Which definition describes JWT in regard to REST API security?
Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?
Which framework is used for third-party authorization?
Which characteristic applies to Cisco SD-Access?
Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?
What is the purpose of data modeling languages?
An engineer must configure a new 6 Ghz only SSID on a cisco catalyst 9800 series WLC, with these requirements:
Provide 802.11ax data rates for supported devices
All users authenticate using a certificate
Which wireless layer 2 security mode meets the requirements?
Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?
How does NETCONF YANG represent data structures?
Refer to the exhibit. What is the output of this code?
Drag and drop the snippets onto the blanks within the code to construct a script that blocks a MAC address.
Refer to the exhibit. The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?
What are two methods of ensuring that the multicast RPF check passes without changing the unicast routing table? (Choose two.)
What is a client who is using 802.1x for authentication referred to as?
Which three methods does Cisco Catalyst Center (formerly DNA Center) use to discover devices? (Choose three.)
An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:
•LocationA -72dBm
• Location B:-75 dBm
• Location C; -65 dBm
• Location D -80 dBm
Which two statements does the engineer use to explain these values to the customer? (Choose two.)
What is a characteristic of VXLAN?
Which language can be used to model configuration and state data?
Which deployment option of Cisco NGFW provides scalability?
Which action controls the maximum cell size in a high-density wireless environment?
Which protocol is used by vmanage to push centralized policies to vsmart controllers?
Drag and drop the code snippets from the bottom onto the blanks in the Python script to convert a Python object into a JSON string. Not all options are used.
Refer to the exhibit. An engineer must adjust the configuration so that Router A becomes the active router. Which commands should be applied to router A? (Choose two)
Which two functions is an edge node responsible for? (Choose two.)
What does the statement print(format(0.8, \0%')) display?
When deploying Cisco SD-Access Fabric APs, where does the data plane VXLAN tunnel terminate?
What is the API keys option for REST API authentication?
Refer to the exhibit. Which HTTP request produced the REST API response that was returned by the Cisco Catalyst Center (formerly DNA Center) platform?
Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request that configures a deny rule on an access list?
What is a characteristics of a type 1 hypervisor?
Refer to the exhibit.
Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?
Which RF value represents the decline of the RF signal amplitude over a given distance"?
Which action is a LISP Map Resolver responsible for?
A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?
What are two benefits of using Cisco TrustSec? (Choose two.)
Refer to the exhibit. An engineer must configure a Cisco WLC with WPA2 Enterprise mode and avoid global server lists. Which action is required?
Which method does FastLocate use to collect location-based information?
An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication. Which profile must the engineer edit to achieve this requirement?
OR