Why are stateless calls executed by REST API useful in cloud applications?
They use HTTPS to implement all calls.
They control URL decoding.
They are easy to redeploy and to scale.
They rely on data stored on the server for calls.
Which data format can be used for an API request?
HTML
PERL
JSON
Python
What is a characteristic of a Type 2 hypervisor?
quick deployment
ideal for data center
complicated deployment
referred to as bare-metal
Drag and drop the code snippets from the bottom onto the blanks in the Python script to convert a Python object into a JSON string. Not all options are used.
Which message type is valid for IGMPv3?
leave group
hello
graft
source-specific membership report
See the solution below in Explanation:
Solution:
R2
R3
Copy run start
Verification:
OR
Sw10
config t
no int po2
int et0/0
channel-group 2 mode active
no shut
spanning-tree vlan 10a pri 0
wr
Config#int et0/1
config-if#ip ospf priority 255
R20
clear ip ospf process
yes
R10
ip ospf priority 0
R1
en
Conf t
Router ospf 10
Router-id 10.x.x.x – lo0 address
Int range lo0, e0/0-1
Ip ospf 10 area 0
Exit
Area 10 range 10.1.0.0 255.255.0.0
exit
Area 10 range 10.2.0.0 255.255.0.0
Wr
R30
Config t
router ospf 10
router-id 10.0.1.30
int ran lo0 , e0/0-1
ip ospf 10 a 0
int et0/2
ip ospf 10 a 50
area 50 range 10.10.0.0 255.255.128.0
area 50 range 10.50.0.0 255.255.128.0
end
Verification:-
username NetworkAdmin privilege 15 password CiscoENCOR
line vty 0 4
login local
transport input telnet rlogin
exec-timepit 20
no int po1
default int ran et0/0-2
int ran e0/0-2
switchport trunk encap dot1q
switchport mode trunk
channel-group 1 mode active
Solution: -
Flow exporter Export-NetFlowENCOR
destination 10.10.1.110
transport udp 2055
flow moni Monitor-NetFlowENCOR
ip sla 1
http gethttp://10.10.1.100
frequ 300
ip sla schedule 1 life forever start-time now
SW1
Monitor session 7 source interface e0/0
Monitor session 7 destination interface e1/1
End
flow record NetFlow-Record
match ipv4 source address
match ipv4 destination address
collect country bytes
flow exporter NetFlow-Exporter
destination 10.10.1.10
transport udp 9996
flow monitor NetFlow-Monitor
record NetFlow-Record
exporter NetFlow-Exporter
ip flow monitor NetFlow-Monitor input
http get http://10.10.1.100
frequency 600
ip sla schedule 1 start-time now
Sw1
monitor session 2 source int e0/0
monitor session 2 source int et0/2
monitor session 2 destination interface e1/0
router bgp 10
bgp router-id 10.1.1.111
no bgp defa ipv4-unicast
nei 209.165.200.226 remote-as 20
nei 209.165.202.130 remote-as 30
address-family ipv4
neigh 209.165.200.226 activate
neigh 209.165.202.130 activate
network 10.1.1.10 mask 255.255.255.255
network 209.165.201.10 mask 255.255.255.255
network 209.165.201.20 mask 255.255.255.255
Int e0/1
Ip ospf priority 255
Ip ospf network point-to-point
Int e0/0
router ospf 100
ip ospf 100 a 0
ip ospf 100 a 50
router ospf 30
area 50 range 10.10.0.0 255.255.192.0
area 50 range 10.50.0.0 255.255.192.0
Solution:-
Default int range et0/0-1
Int range e0/0 – 1
Sw trunk encap dot1
Switch mode trunk
Channel-group 2 mode passive
No shut
Spanning-tree vlan 10 priority 0
Spanning-tree vlan 30 priority 0
show ip access-list
ip access-list extended 151
5 permit eigrp any any
ip access-list extended 100
permit tcp 192.168.211.0 0.0.0.255 any eq 22
class-map match-any SSH
match access-group 100
policy-map CoPP
class SSH
police 8000 conform-action transmit exceed-action drop
control-plane
service-policy input CoPP
R22
int tunn0
vrf forwarding FINANCE
ip add 10.11.22.2 255.255.255.0
tunn so e0/0
tunn dest 209.165.200.230
int et0/1
vrf forward FINANCE
ip add 10.22.22.1 255.255.255.252
ip route vrf FINANCE 10.10.111.0 255.255.255.0 tunn0
VERIFICATION: -
config
flow exporter Export-NetFlowENCOR
ip sla schedule 100 life forever start-time now
monitor session 11 source interface e0/2
monitor session 11 destination interface et1/1
Int et0/0
Ip flow monitor Monitor-R1Flow input
Ip flow monitor Monitor-R1Flow output
Ip sla 1
Icmp-echo 10.12.1.2
Freq 300
Ip sla schedule 1 life foreve start-time now
Monitor session 12 source vlan 12
Monitor session 12 destination interface et1/3
ip access-list extended 120
permit tcp 192.168.25.0 0.0.0.255 any eq 23
class-map match-any TELNET
class TELNET
police 10000 conform-action transmit exceed-action drop
no int po20
channel-group 20 mode active
spanning-tree vlan 20 pri 0
Solution on R1:
R1# copy run start
int tun0
ip add 10.10.10.2 255.255.255.0
tunn source e0/0
tunnel dest 209.165.200.230
ip address 10.22.22.1 255.255.255.252
TESTED 01 May 2025
Copyright © 2014-2025 DumpsTool. All Rights Reserved