Author: IT Administrator
Module 1: Course Introduction Exam Answers DevNet Associate (Version 1.0) – DevNet Associate Module 1 Exam Answers 1. A system administrator issues the apt-get upgrade command on a Linux operating system. What is the purpose of this command? Every application installed will update itself to the latest version. …
DevNet Associate v1.0 – Modules Exam Answers Online Test DevNet Associate – Module 1 Exam Answers DevNet Associate – Module 2 Exam Answers DevNet Associate – Module 3 Exam Answers DevNet Associate – Module 4 Exam Answers DevNet Associate – Module 5 Exam Answers DevNet Associate – …
30. Which two configuration management tools are developed using Python? (Choose two.) Chef Ansible Puppet SaltStack NETCONF 31. Which term is used to describe a set of instructions for execution by the configuration management tool SaltStack? Pillar Manifest Playbook Cookbook 32. What is the maximum number of nodes …
1. What is the function of a hypervisor? to create VMs and provide hardware abstraction to support them to create an isolated environment where containerized applications run to perform FCAPS functions for VNFs to centralize management of vSwitch configuration 2. What are three characteristics of containers on a …
14. A network administrator configures an ACL with the command R1(config)# access-list 1 permit 172.16.0.0 0.0.15.255. Which two IP addresses will match this ACL statement? (Choose two.) 172.16.0.255 172.16.15.36 172.16.16.12 172.16.31.24 172.16.65.21 15. Which service can be disabled to help mitigate man-in-the-middle intrusion attacks that exploit spoofed MAC …
1. Which Cisco security architectural framework helps design secure solutions for the various places in the network (PINs)? Cisco SAFE Cisco DNA Cisco ENFV Cisco NGFW 2. Which Cisco SAFE secure domain is concerned with the technologies involving access control, VPNs, and encryption? secure services security intelligence threat …
25. Which network service allows administrators to monitor and manage network devices? NTP SNMP syslog NetFlow 26. By default, where do Cisco routers send syslog messages? to a syslog server to the VTY lines to the console line to an SNMP server 27. What network monitoring tool copies …
13. Which IGP is used in the automated underlay model of the Cisco SD-Access architecture? IS-IS OSPF EIGRP BGP 14. Which SD-Access functionality replaces manual device configuration with network device management by using Cisco DNA Center for faster, lower-risk deployment? network automation network assurance network virtualization policy enforcement …
1. What is a characteristic of the distribution layer in the three layer hierarchical model? acts as the backbone for the network, aggregating and distributing network traffic throughout the campus provides access to the rest of the network through switching, routing, and network access policies distributes access to …
13. A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is occasionally affected …