DevNet Associate (Version 1.0) – Practice Final Exam Answers

DevNet Associate (Version 1.0) – DevNet Associate 1.0 Practice Final exam

How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not here, find it in Questions Bank.

NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.


1. A network engineer is working on a bash script in order to automate some mundane tasks needed by the department. Why would the engineer add a she-bang (#!) to the top of the script as shown:

#!/bin/bash

  • The script file has specific commands that are preceded by the exclamation mark (!) and should not be executed.
  • The script file has specific commands that are preceded by the pound sign (#) and should not be executed.
  • The commands within the script fie are to have the output stored in the /bin/bash directory.
  • The script file has commands that need to be run in the bash shell.

2. An international manufacturing company is implementing an industrial internet of things plant infrastructure. The design requires that computing resources are located as close to the user as possible. Which cloud model is suitable for this situation?

  • public
  • edge
  • private
  • hybrid

Explanation: Edge clouds are located as close to the user as possible. Having computing power at the network edge is a benefit for internet of things devices such as cameras, industrial automation equipment, and autonomous vehicles.

3. What are three tools used by developers for scanning code to check for well-known security issues? (Choose three.)

  • Viptela
  • Brakeman
  • VisualCodeGrepper
  • Docker
  • Bandit
  • VIRL

4. A network engineer is configuring a Jenkins job and finishing with the following script in order to trigger the build:

DevNet Associate (Version 1.0) - Practice Final Exam Answers 1

After saving the job, what should the engineer do next?

  • Test the script in Docker.
  • Run the job.
  • Open the Recent Changes option to verify the results of the job.
  • Manually run the samplerunning container.

Explanation: Once a script is created, use the Build Now Jenkins menu option to run the job. If the script is done correctly, then the Stage View should show three green boxes. If errors are found, check the script for errors.

5. What are three ways to mitigate SQL injection threats? (Choose three.)

  • stored procedures configured with the “db_owner” rights set as default
  • stateless packet-filtering firewalls
  • dynamic queries
  • database firewalls
  • whitelist input validation
  • parameterized database queries

Explanation: SQL injection is a basic web application attack technique which, if successful, can delete or change sensitive data or reveal it to the attacker. There are several methods to mitigate the threat of SQL injection such as the use of parameterized database queries, database firewalls, and whitelist input validation.

6. What is the purpose of adding salt to the password hashing process?

  • to decrease password complexity
  • to increase the length of a password
  • to make hashed passwords deterministic
  • to create a unique hash for every password

Explanation: Because of the deterministic nature of the hash function, hashed passwords are not unique. The same password always produces the same hash even if the password is created by different users. The salting process adds random data to the input of the hash function to guarantee a unique, nondeterministic output.

7. Match the CI/CD software development philosophy with a description.

DevNet Associate (Version 1.0) - Practice Final Exam Answers 2

8. What is an operational characteristic of the local version control system?

  • It locks a file once it is checked out by a user to prevent modification by others.
  • It pushes a working copy of a file to a main repository after individuals have made changes.
  • It allows multiple individuals to edit a working copy of a file at the same time.
  • It stores a delta of two versions of a file as opposed to the file itself.

Explanation: There are three types of version control systems:

  • Local version control system
  • Centralized version control system
  • Distributed version control system

The local version control system stores the delta between the two versions of the file, as opposed to the file itself. When the user wants to revert to the previous version of the file, the delta is reversed to get to the requested version.

9. An organization is using the Waterfall methodology for a software development project. In what order are the SDLC phases completed when using this method?

  • requirements and analysis, design, testing, implementation, deployment, maintenance
  • requirements and analysis, design, implementation, testing, deployment, maintenance
  • requirements and analysis, design, implementation, deployment, testing, maintenance
  • requirements and analysis, design, deployment, testing, implementation, maintenance

10. In which phase of the SDLC process does the product development team gather feedback from the potential customer on the desired features for the new software?

  • design
  • deployment
  • implementation
  • requirements and analysis

11. Which Git command is used to get an initial copy on an existing Git repository for the first time?

  • git add
  • git copy
  • git clone
  • git repo

12. Refer to the exhibit. Which message format is being used?

DevNet Associate (Version 1.0) - Practice Final Exam Answers 3

  • JSON
  • HTML
  • YAML
  • XML

13. A student is learning Python using the interactive interpreter mode. The student issues these commands:

DevNet Associate (Version 1.0) - Practice Final Exam Answers 4

Which type of Python structure is created?

  • a method
  • a class
  • a function
  • a module

14. Match the Git stage with a description.

DevNet Associate (Version 1.0) - Practice Final Exam Answers 5

15. How does YAML maintain data-structure hierarchy?

  • braces
  • brackets
  • parenthesis
  • indentation

16. Which SDLC phase concludes with a high quality, bug-free, working piece of software that is ready for production?

  • design
  • deployment
  • implementation
  • testing

Explanation: There are six phases in the SDLC process.

  • Requirements & analysis : The product owner and qualified team members gather the requirements for the software to be built.
  • Design: Software architects and developers design the software based on the provided software requirement specification document.
  • Implementation : Developers take the design documentation and develop the code according to that design.
  • Testing : Test engineers take the code and install it into the testing environment so that they can follow the test plan.
  • Deployment : The software is installed into the production environment.
  • Maintenance : The development team provides support for customers and works on software improvements.

17. Match the SDLC phase with its description. (Not all options are used.)

DevNet Associate (Version 1.0) - Practice Final Exam Answers 6

18. Which terminal command can be used to print the Python version number installed on a system?

  • python -h
  • python -i
  • python -V
  • which python

19. What are three platforms that the Firepower Management Center can run on in the overall architecture of a large enterprise? (Choose three.)

  • on every router
  • on a wide range of Cisco devices
  • in the Secure Operations Center (SOC)
  • on VMWare VSphere
  • in an availability zone
  • on Amazon Web Services (AWS)

Explanation: Firepower Management Center can run on VMware vSphere or Amazon Web Services (AWS). It can also run on a range of physical devices including the Cisco FMC series.

20. Which two types of APIs are supported by Cisco Finesse? (Choose two.)

  • AXL
  • REST
  • JavaScript
  • SOAP
  • Python SDK

21. An engineer is learning how to enable RESTful API access for the Cisco Meraki Dashboard. What is the first step that must be taken in order to use API calls with the Meraki enterprise cloud-managed networking infrastructure service?

  • The Meraki Dashboard API must first be enabled under Organizations > Settings within the GUI.
  • Each cloud-managed organization must specify API access and allow the Meraki Dashboard administrator to employ site-specific APIs.
  • The engineer must first generate an API key by going to the My Profile page within the GUI.
  • A GET request must be created and include header parameters including authentication credentials and the Meraki API URL.

22. What does the Intersight REST API enable an application developer to access?

  • JavaScript Object Notation
  • Management Information Model
  • IETF Interface
  • Universal Resource Locator

23. A student in the DevNet class is learning SDKS and APIS. What is the difference between an API and an SDK?

  • An API is essentially a documented set of URIs, whereas an SDK is a package integrated with code examples and libraries.
  • An API contains the components that have been created for a specific purpose, whereas an SDK is commonly an interface for a service.
  • An API is a tool box that contains multiple SDKs, whereas each SDK allows the creation of software for a specific hardware platform.
  • An API is a software development tool for developing applications, whereas an SDK is a set of protocols for building application software.

Explanation: Most SDKs are packages that require installation and are integrated with libraries, documents, and code examples. APIs are essentially a documented set of URIs that act as an interface for a service.

24. Which modeling language is most commonly used for data modeling?

  • Python
  • YAML
  • YANG
  • SQL

Explanation: YANG, an acronym for Yet Another Next Generation, is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications.

25. Match the description to the corresponding layer of the OSI model. (Not all options are used.)

DevNet Associate (Version 1.0) - Practice Final Exam Answers 7

26. Which field in an 802.1Q Ethernet frame is used by switches to identify VLAN membership of the frame?

  • Tag
  • Data
  • FCS
  • Preamble

27. Which two statements are correct if a configured NTP master on a network cannot reach any clock with a lower stratum number? (Choose two.)

  • The NTP master will lower its stratum number.
  • The NTP master will be the clock with 1 as its stratum number.
  • Other systems will be willing to synchronize to that master using NTP.
  • The NTP master will claim to be synchronized at the configured stratum number.
  • An NTP server with a higher stratum number will become the master.

Explanation: If the network NTP master cannot reach any clock with a lower stratum number, the system will claim to be synchronized at the configured stratum number, and other systems will be willing to synchronize to it using NTP.

28. What are three parts of an IPv6 global unicast address? (Choose three.)

  • a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP
  • a global routing prefix that is used to identify the portion of the network address provided by a local administrator
  • an interface ID that is used to identify the local network for a particular host
  • an interface ID that is used to identify the local host on the network
  • a subnet ID that is used to identify networks inside of the local enterprise site

Explanation: There are three elements that make up an IPv6 global unicast address. A global routing prefix which is provided by an ISP, a subnet ID which is determined by the organization, and an interface ID which uniquely identifies the interface interface of a host.

29. Match the IPv6 address to the IPv6 address type. (Not all options are used.)

DevNet Associate (Version 1.0) - Practice Final Exam Answers 8

30. What attribute of a NIC would place it at the data link layer of the OSI model?

  • IP address
  • RJ-45 port
  • attached Ethernet cable
  • MAC address
  • TCP/IP protocol stack

Explanation: The data link layer describes media access and physical addressing. The encoding of a MAC address on a NIC places it at that layer. Ports and cables are placed at the physical layer of the OSI model. IP addresses are placed at the network layer. The TCP/IP protocol stack describes a different model.

31. Match the firewall function to the type of threat protection it provides to the network. (Not all options are used.)

DevNet Associate (Version 1.0) - Practice Final Exam Answers 9

  • packet filtering – prevents access based on IP or MAC address
  • URL filtering – prevents access to websites
  • network address translator – (none)
  • stateful packet inspection – prevents unsolicited incoming sessions
  • application filtering – prevents access by port number

Explanation: Firewall products come packaged in various forms. These products use different techniques for determining what will be permitted or denied access to a network. They include the following:

+ Packet filtering – Prevents or allows access based on IP or MAC addresses
+ Application filtering – Prevents or allows access by specific application types based on port numbers
+ URL filtering – Prevents or allows access to websites based on specific URLs or keywords
+ Stateful packet inspection (SPI) – Incoming packets must be legitimate responses to requests from internal hosts. Unsolicited packets are blocked unless permitted specifically. SPI can also include the capability to recognize and filter out specific types of attacks, such as denial of service (DoS)

32. Which protocol automates assignment of IP addresses on a network, and which port number does it use? (Choose two.)

  • DHCP
  • DNS
  • SMB
  • 53
  • 67
  • 80

Explanation: DNS uses port 53 and translates URLs to IP addresses. SMB provides shared access to files and printers and uses port 445. Port 80 is used by HTTP. HTTP is a protocol used to communicate between a web browser and a server.

33. What are the two types of DevNet Sandboxes? (Choose two.)

  • assigned
  • always-on
  • reserved
  • intermal-use only
  • exclusive

34. Which fee-based Cisco DevNet developer support option provides a response time of 1 business day?

  • knowledge base
  • chat with DevNet
  • case-based ticket
  • community forum

35. When working with both a live production environment and testing code in a shared developer sandbox, what are two important rules to follow? (Choose two.)

  • Never request assistance or share information in community or public environments.
  • Never use publicly posted tokens or credentials in production environment.
  • Never provide any identifying information in community or public environments.
  • Never use a customized token in the sandbox, but instead use personal tokens that currently exist.
  • Never use any personal tokens in the sandbox, but instead use a customized token for development.

Explanation: When working in a leaming environment or community-based environment, remember never to use any personal tokens or credentials in the sandbox. Also, do not use tokens or credentials provided in a course or online community in a production environment. It is important to be protective of tokens, passwords, and other identifying information in development environments.

36. Which DevNet resource would a student use to learn how to make REST API requests?

  • DevNet Learning Labs
  • DevNet Sandbox
  • Code Exchange
  • DevNet Support

Explanation: DevNet provides a catalog of free, self-paced online tutorials called Learning Labs.

37. Which two forums are available on the Cisco Developer Community? (Choose two.)

  • Developer Automation
  • Developer Networking
  • Developer Coding
  • Developer Support
  • Developer Security

Explanation: There are a total of ten developer forums on the Cisco Developer Community:

Developer Networking
Developer Collaboration
Developer Security
Developer Data Center
Developer Intemet of Things
Developer Cloud
Developer Services
Developer Mobility
Developer Analytics and Automation Software
Developer DevNet Site

38. What are two benefits of using automation for IT infrastructure? (Choose two.)

  • increased implementation of specific opinionated companion components
  • increased speed in the deployment of technologies and products
  • reduced user requisition requests for on-demand infrastructure
  • reduced risk while working at scale
  • reduced need for IT personnel and operations staff

39. Which component is required by both Puppet and Chef to be run on hosts?

  • agents that query a server to determine their desired state, then converge upon it
  • cron jobs that access a server to randomize access times to prevent server overload
  • IPtables that enable masquerade tunneling
  • certificates for authentication and encryption

40. What are two processes that can be used to execute remote scripts securely? (Choose two.)

  • pipe scripts to a remote machine using cat | telnet and execute them in sequence with other commands, capturing and returning results to a local terminal
  • access the built-in rexec command within Bash, target the IP address of the remote machine, and execute the Bash command
  • store scripts locally, transmit them to a target machine with scp, log into the remote machine via ssh, and execute the scripts
  • store scripts on a webserver, log into the remote machine, and retrieve the scripts using wget via HTTP
  • store scripts in a Git repository, install git on the remote machine, clone the repo, check out a branch, and execute the scripts

Explanation: There are many ways to configure remote systems using scripts. However, scripts should be delivered to a remote system through the use of secured protocols or services or both.

41. What is an example of an SLI?

  • All services provided include data integrity and security and comply with local regulations about where and how data is stored.
  • 95% of requests will be served within 75 milliseconds.
  • All applications being provided will offer a good-enough experience to the user base.
  • 100% availability will be maintained for any services provided.

42. Which component of a software-defined infrastructure provides available cloud resources within hours or minutes of needing them?

  • repeatability
  • observability
  • self-service
  • platform abstraction

43. A user is working on Ansible on the local NMS to manage remote network devices. The user issues the ansible webservers -m ping command to test the communication. What is the parameter ping in the command?

  • a function
  • a class
  • a module
  • a method

Explanation: In the ansible webservers -m ping command, the parameter ping is an Ansible module invoked by the switch -m

44. A network operator is testing a network management application that uses REST API to communicate with network devices. The operator received an HTTP response code 403 in a test step. What does this response code indicate?

  • Client has not authenticated to access the site or API call.
  • The page at HTTP URL location does not exist or is hidden.
  • Request failed due to a client-side issue.
  • Access is not granted based on supplied credentials.

Explanation: Most common HTTP status codes include:

200 – OK (using GET or POST to exchange data with an API successfully)
201 – Created (creating resources by using a REST API call successfully)
400 – Bad Request (The request from the client is failed due to client-side issue.)
401 – Unauthorized (The client is not authenticated to access site or API call.)
403 – Forbidden (The access request is not granted based on the supplied credentials.)
404 – Not Found (The page requested at HTTP URL location does not exist or is hidden.)

45. Which three characteristics are associated with the SOAP architecture? (Choose three.)

  • stateless
  • neutral
  • extensible
  • layered system
  • independent
  • uniform interface

46. A client is using an API key to authenticate and access resources on a website through a REST API. The string in the API request is GET http://example.com:8080/v1/books?API_KEY= < key >. Which component in the API request is used to provide this string?

  • cookie
  • query string
  • header
  • body data

47. Refer to the exhibit. A student is learning network automation with Python and REST API. The student constructs a small Python script to get information from a local network device. The device is a sandbox located inside the college lab and it is using a self-signed SSL certificate. Which parameter is needed in the Python code (in place of the question mark) to skip the SSL verification?

DevNet Associate (Version 1.0) - Practice Final Exam Answers 10

  • verify = True
  • verify = False
  • verify = NO
  • verify = YES

Explanation: When the protocol used within the URI is HTTPS, the connection will perform an SSL handshake between the client and the server for secure authentication. This handshake needs to be successful before the REST API request is even sent to the API server. However, because the SSL is self-signed, it would not pass the SSL verification with a CA. In the case of learning and practicing on a local resource, the SSL verification can be turned off by the “verify = False” parameter.

48. What are two features of REST APIs? (Choose two.)

  • They communicate over HTTP.
  • They follow the Representational State Transfer principles.
  • Requests always contain data.
  • Responses are always in JSON format.
  • They maintain session states in communications.

Explanation: REST APIs are the short name for Representational State Transfer Webservice APIs. They follow the REST architectural style and communicate over HTTP. REST API requests and responses can use many different data formats; it is not mandatory to use JSON. It is also not mandatory for requests or responses to contain data. Data is provided when applicable. Communication using REST APIs is stateless.

49. What are two advantages of using an APl rate limit? (Choose two.)

  • It protects against a DoS attack.
  • It reduces the amount of overhead within the API request.
  • It allows requests to be processed in a prioritized manner.
  • It supports token passing so tha each client gets a turn.
  • It provides better quality of service and response time.

Explanation: An API rate limit allows a web service to control the number of requests made in a defined amount of time and is a best practice to use for public and unrestricted APIS. Benefits of using rate limits include the following:

Avoids a server overload from too many requests at once
Provides better service and response time to all users
Protects against a denial of service (DoS) attack

50. Which three authentication mechanisms are used in REST APIs? (Choose three.)

  • basic authentication
  • OAuth
  • open authentication
  • API Key
  • bearer authentication
  • SSO

Explanation: For security reasons, most REST APIs require authentication to prevent random users from being able to create, update, or delete information incorrectly or maliciously. Basic Authentication, Bearer Authentication, and API Key are authentication mechanisms used by REST APIs. OAuth is an authorization mechanism

51. What are two advantages of using an API rate limit? (Choose two.)

  • It reduces the amount of overhead within the API request.
  • It protects against a DoS attack.
  • It allows requests to be processed in a prioritized manner.
  • It provides better quality of service and response time.
  • It supports token passing so that each client gets a turn.

52. What are three characteristics of containers on a host server? (Choose three.)

  • They all share the same OS.
  • They are isolated from each other.
  • They leverage the kernel of the host OS for a quick start.
  • They include a guest OS.
  • They virtualize a physical server.
  • They are resource intensive and require several minutes to start.

Explanation: A container is an isolated environment where containerized applications run. It contains the application and all dependencies needed for the application to run. The containers on a physical server all share the same OS, are isolated from each other, and leverage the kernel of the host operating system to allow for quick starts.

53. Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)

  • NAT adds authentication capability to IPv4.
  • NAT introduces problems for some applications that require end-to-end connectivity.
  • NAT will impact negatively on switch performance.
  • NAT provides a solution to slow down the IPv4 address depletion.
  • NAT improves packet handling.
  • NAT causes routing tables to include more information.

54. What is one function of a Layer 2 switch?

  • forwards data based on logical addressing
  • duplicates the electrical signal of each frame to every port
  • learns the port assigned to a host by examining the destination MAC address
  • determines which interface is used to forward a frame based on the destination MAC address

Explanation: A switch builds a MAC address table of MAC addresses and associated port numbers by examining the source MAC address found in inbound frames. To forward a frame onward, the switch examines the destination MAC address, looks in the MAC address for a port number associated with that destination MAC address, and sends it to the specific port. If the destination MAC address is not in the table, the switch forwards the frame out all ports except the inbound port that originated the frame.

55. What is the purpose of the subnet mask in conjunction with an IP address?

  • to uniquely identify a host on a network
  • to identify whether the address is public or private
  • to determine the subnet to which the host belongs
  • to mask the IP address to outsiders

Explanation: With the IPv4 address, a subnet mask is also necessary. A subnet mask is a special type of IPv4 address that coupled with the IP address determines the subnet of which the device is a member.

56. Which type of threat defense is provided by Cisco Umbrella?

  • blocking requests to malicious Internet destinations
  • monitoring and analyzing network traffic for potential network intrusion attacks
  • identifying and blocking zero-day threats that manage to infiltrate the network
  • blocking hidden malware from both suspicious and legitimate websites

57. What are two features of the formal code review? (Choose two.)

  • For a quicker turnaround, it involves only one reviewer
  • It involves the developer going through code with the reviewer line-by-line.
  • It promotes discussion among all of the reviewers.
  • It allows the developer to make changes on the spot.
  • It involves a review of the entire code base in a series of meetings.

58. What is immutable infrastructure in DevOps?

  • infrastructure that is deployed with all component versions locked except for the ability to perform manual configuration changes
  • infrastructure that is only deployed and maintained in containers
  • infrastructure that is entirely maintained and deployed in code and never subjected to manual changes
  • virtualized infrastructure that is deployed as golden images

59. What is a benefit of using a bare metal deployment solution?

  • increased processor and memory resource flexibility
  • direct access to hardware resources for increased efficiency
  • enhanced security
  • addition of an extra layer of abstraction

60. What are two characteristics of containers that are running on the same host server? (Choose two.)

  • They all share the same host operating system.
  • They are isolated from each other.
  • They each include a guest operating system.
  • They each virtualize a different physical server.
  • They are resource intensive and require several minutes to start.

61. An engineer is implementing an edge computing solution where a number of sensors are streaming a large amount data. Where should the computing capability be placed?

  • as close to the WAN edge as possible
  • as close to the internet as possible
  • as close to the network edge as possible
  • as close to the sources of data possible

62. What type of attack is being attempted if code similar to this is entered in the login field on a web site?
SELECT REPLACE (User_Name, ‘administrator’, ‘hacker’) Userlist FROM Credentials;

  • DoS
  • zero day
  • brute force
  • SQL injection

63. What is a benefit to an organization of implementing edge computing?

  • provides low latency and increased bandwidth for remote IoT devices
  • minimizes high levels of data transfer across the network
  • allows all compute resources to be centralized in the data center
  • consolidates compute resources into a single cloud

64. What is Bash?

  • a web application framework written in Python
  • a code injection technique used to attack data-driven applications
  • a Linux script engine that allows commands to be entered on the command line
  • a philosophy for software deployment that figures prominently in the field of DevOps

65. What are two benefits of using a distributed version control system compared to other version control systems? (Choose two.)

  • An offline user is not required to make a copy of an important file before editing it further.
  • A simple database is used to store the delta between the versions of a single file.
  • A single user can lock a file to prevent other users from modifying it until the single user is done editing it.
  • Every user has the ability to work on any file at any time.
  • A corrupt repository can be restored from any client system.

66. Which two components of XML code are contained within the XML prologue? (Choose two.)

  • the tag name xml
  • the XML namespaces
  • the URNs
  • the character encoding
  • the instance objects

67. What is a philosophy associated with the test-driven development process?

  • Application code is developed at a slower pace to allow for repetitive testing.
  • Application code should be written before validating system design and tested for functionality as needed.
  • More than enough code is written to support the application.
  • Failures are expected to occur in order to limit the application code to only what is needed to pass the test.

68. What process would need to be taken to extract information from XML and convert it into a form that Python could access conveniently?

  • decoding
  • parsing
  • encoding
  • serializing

69. What is the outcome of performing a Git merge between two branches?

  • The changes/commits located within both the source branch and target branch are modified to cause the branches to converge.
  • The changes/commits of files within the target branch are analyzed against the changes/commits located within the source branch using a generic comparison tool.
  • The changes/commits located within the target branch are modified to mirror the changes/commits stored within the source branch.
  • The changes/commits located within the source branch are modified to mirror the changes/commits stored within the target branch.

70. In which situation would a router be used?

  • when performing a formal code review
  • when testing an app on a cloud-based server
  • when developing an app on a private server located on the same network as the development team
  • when authenticating to a REST API service on the local host

71. A network app developer has configured an app to use a particular DNS server in order to test the application against a test database. The developer suspects a DNS issue. Which command could be used to verify a particular domain name?

  • sudo puppet agent -t
  • nslookup
  • ifconfig
  • ssh -p 53

72. A user makes some REST API calls to a server and the responses from the server include third-party executable code. The user notices that the responses do not work. Which network device may prevent the third-party code from execution?

  • proxy server
  • reverse proxy server
  • Layer 3 switch
  • firewall

73. What are two reasons a VLAN would be used on a Layer 2 switch? (Choose two.)

  • to filter network traffic based on protocol port numbers
  • to allow traffic to be sent between two networks
  • to allow multiple networks to be created at Layer 2
  • to allow a router to broadcast traffic between two networks
  • to create separate broadcast domains on a switch

74. A user is testing an application by sending requests to gather information from a network device through a REST API. The user expects a very large amount of data to be returned. The user requests that the network device sends the data back with the compression algorithm of gzip. What response header string would indicate that the return data is compressed as requested?

  • Accept-Encoding: compress
  • Accept-Encoding: gzip
  • Content-Encoding: compress; gzip
  • Content-Encoding: gzip

75. A user sends a request to add a loopback interface on a Cisco router through the REST API. Which response status code will the user expect to receive that indicates the request is fulfilled?

  • 200
  • 201
  • 202
  • 203

76. A user is testing an application by sending requests to gather information from a network device through a REST API. The user reviews the API responses and notices an HTTP header string of “Cache-Control: max-age=3600, public”. Which two statements describe the HTTP directive? (Choose two.)

  • The response can be saved in cache and the information must be refreshed after 60 minutes.
  • The response may be stored by any cache, even if the response is normally noncacheable.
  • The response can be saved in cache and the cached content is open to public access.
  • Only responses to requests with the HTTP protocol can be cached.
  • The client web browser can save the response in the cache and it will expire in an hour.

77. Which situation illustrates the use of a webhook application?

  • Triggered by the operation of a user, a mobile application sends a REST API request to get information from a webhook server.
  • A network automation application queries a router to get CPU and memory usage over a period of time.
  • A developer subscribes to a webhook server for an application so that the application will receive a notification when an event occurs.
  • A user sends a REST API call to a webhook server to poll a predefined data set.

78. A user is developing an application to remotely manage a network device through the API. The features of the API should support the client-server model, JSON or XML data format, and stateless operation. What is an API architecture style that the developer could use?

  • webhook
  • RPC
  • SOAP
  • REST

79. Which two statements describe the characteristics of the model-driven programmability implemented on Cisco IOS XE? (Choose two.)

  • The configuration command ip http secure-server is required to enable RESTCONF over port 443.
  • Both NETCONF and RESTCONF support running and candidate data stores.
  • RESTCONF is enabled by the configuration command restconf enable .
  • NETCONF connections should be authenticated using AAA credentials.
  • NETCONF connections require that a VPN link be established first.

80. A student is learning network automation using the DevNet site. Which DevNet resource allows users to search and share their programming skills and experiences?

  • Code Exchange
  • Sandbox
  • Learning Labs
  • Automation Exchange

81. A network administrator is evaluating Cisco UCS Manager products to deploy centralized management for the data center. The data center has about 500 physical servers. Which product should the administrator choose?

  • UCS Central (UCSC)
  • Unified Communications Manager (CUCM)
  • UCS Manager (UCSM)
  • Integrated Management Controller (CIMC)

82. Which REST API supported by Cisco Unified Communications Manager is designed to enable end users to update and configure personal settings.?

  • UC Manager Serviceability API
  • Telephony API
  • UDS API
  • AXL API

83. What are two benefits of model-driven programmability in infrastructure automation? (Choose two.)

  • uses human-readable configuration language
  • leverages code that is coupled with transport, protocol, and encoding
  • relies on the use of device-specific scripts
  • uses device-specific CLIs
  • leverages open-source technology

84. A credit union has been growing very rapidly in the past 3 years and the IT department has been struggling to keep up. The department has always been criticized for the time it takes to program and implement change requests. The new CIO has decided to implement CI/CD. What are three benefits of this strategy? (Choose three.)

  • improves quality
  • delivers a lot of code in a small amount of time
  • requires the use of multiple communication tools, thus improving development
  • is less disruptive to future releases
  • integrates well with Agile software development methods
  • is easier to market

85. The development team in the IT department has decided to implement CI/CD. What are three characteristics of this strategy? (Choose three.)

  • Automation is part of the creation, verification, and deployment of software.
  • The integration and development process goes in one direction and can never go backwards.
  • CI/CD places a higher priority on satisfying the customer needs than does the development plan.
  • Strategies are used to limit the impact of a possible bad build to users.
  • It is modeled after the software development life cycle and is a more traditional implementation method.
  • The development process attempts to eliminate the problem of application merge conflicts.

86. How does Cisco VIRL benefit the testing and development of code and automation?

  • Cisco VIRL can duplicate network simulations using a .virl file, which is a JSON file.
  • Cisco VIRL can duplicate the performance of SDN software components in optimal production conditions.
  • Cisco VIRL can duplicate the same code that runs inside actual Cisco products.
  • Cisco VIRL can duplicate the performance of elite hardware components in optimal production conditions.

87. What two components form the Python-based network device test and validation solution of pyATS?

  • Python and VIRL
  • Python and Genie
  • Python and Puppet
  • Python and Ansible

88. A network engineer has been asked to automate some of the network management and configuration management. The engineer is going to use NETCONF. Why should the engineer consider also using YANG as part of this project?

  • YANG is a documented set of URIs that could be used as part of the deployment.
  • YANG is a set of software development tools that is integrated with vendor-specific configuration libraries.
  • YANG provides a hierarchy of data that can be used for device configuration and operational status retrieval.
  • YANG is used to provide the transport to and from a network device such as a Cisco switch.

89. Match the Cisco NSO component to the description.
DevNet Associate (Version 1.0) - Practice Final Exam Answers 11

  • Service Manager: provides an internal API for locating network element configurations and automatic support for upgrade and downgrade of configuration data
  • Device Manager: deploys configuration changes to multiple devices through the use of distributed transactions
  • Configuration Database: maintains device dependencies and provideds a service self start for triggering diagnostic tests

Related Articles

guest
8 Comments
Inline Feedbacks
View all comments
JackStings
JackStings
7 days ago

New one

Capture.JPG
JackStings
JackStings
7 days ago

Why are the new ones don’t have any highlighted answers?

Quaresma
Quaresma
14 days ago

What are three characteristics of containers on a host server? (Choose three.) They are isolated from each other. They virtualize a physical server. They all share the same OS. They leverage the kernel of the host OS for a quick start. They are resource intensive and require several minutes to start. They include a guest OS. What is a benefit of using a bare metal deployment solution? increased processor and memory resource flexibility direct access to hardware resources for increased efficiency enhanced security addition of an extra layer of abstraction What are two characteristics of containers that are running on… Read more »

kithmini thathsara jasin arachchi
kithmini thathsara jasin arachchi
4 months ago

What are two advantages of using an API rate limit? (Choose two.)

  • It provides better quality of service and response time.
  • It protects against a DoS attack.
  • It allows requests to be processed in a prioritized manner.
  • It reduces the amount of overhead within the API request.
  • It supports token passing so that each client gets a turn.
Amarendar
Amarendar
4 months ago

What are two advantages of using an API rate limit?

Rate limiting advantages:

  • avoid a server overload from too many requests at once
  • provide better service and response time to all users
  • protect against a denial-of-service (DoS) attack