Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which method ensures the confidentiality of data exchanged over a REST API?

A.

Use TLS to secure the underlying HTTP session.

B.

Use me POST method Instead or URL-encoded GET to pass parameters.

C.

Deploy digest-based authentication to protect the access to the API.

D.

Encode sensitive data using Base64 encoding.

Refer to the exhibit. What is the output of this code?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which framework is used for third-party authorization?

A.

API keys

B.

custom tokens

C.

OAuth

D.

SOAP

Which next generation firewall feature supports separate security services for multiple departments?

A.

state sharing mode to .trade the user data sessions and replication to the neighbor firewall using a failover link

B.

Layer 3 mode with resource tracking capabilities and automatic configuration synchronization between the nodes and security zones

C.

multicontext mode with specific logical or physical interface allocation within each context and grouped into security zones

D.

virtual switch mode to provide traffic inspection capabilities for the flows entering the firewall and dropping packets based on policy configuration

What is used by vManage to interact withCiscoSD-WAN devices in the fabric?

A.

northbound API

B.

RESTCONF

C.

Southbound API

D.

IPsec

Refer to the exhibit. An engineer builds an EEM script to apply an access list. Which statement must be added to complete the script?

A.

event none

B.

action 6.0 cli command "ip access-list extended 101"

C.

action 2.1 cli command "ip access-list extended 101"

D.

action 3.1 cli command "ip access-list extended 101"

Which nodes require VXLAN encapsulation support In a Cisco SD-Access deployment?

A.

core nodes

B.

distribution nodes

C.

border nodes

D.

aggregation nodes

Which characteristic applies to the endpoint security aspect of the Cisco Threat Defense architecture?

A.

detect and block ransomware in email attachments

B.

cloud-based analysis of threats

C.

outbound URL analysis and data transfer controls

D.

user context analysis

Refer to the exhibit.

An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D