DevNet Associate (Version 1.0) – DevNet Associate 1.0 Practice Final exam
1. A network engineer is working on a bash script in order to automate some mundane tasks needed by the department. Why would the engineer add a she-bang (#!) to the top of the script as shown:
#!/bin/bash
- The script file has specific commands that are preceded by the exclamation mark (!) and should not be executed.
- The script file has specific commands that are preceded by the pound sign (#) and should not be executed.
- The commands within the script fie are to have the output stored in the /bin/bash directory.
- The script file has commands that need to be run in the bash shell.
2. An international manufacturing company is implementing an industrial internet of things plant infrastructure. The design requires that computing resources are located as close to the user as possible. Which cloud model is suitable for this situation?
- public
- edge
- private
- hybrid
3. What are three tools used by developers for scanning code to check for well-known security issues? (Choose three.)
- Viptela
- Brakeman
- VisualCodeGrepper
- Docker
- Bandit
- VIRL
4. A network engineer is configuring a Jenkins job and finishing with the following script in order to trigger the build:
node { stage('Preparation') { catchError(buildResult: 'SUCCESS') { sh 'docker stop samplerunning' sh 'docker rm samplerunning' } } stage('Build') { build 'BuildAppJob' } stage('Results') { build 'TestAppJob' } }
After saving the job, what should the engineer do next?
- Test the script in Docker.
- Run the job.
- Open the Recent Changes option to verify the results of the job.
- Manually run the samplerunning container.
5. What are three ways to mitigate SQL injection threats? (Choose three.)
- stored procedures configured with the “db_owner” rights set as default
- stateless packet-filtering firewalls
- dynamic queries
- database firewalls
- whitelist input validation
- parameterized database queries
6. What is the purpose of adding salt to the password hashing process?
- to decrease password complexity
- to increase the length of a password
- to make hashed passwords deterministic
- to create a unique hash for every password
7. Match the CI/CD software development philosophy with a description.
8. What is an operational characteristic of the local version control system?
- It locks a file once it is checked out by a user to prevent modification by others.
- It pushes a working copy of a file to a main repository after individuals have made changes.
- It allows multiple individuals to edit a working copy of a file at the same time.
- It stores a delta of two versions of a file as opposed to the file itself.
9. An organization is using the Waterfall methodology for a software development project. In what order are the SDLC phases completed when using this method?
- requirements and analysis, design, testing, implementation, deployment, maintenance
- requirements and analysis, design, implementation, testing, deployment, maintenance
- requirements and analysis, design, implementation, deployment, testing, maintenance
- requirements and analysis, design, deployment, testing, implementation, maintenance
10. In which phase of the SDLC process does the product development team gather feedback from the potential customer on the desired features for the new software?
- design
- deployment
- implementation
- requirements and analysis
11. Which Git command is used to get an initial copy on an existing Git repository for the first time?
- git add
- git copy
- git clone
- git repo
12. Refer to the exhibit. Which message format is being used?
- JSON
- HTML
- YAML
- XML
13. A student is learning Python using the interactive interpreter mode. The student issues these commands:
>>> class Url(): ... def __init__(self, host, prot): ... self.host = host ... self.prot = prot ... self.url = self.prot + "://" + self.host ... >>>
Which type of Python structure is created?
- a method
- a class
- a function
- a module
14. Match the Git stage with a description.
15. How does YAML maintain data-structure hierarchy?
- braces
- brackets
- parenthesis
- indentation
16. Which SDLC phase concludes with a high quality, bug-free, working piece of software that is ready for production?
- design
- deployment
- implementation
- testing
17. Match the SDLC phase with its description. (Not all options are used.)
18. Which terminal command can be used to print the Python version number installed on a system?
- python -h
- python -i
- python -V
- which python
19. What are three platforms that the Firepower Management Center can run on in the overall architecture of a large enterprise? (Choose three.)
- on every router
- on a wide range of Cisco devices
- in the Secure Operations Center (SOC)
- on VMWare VSphere
- in an availability zone
- on Amazon Web Services (AWS)
20. Which two types of APIs are supported by Cisco Finesse? (Choose two.)
- AXL
- REST
- JavaScript
- SOAP
- Python SDK
21. An engineer is learning how to enable RESTful API access for the Cisco Meraki Dashboard. What is the first step that must be taken in order to use API calls with the Meraki enterprise cloud-managed networking infrastructure service?
- The Meraki Dashboard API must first be enabled under Organizations > Settings within the GUI.
- Each cloud-managed organization must specify API access and allow the Meraki Dashboard administrator to employ site-specific APIs.
- The engineer must first generate an API key by going to the My Profile page within the GUI.
- A GET request must be created and include header parameters including authentication credentials and the Meraki API URL.
22. What does the Intersight REST API enable an application developer to access?
- JavaScript Object Notation
- Management Information Model
- IETF Interface
- Universal Resource Locator
23. A student in the DevNet class is learning SDKS and APIS. What is the difference between an API and an SDK?
- An API is essentially a documented set of URIs, whereas an SDK is a package integrated with code examples and libraries.
- An API contains the components that have been created for a specific purpose, whereas an SDK is commonly an interface for a service.
- An API is a tool box that contains multiple SDKs, whereas each SDK allows the creation of software for a specific hardware platform.
- An API is a software development tool for developing applications, whereas an SDK is a set of protocols for building application software.
24. Which modeling language is most commonly used for data modeling?
- Python
- YAML
- YANG
- SQL
25. Match the description to the corresponding layer of the OSI model. (Not all options are used.)

DevNet Associate (Version 1.0) – DevNet Associate 1.0 Practice Final exam
26. Which field in an 802.1Q Ethernet frame is used by switches to identify VLAN membership of the frame?
- Tag
- Data
- FCS
- Preamble
27. Which two statements are correct if a configured NTP master on a network cannot reach any clock with a lower stratum number? (Choose two.)
- The NTP master will lower its stratum number.
- The NTP master will be the clock with 1 as its stratum number.
- Other systems will be willing to synchronize to that master using NTP.
- The NTP master will claim to be synchronized at the configured stratum number.
- An NTP server with a higher stratum number will become the master.
28. What are three parts of an IPv6 global unicast address? (Choose three.)
- a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP
- a global routing prefix that is used to identify the portion of the network address provided by a local administrator
- an interface ID that is used to identify the local network for a particular host
- an interface ID that is used to identify the local host on the network
- a subnet ID that is used to identify networks inside of the local enterprise site
29. Match the IPv6 address to the IPv6 address type. (Not all options are used.)
30. What attribute of a NIC would place it at the data link layer of the OSI model?
- IP address
- RJ-45 port
- attached Ethernet cable
- MAC address
- TCP/IP protocol stack
31. Match the firewall function to the type of threat protection it provides to the network. (Not all options are used.)
- packet filtering – prevents access based on IP or MAC address
- URL filtering – prevents access to websites
- network address translator – (none)
- stateful packet inspection – prevents unsolicited incoming sessions
- application filtering – prevents access by port number
32. Which protocol automates assignment of IP addresses on a network, and which port number does it use? (Choose two.)
- DHCP
- DNS
- SMB
- 53
- 67
- 80
33. What are the two types of DevNet Sandboxes? (Choose two.)
- assigned
- always-on
- reserved
- intermal-use only
- exclusive
34. Which fee-based Cisco DevNet developer support option provides a response time of 1 business day?
- knowledge base
- chat with DevNet
- case-based ticket
- community forum
35. When working with both a live production environment and testing code in a shared developer sandbox, what are two important rules to follow? (Choose two.)
- Never request assistance or share information in community or public environments.
- Never use publicly posted tokens or credentials in a production environment.
- Never provide any identifying information in community or public environments.
- Never use a customized token in the sandbox, but instead use personal tokens that currently exist.
- Never use any personal tokens in the sandbox, but instead use a customized token for development.
36. Which DevNet resource would a student use to learn how to make REST API requests?
- DevNet Learning Labs
- DevNet Sandbox
- Code Exchange
- DevNet Support
37. Which two forums are available on the Cisco Developer Community? (Choose two.)
- Developer Automation
- Developer Networking
- Developer Coding
- Developer Support
- Developer Security
38. What are two benefits of using automation for IT infrastructure? (Choose two.)
- increased implementation of specific opinionated companion components
- increased speed in the deployment of technologies and products
- reduced user requisition requests for on-demand infrastructure
- reduced risk while working at scale
- reduced need for IT personnel and operations staff
39. Which component is required by both Puppet and Chef to be run on hosts?
- agents that query a server to determine their desired state, then converge upon it
- cron jobs that access a server to randomize access times to prevent server overload
- IPtables that enable masquerade tunneling
- certificates for authentication and encryption
40. What are two processes that can be used to execute remote scripts securely? (Choose two.)
- pipe scripts to a remote machine using cat | telnet and execute them in sequence with other commands, capturing and returning results to a local terminal
- access the built-in rexec command within Bash, target the IP address of the remote machine, and execute the Bash command
- store scripts locally, transmit them to a target machine with scp , log into the remote machine via ssh, and execute the scripts
- store scripts on a webserver, log into the remote machine, and retrieve the scripts using wget via HTTP
- store scripts in a Git repository, install git on the remote machine, clone the repo, check out a branch, and execute the scripts
41. What is an example of an SLI?
- All services provided include data integrity and security and comply with local regulations about where and how data is stored.
- 95% of requests will be served within 75 milliseconds.
- All applications being provided will offer a good-enough experience to the user base.
- 100% availability will be maintained for any services provided.
42. Which component of a software-defined infrastructure provides available cloud resources within hours or minutes of needing them?
- repeatability
- observability
- self-service
- platform abstraction
43. A user is working on Ansible on the local NMS to manage remote network devices. The user issues the ansible webservers -m ping command to test the communication. What is the parameter ping in the command?
- a function
- a class
- a module
- a method
44. A network operator is testing a network management application that uses REST API to communicate with network devices. The operator received an HTTP response code 403 in a test step. What does this response code indicate?
- Client has not authenticated to access the site or API call.
- The page at HTTP URL location does not exist or is hidden.
- Request failed due to a client-side issue.
- Access is not granted based on supplied credentials.
45. Which three characteristics are associated with the SOAP architecture? (Choose three.)
- stateless
- neutral
- extensible
- layered system
- independent
- uniform interface
46. A client is using an API key to authenticate and access resources on a website through a REST API. The string in the API request is GET http://example.com:8080/v1/books?API_KEY= < key >. Which component in the API request is used to provide this string?
- cookie
- query string
- header
- body data
47. Refer to the exhibit. A student is learning network automation with Python and REST API. The student constructs a small Python script to get information from a local network device. The device is a sandbox located inside the college lab and it is using a self-signed SSL certificate. Which parameter is needed in the Python code (in place of the question mark) to skip the SSL verification?
- verify = True
- verify = False
- verify = NO
- verify = YES
48. What are two features of REST APIs? (Choose two.)
- They communicate over HTTP.
- They follow the Representational State Transfer principles.
- Requests always contain data.
- Responses are always in JSON format.
- They maintain session states in communications.
49. What are two advantages of using an APl rate limit? (Choose two.)
- It protects against a DoS attack.
- It reduces the amount of overhead within the API request.
- It allows requests to be processed in a prioritized manner.
- It supports token passing so tha each client gets a turn.
- It provides better quality of service and response time.
50. Which three authentication mechanisms are used in REST APIs? (Choose three.)
- basic authentication
- OAuth
- open authentication
- API Key
- bearer authentication
- SSO
51. What are two advantages of using an API rate limit? (Choose two.)
- It reduces the amount of overhead within the API request.
- It protects against a DoS attack.
- It allows requests to be processed in a prioritized manner.
- It provides better quality of service and response time.
- It supports token passing so that each client gets a turn.
52. What are three characteristics of containers on a host server? (Choose three.)
- They all share the same OS.
- They are isolated from each other.
- They leverage the kernel of the host OS for a quick start.
- They include a guest OS.
- They virtualize a physical server.
- They are resource intensive and require several minutes to start.
53. Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)
- NAT adds authentication capability to IPv4.
- NAT introduces problems for some applications that require end-to-end connectivity.
- NAT will impact negatively on switch performance.
- NAT provides a solution to slow down the IPv4 address depletion.
- NAT improves packet handling.
- NAT causes routing tables to include more information.
54. What is one function of a Layer 2 switch?
- forwards data based on logical addressing
- duplicates the electrical signal of each frame to every port
- learns the port assigned to a host by examining the destination MAC address
- determines which interface is used to forward a frame based on the destination MAC address
55. What is the purpose of the subnet mask in conjunction with an IP address?
- to uniquely identify a host on a network
- to identify whether the address is public or private
- to determine the subnet to which the host belongs
- to mask the IP address to outsiders
56. Which type of threat defense is provided by Cisco Umbrella?
- blocking requests to malicious Internet destinations
- monitoring and analyzing network traffic for potential network intrusion attacks
- identifying and blocking zero-day threats that manage to infiltrate the network
- blocking hidden malware from both suspicious and legitimate websites
57. What are two features of the formal code review? (Choose two.)
- For a quicker turnaround, it involves only one reviewer
- It involves the developer going through code with the reviewer line-by-line.
- It promotes discussion among all of the reviewers.
- It allows the developer to make changes on the spot.
- It involves a review of the entire code base in a series of meetings.
58. What is immutable infrastructure in DevOps?
- infrastructure that is deployed with all component versions locked except for the ability to perform manual configuration changes
- infrastructure that is only deployed and maintained in containers
- infrastructure that is entirely maintained and deployed in code and never subjected to manual changes
- virtualized infrastructure that is deployed as golden images
59. What is a benefit of using a bare metal deployment solution?
- increased processor and memory resource flexibility
- direct access to hardware resources for increased efficiency
- enhanced security
- addition of an extra layer of abstraction
60. What are two characteristics of containers that are running on the same host server? (Choose two.)
- They all share the same host operating system.
- They are isolated from each other.
- They each include a guest operating system.
- They each virtualize a different physical server.
- They are resource intensive and require several minutes to start.
61. What type of attack is being attempted if code similar to this is entered in the login field on a web site?
SELECT REPLACE (User_Name, ‘administrator’, ‘hacker’) Userlist FROM Credentials;
- DoS
- zero day
- brute force
- SQL injection
62. A user is testing an application by sending requests to gather information from a network device through a REST API. The user reviews the API responses and notices an HTTP header string of “Cache-Control: max-age=3600, public”. Which two statements describe the HTTP directive? (Choose two.)
- The response can be saved in cache and the cached content is open to public access.
- The client web browser can save the response in the cache and it will expire in an hour.
- Only responses to requests with the HTTP protocol can be cached.
- The response may be stored by any cache, even if the response is normally noncacheable.
- The response can be saved in cache and the information must be refreshed after 60 minutes
63. What is Bash?
- a web application framework written in Python
- a code injection technique used to attack data-driven applications
- a Linux script engine that allows commands to be entered on the command line
- a philosophy for software deployment that figures prominently in the field of DevOps
64. Match the principles in the uniform interface constraint of the REST to the description. (Not all options are used.)
- manipulation of resources through representations: The client receives a representation of the resource from the server that must contain enough data for the client to handle the resource.
- hypermedia as the engine of application state: The server must include additional actions and resources available for the client to access supplemental information about the resource.
- independence of client and server: (Not use)
- notification of cache capability: (Not use)
- self-descriptive messages: Each message must contain all the information for the recipient to process.
- identification of resources: A resource must be identified in the request as the individual object.
65. What is a philosophy associated with the test-driven development process?
- Application code is developed at a slower pace to allow for repetitive testing.
- Application code should be written before validating system design and tested for functionality as needed.
- More than enough code is written to support the application.
- Failures are expected to occur in order to limit the application code to only what is needed to pass the test.
66. What process would need to be taken to extract information from XML and convert it into a form that Python could access conveniently?
- decoding
- parsing
- encoding
- serializing
67. What is the outcome of performing a Git merge between two branches?
- The changes/commits located within both the source branch and target branch are modified to cause the branches to converge.
- The changes/commits of files within the target branch are analyzed against the changes/commits located within the source branch using a generic comparison tool.
- The changes/commits located within the target branch are modified to mirror the changes/commits stored within the source branch.
- The changes/commits located within the source branch are modified to mirror the changes/commits stored within the target branch.
68. In which situation would a router be used?
- when performing a formal code review
- when testing an app on a cloud-based server
- when developing an app on a private server located on the same network as the development team
- when authenticating to a REST API service on the local host
69. A network app developer has configured an app to use a particular DNS server in order to test the application against a test database. The developer suspects a DNS issue. Which command could be used to verify a particular domain name?
- sudo puppet agent -t
- nslookup
- ifconfig
- ssh -p 53
70. A user makes some REST API calls to a server and the responses from the server include third-party executable code. The user notices that the responses do not work. Which network device may prevent the third-party code from execution?
- proxy server
- reverse proxy server
- Layer 3 switch
- firewall
71. What are two reasons a VLAN would be used on a Layer 2 switch? (Choose two.)
- to create separate broadcast domains on a switch
- to filter network traffic based on protocol port numbers
- to allow a router to broadcast traffic between two networks
- to allow multiple networks to be created at Layer 2
- to allow traffic to be sent between two networks
72. A user is testing an application by sending requests to gather information from a network device through a REST API. The user expects a very large amount of data to be returned. The user requests that the network device sends the data back with the compression algorithm of gzip. What response header string would indicate that the return data is compressed as requested?
- Accept-Encoding: compress
- Accept-Encoding: gzip
- Content-Encoding: compress; gzip
- Content-Encoding: gzip
73. Match the protocol to the description. (Not all options are used.)
- resolves a host name to an IP address –> DNS
- facilitates network and device monitoring –> SNMP
- extends the lifetime of IPv4 addresses –> NAT
- provides IP address configuration information –> DHCP
- provides accurate clock-related information –> NTP
74. Refer to the exhibit. Match the Python coding components to the location. (Not all options are used.)
Answers:
- A = Authorization
- B = Content-Type
- C = application/json
- D = max
- E = 100
- F = url
- G = headers=headers
75. Refer to the exhibit. Match the items needed in the Python script. (Not all options are used.)
import requests “Item A” api_url = “http://localhost:58000/api/v1/ticket” headers = { “content-type”: “application/json” } Body = { “Item B” } resp = requests.post(api_url, json.dumps(body), headers=headers, verify=False) print(“Ticket request status: “,”Item C”) response1 = “Item D” serviceTicket = response1[“response”][“Item E”] print(“The service ticket number is: “, serviceTicket)
A : import json
B : “username”:”cisco”, “password”:”cisco123!”
C : resp.status_code
D : resp.json()
E : serviceTicket
76. A user is developing an application to remotely manage a network device through the API. The features of the API should support the client-server model, JSON or XML data format, and stateless operation. What is an API architecture style that the developer could use?
- webhook
- RPC
- SOAP
- REST
77. Which two statements describe the characteristics of the model-driven programmability implemented on Cisco IOS XE? (Choose two.)
- The configuration command ip http secure-server is required to enable RESTCONF over port 443.
- Both NETCONF and RESTCONF support running and candidate data stores.
- RESTCONF is enabled by the configuration command restconf enable .
- NETCONF connections should be authenticated using AAA credentials.
- NETCONF connections require that a VPN link be established first.
78. A student is learning network automation using the DevNet site. Which DevNet resource allows users to search and share their programming skills and experiences?
- Code Exchange
- Sandbox
- Learning Labs
- Automation Exchange
79. A network administrator is evaluating Cisco UCS Manager products to deploy centralized management for the data center. The data center has about 500 physical servers. Which product should the administrator choose?
- UCS Central (UCSC)
- Unified Communications Manager (CUCM)
- UCS Manager (UCSM)
- Integrated Management Controller (CIMC)
80. Which REST API supported by Cisco Unified Communications Manager is designed to enable end users to update and configure personal settings.?
- UDS API
- UC Manager Serviceability API
- Telephony API
- AXL API
81. What is the outcome of performing a Git merge between two branches?
- The changes/commits located within both the source branch and target branch are modified to cause the branches to converge.
- The changes/commits located within the source branch are modified to mirror the changes/commits stored within the target branch.
- The changes/commits located within the target branch are modified to mirror the changes/commits stored within the source branch.
- The changes/commits of files within the target branch are analyzed against the changes/commits located within the source branch using a generic comparison tool.
82. What are two benefits of using a distributed version control system compared to other version control systems? (Choose two.)
- Every user has the ability to work on any file at any time.
- An offline user is not required to make a copy of an important file before editing it further.
- A simple database is used to store the delta between the versions of a single file.
- A corrupt repository can be restored from any client system.
- A single user can lock a file to prevent other users from modifying it until the single user is done editing it.
83. Match the Meraki APIs for integration to the description. (Not all options are used.)
- Dashboard API: a RESTful service for device provisioning, management, and monitoring
- Location Streaming API: an HTTP POST method providing Wi-Fi and Bluetooth client location information
- Webhook API: a real-time notification system for network alerts, covering events and network health
- External Captive Portal (EXCAP) API: an API that enables an organization to build out custom engagement models at Wi-Fi access points
- MV Sense API: a combination of REST APIs and realtime MQTT stream supporting oversight of a physical space
84. What two components form the Python-based network device test and validation solution of pyATS?
- Python and VIRL
- Python and Genie
- Python and Puppet
- Python and Ansible
85. Match the Cisco NSO component to the description.
- Service Manager: maintains device dependencies and provideds a service self start for triggering diagnostic tests
- Device Manager: deploys configuration changes to multiple devices through the use of distributed transactions
- Configuration Database: provides an internal API for locating network element configurations and automatic support for upgrade and downgrade of configuration data
86. What are two symptoms that DNS is an issue when developing and testing network scripts? (Choose two.)
- no connection between the app and a remote server
- host IP address showing 169.x.x.x
- 403 error code
- authentication failure
- 1XX status code
87. Refer to the exhibit. A company uses three servers to support a new network app. The network administrator is looking to include a load balancer as part of the network design to improve the performance of the application response. Where should the load balancer be installed?
- attached to the same switch as the servers
- between the host and the cloud
- between the servers and storage
- within the cloud
88. What are two functions of MAC addresses in a LAN? (Choose two.)
- to indicate the best path between separate networks
- to determine which host has priority to transfer data
- to associate with a specific network IP address
- to uniquely identify a node on a network
- to allow the transfer of frames from source to destination
89. What is a benefit to an organization of implementing edge computing?
- minimizes high levels of data transfer across the network
- provides low latency and increased bandwidth for remote IoT devices
- consolidates compute resources into a single cloud
- allows all compute resources to be centralized in the data center
90. Refer to the exhibit. A student is learning network automation by using an API. The student constructs a Python file to communicate with a Webex Teams server. Which two statements describe characteristics of the script? (Choose two.)
- It is used to obtain an access token from the server.
- It loads two modules from a Cisco SDK.
- It is used to retrieve the email addresses associated with the student.
- The term people in the script is a class object.
- The access token is set with a WEBEX_TEAMS_ACCESS_TOKEN environment variable.
91. Which situation illustrates the use of a webhook application
- A user sends a REST API call to a webhook server to poll a predefined data set.
- Triggered by the operation of a user, a mobile application sends a REST API request to get information from a webhook server.
- A network automation application queries a router to get CPU and memory usage over a period of time.
- A developer subscribes to a webhook server for an application so that the application will receive a notification when an event occurs.
92. Refer to the exhibit. A user is working on Ansible on the local NMS to manage remote network devices. Which file is the user creating?
- service
- playbook
- variable
- hosts
93. Refer to the exhibit. A student is learning Python in the interpret mode. The student enters Python statements and after a while, an error message returns. What is a possible cause for the error?
- The student did not provide the authentication credentials.
- The host domain name cannot be resolved.
- The parameter of “verify = False” should be replaced with “verify = True”.
- The resource on the host is not available.
94. The development team in the IT department has decided to implement CI/CD. What are three characteristics of this strategy? (Choose three.)
- Strategies are used to limit the impact of a possible bad build to users.
- CI/CD places a higher priority on satisfying the customer needs than does the development plan.
- The integration and development process goes in one direction and can never go backwards.
- It is modeled after the software development life cycle and is a more traditional implementation method.
- The development process attempts to eliminate the problem of application merge conflicts.
- Automation is part of the creation, verification, and deployment of software.
95. What are two benefits of model-driven programmability in infrastructure automation? (Choose two.)
- uses human-readable configuration language
- leverages open-source technology
- leverages code that is coupled with transport, protocol, and encoding
- relies on the use of device-specific scripts
- uses device-specific CLIs
96. How does Cisco VIRL benefit the testing and development of code and automation?
- Cisco VIRL can duplicate the performance of SDN software components in optimal production conditions.
- Cisco VIRL can duplicate the same code that runs inside actual Cisco products.
- Cisco VIRL can duplicate the performance of elite hardware components in optimal production conditions.
- Cisco VIRL can duplicate network simulations using a .virl file, which is a JSON file.
97. Refer to the exhibit. Which portion of the RESTful request specifies the API that is being requested.
- 4
- 3
- 2
- 1
98. A user sends a request to add a loopback interface on a Cisco router through the REST API. Which response status code will the user expect to receive that indicates the request is fulfilled?
- 200
- 201
- 202
- 203
99. Which two components of XML code are contained within the XML prologue? (Choose two.)
- the character encoding
- the XML namespaces
- the tag name xml
- the URNs
- the instance objects
Refer to the exhibit. A user is working on Ansible on the local NMS to manage remote network devices. The user issues the ansible webservers -m ping command to test the communication. However, an error message returns. What are two possible causes for the error? (Choose two.
????????????
Refer to the exhibit. Match the items needed in the Python script. (Not all options are used.)
import requests
“Item A”
api_url = “http://localhost:58000/api/v1/ticket”
headers = {
“content-type”: “application/json”
}
Body = {
“Item B”
}
resp = requests.post(api_url, json.dumps(body), headers=headers, verify=False)
print(“Ticket request status: “,”Item C”)
response1 = “Item D”
serviceTicket = response1[“response”][“Item E”]
print(“The service ticket number is: “, serviceTicket)
A : import json
B : “username”:”cisco”, “password”:”cisco123!”
C : resp.status_code
D : resp.json()
E : serviceTicket
Match the principles in the uniform interface constraint of the REST to the description. (Not all options are used.)
A resource must be identified in the request as the individual object.
identification of resources
Each message must contain all the information for the recipient to process.
self-descriptive messages
The server must include additional actions and resources available for the client to access supplemental information about the resource.
hypermedia as the engine of application state
The client receives a representation of the resource from the server that must contain enough data for the client to handle the resource.
manipulation of resources through representations
import requests
access_token = ‘valid_token’
url = ‘https://webexapis.com/v1/rooms’
headers = {
‘A’:’Bearer{}’.format(access_token),
‘B’:’C’
}
params = {‘D’:’E’}
res = requests.get(F,G,params=params)
print(res.json())
A = Authorization
B = Content-Type
C = application/json
D = max
E = 100
F = url
G = headers=headers
REST
new s
new
wrongs
Wrong one
Wrong Answers
What is the outcome of performing a Git merge between two branches?
The changes/commits located within both the source branch and target branch are modified to cause the branches to converge.
The changes/commits located within the source branch are modified to mirror the changes/commits stored within the target branch.
The changes/commits located within the target branch are modified to mirror the changes/commits stored within the source branch.
The changes/commits of files within the target branch are analyzed against the changes/commits located within the source branch using a generic comparison tool.
What are two benefits of using a distributed version control system compared to other version control systems? (Choose two.)
Every user has the ability to work on any file at any time.
An offline user is not required to make a copy of an important file before editing it further.
A simple database is used to store the delta between the versions of a single file.
A corrupt repository can be restored from any client system.
A single user can lock a file to prevent other users from modifying it until the single user is done editing it.
Refer to the exhibit. A student is learning Python in the interpret mode. The student enters Python statements and after a while, an error message returns. What is a possible cause for the error?
The student did not provide the authentication credentials.
The host domain name cannot be resolved.
The parameter of “verify = False” should be replaced with “verify = True”.
The resource on the host is not available.
Which situation illustrates the use of a webhook application
A user sends a REST API call to a webhook server to poll a predefined data set.
Triggered by the operation of a user, a mobile application sends a REST API request to get information from a webhook server.
A network automation application queries a router to get CPU and memory usage over a period of time.
A developer subscribes to a webhook server for an application so that the application will receive a notification when an event occurs.
A user is testing an application by sending requests to gather information from a network device through a REST API. The user reviews the API responses and notices an HTTP header string of “Cache-Control: max-age=3600, public”. Which two statements describe the HTTP directive? (Choose two.)
The response can be saved in cache and the cached content is open to public access.
The client web browser can save the response in the cache and it will expire in an hour.
Only responses to requests with the HTTP protocol can be cached.
The response may be stored by any cache, even if the response is normally noncacheable.
The response can be saved in cache and the information must be refreshed after 60 minutes
A user sends a request to add a loopback interface on a Cisco router through the REST API. Which response status code will the user expect to receive that indicates the request is fulfilled?
200
201
202
203
Refer to the exhibit. Which portion of the RESTful request specifies the API that is being requested.
4
3
2
1
How does Cisco VIRL benefit the testing and development of code and automation?
Cisco VIRL can duplicate the performance of SDN software components in optimal production conditions.
Cisco VIRL can duplicate the same code that runs inside actual Cisco products.
Cisco VIRL can duplicate the performance of elite hardware components in optimal production conditions.
Cisco VIRL can duplicate network simulations using a .virl file, which is a JSON file.
What are two benefits of model-driven programmability in infrastructure automation? (Choose two.)
uses human-readable configuration language
leverages open-source technology
leverages code that is coupled with transport, protocol, and encoding
relies on the use of device-specific scripts
uses device-specific CLIs
The development team in the IT department has decided to implement CI/CD. What are three characteristics of this strategy? (Choose three.)
Strategies are used to limit the impact of a possible bad build to users.
CI/CD places a higher priority on satisfying the customer needs than does the development plan.
The integration and development process goes in one direction and can never go backwards.
It is modeled after the software development life cycle and is a more traditional implementation method.
The development process attempts to eliminate the problem of application merge conflicts.
Automation is part of the creation, verification, and deployment of software.
A credit union has been growing very rapidly in the past 3 years and the IT department has been struggling to keep up. The department has always been criticized for the time it takes to program and implement change requests. The new CIO has decided to implement CI/CD. What are three benefits of this strategy? (Choose three.)
integrates well with Agile software development methods
improves quality
requires the use of multiple communication tools, thus improving development
delivers a lot of code in a small amount of time
is less disruptive to future releases
is easier to market
Refer to the exhibit. A user is working on Ansible on the local NMS to manage remote network devices. Which file is the user creating?
service
playbook
variable
hosts
Which REST API supported by Cisco Unified Communications Manager is designed to enable end users to update and configure personal settings.
UDS API
UC Manager Serviceability API
Telephony API
AXL API
Refer to the exhibit. A student is learning network automation by using an API. The student constructs a Python file to communicate with a Webex Teams server. Which two statements describe characteristics of the script? (Choose two.)
It is used to obtain an access token from the server.
It loads two modules from a Cisco SDK.
It is used to retrieve the email addresses associated with the student.
The term people in the script is a class object.
The access token is set with a WEBEX_TEAMS_ACCESS_TOKEN environment variable.
What is a benefit to an organization of implementing edge computing?
minimizes high levels of data transfer across the network
provides low latency and increased bandwidth for remote IoT devices
consolidates compute resources into a single cloud
allows all compute resources to be centralized in the data center
What are two functions of MAC addresses in a LAN? (Choose two.)
to indicate the best path between separate networks
to determine which host has priority to transfer data
to associate with a specific network IP address
to uniquely identify a node on a network
to allow the transfer of frames from source to destination
Refer to the exhibit. A company uses three servers to support a new network app. The network administrator is looking to include a load balancer as part of the network design to improve the performance of the application response. Where should the load balancer be installed?
attached to the same switch as the servers
between the host and the cloud
between the servers and storage
within the cloud
What are two symptoms that DNS is an issue when developing and testing network scripts? (Choose two.)
no connection between the app and a remote server
host IP address showing 169.x.x.x
403 error code
authentication failure
1XX status code
New one
Why are the new ones don’t have any highlighted answers?
What are three characteristics of containers on a host server? (Choose three.)
They are isolated from each other.
They virtualize a physical server.
They all share the same OS.
They leverage the kernel of the host OS for a quick start.
They are resource intensive and require several minutes to start.
They include a guest OS.
What is a benefit of using a bare metal deployment solution?
increased processor and memory resource flexibility
direct access to hardware resources for increased efficiency
enhanced security
addition of an extra layer of abstraction
What are two characteristics of containers that are running on the same host server? (Choose two.)
They all share the same host operating system.
They are isolated from each other.
They each include a guest operating system.
They each virtualize a different physical server.
They are resource intensive and require several minutes to start.
An engineer is implementing an edge computing solution where a number of sensors are streaming a large amount data. Where should the computing capability be placed?
as close to the WAN edge as possible
as close to the internet as possible
as close to the network edge as possible
as close to the sources of data possible
What type of attack is being attempted if code similar to this is entered in the login field on a web site?
SELECT REPLACE (User_Name, ‘administrator’, ‘hacker’) Userlist FROM Credentials;
DoS
zero day
brute force
SQL injection
What is a benefit to an organization of implementing edge computing?
provides low latency and increased bandwidth for remote IoT devices
minimizes high levels of data transfer across the network
allows all compute resources to be centralized in the data center
consolidates compute resources into a single cloud
What is Bash?
a web application framework written in Python
a code injection technique used to attack data-driven applications
a Linux script engine that allows commands to be entered on the command line
a philosophy for software deployment that figures prominently in the field of DevOps
What are two benefits of using a distributed version control system compared to other version control systems? (Choose two.)
An offline user is not required to make a copy of an important file before editing it further.
A simple database is used to store the delta between the versions of a single file.
A single user can lock a file to prevent other users from modifying it until the single user is done editing it.
Every user has the ability to work on any file at any time.
A corrupt repository can be restored from any client system.
Which two components of XML code are contained within the XML prologue? (Choose two.)
the tag name xml
the XML namespaces
the URNs
the character encoding
the instance objects
What is a philosophy associated with the test-driven development process?
Application code is developed at a slower pace to allow for repetitive testing.
Application code should be written before validating system design and tested for functionality as needed.
More than enough code is written to support the application.
Failures are expected to occur in order to limit the application code to only what is needed to pass the test.
What process would need to be taken to extract information from XML and convert it into a form that Python could access conveniently?
decoding
parsing
encoding
serializing
What is the outcome of performing a Git merge between two branches?
The changes/commits located within both the source branch and target branch are modified to cause the branches to converge.
The changes/commits of files within the target branch are analyzed against the changes/commits located within the source branch using a generic comparison tool.
The changes/commits located within the target branch are modified to mirror the changes/commits stored within the source branch.
The changes/commits located within the source branch are modified to mirror the changes/commits stored within the target branch.
In which situation would a router be used?
when performing a formal code review
when testing an app on a cloud-based server
when developing an app on a private server located on the same network as the development team
when authenticating to a REST API service on the local host
Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)
NAT adds authentication capability to IPv4.
NAT causes routing tables to include more information.
NAT introduces problems for some applications that require end-to-end connectivity.
NAT improves packet handling.
NAT will impact negatively on switch performance.
NAT provides a solution to slow down the IPv4 address depletion.
A network app developer has configured an app to use a particular DNS server in order to test the application against a test database. The developer suspects a DNS issue. Which command could be used to verify a particular domain name?
sudo puppet agent -t
nslookup
ifconfig
ssh -p 53
A user makes some REST API calls to a server and the responses from the server include third-party executable code. The user notices that the responses do not work. Which network device may prevent the third-party code from execution?
proxy server
reverse proxy server
Layer 3 switch
firewall
What are two reasons a VLAN would be used on a Layer 2 switch? (Choose two.)
to filter network traffic based on protocol port numbers
to allow traffic to be sent between two networks
to allow multiple networks to be created at Layer 2
to allow a router to broadcast traffic between two networks
to create separate broadcast domains on a switch]
What is one function of a Layer 2 switch?
duplicates the electrical signal of each frame to every port
determines which interface is used to forward a frame based on the destination MAC address
learns the port assigned to a host by examining the destination MAC address
forwards data based on logical addressing
What is the purpose of the subnet mask in conjunction with an IP address?
to mask the IP address to outsiders
to determine the subnet to which the host belongs
to identify whether the address is public or private
to uniquely identify a host on a network
A user is testing an application by sending requests to gather information from a network device through a REST API. The user expects a very large amount of data to be returned. The user requests that the network device sends the data back with the compression algorithm of gzip. What response header string would indicate that the return data is compressed as requested?
Accept-Encoding: compress
Accept-Encoding: gzip
Content-Encoding: compress; gzip
Content-Encoding: gzip
A user sends a request to add a loopback interface on a Cisco router through the REST API. Which response status code will the user expect to receive that indicates the request is fulfilled?
200
201
202
203
A user is testing an application by sending requests to gather information from a network device through a REST API. The user reviews the API responses and notices an HTTP header string of “Cache-Control: max-age=3600, public”. Which two statements describe the HTTP directive? (Choose two.)
The response can be saved in cache and the information must be refreshed after 60 minutes.
The response may be stored by any cache, even if the response is normally noncacheable.
The response can be saved in cache and the cached content is open to public access.
Only responses to requests with the HTTP protocol can be cached.
The client web browser can save the response in the cache and it will expire in an hour.
Which situation illustrates the use of a webhook application?
Triggered by the operation of a user, a mobile application sends a REST API request to get information from a webhook server.
A network automation application queries a router to get CPU and memory usage over a period of time.
A developer subscribes to a webhook server for an application so that the application will receive a notification when an event occurs.
A user sends a REST API call to a webhook server to poll a predefined data set.
A user is developing an application to remotely manage a network device through the API. The features of the API should support the client-server model, JSON or XML data format, and stateless operation. What is an API architecture style that the developer could use?
webhook
RPC
SOAP
REST
Which type of threat defense is provided by Cisco Umbrella?
monitoring and analyzing network traffic for potential network intrusion attacks
identifying and blocking zero-day threats that manage to infiltrate the network
blocking requests to malicious Internet destinations
blocking hidden malware from both suspicious and legitimate websites
Which two statements describe the characteristics of the model-driven programmability implemented on Cisco IOS XE? (Choose two.)
The configuration command ip http secure-server is required to enable RESTCONF over port 443.
Both NETCONF and RESTCONF support running and candidate data stores.
RESTCONF is enabled by the configuration command restconf enable .
NETCONF connections should be authenticated using AAA credentials.
NETCONF connections require that a VPN link be established first.
A student is learning network automation using the DevNet site. Which DevNet resource allows users to search and share their programming skills and experiences?
Code Exchange
Sandbox
Learning Labs
Automation Exchange
A network administrator is evaluating Cisco UCS Manager products to deploy centralized management for the data center. The data center has about 500 physical servers. Which product should the administrator choose?
UCS Central (UCSC)
Unified Communications Manager (CUCM)
UCS Manager (UCSM)
Integrated Management Controller (CIMC)
Which REST API supported by Cisco Unified Communications Manager is designed to enable end users to update and configure personal settings.
UC Manager Serviceability API
Telephony API
UDS API
AXL API
What are two features of the formal code review? (Choose two.)
It involves a review of the entire code base in a series of meetings.
For a quicker turnaround, it involves only one reviewer.
It promotes discussion among all of the reviewers.
It allows the developer to make changes on the spot.
It involves the developer going through code with the reviewer line-by-line.
What are two benefits of model-driven programmability in infrastructure automation? (Choose two.)
uses human-readable configuration language
leverages code that is coupled with transport, protocol, and encoding
relies on the use of device-specific scripts
uses device-specific CLIs
leverages open-source technology
A credit union has been growing very rapidly in the past 3 years and the IT department has been struggling to keep up. The department has always been criticized for the time it takes to program and implement change requests. The new CIO has decided to implement CI/CD. What are three benefits of this strategy? (Choose three.)
improves quality
delivers a lot of code in a small amount of time
requires the use of multiple communication tools, thus improving development
is less disruptive to future releases
integrates well with Agile software development methods
is easier to market
The development team in the IT department has decided to implement CI/CD. What are three characteristics of this strategy? (Choose three.)
Automation is part of the creation, verification, and deployment of software.
The integration and development process goes in one direction and can never go backwards.
CI/CD places a higher priority on satisfying the customer needs than does the development plan.
Strategies are used to limit the impact of a possible bad build to users.
It is modeled after the software development life cycle and is a more traditional implementation method.
The development process attempts to eliminate the problem of application merge conflicts.
How does Cisco VIRL benefit the testing and development of code and automation?
Cisco VIRL can duplicate network simulations using a .virl file, which is a JSON file.
Cisco VIRL can duplicate the performance of SDN software components in optimal production conditions.
Cisco VIRL can duplicate the same code that runs inside actual Cisco products.
Cisco VIRL can duplicate the performance of elite hardware components in optimal production conditions.
What two components form the Python-based network device test and validation solution of pyATS?
Python and VIRL
Python and Genie
Python and Puppet
Python and Ansible
What is immutable infrastructure in DevOps?
virtualized infrastructure that is deployed as golden images
infrastructure that is only deployed and maintained in containers
infrastructure that is deployed with all component versions locked except for the ability to perform manual configuration changes
infrastructure that is entirely maintained and deployed in code and never subjected to manual changes
A network engineer has been asked to automate some of the network management and configuration management. The engineer is going to use NETCONF. Why should the engineer consider also using YANG as part of this project?
YANG is a documented set of URIs that could be used as part of the deployment.
YANG is a set of software development tools that is integrated with vendor-specific configuration libraries.
YANG provides a hierarchy of data that can be used for device configuration and operational status retrieval.
YANG is used to provide the transport to and from a network device such as a Cisco switch.
What are two advantages of using an API rate limit? (Choose two.)
What are two advantages of using an API rate limit?
Rate limiting advantages: