Which two protocols are used with YANG data models? (Choose two.)
Which two protocols are used with YANG data models? (Choose two.)A . TLSB . RESTCONFC . SSHD . NETCONFE . HTTPSView AnswerAnswer: BD
messages to its default port?
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?A . logging host 10.2.3.4 vrf mgmt transport tcp port 514B . logging host 10.2.3.4 vrf mgmt transport udp port 514C . logging host 10.2.3.4 vrf mgmt transport tcp port 6514D ....
Which JSON syntax is valid?
Which JSON syntax is valid?A . {“switch”: “name”: “dist1”, “interfaces”: [“gig1”, “gig2”, “gig3”]}B . {/“switch/”: {/“name/”: “dist1”, /“interfaces/”: [“gig1”, “gig2”, “gig3”]}}C . {“switch”: {“name”: “dist1”, “interfaces”: [“gig1”, “gig2”, “gig3”]}}D . {‘switch’: (‘name’: ‘dist1’, ‘interfaces’: [‘gig1’, ‘gig2’, ‘gig3’])}View AnswerAnswer: A
Which function does a fabric edge node perform in an SD-Access deployment?
Which function does a fabric edge node perform in an SD-Access deployment?A . Connects endpoints to the fabric and forwards their traffic.B . Encapsulates end-user data traffic into LISD . Connects the SD-Access fabric to another fabric or external Layer 3 networks.E . Provides reachability between border nodes in the...
What is a benefit of data modeling languages like YANG?
What is a benefit of data modeling languages like YANG?A . They create more secure and efficient SNMP OIDs.B . They provide a standardized data structure, which results in configuration scalability and consistency.C . They enable programmers to change or write their own applications within the device operating system.D ....
Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on their OUIs?
An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WI-AN. Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on their OUIs?A . over the DSB . 802.11kC . adaptive RD . 802.11vView...
What is the JSON syntax that is formed from the data?
Refer to the exhibit. What is the JSON syntax that is formed from the data?A . {Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]}B . {“Name”: “Bob Johnson”, “Age”: 75, “Alive”: true, “Favorite Foods”: [“Cereal”, “Mustard”, “Onions”]}C . {‘Name’: ‘Bob Johnson’, ‘Age’: 75, ‘Alive’: True, ‘Favorite...
Drag and Drop
Drag and Drop Drag and drop the characteristics from the left onto the correct routing protocol types on the right. View AnswerAnswer:
Which statement about agent-based versus agentless configuration management tools is true?
Which statement about agent-based versus agentless configuration management tools is true?A . Agentless tools use proxy nodes to interface with slave nodes.B . Agentless tools require no messaging systems between master and slaves.C . Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave...
Which statement describes the IP and MAC allocation requirements for virtual machines on Type 1 hypervisors?
Which statement describes the IP and MAC allocation requirements for virtual machines on Type 1 hypervisors?A . Virtual machines do not require a unique IP or unique MAB . They share the IP and MAC address of the physical server.C . Each virtual machine requires a unique IP address but...