Topic 1: Exam Pool A
Which method of account authentication does OAuth 2.0 within REST APIs?
A.
username/role combination
B.
access tokens
C.
cookie authentication
D.
basic signature workflow
access tokens
Explanation: The most common implementations of OAuth (OAuth 2.0) use one or both of these tokens:
+ access token: sent like an API key, it allows the application to access a user’s data; optionally, access tokens can expire.
+ refresh token: optionally part of an OAuth flow, refresh tokens retrieve a new access token if they have expired. OAuth2 combines Authentication and Authorization to allow more sophisticated scope and validity control.
What is the recommended MTU size for a Cisco SD-Access Fabric?
A.
1500
B.
9100
C.
4464
D.
17914
9100
Which LISP component is required for a LISP site to communicate with a non-LISP site?
A.
ETR
B.
ITR
C.
Proxy ETR
D.
Proxy ITR
Proxy ETR
Which two operational models enable an AP to scan one or more wireless channels for rouge access points and at the same time provide wireless services to clients? (Choose two.)
A.
Rouge detector
B.
Sniffer
C.
FlexConnect
D.
Local
E.
Monitor
Local
Monitor
How is MSDP used to interconnect multiple PIM-SM domains?
A.
MSDP depends on BGP or multiprotocol BGP for mterdomam operation
B.
MSDP SA request messages are used to request a list of active sources for a specific group
C.
SDP allows a rendezvous point to dynamically discover active sources outside of its domain
D.
MSDP messages are used to advertise active sources in a domain
MSDP depends on BGP or multiprotocol BGP for mterdomam operation
Page 37 out of 168 Pages |
Previous |