Question: 1
Which algorithms are used to secure REST API from brute attacks and minimize the impact?
A. SHA-512 and SHA-384
B. MD5 algorithm-128 and SHA-384
C. SHA-1, SHA-256, and SHA-512
D. PBKDF2, BCrypt, and SCrypt
Answer: D
Question: 2
An engineer is describing QoS to a client. Which two facts apply to traffic policing? (Choose two.)
A. Policing adapts to network congestion by queuing excess traffic
B. Policing should be performed as close to the destination as possible
C. Policing drops traffic that exceeds the defined rate
D. Policing typically delays the traffic, rather than drops it
E. Policing should be performed as close to the source as possible
Answer: C, E
Question: 3
What are two common sources of interference for WI-FI networks? (Choose two.)
A. radar
B. LED lights
C. rogue AP
D. conventional oven
E. fire alarm
Answer: A C
Question: 4
A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?
A. Autonomous
B. Mobility Express
C. SD-Access wireless
D. Local mode
Answer: B
For More Info: https://www.exam4help.com/cisco/350-401-dumps.html