects the SD-Access fabric to another fabric or external Layer 3 networks.E . Provides reachability between border nodes in the...
Which two mechanisms are available to secure NTP? (Choose two.)
Which two mechanisms are available to secure NTP? (Choose two.)A . IPsecB . IP prefix list-basedC . encrypted authenticationD . TACACS-based authenticationE . IP access list-basedView AnswerAnswer: CE Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/ios-xml/ios/bsm/configuration/xe3se/3650/bsm-xe-3se-3650-book.html
Which statement allows this traffic?
A client with IP address 209.165.201.25 must access a web server on port 80 at 209.165.200.225. To allow this traffic, an engineer must add a statement to an access control list that is applied in the inbound direction on the port connecting to the web servers. Which statement allows this...
What is a benefit of data modeling languages like YANG?
What is a benefit of data modeling languages like YANG?A . They create more secure and efficient SNMP OIDs.B . They provide a standardized data structure, which results in configuration scalability and consistency.C . They enable programmers to change or write their own applications within the device operating system.D ....
Which statements are used for error handling in Python?
Which statements are used for error handling in Python?A . try/catchB . catch/releaseC . block/rescueD . try/exceptView AnswerAnswer: D