1. Hackers have gained access to account information and can now login into a system with the same rights as authorized users. What type of attack is this? compromised key password-based DoS social engineering 2. In what type of attack can threat actors change the data in packets …
1. Which network type consists of a number of LANs that are connected together across a limited geographic area? SOHO WAN CAN Data Center Cloud 2. Which network type includes a consumer grade router with basic security features to protect inside assets from outside attackers? SOHO CAN WAN …
1. Which IBN feature is responsible for continuous validation and verification that the network is meeting the expressed intent? Translation Activation Assurance Network Infrastructure 2. Which IBN feature enables the network administrator to express the expected networking behavior that will best support the business intent? Translation Activation Assurance …
1. Which of the following are not typically used as configuration tools? (Choose two.) API Ansible Chef Puppet SaltStack SNMP 2. Identify the term for the following definition in relationship to configuration management tools: Programmatically performing a task on a system such as configuring an interface or deploying …
1. An API in considered RESTful if it has which of the following features? (Choose three.) Stateful Stateless Cacheable Cacheless Client-Server Server-Server 2. Which of the following is a URL? https://www.cisco.com/c/en/us/solutions/design-zone.html#~all-guides https://www.cisco.com/c/en/us/solutions/design-zone.html www.cisco.com/c/en/us/solutions/design-zone.html #~all-guides 3. Which of the following is a URN? https://www.cisco.com/c/en/us/solutions/design-zone.html#~all-guides https://www.cisco.com/c/en/us/solutions/design-zone.html www.cisco.com/c/en/us/solutions/design-zone.html #~all-guides 4. Which …
1. True or False: An API is a set of rules describing how one application can interact with another, and the instructions to allow the interaction to occur. True False 2. Which of the following APIs would be used exclusively between Google and Cisco? Open or Public API …
1. Which of the following data formats is typically used to display web pages? HTML XML JSON YAML 2. Which of the following describes a key/value pair? A key is a string and a value is a list A key/value pair is another name for an array. A …
1. You use online banking to pay a bill. Automation Not automation 2. Production levels are automatically tied to demand, eliminating unneeded product and reducing the impact on the environment. Automation Not automation 3. Your GPS recalculates the best route to a destination based on current traffic congestion. …
1. This is a table that matches incoming packets to a particular flow and specifies the functions that are to be performed on the packet. neighbor table routing table flow table ARP table meter table 2. This is a table that triggers a variety of performance-related actions on …
1. Which characteristic best describes the control plane of a networking device? (Choose three.) Information sent to this plane is processed by the CPU. This plane is also called the forwarding plane. This plane makes forwarding decisions. This plane contains router protocol neighbor and topology tables. This plane …