JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self- contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret (with the HMAC algorithm) or a public/private key pair using RSA or ECDSA. JSON Web Tokens are composed of three parts, separated by a dot (.): Header, Payload, Signature. Therefore, a JWT typically looks like the following: xxxxx.yyyyy.zzzzz The header typically consists of two parts: the type of the token, which is JWT, and the signing algorithm being used, such as HMAC SHA256 or RSA. The second part of the token is the payload, which contains the claims. Claims are statements about an entity (typically, the user) and additional data. To create the signature part you have to take the encoded header, the encoded payload, a secret, the algorithm specified in the header, and sign that. Reference: https://jwt.io/introduction/
Question 477
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
Correct Answer:
Question 478
Which EIGRP feature allows the use of leak maps?
Correct Answer: B
If we configured an EIGRP stub router so that it only advertises connected and summary routes. But we also want to have an exception to this rule then we can configure a leak-map. For example: R4(config-if)#router eigrp 1 R4(config-router)#eigrp stub R4(config)#ip access-list standard R4_L0opback0 R4(config-std-nacl)#permit host 4.4.4.4 R4(config)#route-map R4_L0opback0_LEAKMAP R4(config-route-map)#match ip address R4_L0opback0 R4(config)#router eigrp 1 R4(config-router)#eigrp stub leak-map R4_L0opback0_LEAKMAP As we can see the leak-map feature goes long with 'eigrp stub' command.
Question 479
Which feature must be configured to allow packet capture over Layer 3 infrastructure'?
Correct Answer: D
Question 480
Which DHCP option provides the CAPWAP APs with the address of the wireless controller(s)?