Time limit: 0
Quiz-summary
0 of 99 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
Information
DevNet Associate (Version 1.0) – Practice Final Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 99 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- Answered
- Review
-
Question 1 of 99
1. Question
1 pointsA network engineer is working on a bash script in order to automate some mundane tasks needed by the department. Why would the engineer add a she-bang (#!) to the top of the script as shown:#!/bin/bash
Correct
Incorrect
Hint
A she-bang is the pound sign (#) followed by an exclamation mark (!) and designates the path to the command interpreter. In this case, the interpreter is bash and bash will be used to interpret the script that follows. -
Question 2 of 99
2. Question
1 pointsAn international manufacturing company is implementing an industrial internet of things plant infrastructure. The design requires that computing resources are located as close to the user as possible. Which cloud model is suitable for this situation?Correct
Incorrect
Hint
Edge clouds are located as close to the user as possible. Having computing power at the network edge is a benefit for internet of things devices such as cameras, industrial automation equipment, and autonomous vehicles. -
Question 3 of 99
3. Question
1 pointsWhat are three tools used by developers for scanning code to check for well-known security issues? (Choose three.)Correct
Incorrect
Hint
Because most code developers are not security experts, it is not uncommon to have security vulnerabilities inadvertently written into applications. To help mitigate this threat, there are code scanning tools that a developer can use to look for any well-know security issues embedded into the code. Examples of such tools are Bandit, Brakeman, and VisualCodeGrepper. -
Question 4 of 99
4. Question
1 pointsA network engineer is configuring a Jenkins job and finishing with the following script in order to trigger the build:node { stage('Preparation') { catchError(buildResult: 'SUCCESS') { sh 'docker stop samplerunning' sh 'docker rm samplerunning' } } stage('Build') { build 'BuildAppJob' } stage('Results') { build 'TestAppJob' } }
After saving the job, what should the engineer do next?Correct
Incorrect
Hint
Once a script is created, use the Build Now Jenkins menu option to run the job. If the script is done correctly, then the Stage View should show three green boxes. If errors are found, check the script for errors. -
Question 5 of 99
5. Question
1 pointsWhat are three ways to mitigate SQL injection threats? (Choose three.)Correct
Incorrect
Hint
SQL injection is a basic web application attack technique which, if successful, can delete or change sensitive data or reveal it to the attacker. There are several methods to mitigate the threat of SQL injection such as the use of parameterized database queries, database firewalls, and whitelist input validation. -
Question 6 of 99
6. Question
1 pointsWhat is the purpose of adding salt to the password hashing process?Correct
Incorrect
Hint
Because of the deterministic nature of the hash function, hashed passwords are not unique. The same password always produces the same hash even if the password is created by different users. The salting process adds random data to the input of the hash function to guarantee a unique, nondeterministic output. -
Question 7 of 99
7. Question
1 pointsMatch the CI/CD software development philosophy with a description.Correct
Incorrect
-
Question 8 of 99
8. Question
1 pointsWhat is an operational characteristic of the local version control system?Correct
Incorrect
Hint
There are three types of version control systems:- Local version control system
- Centralized version control system
- Distributed version control system
-
Question 9 of 99
9. Question
1 pointsAn organization is using the Waterfall methodology for a software development project. In what order are the SDLC phases completed when using this method?Correct
Incorrect
Hint
The Software Development Life Cycle (SDLC) is the process of developing software from concept to final product. The process consists of six phases, with each phase using the results of the previous phase as input. The phases are ordered as follows: (1) requirements & analysis, (2) design, (3) implementation, (4) testing, (5) deployment, and (6) maintenance. -
Question 10 of 99
10. Question
1 pointsIn which phase of the SDLC process does the product development team gather feedback from the potential customer on the desired features for the new software?Correct
Incorrect
Hint
The first phase of the SDLC is the requirements and analysis phase. In this phase the product owner and qualified team members, using feedback from potential customers, gather the requirements for the software to be built. -
Question 11 of 99
11. Question
1 pointsWhich Git command is used to get an initial copy on an existing Git repository for the first time?Correct
Incorrect
Hint
The command that you would use for the first copy of an existing Git repository is git clone . -
Question 12 of 99
12. Question
1 pointsRefer to the exhibit. Which message format is being used?Correct
Incorrect
Hint
JSON objects are unordered sets of name/value pairs that begin and end with curly braces { }. -
Question 13 of 99
13. Question
1 pointsA student is learning Python using the interactive interpreter mode. The student issues these commands:>>> class Url(): ... def __init__(self, host, prot): ... self.host = host ... self.prot = prot ... self.url = self.prot + "://" + self.host ... >>>
Which type of Python structure is created?Correct
Incorrect
Hint
In Python, classes are a means of bundling data storage and functionality in a single structure. Each class declaration defines a new object type. A class is defined with the class Class_Name() command. -
Question 14 of 99
14. Question
1 pointsMatch the Git stage with a description.Correct
Incorrect
-
Question 15 of 99
15. Question
1 pointsHow does YAML maintain data-structure hierarchy?Correct
Incorrect
Hint
In YAML the data-structure hierarchy is maintained by outline indentation. -
Question 16 of 99
16. Question
1 pointsWhich SDLC phase concludes with a high quality, bug-free, working piece of software that is ready for production?Correct
Incorrect
Hint
There are six phases in the SDLC process.- Requirements & analysis : The product owner and qualified team members gather the requirements for the software to be built.
- Design: Software architects and developers design the software based on the provided software requirement specification document.
- Implementation : Developers take the design documentation and develop the code according to that design.
- Testing : Test engineers take the code and install it into the testing environment so that they can follow the test plan.
- Deployment : The software is installed into the production environment.
- Maintenance : The development team provides support for customers and works on software improvements.
-
Question 17 of 99
17. Question
1 pointsMatch the SDLC phase with its description. (Not all options are used.)Correct
Incorrect
-
Question 18 of 99
18. Question
1 pointsWhich terminal command can be used to print the Python version number installed on a system?Correct
Incorrect
Hint
The command python -V can be used from a command or terminal window to view the Python version installed on the system. -
Question 19 of 99
19. Question
1 pointsWhat are three platforms that the Firepower Management Center can run on in the overall architecture of a large enterprise? (Choose three.)Correct
Incorrect
Hint
Firepower Management Center can run on VMware vSphere or Amazon Web Services (AWS). It can also run on a range of physical devices including the Cisco FMC series. -
Question 20 of 99
20. Question
1 pointsWhich two types of APIs are supported by Cisco Finesse? (Choose two.)Correct
Incorrect
Hint
Cisco Finesse has REST APIs and JavaScript APIs that can be used to build fully customized agent desktops, integrate contact center functionality into applications, and integrate applications into the Finesse agent and supervisor desktop. -
Question 21 of 99
21. Question
1 pointsAn engineer is learning how to enable RESTful API access for the Cisco Meraki Dashboard. What is the first step that must be taken in order to use API calls with the Meraki enterprise cloud-managed networking infrastructure service?Correct
Incorrect
Hint
In order to provide API access for an organization, API access must first be enabled within the GUI, under Organization > Settings . After the API is enabled, an API key must be generated within the My Profile page. -
Question 22 of 99
22. Question
1 pointsWhat does the Intersight REST API enable an application developer to access?Correct
Incorrect
Hint
The Intersight REST API enables a user to access the Management Information Model. The Intersight API accepts and returns messages that are encapsulated through JavaScript Object Notation (JSON) documents and uses HTTP over TLS as the transport protocol. -
Question 23 of 99
23. Question
1 pointsA student in the DevNet class is learning SDKS and APIS. What is the difference between an API and an SDK?Correct
Incorrect
Hint
Most SDKs are packages that require installation and are integrated with libraries, documents, and code examples. APIs are essentially a documented set of URIs that act as an interface for a service. -
Question 24 of 99
24. Question
1 pointsWhich modeling language is most commonly used for data modeling?Correct
Incorrect
Hint
YANG, an acronym for Yet Another Next Generation, is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. -
Question 25 of 99
25. Question
1 pointsMatch the description to the corresponding layer of the OSI model. (Not all options are used.)Correct
Incorrect
Hint
Place the options in the following order: Application Includes protocols that provide specific functionality to a variety of end user applications. Provides the interface between applications and the underlying network. Presentation Compresses the data in a way that can be decompressed by the destination device. Ensures that data from the source device can be interpreted by the appropriate application on the destination device. Session Restarts dialogs between source and destination applications when they are disrupted. Handles the exchange of information to initiate dialogs between source and destination applications. -
Question 26 of 99
26. Question
1 pointsWhich field in an 802.1Q Ethernet frame is used by switches to identify VLAN membership of the frame?Correct
Incorrect
Hint
The 12-bit VLAN identifier is part of the 4-byte Tag field of an 802.1Q Ethernet frame. -
Question 27 of 99
27. Question
1 pointsWhich two statements are correct if a configured NTP master on a network cannot reach any clock with a lower stratum number? (Choose two.)Correct
Incorrect
Hint
If the network NTP master cannot reach any clock with a lower stratum number, the system will claim to be synchronized at the configured stratum number, and other systems will be willing to synchronize to it using NTP. -
Question 28 of 99
28. Question
1 pointsWhat are three parts of an IPv6 global unicast address? (Choose three.)Correct
Incorrect
Hint
There are three elements that make up an IPv6 global unicast address. A global routing prefix which is provided by an ISP, a subnet ID which is determined by the organization, and an interface ID which uniquely identifies the interface interface of a host. -
Question 29 of 99
29. Question
1 pointsMatch the IPv6 address to the IPv6 address type. (Not all options are used.)Correct
Incorrect
-
Question 30 of 99
30. Question
1 pointsWhat attribute of a NIC would place it at the data link layer of the OSI model?Correct
Incorrect
Hint
The data link layer describes media access and physical addressing. The encoding of a MAC address on a NIC places it at that layer. Ports and cables are placed at the physical layer of the OSI model. IP addresses are placed at the network layer. The TCP/IP protocol stack describes a different model. -
Question 31 of 99
31. Question
1 pointsMatch the firewall function to the type of threat protection it provides to the network. (Not all options are used.)Correct
Incorrect
Hint
Firewall products come packaged in various forms. These products use different techniques for determining what will be permitted or denied access to a network. They include the following: + Packet filtering – Prevents or allows access based on IP or MAC addresses + Application filtering – Prevents or allows access by specific application types based on port numbers + URL filtering – Prevents or allows access to websites based on specific URLs or keywords + Stateful packet inspection (SPI) – Incoming packets must be legitimate responses to requests from internal hosts. Unsolicited packets are blocked unless permitted specifically. SPI can also include the capability to recognize and filter out specific types of attacks, such as denial of service (DoS) -
Question 32 of 99
32. Question
1 pointsWhich protocol automates assignment of IP addresses on a network, and which port number does it use? (Choose two.)Correct
Incorrect
Hint
DNS uses port 53 and translates URLs to IP addresses. SMB provides shared access to files and printers and uses port 445. Port 80 is used by HTTP. HTTP is a protocol used to communicate between a web browser and a server. -
Question 33 of 99
33. Question
1 pointsWhat are the two types of DevNet Sandboxes? (Choose two.)Correct
Incorrect
Hint
The two types of DevNet Sandboxes include always-on and reserved. An “always-on” sandbox is available to anyone and typically provides read-only access. A reserved Cisco DevNet Sandbox has shared resources with a quota setting and uses a VPN connection so that traffic to and from the sandbox and development environment is protected. -
Question 34 of 99
34. Question
1 pointsWhich fee-based Cisco DevNet developer support option provides a response time of 1 business day?Correct
Incorrect
Hint
Case-based tickets provide 1-on-1 support for certain Cisco APIs. The response time is commonly 1 business day and the cost varies based on the amount of case-based tickets purchased. -
Question 35 of 99
35. Question
1 pointsWhen working with both a live production environment and testing code in a shared developer sandbox, what are two important rules to follow? (Choose two.)Correct
Incorrect
Hint
When working in a leaming environment or community-based environment, remember never to use any personal tokens or credentials in the sandbox. Also, do not use tokens or credentials provided in a course or online community in a production environment. It is important to be protective of tokens, passwords, and other identifying information in development environments. -
Question 36 of 99
36. Question
1 pointsWhich DevNet resource would a student use to learn how to make REST API requests?Correct
Incorrect
Hint
DevNet provides a catalog of free, self-paced online tutorials called Learning Labs. -
Question 37 of 99
37. Question
1 pointsWhich two forums are available on the Cisco Developer Community? (Choose two.)Correct
Incorrect
Hint
There are a total of ten developer forums on the Cisco Developer Community: Developer Networking Developer Collaboration Developer Security Developer Data Center Developer Intemet of Things Developer Cloud Developer Services Developer Mobility Developer Analytics and Automation Software Developer DevNet Site -
Question 38 of 99
38. Question
1 pointsWhat are two benefits of using automation for IT infrastructure? (Choose two.)Correct
Incorrect
Hint
There are commonly three benefits of infrastructure automation: Speed Repeatability The ability to work at scale, with reduced risk -
Question 39 of 99
39. Question
1 pointsWhich component is required by both Puppet and Chef to be run on hosts?Correct
Incorrect
Hint
Puppet and Chef both require the use of an agent, which is used to reterieve information and make desired changes. -
Question 40 of 99
40. Question
1 pointsWhat are two processes that can be used to execute remote scripts securely? (Choose two.)Correct
Incorrect
Hint
There are many ways to configure remote systems using scripts. However, scripts should be delivered to a remote system through the use of secured protocols or services or both. -
Question 41 of 99
41. Question
1 pointsWhat is an example of an SLI?Correct
Incorrect
Hint
A Service Level Indicator or SLI is a real-world benchmark metric used to determine Service-Level Objectives (SLOs). -
Question 42 of 99
42. Question
1 pointsWhich component of a software-defined infrastructure provides available cloud resources within hours or minutes of needing them?Correct
Incorrect
Hint
Self-service or “platforms on demand” speeds up all phases of development by using cloud resources that can be available within hours or minutes of needing them. -
Question 43 of 99
43. Question
1 pointsA user is working on Ansible on the local NMS to manage remote network devices. The user issues the ansible webservers -m ping command to test the communication. What is the parameter ping in the command?Correct
Incorrect
Hint
In the ansible webservers -m ping command, the parameter ping is an Ansible module invoked by the switch -m -
Question 44 of 99
44. Question
1 pointsA network operator is testing a network management application that uses REST API to communicate with network devices. The operator received an HTTP response code 403 in a test step. What does this response code indicate?Correct
Incorrect
Hint
Most common HTTP status codes include: 200 – OK (using GET or POST to exchange data with an API successfully) 201 – Created (creating resources by using a REST API call successfully) 400 – Bad Request (The request from the client is failed due to client-side issue.) 401 – Unauthorized (The client is not authenticated to access site or API call.) 403 – Forbidden (The access request is not granted based on the supplied credentials.) 404 – Not Found (The page requested at HTTP URL location does not exist or is hidden.) -
Question 45 of 99
45. Question
1 pointsWhich three characteristics are associated with the SOAP architecture? (Choose three.)Correct
Incorrect
Hint
SOAP architecture has three characteristics: Independent – different applications can communicate with one another Extensible – extensions can be added to SOAP because it is an application of XML Neutral – SOAP can use a variety of protocols including HTTP, SMTP, TCP, UDP, or JMS -
Question 46 of 99
46. Question
1 pointsA client is using an API key to authenticate and access resources on a website through a REST API. The string in the API request is GET http://example.com:8080/v1/books?API_KEY= < key >. Which component in the API request is used to provide this string?Correct
Incorrect
Hint
A REST API request can provide an API key in a few different ways including query string, header, body data, and cookie. In this case, the API key is provided through the query string that is preceded with a symbol ? . -
Question 47 of 99
47. Question
1 pointsRefer to the exhibit. A student is learning network automation with Python and REST API. The student constructs a small Python script to get information from a local network device. The device is a sandbox located inside the college lab and it is using a self-signed SSL certificate. Which parameter is needed in the Python code (in place of the question mark) to skip the SSL verification?Correct
Incorrect
Hint
When the protocol used within the URI is HTTPS, the connection will perform an SSL handshake between the client and the server for secure authentication. This handshake needs to be successful before the REST API request is even sent to the API server. However, because the SSL is self-signed, it would not pass the SSL verification with a CA. In the case of learning and practicing on a local resource, the SSL verification can be turned off by the “verify = False” parameter. -
Question 48 of 99
48. Question
1 pointsWhat are two features of REST APIs? (Choose two.)Correct
Incorrect
Hint
REST APIs are the short name for Representational State Transfer Webservice APIs. They follow the REST architectural style and communicate over HTTP. REST API requests and responses can use many different data formats; it is not mandatory to use JSON. It is also not mandatory for requests or responses to contain data. Data is provided when applicable. Communication using REST APIs is stateless. -
Question 49 of 99
49. Question
1 pointsWhat are two advantages of using an APl rate limit? (Choose two.)Correct
Incorrect
Hint
An API rate limit allows a web service to control the number of requests made in a defined amount of time and is a best practice to use for public and unrestricted APIS. Benefits of using rate limits include the following: Avoids a server overload from too many requests at once Provides better service and response time to all users Protects against a denial of service (DoS) attack -
Question 50 of 99
50. Question
1 pointsWhich three authentication mechanisms are used in REST APIs? (Choose three.)Correct
Incorrect
Hint
For security reasons, most REST APIs require authentication to prevent random users from being able to create, update, or delete information incorrectly or maliciously. Basic Authentication, Bearer Authentication, and API Key are authentication mechanisms used by REST APIs. OAuth is an authorization mechanism -
Question 51 of 99
51. Question
1 pointsWhat are two advantages of using an API rate limit? (Choose two.)Correct
Incorrect
Hint
An API rate limit allows a web service to control the number of requests made in a defined amount of time and is a best practice to use for public and unrestricted APIs. Benefits of using rate limits include the following: Avoids a server overload from too many requests at once Provides better service and response time to all users Protects against a denial of service (DoS) attack -
Question 52 of 99
52. Question
1 pointsWhat are three characteristics of containers on a host server? (Choose three.)Correct
Incorrect
Hint
A container is an isolated environment where containerized applications run. It contains the application and all dependencies needed for the application to run. The containers on a physical server all share the same OS, are isolated from each other, and leverage the kernel of the host operating system to allow for quick starts. -
Question 53 of 99
53. Question
1 pointsWhich two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)Correct
Incorrect
Hint
Network Address Translation (NAT) is a technology that is implemented within IPv4 networks. One application of NAT is to use private IP addresses inside a network and use NAT to share a few public IP addresses for many internal hosts. In this way it provides a solution to slow down the IPv4 address depletion. However, since NAT hides the actual IP addresses that are used by end devices, it may cause problems for some applications that require end-to-end connectivity. -
Question 54 of 99
54. Question
1 pointsWhat is one function of a Layer 2 switch?Correct
Incorrect
Hint
A switch builds a MAC address table of MAC addresses and associated port numbers by examining the source MAC address found in inbound frames. To forward a frame onward, the switch examines the destination MAC address, looks in the MAC address for a port number associated with that destination MAC address, and sends it to the specific port. If the destination MAC address is not in the table, the switch forwards the frame out all ports except the inbound port that originated the frame. -
Question 55 of 99
55. Question
1 pointsWhat is the purpose of the subnet mask in conjunction with an IP address?Correct
Incorrect
Hint
With the IPv4 address, a subnet mask is also necessary. A subnet mask is a special type of IPv4 address that coupled with the IP address determines the subnet of which the device is a member. -
Question 56 of 99
56. Question
1 pointsWhich type of threat defense is provided by Cisco Umbrella?Correct
Incorrect
Hint
Cisco Umbrella serves as a first line of defense for an organization by blocking requests to malicious internet destinations. -
Question 57 of 99
57. Question
1 pointsWhat are two features of the formal code review? (Choose two.)Correct
Incorrect
Hint
In a formal code review, developers have a series of meetings to review the whole codebase and go over the code line by line, discussing each one in detail. The formal code review process promotes discussion among all of the reviewers. -
Question 58 of 99
58. Question
1 pointsWhat is immutable infrastructure in DevOps?Correct
Incorrect
-
Question 59 of 99
59. Question
1 pointsWhat is a benefit of using a bare metal deployment solution?Correct
Incorrect
-
Question 60 of 99
60. Question
1 pointsWhat are two characteristics of containers that are running on the same host server? (Choose two.)Correct
Incorrect
-
Question 61 of 99
61. Question
1 pointsWhat type of attack is being attempted if code similar to this is entered in the login field on a web site? SELECT REPLACE (User_Name, ‘administrator’, ‘hacker’) Userlist FROM Credentials;Correct
Incorrect
Hint
This item is based on information contained in the presentation. A DoS (denial of service) attack prevents users from accessing network resources. A brute force attack attempts to guess the password of an account. A zero day attack is the first occurrence of a previously unknown virus or other malware. -
Question 62 of 99
62. Question
1 pointsA user is testing an application by sending requests to gather information from a network device through a REST API. The user reviews the API responses and notices an HTTP header string of “Cache-Control: max-age=3600, public”. Which two statements describe the HTTP directive? (Choose two.)Correct
Incorrect
Hint
The HTTP header string is a cache control directive that indicates that (1) the response content can be saved by any cache and (2) the cached content will expire in 3600 seconds unless it gets refreshed before it expires. -
Question 63 of 99
63. Question
1 pointsWhat is Bash?Correct
Incorrect
Hint
Bash is the name of the default script engine that lets you do things from the command line. It is the default shell for most Linux distributions. -
Question 64 of 99
64. Question
1 pointsMatch the principles in the uniform interface constraint of the REST to the description. (Not all options are used.)Correct
Incorrect
Hint
- manipulation of resources through representations: The client receives a representation of the resource from the server that must contain enough data for the client to handle the resource.
- hypermedia as the engine of application state: The server must include additional actions and resources available for the client to access supplemental information about the resource.
- independence of client and server: (Not use)
- notification of cache capability: (Not use)
- self-descriptive messages: Each message must contain all the information for the recipient to process.
- identification of resources: A resource must be identified in the request as the individual object.
-
Question 65 of 99
65. Question
1 pointsWhat is a philosophy associated with the test-driven development process?Correct
Incorrect
Hint
With the Test-Driven Development process, testing code is written before application code. The application code is then created with the single purpose of being able to barely pass the testing code. -
Question 66 of 99
66. Question
1 pointsWhat process would need to be taken to extract information from XML and convert it into a form that Python could access conveniently?Correct
Incorrect
Hint
Parsing is the process of analyzing a message, separating it into component parts, and understanding the purpose of it in context. -
Question 67 of 99
67. Question
1 pointsWhat is the outcome of performing a Git merge between two branches?Correct
Incorrect
-
Question 68 of 99
68. Question
1 pointsIn which situation would a router be used?Correct
Incorrect
-
Question 69 of 99
69. Question
1 pointsA network app developer has configured an app to use a particular DNS server in order to test the application against a test database. The developer suspects a DNS issue. Which command could be used to verify a particular domain name?Correct
Incorrect
Hint
The nslookup command is used to obtain an IP address for a specific domain name by querying a DNS server. The desired domain name follows the command and optionally the IP address of a particular DNS server. -
Question 70 of 99
70. Question
1 pointsA user makes some REST API calls to a server and the responses from the server include third-party executable code. The user notices that the responses do not work. Which network device may prevent the third-party code from execution?Correct
Incorrect
-
Question 71 of 99
71. Question
1 pointsWhat are two reasons a VLAN would be used on a Layer 2 switch? (Choose two.)Correct
Incorrect
Hint
A virtual local-area network (VLAN) is a separate Layer 2 network that has its own broadcast domain. A Layer 3 device such as a router or multilayer switch is required to communicate between VLANs. -
Question 72 of 99
72. Question
1 pointsA user is testing an application by sending requests to gather information from a network device through a REST API. The user expects a very large amount of data to be returned. The user requests that the network device sends the data back with the compression algorithm of gzip. What response header string would indicate that the return data is compressed as requested?Correct
Incorrect
Hint
If a large amount of return data is expected, the client can request that the return data be compressed with a specific compression algorithm. To request a data compression, the request must add the Accept-Encoding field to the API request header. For example, a header string of “Accept-Encoding: gzip” tells the server to compress the return data using the gzip algorithm. If the server fulfills the compression, it will send the response back with the compressed data and add the Content-Encoding field to the response header. The value of the Content-Encoding is the type of compression that was used. -
Question 73 of 99
73. Question
1 pointsMatch the protocol to the description. (Not all options are used.)Correct
Incorrect
Hint
- resolves a host name to an IP address –> DNS
- facilitates network and device monitoring –> SNMP
- extends the lifetime of IPv4 addresses –> NAT
- provides IP address configuration information –> DHCP
- provides accurate clock-related information –> NTP
-
Question 74 of 99
74. Question
1 pointsRefer to the exhibit. Match the Python coding components to the location. (Not all options are used.)Correct
Incorrect
Hint
A = Authorization B = Content-Type C = application/json D = max E = 100 F = url G = headers=headers -
Question 75 of 99
75. Question
1 pointsRefer to the exhibit. Match the items needed in the Python script. (Not all options are used.)Correct
Incorrect
Hint
A : import json B : “username”:”cisco”, “password”:”cisco123!” C : resp.status_code D : resp.json() E : serviceTicket -
Question 76 of 99
76. Question
1 pointsA user is developing an application to remotely manage a network device through the API. The features of the API should support the client-server model, JSON or XML data format, and stateless operation. What is an API architecture style that the developer could use?Correct
Incorrect
Hint
RPC, SOAP, and REST are the three most popular types of API architectural styles. They all support the client-server model. RPC and REST can use XML or JSON. SOAP uses XML. REST requires that the communication between the client and the server remains stateless. -
Question 77 of 99
77. Question
1 pointsWhich two statements describe the characteristics of the model-driven programmability implemented on Cisco IOS XE? (Choose two.)Correct
Incorrect
Hint
Cisco IOS XE is the next-generation programmable platform. Both NETCONF and RESTCONF are supported. Their connections should be authenticated using AAA credentials. RESTCONF runs over HTTPS which is enabled by the command ip http secure-server . The CLI command to enable RESTCONF is simply restconf . NETCONF uses SSH as a transport. NETCONF supports both running and candidate data stores, whereas RESTCONF supports only a running datastore. -
Question 78 of 99
78. Question
1 pointsA student is learning network automation using the DevNet site. Which DevNet resource allows users to search and share their programming skills and experiences?Correct
Incorrect
Hint
DevNet provides ways for community members to share with each other. These are called Exchanges. In the Code Exchange site, users can submit a repository that they have found useful for any technology area. Users can search for any keyword in the repository and get a list of results. -
Question 79 of 99
79. Question
1 pointsA network administrator is evaluating Cisco UCS Manager products to deploy centralized management for the data center. The data center has about 500 physical servers. Which product should the administrator choose?Correct
Incorrect
Hint
The Cisco UCS Manager products provide scalability by integrating many components of a data center. The different management products directly relate to the number of servers being managed:- Cisco Integrated Management Controller (CIMC) can manage a single physical server.
- Cisco UCS Manager (UCSM) can manage up to 160 physical servers.
- Cisco UCS Central (UCSC) can manage up to 10,000 physical servers.
-
Question 80 of 99
80. Question
1 pointsWhich REST API supported by Cisco Unified Communications Manager is designed to enable end users to update and configure personal settings.?Correct
Incorrect
Hint
User Data Services (UDS) is a REST-based API that provides a mechanism for inserting, retrieving, updating, and removing data from the Unified Communication configuration database. The UDS API is designed to enable end users to update and configure personal settings. -
Question 81 of 99
81. Question
1 pointsWhat is the outcome of performing a Git merge between two branches?Correct
Incorrect
Hint
When a Git merge is performed, the source branch is untouched and only the target branch is modified. -
Question 82 of 99
82. Question
1 pointsWhat are two benefits of using a distributed version control system compared to other version control systems? (Choose two.)Correct
Incorrect
Hint
The distributed version control system is a peer-to-peer model that clones the full repository to client systems and allows every individual to work on any file, even at the same time. -
Question 83 of 99
83. Question
1 pointsMatch the Meraki APIs for integration to the description. (Not all options are used.)Correct
Incorrect
Hint
- Dashboard API: a RESTful service for device provisioning, management, and monitoring
- Location Streaming API: an HTTP POST method providing Wi-Fi and Bluetooth client location information
- Webhook API: a real-time notification system for network alerts, covering events and network health
- External Captive Portal (EXCAP) API: an API that enables an organization to build out custom engagement models at Wi-Fi access points
- MV Sense API: a combination of REST APIs and realtime MQTT stream supporting oversight of a physical space
-
Question 84 of 99
84. Question
1 pointsWhat two components form the Python-based network device test and validation solution of pyATS?Correct
Incorrect
Hint
PyATS uses Python for low-level code, but relies on Genie, a higher-level library system, in order to interact with network devices and perform testing. -
Question 85 of 99
85. Question
1 pointsMatch the Cisco NSO component to the description.Correct
Incorrect
Hint
- Service Manager: maintains device dependencies and provideds a service self start for triggering diagnostic tests
- Device Manager: deploys configuration changes to multiple devices through the use of distributed transactions
- Configuration Database: provides an internal API for locating network element configurations and automatic support for upgrade and downgrade of configuration data
-
Question 86 of 99
86. Question
1 pointsWhat are two symptoms that DNS is an issue when developing and testing network scripts? (Choose two.)Correct
Incorrect
Hint
Name resolution issues often manifest as lost network connectivity and authentication failures between a network app and a remote server. Common problems include defining the correct DNS server, a missing or incorrect DNS entry, an incorrect hostname, or a configuration issue on the DNS server being used. -
Question 87 of 99
87. Question
1 pointsRefer to the exhibit. A company uses three servers to support a new network app. The network administrator is looking to include a load balancer as part of the network design to improve the performance of the application response. Where should the load balancer be installed?Correct
Incorrect
Hint
Because server load balancing distributes server requests across multiple servers, the load balancer should be attached to the same switch that the servers are on. -
Question 88 of 99
88. Question
1 pointsWhat are two functions of MAC addresses in a LAN? (Choose two.)Correct
Incorrect
Hint
What are two functions of MAC addresses in a LAN? (Choose two.) -
Question 89 of 99
89. Question
1 pointsWhat is a benefit to an organization of implementing edge computing?Correct
Incorrect
Hint
The term edge computing refers to the practice of placing computing resources as close to the actual sources of data as possible. Deploying computer resources at the edge, can help to avoid high levels of data transfer across the network for performance or security purposes. -
Question 90 of 99
90. Question
1 pointsRefer to the exhibit. A student is learning network automation by using an API. The student constructs a Python file to communicate with a Webex Teams server. Which two statements describe characteristics of the script? (Choose two.)Correct
Incorrect
-
Question 91 of 99
91. Question
1 pointsWhich situation illustrates the use of a webhook applicationCorrect
Incorrect
Hint
A webhook is an HTTP callback, or an HTTP POST, to a specified URL that notifies a registered application when an activity or event has occurred in one of the resources on the platform. Webhooks enable applications to get real-time data. With webhooks, applications are more efficient because they no longer need to have a polling mechanism. -
Question 92 of 99
92. Question
1 pointsRefer to the exhibit. A user is working on Ansible on the local NMS to manage remote network devices. Which file is the user creating?Correct
Incorrect
Hint
Ansible uses an inventory file called hosts that contains device information used by Ansible playbooks. The hosts file begins with an alias for the remote. After the alias, the hosts file specifies three variables that will be used by the Ansible playbook to access the device. These are the SSH credentials Ansible needs to securely access the remote host. -
Question 93 of 99
93. Question
1 pointsRefer to the exhibit. A student is learning Python in the interpret mode. The student enters Python statements and after a while, an error message returns. What is a possible cause for the error?Correct
Incorrect
Hint
The error message indicates that the connection to the host cannot be established. The causes could be an internet connection issue, or the domain name of the host cannot be resolved by DNS servers because it is wrong. -
Question 94 of 99
94. Question
1 pointsThe development team in the IT department has decided to implement CI/CD. What are three characteristics of this strategy? (Choose three.)Correct
Incorrect
Hint
Continuous Integration/Continuous Deployment (CI/CD) is a philosophy for software development that includes automation as part of the process. Continuous integration attempts to eliminate the problem of conflicts that occur when new or updated code is applied to the main application. Even though there is a potential of a bad build being deployed to the users, companies can limit that impact by using a deployment strategy such as a rolling upgrade, canary pipeline, or blue-green deployment. -
Question 95 of 99
95. Question
1 pointsWhat are two benefits of model-driven programmability in infrastructure automation? (Choose two.)Correct
Incorrect
Hint
In summary, model-driven programmability does the following:- Provides configuration language that is human-readable
- Is model-based, structured, and computer-friendly
- Includes support for multiple model types, including native, OpenConfig, and IETF
- Uses a specification that is decoupled from transport, protocol end encoding
- Uses model-driven APIs for abstraction and simplification
- Leverages open-source and enjoys wide support
-
Question 96 of 99
96. Question
1 pointsHow does Cisco VIRL benefit the testing and development of code and automation?Correct
Incorrect
Hint
Cisco VIRL is used to build network simulations and it can duplicate the same code that runs inside actual Cisco products. The native configuration format is called a.virl file, which is a human-readable YAML file. -
Question 97 of 99
97. Question
1 pointsRefer to the exhibit. Which portion of the RESTful request specifies the API that is being requested.Correct
Incorrect
-
Question 98 of 99
98. Question
1 pointsA user sends a request to add a loopback interface on a Cisco router through the REST API. Which response status code will the user expect to receive that indicates the request is fulfilled?Correct
Incorrect
Hint
With REST APIs, the response code 201 is with the status message of “Created”. It indicates that the request was fulfilled, and the requested resource was created. -
Question 99 of 99
99. Question
1 pointsWhich two components of XML code are contained within the XML prologue? (Choose two.)Correct
Incorrect
Hint
The XML prologue is placed as the first line in an XML file and contains the tag name xml and attributes that provide the version and the character encoding.