- 积分
- 760
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 注册时间
- 2016-3-15
- 最后登录
- 1970-1-1
- 阅读权限
- 40
- 听众
- 收听
中级工程师
|
10.18 pass 350-401 。用的题库是7.19 遇见8道新选择题。 现在找到了4道 以上答案是我自己做题,不一定对, 希望能帮到大家。. z! o& D6 `5 @% x) j
! i. @ q' i2 T1 G6 G; g# L
) K/ {- k% n* I5 x( a4 bWhat is a characteristic of Cisco DNA Northbound APIs?
; O9 A |! |6 } ?$ z8 QA. They simplify the management of network infrastructure devices. 8 J/ Q, }$ n8 N3 P
B. They enable automation of network infrastructure based on intent. 0 `7 [+ W4 x; x( i5 s. f* v
C. They utilize RESTCONF.
" X6 @; A! I3 wD. They utilize multivendor support APIs.
* h( j/ c" \( u3 H7 G选 C
* ~/ U5 q! a; N7 C
5 Z% E5 s* [+ d5 V: F; |Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats? ( u3 v$ N' D- H5 \
A. threat defense
+ [1 P" i+ K& P2 G- KB. security services 8 ?* Y1 v- J* \8 @) F# I8 y' @8 P7 x2 m% Q
C. security intelligence
" @. O$ J. w' K7 f( F" F; r5 P Q4 rD. segmentation ; |& w4 U5 F$ H- f- T* X
选C6 f5 X7 I {7 p+ b4 N, R, A0 o
' J$ v$ k0 P/ e$ r+ H5 A
Which threat defence mechanism, when deployed at the network perimeter, protects against zero-day attacks? 5 B2 N( B8 ]4 k
A. intrusion prevention
8 E' x, E O4 C# A$ X1 JB. stateful inspection
0 r3 q9 c3 ~4 n5 ]" M8 sC. sandbox
! E4 D" L ]5 d2 q, ?1 h4 u3 PD. SSL decryption ! w: K* h8 q! C" o- P. ]3 s/ M, W$ Z
选A n/ m; V* d8 S3 j, P
/ o1 p& g o) f( K( ~/ D" [Which two items are found in YANG data models? (Choose two.)
1 P& ~( B- |( ]# ?A. HTTP return codes
* w. b3 V. S5 P1 ~B. rpc statements0 \: n: s8 q. O+ R& S7 D
C. JSON schema
( y* W: k3 `, MD. container statements
( @- n, m H: q" hE. XML schema
( g# {8 }; g! d; U, n选 C E |
评分
-
查看全部评分
|