Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?
Which type of API is being used when a controller within a software-defined network architecture dynamically
makes configuration changes on switches within the network?
An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically.
What must be configured to accomplish this?
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps.
Which two actions must be taken to ensure that interfaces are put back into service? (Choose two)