Study Guide Flashcards
What is a benfit of data modeling languages like YANG?
A. They enable programmers to change or write their own application within the device operating system.
B. They create more secure and efficient SNMP OIDs.
C. They make the CLI simpler and more efficient.
D. They provide a standardized data structure, which results in configuration scalability and consistency.
D. They provide a standardized data structure, which results in configuration scalability and consistency.
A customer has several small branches and wants to deploy a Wi-Fi solution with local management using CAPWAP. Which deployment model meets this requirement? A. Autonomous B. Mobility express C. SD-Access wireless D. Local Mode
B. Mobility express.
Mobility express is the aility to use an access point (AP) as a controller instead of a real WLAN controller. This solution is only suitable for small to midsize, or multi-site branch locations where you might not want to invest in a dedicated WLC.
Which statement about agent-based versus agentless configuration management tools is true?
A. Agentless tools require no messaging systems between master and slaves.
B. Agentless tools use proxy nodes to interface with slave nodes.
C. Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave nodes.
D. Agent-based tools do not require installation of additional software packages on the slave nodes.
C. Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave nodes.
Agentless tool means that no software or agent needs to be installed on the client machines that are to be managed. Ansible is an example of an agentless tool.
On which protocol or technology is the fabric data plane based in Cisco SD-Access fabric? A. LISP B. IS-IS C. Cisco TrustSec D. VXLAN
D. VXLAN
VXLAN (Virtual Extensible LAN) can be forwarded by any IP-based network and creates the overlay network for the SD-Access fabric. Using VXLAN allows the SD-Access fabric to support Layer 2 and Layer 3 virtuial topologies (overlays).
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
A. logging host 10.2.3.4 vrf mgmt transport tcp port 6514
B. logging host 10.2.3.4 vrf mgmt transport udp port 6514
C. logging host 10.2.3.4 vrf mgmt transport tcp port 514
D. logging host 10.2.3.4 vrf mgmt transport udp port 514
A. logging host 10.2.3.4 vrf mgmt transport tcp port 6514
The TCP port 6514 has been allocated as the syslog over TLS.
A client device fails to see the enterprise SSID, but other device are connected to it. What is the cause of this issue?
A. The hidden SSID was not manually configured on the client.
B. The broadcast SSID was not manually configured on the client.
C. The client has incorrect credentials stored for the configured hidden SSID.
D. The client has incorrect credentials stored for the configured broadcast SSID.
A. The hidden SSID was not manually configured on the client.
Which function does a fabric edge node perform in an SD-Access deployment?
A. Connects the SD-Access fabric to another fabric or external Layer 3 networks.
B. Connects endpoints to the fabric and forwards their traffic.
C. Provides reachabiity border nodes in the fabric underlay.
D. Encapsulates end-user data traffic into LISP.
B. Connects endpoints to the fabric and forwards their traffic.
There are five device roles in the fabric overlay:
Control plane node - Contains the settings, protocols, and mapping tables to provide the endpoint-to-location mapping system for the fabric overlay.
Fabric Border Node - Connects external Layer 3 networks to the SDA fabric.
Fabric Edge Node - Connects wired endpoints to the SDA fabric.
Fabric WLAN Controller (WLC) - Connects APs and wireless endpoints to the SDA fabric.
Intermediate Nodes - Intermediate routers or extended switches that do not provide any sort of SD-Access fabric role other than underlay services.
Which two methods are used by an AP that is trying to discover a wireless LAN controller? (choose two)
A. Cisco Discovery Protocol neighbor
B. Broadcasting on the local subnet
C. DNS lookup cisco-DNA-PRIMARY.local domain
D. DHCP Option 43
E. Querying other APs
B and D.
B - Broadcasting on the local subnet
D - DHCP Option 43
Which statement describes the IP and MAC allocation requirements for virtual machines on Type 1 hypervisors?
A. Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes.
B. Each virtual machine requires a unique IP address but shares the MAC address with the physical server.
C. Each virtual machine requires a unique IP address but shares the MAC address with the address of the physical server.
D. Each virtual machine requires a unique MAC address but shares the IP address with the physical server.
A. Each virtual machine requires a unique IP and MAC address to be able to reach to other nodes.
In Type 1 hypervisor (or native hypervisor), the hypervisor is installed directly on the physical server (VMware vSphere/ESXi, Oracle VM, KVM, and Hyper-V).
Which LISP infrastucture device provides connectivity between non-sites and LISP sites by receiving non-LISP traffic with a LISP site destination? A. PETR B. PITR C. map resolver D. map server
B. PITR
Proxy Ingress Tunnel Router (PITR) is an infrastructure LISP network entity that receives packets from non-LISP sites and encapsulates the packets to LISP sites or natively forwards them to non-LISP sites.
In OSPF, which LAS type is responsible for pointing to the ASBR router? A. type 1 B. type 2 C. type 3 D. type 4
D. Type 4
Summary ASBR LSA (Type 4) is generated by the ABR to describe an ASBR to routers in other areas so that routers in other areas know how to get to external routes through that ASBR.
An engineer configures a WLAN with fast transition enabled. Some legacy clients fail to connect to this WLAN. Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on their OLTI's? A. over the DS B. adaptive R C. 802.11v D. 802.11k
B. adaptive R
802.11r Fast Transition (FT) Roaming is a new concept for roaming. The initial handshake with the new AP occurs before the client roams to the target AP. Hence, fast transition.
What is the JSON syntax for the following data? Name Bob Johnson Age 75 Is alive Favorite Foods are cereal, mustard, and onions. A. Name: Bob, Johnson... B. Name" , "Bob Johnson"... C. Name', 'Bob Johnson,' ... D. Name", "Bob Johnson" ... E. {"Name" : "Bob Johnson" ...
E. {“Name” : “Bob Johnson” , “age” : 75, “alive” : true, “favorite foods” :[“Cereal” , “Mustard” , “Onions”]}
If a VRRP master router fails, which router is selected as the new master router?
A. router with the highest priority
B. router with the highest loopack address
C. router with the lowest loopback address
D. router with the lowest priority
A. router with the highest priority
Refer to the exhibit. Which type of antenna do the radiation patterns represent? A. Patch C. Omnidirectional C. Yagi D. Dipole
A. Patch
A patch antenna, in its simplest form, is just a single rectangular (or circular) conductive plate that is spaced above a ground plane. Patch antennas are attractive due to their low profile and ease of fabrication.
What do Cisco DNA southbound APIs provide?
A. Interface between the controller and the network devices.
B. NETCONF API interface for orchestration communication.
C. RESTful API interface for orchestrator communication.
D. Interface between the controller and the consumer.
A. Interface between the controller and the network devices.
To increase total throughput and redundancy on the links between the wireless controller and the switch, the customer enabled LAG on the wireless controller. Which EtherChannel mode must be configured on the switch to allow the WLC to connect? A. Auto B. Active C. On D. Passive
C. On
LAG requires the EtherChannel to be configured for “mode on” on both the controller and the catalyst switch.
Which description of an SD-Access wireless network infrastructure deployment is true?
A. The access point is part of the fabric underlay
B. The WLC is part of the fabric underlay
C. The access point is part of the fabric overlay
D. The wireless client is part of the fabric overlay
C. The access point is part of the fabric overlay.
Which method displays text directly into the active console with a synchronous EEM applet policy? event manager applet boom event syslog pattern 'UP' action 1.0 ... A. gets 'logging directly to console' B. syslog priority direct msg 'log directly to console' C. puts 'logging directly to console' D. string 'logging directly to console'
C. action 1.0 puts ‘logging directly to console’
What is the difference between a RIB and a FIB?
A. The RIB is used to make IP source prefic-based switching decisions
B. The FIB is where all IP routing information is stored.
C. The RIB maintains a mirror image of the FIB.
D. The FIB is populated based on RIB content.
D. The FIB is populated based on RIB content.
CEF uses a Forwarding Information Base (FIB) to make IP destination prefix-based switching decisions. RIB is in the control plane, FIB is in the data plane.
Which PAgP mode combination prevents an Etherchannel from forming? A. auto/auto B. desirable/desirable C. auto/desirable D. desirable
A. auto/auto
There are two PAgP modes:
Auto - Responds to PAgP messages but does not aggressively negotiate an Etherchannel, unless the other end is set to desirable.
Desirable - Actively negotiates Etherchannel with the other end of the link no matter if it is auto or desirable.
In which part of the HTTP message is the content type specified? A. HTTP method B. URL C. header D. body
C. header
What is the correct EBGP path attribute list, ordered from most preferred to the least preferred that the BGP best-path algorithm uses?
A. weight, AS path, local preference, MED
B. weight, local preference, AS path, MED
C. local preference, weight, AS path, MED
D. local preference, weight, MED, AS path
B. weight, local preference, AS path, and MED Path selection order for EBGP: 1. Weight 2. Local Preference 3. Originate 4. AS Path 5. Origin 6. MED 7. External 8. IGP Cost 9. eBGP Peering 10. Router ID
Which statement about multicast RPs is true?
A. RPs are required only when using protocol independent multicast dense mode
B. RPs are required for protocol independent multicast sparse mode and dense mode
C. By default, the RP is needed periodically to maintain sessions with sources and receivers.
D. By default, the RP is needed only to start new sessions with sources and receivers.
D. By default, the RP is needed only to start new sessions with sources and receivers.
A rendezvous point (RP) is required only in networks running protocol independent multicast sparse mode (PIM-SM). By default, the RP is needed only to start new sessions with sources and receivers.
What the role of a fusion in an SD-Access solution?
A. provides connectivity to external networks
B. acts as a DNS server
C. performs route leaking between user-defined virtual networks and shared services.
D. provides additional forwarding capacity to the fabric
C. performs route leaking between user-defined networks and shared services.
Which statement about VXLAN is true?
A. VXLAN uses TCP 35 as the transport protocol over the physical data center network.
B. VXLAN extends the Layer 2 segment ID field to 24-bits, which allows up to 4094 unique layer 2 segments over the same network.
C. VXLAN encapsulates a Layer 2 frame in an IP-UDP header, which allows Layer 2 adjacency across router boundaries.
D. VXLAN uses the Spanning Tree Protocol for loop prevention.
C. VXLAN encapsulates a Layer 2 frame in an IP-UDP header, which allows Layer 2 adjacency across router boundaries.
Refer to the exhibit. Switch C connects HR and Sales to the Core switch. However, business needs require that no traffic from the Finance VLAN traverse this switch. Which command meets this requirement?
A. vtp pruning
B. vtp pruning vlan 110
C. interface port-channel 1
switchport trunk allowed vlan add 210, 310
D. interface port-channel 1
switchport trunk allowed vlan remove 110
D. interface port-channel 1
switchport trunk allowed vlan remove 110
Finance belongs to VLAN 110, so it must be removed from the port-channel.
Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session? A. 200 B. 302 C. 401 D. 504
C. HTTP Status Code: 401
A 401 error response indicates that the client tried to operate on aprotected resource without providing the proper authorization. It may have provided the wrong credentials or none at all.
4## errors are client, 5## are server.
When configuring WPA2 Enterprise on a WLAN, which additional security component configuration is required? A. NTP server B. PKI server C. RADIUS server D. TACACS server
C. RADIUS server
WPA2-Enterprise requires a RADIUS server.
A response code of 404 is received while using the REST API on Cisco DNA Center to POST to this URL.
/dna/intent/api/v1
/template-programmer/project
A. The client made a request for a resource that does not exist.
B. The server has not implemented the functionality that is needed to fulfill the request.
C. The request accepted for processing, but the processing was not completed.
D. The POST/PUT request was fulfilled and anew resource was created, information about the resource is in the response body.
A. The client made a request a resource that does not exist.
The 404 (Not Found) error status code indicates that the REST API can’t map the client’s URL to a resource but may be available in the future. Subsequent requests by the client are permissible.
Which behavior can be expected when the HSRP versions is changed from 1 to 2?
A. Each HSRP group reinitializes because the virtual MAC address has changed.
B. No changes occur because version 1 and 2 use the same virtual MAC OUI.
C. Each HSRP group reinitializes because the multicast address has changed.
D. No changes occur because the standby router is upgraded before the active router.
A. Each ESRP group reinitializes because the virtual MAC address has changed.
A client with IP address 209.165.201.25 must access a web server on port 80 at 209.165.200.225. To allow this traffic, an engineer must add a statement to an access control list that is applied in the inbound direction on the port connecting to the web server. Which statement allows this traffic? permit tcp host 209.165... A. 200.225 eq 80 host 209.165.201.25 B. 201.25 host .200.225 eq 80 C. 200.225 it 80 host 201.25 D. 200.225 host 201.25 eq 80
A. permit tcp host 209.165.200.225 eq 80 host 209.165.201.25
OSPF or EIGRP?
- Supports unequal path load balancing
- Link state routing protocol
- Distance vector routing protocol
- Metric is based on delay and reliability by default
- Makes it easy to segment the network logically
- Constructs three tables s part of its operation - neighbor, topology, and routing.
OSPF
- Link state routing protocol
- Metric is based on delay and reliability by default
- Makes it easy to segment the network logically
EIGRP
- supports unequal path load balancing
- distance vector routing protocol
- constructs three tables as part of its operation: neighbor, topology, and routing.
Which IP address becomes the next active next-hop for 192.168.102.0/24 when 192.168.101.2 fails? A. 192.168.101.18 B. 192.168.101.6 C. 192.168.101.10 D. 192.168.101.14
A. 192.168.101.18
Path selection attributes: Weight > Local Preference > Originate > AS Path > Origin > MED > External > IGP Cost > eBGP Peering > Router ID
.18 takes over for .2
Which two protocols are used with Yang data models? (Choose two) A. HTTPS B. SSH C. RESTCONF D. TLS E. NETCONF
C and E.
C. RESTCONF
E. NETCONF
YANG (Yet Another Next Generation) is a data modeling language for the definition of data sent over netwrok management protocols such as the NETCONF and RESTCONF.
Which protocol does REST API rely on to secure the communication channel? A. TCP B. HTTPS C. SSH D. HTTP
B. HTTPS
REST API accepts and returns HTTP or HTTPS messages, but HTTP is not enabled by default.
Which JSON syntax is valid? A. {"switch" : "name" : dist1" B. {'switch': C. {"switch": {"name":"dist1" D. {/"switch/"
C. { “switch” : { “name” : “dist1” , “interface” : [“gig1” , “gig2” , “gig3” ] } }
Which two descriptions of FlexConnect mode for Cisco APs are true? (choose two)
A. AP’s that operate in FlexConnect mode cannot detect rogue APs.
B. FlexConnect mode is used when the APs are set up in a mesh environment and used to bridge between each other.
C. FlexConnect mode is a feature that is designed to allow specified CAPWAP-enabled APs to exclude themselves from managing data traffic between clients and infrastructure.
D. When connected to the controller, FlexConnect APs can tunnel traffic back to the controller.
E. FlexConnect mode is a wireless solution for branch office and remote office deployments.
D and E.
D. When connected to the controller, FlexConnect APs can tunnel traffic back to the controller.
E. FlexConnect mode is a wireless solution for branch office and remote office deployments.
Which two staetments about he EEM applet configuration are true? (Choose two).
A. The EEM applet runs before the CLI command is executed.
B. The EEM applet runs after the CLI command is executed.
C. The EEM applet requires a case-insensitive response.
D. The running-configuration is displayed only if the letter Y is entered at the CLI.
A and D.
A. The EEM applet runs before the CLI command is executed.
D. The running-configuration is displayed only if the letter Y is entered at he CLI.
The “sync yes” option causes the EEM applet to run before the CLI command is executed.
Which network script automation option or tool is used in the exhibit?
https://mydevice.mycompany.com/getstuff?queryName=errors&queryResults=yes
A. EEM
B. Python
C. Bash script
D. NETCONF
E. REST
E. REST
Which data modeling language is commonly used by NETCONF? A. HTML B. XML C. YANG D. REST
C. YANG
Cisco IOS-XE supports YANG, which can be used with NETCONF for automation.
Refer to the exhibit. Which IPv6 OSPF network type is applied to interface Fa0/0 of R2 by default? A. broadcast B. Ethernet C. multipoint D. point-to-point
A. broadcast.
The Broadcast network type is the default for an OSPF enabled ethernet interface.
A network is being migrated from IPv4 to IPv6 using a dual-stack approach. Network management is already 100% IPv6 enabled. In a dual-stack network with two dual-stack NetFlow collections, how many flow exporters are needed per network device in the flexible NetFlow configuration? A. 1 B. 2 C. 4 D. 8
B. 2
What is the structure of a JSON web token?
A. three parts separated by dots. Header, payload, and signature
B. header and payload
C. three parts separated by dots. Version, header, and signature.
D. payload and signature
A. three partes separated by dots. Header, payload, and signature.
JSON Web Token (JWT) are composed of three parts separated by a dot:
xxxxx.yyyyy.zzzzz
Which feature is supported by EIGRP but is not supported by OSPF? A. route summarization B. equal-cost load balancing C. unequal-cost load balancing D. route filtering
C. unequal-cost load balancing
EIGRP supports unequal-cost load balncing via the “variance” command. OSPF only supports equal-cost load balancing.
Which method creates an EEM applet policy that is registered with the EEM and runs on demand or manually? event manager applet ondemand A. event register B. event manual C. event none D. none
C. event none
The “event none” command allows EEM to identify an EEM policy that can be manually triggered.
Which IP SLA operation requires the IP SLA responder to be configured on the remote end? A. ICMP echo B. UDP jitter C. CMP jitter D. TCP connect
B. UDP jitter
An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 security options for Web Policy. Which device presents the web authentication for the WLAN? A. ISE server B. local WLC C. RADIUS server D. anchor WLC
B. local WLC
Refer to exhibit. VLANs 50 and 60 exist on the trunk links between all switches. All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server. Which command ensures that SW3 receives frames only from VLAN 50? A. SW1# vtp pruning B. SW3# vtp mode transparent C. SW2# vtp pruning D. SW1# vtp mode transparent
A. SW1# vtp pruning
Which NGFW mode block flows crossing the firewall? A. Passive B. Tap C. Inline Tap D. Inline
D. Inline
What are two common sources of interference for Wi-Fi networks? (Choose two) A. radar B. LED lights C. rogue AP D. conventional oven E. fire alarm
A and C.
A. Radar
C. Rogue AP
A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two)
A. Configure the logging synchronous global configuration command
B. Configure the logging delimiter feature
C. Configure the logging synchronous command under the vty
D. Press the TAB key to reprint the command in a new line
E. Increase the number of lines on the screen using the terminal length command.
A and D.
A. Configure the logging synchronous global configuration command.
D. Press the TAB key to reprint the command in anew line.
The login method is configured on the VTY lines of a router with these parameters:
-The first method for authentication is TACACS
-If TACACS is unavailable, login is allowed without any provided credentials
A. aaa authentication login VTY group tacacs+ none
line vty 0 4
password 7
sh run | include username
Pick the option with:
aaa authentication login VTP group tacacs+ none
and
displays nothing under sh run | include username
Which QoS component alters a packet to change the way that traffic is treated in the network? A. Marking B. Classification C. Shaping D. Policing
A. Marking
Which marking field is used only as an internal marking within a router? A. QoS Group B. Discard Eligibility C. IP Precedence D. MPLS Experimental
A. QoS Group
Which statement about a Cisco APIC controller versus amore traditional SDN controller is true?
A. APIC uses a policy agent to translate policies into instructions.
B. APIC supports OpFlex as a Northbound protocol.
C. APIC does support a Southbound REST API.
D. APIC uses an imperative model.
A. APIC uses a policy agent to translate policies into instructions.
Which QoS mechanism will prevent a decrease in TCP performance? A. Shaper B. Policer C. WRED D. Rate-Limit E. LLQ F. Fair-Queue
C. WRED
Weighted Random Early Detection is a congestion avoidance mechanism.
Which statement explains why Type 1 hypervisors are considered more efficient than Type 2 hypervisors?
A. Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS.
B. Type 1 hypervisor enables other operating systems to run on it.
C. Type 1 hypervisor relics on the existing OS of the host machine to access CPU, memory, storage, and network resources.
D. Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques.
A. Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS.
What are two benfits of virtualizng the server with the use of VMs in a data center environment? (Choose two)
A. Increased security
B. Reduced rack space, power, and cooling requirements
C. Reduced IP and MAC address requirements
D. Speedy deployment
E. Smaller Layer 2 domain
B and D.
B. Reduced rack space, power, and cooling requirements.
D. Speedy deployment
Which exhibit displays a valid JSON file?
{
“hostname” : “edge_router_1”
…
or
{
“hostname” : “edge-router_1”,
…
{
“hostname” : “edge_router_1” ,
…
Look for the only option with a comma after “edge_router_1”
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel? A. MTU B. Window size C. MRU D. MSS
D. MSS
The TCP Maximum Segment Size.
Which statement about an RSPAN session configuration is true?
A. A fitter must be configured for RSPAN regions.
B. Only one session can be configured at a time.
C. A special VLAN type must be used as the RSPAN destination.
D. Only incoming traffic can be monitored.
C. A special VLAN type must be used as the RSPAN destination.
Refer to the exhibit. Based on the configuration in the WLAN security setting. Which method can a client use to authenticate to the network? A. text string B. username and password C. certificate D. RADIUS token
A. text string
Which two pieces of information are necessary to compute SNR? (Choose two). A. EIGRP B. noise floor C. antenna gain D. RSSI E. transmit power
B and D.
B. noise floor
D. RSSI
SNR - Signal to Noise Ratio
Refer to the exhibit. The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of roaming is supported? A. Indirect B. Layer 3 intercontroller C. Layer 2 intercontroller D. Intercontroller
B. Layer 3 intercontroller.
What is the difference between the enable password and the enable secret password when password encryption is enabled on an IOS device?
A. Te enable password is encrypted with a stronger exncryption method.
B. There is no difference and both passwords are encrypted identically.
C. The enable password cannot be decrypted.
D. The enable secret password is protected via stronger cryptography mechanisms.
D. The enable secret password is protected via stronger cryptography mechanisms.
When reason could cause an OSPF neighborship to be in the EXSTART / EXCHANGE staet? A. Mismatched OSPF network type B. Mismatched areas C. Mismatched MTU size D. Mismatched OSPF link costs
C. Mismatched MTU size
Which two staetments about VRF-lite are true? (Choose two)
A. It can increase the packet switching rate.
B. It supports most routing protocols, including EIGRP, ISIS, and OSPF.
C. It supports MPLS-VRF label exchange and labeled packets.
D. It should be used when a customer’s router is connected to an ISP over OSPF.
E. It can support multiple customers on a single switch.
B and E.
B. It supports most routing protocols, including EIGRP, ISIS, and OSPF.
E. It can support multiple customers on a single switch.
Which staetment about the default QoS configuration on aCisco switch is true?
A. All traffic is sent through four egress queues.
B. Port trust is enabled.
C. The Port Cos value is 0
D. The Cos value of each tagged packet is modified
C. Te Port Cos value is 0.
Which IPv6 migration method relies on dynamic tunnels that use the 2002::/16 reserved address space? A. 6RD B. 6to4 C. ISATAP D. GRE
B. 6to4
6to4 tunnel is a technique which relies on reserved address space 2002::/16
How are the Cisco Express Forwarding table and the FIB related to each other?
A. The FIB is used to populate the Cisco Express Forwarding table
B. The Cisco Express Forwarding table allows route lookups to be forwarded to the route processor for processing before they are
C. There can be only one FIB but multiple Cisco Express Forwarding tables on IOS devices.
D. Cisco Express Forwarding uses a FIB to make IP destination prefix-based switching decisions.
D. Cisco Express Forwarding uses a FIB to make IP destination prefix-based switching decisions.
Which two operations are valid for RESTCONF? (Choose two) A. HEAD B. REMOVE C. PULL D. PATCH E. ADD F. PUSH
A and D.
A. HEAD
D. PATCH
What is a benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment?
A. faster deployment times because additional infrastructure does not need to be purchased.
B. lower latency between systems that are physically located near each other.
C. less power and cooling resources needed to run infrastructure on-premises.
D. ability to quickly increase compute power without the need to install additional hardware.
B. lower latency between systems that are physically located near each other.