What is a characteristic of the REST API?
What is a characteristic of the REST API? considered slow, complex, and rigid used for exchanging XML structured information over HTTP or SMTP evolved into what became SOAP most widely…
What is a characteristic of the REST API? considered slow, complex, and rigid used for exchanging XML structured information over HTTP or SMTP evolved into what became SOAP most widely…
How does virtualization help with disaster recovery within a data center? Power is always provided. Less energy is consumed. Server provisioning is faster. Hardware does not have to be identical.…
Which step in the link-state routing process is described by a router flooding link-state and cost information about each directly connected link? electing the designated router exchanging link-state advertisements injecting…
What protocol uses smaller stratum numbers to indicate that the server is closer to the authorized time source than larger stratum numbers? NTP SYSLOG TFTP MPLS Explanation & Hint: NTP…
Refer to the exhibit. From which location did this router load the IOS? a TFTP server flash memory NVRAM RAM ROM Explanation & Hint: The output of the show version…
What are two benefits of using SNMP traps? (Choose two.) They reduce the load on network and agent resources. They limit access for management systems only. They eliminate the need…
Refer to the exhibit. Which address or addresses represent the inside global address? 10.1.1.2 192.168.0.100 209.165.20.25 any address in the 10.1.1.0 network Explanation & Hint: In NAT (Network Address Translation)…
Refer to the exhibit. Router R1 is configured with static NAT. Addressing on the router and the web server are correctly configured, but there is no connectivity between the web…
An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp . If a packet…
Refer to the exhibit. The company has provided IP phones to employees on the 192.168.10.0/24 network and the voice traffic will need priority over data traffic. What is the best…
What are two purposes of launching a reconnaissance attack on a network? (Choose two.) to escalate access privileges to prevent other users from accessing the system to scan for accessibility…
What are two features to consider when creating a named ACL? (Choose two.) Use a space for ease of reading to separate the name from the description. Be descriptive when…
An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 192.168.0.0 255.255.254.0. What wildcard mask would the administrator use in the OSPF…
In JSON, what is held within square brackets [ ]? an array an object key/value pairs nested values Explanation & Hint: In JSON (JavaScript Object Notation), square brackets [ ]…
Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a…
A company needs to interconnect several branch offices across a metropolitan area. The network engineer is seeking a solution that provides high-speed converged traffic, including voice, video, and data on…
Which two scenarios would result in a duplex mismatch? (Choose two.) connecting a device with an interface running at 100 Mbps to another with an interface running at 1000 Mbps…
Which type of VPN connects using the Transport Layer Security (TLS) feature? dynamic multipoint VPN SSL VPN IPsec virtual tunnel interface GRE over IPsec Explanation & Hint: The type of…
What are the two types of VPN connections? (Choose two.) site-to-site Frame Relay PPPoE leased line remote access Explanation & Hint: The two types of VPN (Virtual Private Network) connections…
A student, doing a summer semester of study overseas, has taken hundreds of pictures on a smartphone and wants to back them up in case of loss. What service or…