- 积分
- 763
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 40
- 听众
- 收听
中级工程师
   
|
10.18 pass 350-401 。用的题库是7.19 遇见8道新选择题。 现在找到了4道 以上答案是我自己做题,不一定对, 希望能帮到大家。2 v5 ~# `" J1 r" R2 e8 ?
6 U. z4 ?' f2 j r9 ^4 {/ o; E! w' O4 a( s( l9 s0 L1 l
What is a characteristic of Cisco DNA Northbound APIs?
% v' V6 S& ~2 s7 l2 tA. They simplify the management of network infrastructure devices.
3 ~; Z4 j8 e' m% Y6 j/ a+ GB. They enable automation of network infrastructure based on intent. / j m# |9 t$ R) R. O) _! l+ [ g. N
C. They utilize RESTCONF.
% b6 d t- X: h9 mD. They utilize multivendor support APIs.
5 ]' r6 {, n% a$ e( s% Q6 [选 C2 a8 K' @! _: R# A' l
9 L4 U; v @1 y
Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?
3 _7 K: @; N0 @( l) U; i6 KA. threat defense
. ~. V3 z( ~* Z p0 X q s) NB. security services
+ b5 \) z, E9 e& y8 s) l0 C( kC. security intelligence ) a7 z6 P! R* {$ g6 ]* Z1 K
D. segmentation " f8 s3 f1 N" Q
选C: \7 u0 o2 `$ e# p7 m9 g
% f6 q6 a( Y/ l# n! \Which threat defence mechanism, when deployed at the network perimeter, protects against zero-day attacks? + @( ~5 p: d9 J' a* b
A. intrusion prevention 7 Y( G8 N+ I6 p% x6 h
B. stateful inspection
6 J3 d+ Y$ s( L4 z* L" BC. sandbox
) g' a8 B$ g2 a+ }, q& B1 aD. SSL decryption
3 r. L/ w* A% Q3 L7 L l: R选A% {& {; z) N6 |1 T
7 h+ s4 h% X3 ^& ]" E# fWhich two items are found in YANG data models? (Choose two.)
3 a& P9 `0 s9 \) }A. HTTP return codes% W1 r4 f3 c" h* z) e) n
B. rpc statements) N3 w6 N+ P% @- _
C. JSON schema3 L- H/ U6 ^1 T- }
D. container statements
4 _0 I4 R( I! W. h. M6 NE. XML schema6 L9 n# {* H- P) u1 J; z
选 C E |
评分
-
查看全部评分
|