Which two protocols are used with YANG data models? (Choose two.)

Which two protocols are used with YANG data models? (Choose two.)A . TLSB . RESTCONFC . SSHD . NETCONFE . HTTPSView AnswerAnswer: BD

June 28, 2020 No Comments READ MORE +

messages to its default port?

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?A . logging host 10.2.3.4 vrf mgmt transport tcp port 514B . logging host 10.2.3.4 vrf mgmt transport udp port 514C . logging host 10.2.3.4 vrf mgmt transport tcp port 6514D ....

June 27, 2020 No Comments READ MORE +

Which JSON syntax is valid?

Which JSON syntax is valid?A . {“switch”: “name”: “dist1”, “interfaces”: [“gig1”, “gig2”, “gig3”]}B . {/“switch/”: {/“name/”: “dist1”, /“interfaces/”: [“gig1”, “gig2”, “gig3”]}}C . {“switch”: {“name”: “dist1”, “interfaces”: [“gig1”, “gig2”, “gig3”]}}D . {‘switch’: (‘name’: ‘dist1’, ‘interfaces’: [‘gig1’, ‘gig2’, ‘gig3’])}View AnswerAnswer: A

June 27, 2020 1 Comment READ MORE +

Which function does a fabric edge node perform in an SD-Access deployment?

Which function does a fabric edge node perform in an SD-Access deployment?A . Connects endpoints to the fabric and forwards their traffic.B . Encapsulates end-user data traffic into LISD . Connects the SD-Access fabric to another fabric or external Layer 3 networks.E . Provides reachability between border nodes in the...

June 27, 2020 No Comments READ MORE +

What is a benefit of data modeling languages like YANG?

What is a benefit of data modeling languages like YANG?A . They create more secure and efficient SNMP OIDs.B . They provide a standardized data structure, which results in configuration scalability and consistency.C . They enable programmers to change or write their own applications within the device operating system.D ....

June 27, 2020 No Comments READ MORE +

Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on their OUIs?

An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WI-AN. Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on their OUIs?A . over the DSB . 802.11kC . adaptive RD . 802.11vView...

June 27, 2020 No Comments READ MORE +

What is the JSON syntax that is formed from the data?

Refer to the exhibit. What is the JSON syntax that is formed from the data?A . {Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]}B . {“Name”: “Bob Johnson”, “Age”: 75, “Alive”: true, “Favorite Foods”: [“Cereal”, “Mustard”, “Onions”]}C . {‘Name’: ‘Bob Johnson’, ‘Age’: 75, ‘Alive’: True, ‘Favorite...

June 26, 2020 No Comments READ MORE +

Drag and Drop

Drag and Drop Drag and drop the characteristics from the left onto the correct routing protocol types on the right. View AnswerAnswer:

June 25, 2020 No Comments READ MORE +

Which statement about agent-based versus agentless configuration management tools is true?

Which statement about agent-based versus agentless configuration management tools is true?A . Agentless tools use proxy nodes to interface with slave nodes.B . Agentless tools require no messaging systems between master and slaves.C . Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave...

June 25, 2020 2 Comments READ MORE +

Which statement describes the IP and MAC allocation requirements for virtual machines on Type 1 hypervisors?

Which statement describes the IP and MAC allocation requirements for virtual machines on Type 1 hypervisors?A . Virtual machines do not require a unique IP or unique MAB . They share the IP and MAC address of the physical server.C . Each virtual machine requires a unique IP address but...

June 25, 2020 1 Comment READ MORE +