Which JSON syntax is valid?
Which JSON syntax is valid?A . {“switch”:”name”:”dist1″,”interfaces”:[“gig1″,”gig2″,”gig3”]}B . {„switch‟:(„name‟:‟dist1′,‟interfaces‟:[„gig1′,‟gig2′,‟gig3‟])}C . {“switch”:{“name”:”dist1″,”interfaces”:[“gig1″,”gig2″,”gig3”]}}D . {/”switch/”:{/”name/”:”dist1″,/”interfaces/”:[“gig1″,”gig2″,”gig3”]}}View AnswerAnswer: C Explanation: This JSON can be written as follows: { 'switch': { 'name': 'dist1', 'interfaces': ['gig1', 'gig2', 'gig3'] } }
Which command set is required to complete this task?
An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group. Which command set is required to complete this task? interface GigabitEthernet0/1 ip address 10.10.10.2 255.255.255.0 vrrp 115 ip 10.10.10.1 vrrp 115 authentication 407441579A . Router(config-if)#...
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?A . least privilegeB . fail-safe defaultsC . economy of mechanismD . complete mediationView AnswerAnswer: B
Which protocol does REST API rely on to secure the communication channel?
Which protocol does REST API rely on to secure the communication channel?A . TCPB . HTTPSC . SSHD . HTTPView AnswerAnswer: B Explanation: The REST API accepts and returns HTTP (not enabled by default) or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents. You...
Which command meets this requirement?
Refer to the exhibit. SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch. Which command meets this requirement?A . SwitchC(config)#vtp pruningB . SwitchC(config)#vtp pruning vlan 110C . SwitchC(config)#interface port-channel 1 SwitchC(config-if)#switchport trunk allowed vlan add 210,310D...
Which two technologies allow every end host in a VLAN to use both gateways?
A network administrator has designed a network with two multilayer switches on the distribution layer, which act as default gateways for the end hosts. Which two technologies allow every end host in a VLAN to use both gateways? (Choose two)A . GLBPB . HSRPC . MHSRPD . VSSE . VRRPView...
What is the function of cisco DNA center in a cisco SD-access deployment?
What is the function of cisco DNA center in a cisco SD-access deployment?A . It is responsible for routing decisions inside the fabricB . It is responsible for the design, management, deployment, provisioning and assurance of the fabric network devices.C . It possesses information about all endpoints, nodes and external...
Which action must the engineer perform to prevent from being forwarded beyond the service provider domain when the LSP is down?
AN engineer is implementing MPLS OAM to monitor traffic within the MPLS domain. Which action must the engineer perform to prevent from being forwarded beyond the service provider domain when the LSP is down?A . Disable IP redirects only on outbound interfacesB . Implement the destination address for the LSP...
Which configuration achieves this goal?
Refer to the exhibit. Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?A . line vty 0 15 absolute-timeout 600B . line vty 0 15 exec-timeoutC . line vty 01 5 exec-timeout 10 0D . line vty 0 4 exec-timeout 600View AnswerAnswer:...
Which AP mode allows an engineer to scan configured channels for rogue access points?
Which AP mode allows an engineer to scan configured channels for rogue access points?A . snifferB . monitorC . bridgeD . localView AnswerAnswer: B