Time limit: 0
Quiz-summary
0 of 106 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
Information
DevNet Associate (Version 1.0) - Final Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 106 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- Answered
- Review
-
Question 1 of 106
1. Question
1 pointsA pharmaceutical company wants to contract the services of a cloud provider to store employee data and company-specific applications with strict access security. Which type of cloud would be the most appropriate for this scenario?Correct
Incorrect
Hint
Private clouds – Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as the government. A private cloud can be set up using the organization’s private network, though this can be expensive to build and maintain. A private cloud can also be managed by an outside organization with strict access security. -
Question 2 of 106
2. Question
1 pointsWhat is a function provided by an implementation of a read-only automation solution?Correct
Incorrect
Hint
You can use a read scenario to audit configurations and do the next natural step, which is to put the configuration back into compliance -
Question 3 of 106
3. Question
1 pointsData is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)Correct
Incorrect
Hint
Layer 4 port numbers identify the application or service which will handle the data. The source port number is added by the sending device and will be the destination port number when the requested information is returned. Layer 4 segments are encapsulated within IP packets. UDP, not TCP, is used when low overhead is needed. A source IP address, not a TCP source port number, identifies the sending host on the network. Destination port numbers are specific ports that a server application or service monitors for requests. -
Question 4 of 106
4. Question
1 pointsWhat type of attack targets an SQL database using the input field of a user?Correct
Incorrect
Hint
A criminal can insert a malicious SQL statement in an entry field on a website where the system does not filter the user input correctly. -
Question 5 of 106
5. Question
1 pointsWhich command can be used on Linux and MAC hosts to get IP addressing information?Correct
Incorrect
Hint
Network administrators typically view the IP addressing information on Windows hosts by issuing the ipconfig command, and on Linux and Mac hosts by issuing the ifconfig command. The networksetup -getinfo command is used on Mac hosts to verify IP settings. The ip address command is used on Linux hosts to display IP addresses and properties. -
Question 6 of 106
6. Question
1 pointsWhat are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)Correct
Incorrect
Hint
A switch has the ability of creating temporary point-to-point connections between the directly-attached transmitting and receiving network devices. The two devices have full-bandwidth full-duplex connectivity during the transmission. -
Question 7 of 106
7. Question
1 pointsWhich tool might a developer use as part of a Continuous Integration pipeline in order to build and test source code?Correct
Incorrect
Hint
The testing environment often includes automated testing tools such as Jenkins, CircleCI, or Travis CI, as well as integration with a version control system. -
Question 8 of 106
8. Question
1 pointsA packet is received by a server. The packet has a destination port number of 8008. What protocol or service is requested?Correct
Incorrect
-
Question 9 of 106
9. Question
1 pointsA network contains multiple VLANs spanning multiple switches. What happens when a device in VLAN 20 sends a broadcast Ethernet frame?Correct
Incorrect
Hint
VLANs create logical broadcast domains that can span multiple VLAN segments. Ethernet frames that are sent by a device on a specific VLAN can only be seen by other devices in the same VLAN. -
Question 10 of 106
10. Question
1 pointsWhich piece of software is responsible for creating and managing virtual machines, including allocating system resources to each virtual machine as needed?Correct
Incorrect
-
Question 11 of 106
11. Question
1 pointsHow is an Ethernet MAC address constructed?Correct
Incorrect
-
Question 12 of 106
12. Question
1 pointsWhich Cisco SDK works with ACI?Correct
Incorrect
-
Question 13 of 106
13. Question
1 pointsWhat platforms are provided by DevNet for community members to share solutions, tool kits, and other resources with each other?Correct
Incorrect
-
Question 14 of 106
14. Question
1 pointsWhich two data formats can RESTCON use when requesting data or responding with data? (Choose two.)Correct
Incorrect
Hint
RESTCONF can be used to access data. The RESTCONF requests and responses can use either JSON or XML structured data formats. -
Question 15 of 106
15. Question
1 pointsWhich DevNet resource would a developer use to look for a Python library that supports APIs for a specific Cisco product?Correct
Incorrect
Hint
DevNet Learning Labs contain tutorials that cover engineering technologies, programming languages, and concepts such as model-driven programmability, REST APIs, Python, JavaScript, and Cisco platform instructions and exercises. -
Question 16 of 106
16. Question
1 pointsA component was created with the intent of combining the disciplines and skills of Dev and Ops. This component created a new job role and implemented a best-practices playbook for doing Ops with software methods. Which component matches this description?Correct
Incorrect
Hint
Google was among the first companies to understand and institutionalize a new kind of hybrid Dev+Ops job description. This was the Site Reliability Engineer (SRE). The role of the SRE is intended to fuse the disciplines and skills of Dev and Ops, creating a new specialty and best-practices playbook for doing Ops with software methods. -
Question 17 of 106
17. Question
1 pointsMatch the DevNet exhange type with the decription.Correct
Incorrect
-
Question 18 of 106
18. Question
1 pointsRefer to the exhibit. A user is working on Ansible on the local NMS to manage remote network devices. Which file is the user creating?Correct
Incorrect
Hint
Ansible uses an inventory file called hosts that contains device information used by Ansible playbooks. The hosts file begins with an alias for the remote. After the alias, the hosts file specifies three variables that will be used by the Ansible playbook to access the device. These are the SSH credentials Ansible needs to securely access the remote host. -
Question 19 of 106
19. Question
1 pointsWhich DevNet resource would a developer use in order to test custom code in a production-like environment?Correct
Incorrect
Hint
When you’re developing and testing technology, you want a test bed where you can try out code within a realistic environment without affecting production systems. To do that, go to the DevNet Sandbox offering, where you can try out Cisco hardware and environments. -
Question 20 of 106
20. Question
1 pointsIn which situation would a company implement a reverse proxy as a security solution?Correct
Incorrect
Hint
A reverse proxy is similar to a regular proxy: however, while a regular proxy works to make requests from multiple computers look like they all come from the same client, a reverse proxy works to make sure responses look like they all come from the same server. -
Question 21 of 106
21. Question
1 pointsA software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Agile method. What is a characteristic of this method?Correct
Incorrect
Hint
Agile Methods: The Agile Manifesto by design, wasn’t precise about how Agile should work. After forging the Manifesto, its originators (and many others) kept evolving these ideas, absorbing new ideas from many sources, and testing them in practice. As a result, over the past few decades, many takes on Agile have emerged, and some have become widely popular. -
Question 22 of 106
22. Question
1 pointsA network engineer is creating a Docker container using the docker build command. If the engineer does not specify a tag, which tag will be used by default?Correct
Incorrect
Hint
The first part, the repository, is usually the username of the account storing the image. Next is the image name, and then finally the optional tag. (Remember, if you do not specify it, it will come up as latest.) -
Question 23 of 106
23. Question
1 pointsWhich component in the pyATS ecology handles bundling and running jobs?Correct
Incorrect
-
Question 24 of 106
24. Question
1 pointsWhich three avenues are available within DevNet for developers who need help with specific developer scenario questions concerning Cisco products? (Choose three.)Correct
Incorrect
-
Question 25 of 106
25. Question
1 pointsA student who is interested in network programmability approaches an instructor for advice on learning more about the subject. The student is a kinesthetic learner who learns by doing. Which DevNet resource should the instructor consider telling the student about?Correct
Incorrect
-
Question 26 of 106
26. Question
1 pointsWhat is the default shell commonly used on macOS and Linux?Correct
Incorrect
-
Question 27 of 106
27. Question
1 pointsWhat is immutable infrastructure in DevOps?Correct
Incorrect
-
Question 28 of 106
28. Question
1 pointsWhat is the most common cause of IT outages?Correct
Incorrect
Hint
Most outages are caused by systems being misconfigured, commonly due to human error as manual changes are being made. -
Question 29 of 106
29. Question
1 pointsWhich string of characters is used to identify the beginning of a new separate document when multiple documents are in a single YAML file?Correct
Incorrect
Hint
YAML files conventionally open with three dashes ( — alone on a line) and end with three dots ( … also alone a line). YAML also accommodates the notion of multiple “documents” within a single physical file, in this case, separating each document with three dashes on its own line. -
Question 30 of 106
30. Question
1 pointsWhat is the difference between functions and methods in the Python programming structure?Correct
Incorrect
Hint
The difference between methods and functions is that functions are standalone code blocks while methods are code blocks associated with an object, typically for object-oriented programming. -
Question 31 of 106
31. Question
1 pointsWhich command is used to create a new Git repository?Correct
Incorrect
-
Question 32 of 106
32. Question
1 pointsWhich stakeholder determines the useful value of software product features in the Lean process?Correct
Incorrect
-
Question 33 of 106
33. Question
1 pointsMatch the SDLC phase with its description. (Not all options are used.)Correct
Incorrect
-
Question 34 of 106
34. Question
1 pointsWhat is a principle of the Lean software development model?Correct
Incorrect
-
Question 35 of 106
35. Question
1 pointsWhat character is used to separate the key and value pairs in YAML?Correct
Incorrect
-
Question 36 of 106
36. Question
1 pointsWhich git command is used to compare changes between files?Correct
Incorrect
-
Question 37 of 106
37. Question
1 pointsRefer to the exhibit. Match the missing components of the Python script for authenticating to the Cisco Network Services Orchestrator and obtaining a list of network devices using the username of “superadmin” and password of “soverysecure!”. (Not all options are used.)Correct
Incorrect
-
Question 38 of 106
38. Question
1 pointsWhat is an example of a use supported by Cisco UCS Director and UCS Manager?Correct
Incorrect
-
Question 39 of 106
39. Question
1 pointsHow can a Webex Teams administrator retrieve additional details about a user through an API call?Correct
Incorrect
-
Question 40 of 106
40. Question
1 pointsWhich library is the most commonly used Python library for connecting NETCONF clients with a NETCONF server?Correct
Incorrect
-
Question 41 of 106
41. Question
1 pointsRefer to the exhibit. Match the missing components of the Python script for authenticating to the Cisco DNA Center and obtaining an authentication token using the username of “adminuser” and password of “Sup3rC1$c0”. (Not all options are used.)Correct
Incorrect
-
Question 42 of 106
42. Question
1 pointsRefer to the exhibit. Match the missing components to the Python script for authenticating to the Cisco DNA Center and obtaining a token using the username of “secureuser” and password of “C1$c0”. (Not all options are used.)Correct
Incorrect
Hint
Component1 = C1$c0 Component2 = password Component3 = token -
Question 43 of 106
43. Question
1 pointsRefer to the exhibit. Match the missing components of the Python script for the following tasks. (Not all options are used.)Correct
Incorrect
Hint
delete all previous demo rooms create a new demo room enroll Allan and Jane as members post a message to the new room -
Question 44 of 106
44. Question
1 pointsWhich two APIs allow for Cisco Meraki device provisioning and real-time notifications? (Choose two.)Correct
Incorrect
Hint
Dashboard API – This a RESTful service for device provisioning, management, and monitoring. Webhook API – This is a real-time notification system for network alerts, covering events and network health. -
Question 45 of 106
45. Question
1 pointsA packet is received by a server. The packet has a destination port number of 443. What protocol or service is requested?Correct
Incorrect
-
Question 46 of 106
46. Question
1 pointsWhen thinking about the functional planes of a network, what is unique about the data plane?Correct
Incorrect
Hint
The data plane is the forwarding plane, which is responsible for the switching of packets in hardware, using information from the control plane. The data plane processes data in hardware. -
Question 47 of 106
47. Question
1 pointsWhich Docker component defines the steps needed to create an image that can be deployed in a variety of environments?Correct
Incorrect
-
Question 48 of 106
48. Question
1 pointsWhich three statements describe characteristics of a virtual machine? (Choose three.)Correct
Incorrect
-
Question 49 of 106
49. Question
1 pointsMatch the use cases of a load balancer to the description. (Not all options are used.)Correct
Incorrect
-
Question 50 of 106
50. Question
1 pointsWhat are two characteristics of the staging environment of the four-tier deployment environment structure? (Choose two.)Correct
Incorrect
-
Question 51 of 106
51. Question
1 pointsRefer to the exhibit. A network engineer has created a Jenkins pipeline. Which menu option would the engineer use to run the pipeline?Correct
Incorrect
-
Question 52 of 106
52. Question
1 pointsA network engineer is configuring a Jenkins job and finishing with the following script in order to trigger the build: What is the purpose of the preparation stage?Correct
Incorrect
-
Question 53 of 106
53. Question
1 pointsWhich technique is used to make the output of password hashing nondeterministic?Correct
Incorrect
-
Question 54 of 106
54. Question
1 pointsWhat does self-service refer to in the context of enterprise IT?Correct
Incorrect
-
Question 55 of 106
55. Question
1 pointsWhich statement describes the term orchestration in IT automation?Correct
Incorrect
Hint
Orchestration may refer to several things. When meant concretely, it usually refers to user-built or platform-inherent automation aimed at managing workload lifecycles and reacting dynamically to changing conditions (e.g., by autoscaling or self-healing), particularly in container environments. When meant abstractly, it may refer to processes or workflows that link automation tasks to deliver business benefits, like self-service. -
Question 56 of 106
56. Question
1 pointsWhat is an example of a read-only automation solution?Correct
Incorrect
-
Question 57 of 106
57. Question
1 pointsA student is setting up the CSR1000v VM in VirtualBox that is already installed on the local computer. The VM is imported to the VirtualBox and starts successfully. The student tries to verify communications to the CSR1000v VM by opening the Firefox web browser on the local computer and enters the URL https://192.168.56.101 . A security message “Warning: Potential Security Risk Ahead” appears. What is the security issue that results in this message?Correct
Incorrect
-
Question 58 of 106
58. Question
1 pointsHow do APIs affect traditional IT tasks?Correct
Incorrect
-
Question 59 of 106
59. Question
1 pointsRefer to the exhibit. PC1 needs to resolve the host name of the web server into an IP address by using DNS. What destination IP address and destination port number will PC1 assign to the DNS query packet?Correct
Incorrect
-
Question 60 of 106
60. Question
1 pointsWhich two statements are true about NTP servers in an enterprise network? (Choose two.)Correct
Incorrect
Hint
Network Time Protocol (NTP) is used to synchronize the time across all devices on the network to make sure accurate timestamping on devices for managing, securing and troubleshooting. NTP networks use a hierarchical system of time sources. Each level in this hierarchical system is called a stratum. The stratum 1 devices are directly connected to the authoritative time sources. -
Question 61 of 106
61. Question
1 pointsMatch the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.)Correct
Incorrect
Hint
The translation of the IP addresses from 209.65.200.254 to 192.168.10.10 will take place when the reply comes back from the server. -
Question 62 of 106
62. Question
1 pointsA network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed?Correct
Incorrect
Hint
The traceroute command provides connectivity information about the path a packet takes to reach the destination and about every router (hop) along the way. It also indicates how long a packet takes to get from the source to each hop and back. -
Question 63 of 106
63. Question
1 pointsWhich two HTTP functions correspond to the UPDATE function in CRUD? (Choose two.)Correct
Incorrect
Hint
CRUD is an acronym that stands for CREATE, READ, UPDATE, and DELETE. The HTTP functions that correspond to CRUD functions are as follows: GET -> READ POST -> CREATE PUT/PATCH -> UPDATE DELETE -> DELETE -
Question 64 of 106
64. Question
1 pointsMatch the term to the RESTAPI request http://example.com/update/person?id=42&email=person%40example.com. (Not all options are used.)Correct
Incorrect
-
Question 65 of 106
65. Question
1 pointsWhich HTTP status code category is used in the response to indicate that a REST API request contains an error on the client side?Correct
Incorrect
Hint
4xx – client error: Responses with a 4xx code means that the request contains an error, such as bad syntax or invalid input, which prevents the request from being completed. The client must take action to fix these issues before resending the request. -
Question 66 of 106
66. Question
1 pointsRefer to the exhibit. A network administrator is using a Python script to test a REST API request. The traceback message indicates that there is an error in the URI. What is the error?Correct
Incorrect
-
Question 67 of 106
67. Question
1 pointsWhat are two requirements for an application to communicate with a webhook provider? (Choose two.)Correct
Incorrect
Hint
In order to receive a notification from a webhook provider, the application must meet certain requirements: The application must be running at all times to receive HTTP POST requests. The application must register a URI on the webhook provider so that the provider knows where to send a notification when target events occur. -
Question 68 of 106
68. Question
1 pointsA student is learning network automation by using a REST API. The student sends a request to a network device and receives a response with the status code of 202. What does this status code mean?Correct
Incorrect
Hint
Code 202: Request has been accepted for processing and is in process -
Question 69 of 106
69. Question
1 pointsWhat are two characteristics of stateless applications? (Choose two.)Correct
Incorrect
-
Question 70 of 106
70. Question
1 pointsWhat is a characteristic of the continuous integration component of the CI/CD philosophy for software development?Correct
Incorrect
-
Question 71 of 106
71. Question
1 pointsA software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Waterfall method. What is a characteristic of this method?Correct
Incorrect
Hint
With waterfalls, the water flows in one direction only. With the waterfall method, the process goes in one direction, and can never go backwards. Think of it like a relay race where one runner has to finish their distance before handing the baton off to the next person, who is waiting for them. The baton always goes in a forward motion. -
Question 72 of 106
72. Question
1 pointsIn which SDLC phase is the software product installed into the production environment to decide if it is ready for release?Correct
Incorrect
Hint
The deployment phase takes the software from the testing phase as input. During the deployment phase, the software is installed into the production environment. If there are no deployment issues, the product manager works with the architects and qualified engineers to decide whether the software is ready to be released. At the end of the deployment phase, the final piece of software is released to customers and other end users. -
Question 73 of 106
73. Question
1 pointsWhich convention is used in Python to indicate that methods and variables in a class are private and not to be used outside of the class?Correct
Incorrect
-
Question 74 of 106
74. Question
1 pointsA packet is received by a server. The packet has a destination port number of 80. What protocol or service is requested?Correct
Incorrect
-
Question 75 of 106
75. Question
1 pointsA network administrator is developing an application to control a Webex device through xAPI. Which three protocols can be used to access xAPI? (Choose three.)Correct
Incorrect
Hint
There are multiple ways to access xAPI including Telnet/SSH, HTTP, and RS-232 serial connection. -
Question 76 of 106
76. Question
1 pointsWhich type of request is used to send a message to a Webex Teams space using Python and the Messages API?Correct
Incorrect
-
Question 77 of 106
77. Question
1 pointsA network administrator is assigned the 172.16.0.0/24 block of addresses to use in designing an IP addressing scheme. The administrator submits this design for approval:- 172.16.0.0/26
- 172.16.0.64/27
- 172.16.0.96/26
- 172.16.0.128/27
Correct
Incorrect
-
Question 78 of 106
78. Question
1 pointsWhich statement describes a stateful firewall?Correct
Incorrect
Hint
Basic packet filtering firewalls can only filter based on Layer 3 and sometimes basic Layer 4 information. An application gateway firewall, or proxy firewall, can filter based on information in the upper layers such as the application layer. A NAT firewall can expand the number of available IP addresses on the network. -
Question 79 of 106
79. Question
1 pointsA software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Lean method. What is a characteristic of this method?Correct
Incorrect
-
Question 80 of 106
80. Question
1 pointsRefer to the exhibit. Match the Python coding information in the authentication request to the Cisco DNA Center to the location in the script. (Not all options are used.)Correct
Incorrect
-
Question 81 of 106
81. Question
1 pointsA student is learning REST API application. The student constructs an URI to query the MapQuest API for a route from New York, NY to Boston, MA. What is the valid URI format?Correct
Incorrect
-
Question 82 of 106
82. Question
1 pointsRefer to the exhibit. A student constructs a URI to query the MapQuest API for a route from New Orleans, LA to New York, NY. Match the components to the MapQuest URL. (Not all options are used.)Correct
Incorrect
-
Question 83 of 106
83. Question
1 pointsRefer to the exhibit. Match the Python code components to the function. (Not all options are used.)Correct
Incorrect
-
Question 84 of 106
84. Question
1 pointsA packet is received by a server. The packet has a destination port number of 123. What protocol or service is requested?Correct
Incorrect
-
Question 85 of 106
85. Question
1 pointsWhich scenario exhibits the “social proof” principle of human influence?Correct
Incorrect
-
Question 86 of 106
86. Question
1 pointsWhich SQL injection defense method should be used only as a last resort?Correct
Incorrect
-
Question 87 of 106
87. Question
1 pointsWhich type of ISE node provides network access, posturing, guest access, client provisioning, and profiling services?Correct
Incorrect
Hint
Check the Enable Session Services check box to enable network access, posture, guest, and client provisioning services. -
Question 88 of 106
88. Question
1 pointsWhich communication protocol does Ansible use to connect to remote devices?Correct
Incorrect
Hint
Ansible communicates with remote machines over the SSH protocol. By default, Ansible uses native OpenSSH and connects to remote machines using your current user name, just as SSH does. -
Question 89 of 106
89. Question
1 pointsRefer to the exhibit. Router R2 is configured with static NAT. Place in order the steps that occur when the client accesses the web server through the router. (Not all options are used.)Correct
Incorrect
-
Question 90 of 106
90. Question
1 pointsRefer to the exhibit. What is the function of the identified missing information in regards to the parameter and method contained in the request?Correct
Incorrect
-
Question 91 of 106
91. Question
1 pointsWhat is an architectural constraint to which a true RESTful API web service must adhere?Correct
Incorrect
Hint
These are the REST constraints:- -Client/server
- -Stateless
- -Cache
- -Uniform interface
- -Layered system
- -Code on demand
-
Question 92 of 106
92. Question
1 pointsA packet is received by a server. The packet has a destination port number of 53. What protocol or service is requested?Correct
Incorrect
-
Question 93 of 106
93. Question
1 pointsWhich statement accurately describes dynamic NAT?Correct
Incorrect
Hint
Dynamic NAT provides a dynamic mapping of inside local to inside global IP addresses. NAT is merely the one-to-one mapping of one address to another address without taking into account whether the address is public or private. DHCP is automatic assignment of IP addresses to hosts. DNS is mapping host names to IP addresses. -
Question 94 of 106
94. Question
1 pointsA packet is received by a server. The packet has a destination port number of 830. What protocol or service is requested?Correct
Incorrect
Hint
By default, the NETCONF server on the device runs on TCP port 830 and uses the SSH process for transport. A NETCONF session can be established by using an SSH client and specifying port 830 when connecting to the device -
Question 95 of 106
95. Question
1 pointsWhich programming language is supported by the Webex xAPI to develop macros for on-device customization?Correct
Incorrect
-
Question 96 of 106
96. Question
1 pointsWhich Cisco management system is designed as the solution for Software-Defined Networking and runs on Nexus 9000 hardware?Correct
Incorrect
-
Question 97 of 106
97. Question
1 pointsA developer issues a Linux command python3 -m venv devenv . What is the developer trying to achieve?Correct
Incorrect
-
Question 98 of 106
98. Question
1 pointsRefer to the exhibit. Match the missing components of the Python script for the APIC-EM REST API request for the user “secureuser”. (Not all options are used.)Correct
Incorrect
-
Question 99 of 106
99. Question
1 pointsTwo network engineers are discussing the methods used to forward frames through a switch. What is an important concept related to the cut-through method of switching?Correct
Incorrect
Hint
Fast-forward switching offers the lowest level of latency and it is the typical cut-through method of switching. Fragment-free switching can be viewed as a compromise between store-and-forward switching and fast-forward switching. Because fast-forward switching starts forwarding before the entire packet has been received, there may be times when packets are relayed with errors. -
Question 100 of 106
100. Question
1 pointsWhen thinking about the functional planes of a network, what is unique about the control plane?Correct
Incorrect
Hint
Control Plane – The control plane of a network device processes the traffic that is required to maintain the functionality of the network infrastructure. The control plane consists of applications and protocols between network devices, such as routing protocols OSPF, BGP, and Enhanced Interior Gateway Routing Protocol (EIGRP). The control plane processes data in software. -
Question 101 of 106
101. Question
1 pointsRefer to the exhibit. If PC1 is communicating with a web server on the Internet, which two TCP/IP layers are responsible for encapsulating the message that requests data from that particular server and assigning a source port number? (Choose two.)Correct
Incorrect
-
Question 102 of 106
102. Question
1 pointsA network security administrator is evaluating products that automate threat containment through APIs when a threat is detected. Which Cisco product with the desired capability provides a rule-based engine for enabling policy-based network access to users and devices?Correct
Incorrect
Hint
ISE (Cisco Identity Services Engine) provides a rule-based engine for enabling policy-based network access to users and devices. It enables you to enforce compliance and streamline user network access operations. With the ISE APIs, you can automate threat containment when a threat is detected. It integrates with existing identity deployments. -
Question 103 of 106
103. Question
1 pointsMatch the purpose with its DHCP message type. (Not all options are used.)Correct
Incorrect
-
Question 104 of 106
104. Question
1 pointsRefer to the exhibit. Match the missing components to the Meraki API script to complete the following tasks. (Not all options are used.)Correct
Incorrect
Hint
retrieve the organizations retrieve the networks and the corresponding id retrieve the devices and corresponding device id -
Question 105 of 106
105. Question
1 pointsRefer to the exhibit. A student constructs a URI to query the MapQuest API for a route from New Orleans, LA to New York, NY. Match the components to the MapQuest URI. (Not all options are used.)Correct
Incorrect
-
Question 106 of 106
106. Question
1 pointsWhen thinking about the functional planes of a network, what is unique about the management plane?Correct
Incorrect
Hint
Management Plane – The management plane manages traffic destined for the network device itself. Examples include Secure Shell (SSH) and Simple Network Management Protocol (SNMP).