Which network configuration protocol uses JSON as a data representation format?
Which two statements about the NX-API are true? (Chose two.)
Which two statements about YANG are true? (Choose two.)
Which computer security concept is violated when a web server is written that uses the "root" account for all interactions with a Linux system?
An organization leverages a multivendor network to sell connectivity services using Layer 3 VPN and VPLS. Where possible, the organization wants to use common APIs across vendors, in order to automate the configuration of network services. Which technology should be organization consider for the southbound interface?
How are authentication credentials sent in a Cisco APIC REST API authorization request?