Drag and drop the Cisco Catalyst Center (formerly DNA Center) southbound API characteristics from the left to the right. Not all options are used.
Which IEEE standard provides the capability to permit or deny network connectivity based on the user or device identity?
Exhibit.
Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?
What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?
Which feature provides data-plane security for Cisco Catalyst SD-WAN networks'?
Which DNS record type is needed to allow a Cisco AP to discover a WLC when using IPv4?
Refer to the exhibit. An engineer builds an EEM script to apply an access list. Which statement must be added to complete the script?
Which two southbound interfaces originate from Cisco Catalyst Center (formerly DNA Center) and terminate at fabric underlay switches'? (Choose two.)
Which two actions are recommended as security best practices to protect REST API? (Choose two.)
Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Not all options are used.
Which Cisco WLC feature allows a wireless device to perform a Layer 3 roam between two separate controllers without changing the client IP address?
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?
On which protocol or technology is the fabric data plane based in Cisco SD-Access fabric?
A wireless network engineer must configure a WPA2+WPA3 policy with the Personal security type. Which action meets this requirement?
Refer to the exhibit. A POST /discovery request spawns an asynchronous task. After querying for more information about the task, the Cisco DNA Center platform returns the REST API response. What is the status of the discovery task?
Which type of roaming event occurs when a client roams across multiple mobility groups?
Refer to lhe exhibit. An engineer deploys a script to retrieve the running configuration from a NETCONF-capable CiscoIOSXE device that Is configured with default settings. The script fails. Which configuration must be applied to retrieve the configuration using NETCONF?
What is the name of the numerical relationship of the wireless signal compared to the noise floor?
What is a characteristic of the Cisco Catalyst Center (formerly DNA Center) Template Editor feature?
Where is radio resource management performed in a Cisco SD-Access wireless solution?
Which function is performed by vSmart in the Cisco Catalyst SD-WAN architecture?
In a fabric-enabled wireless network, which device is responsible for maintaining the endpoint ID database?
An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:
Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.
After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.
The contents of the JSON-formatted file are as follows
Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.
Which technology collects location information through data packets received by the APs instead of using mobile device probes?
Drag and drop the snippets onto the blanks within the code to construct a script that blocks a MAC address.
Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?
A customer wants to use a single SSID to authenticate loT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?
Refer to the exhibit. The existing configuration must be updated to terminate all EXEC sessions after 120 minutes. Which command set should be applied?
Which lag/profile on a Cisco Catalyst 9800 Series WLC must be modified to allow Cisco ISE to dynamically assign VLANs to users on an 802.1X-based SSID?
Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture? (Choose two.)
What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?
Which feature is available to clients using layer 2 roaming in a wireless infrastructure?
Refer to the exhibit. An engineer must configure a Cisco WLC with WPA2 Enterprise mode and avoid global server lists. Which action is required?
Which multicast operational mode sends a prune message to the source when there are no connected members or downstream neighbors?
Refer to the exhibit.
Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?
Which statement describes the Cisco SD-Access plane functionality for fabric-enabled wireless?