8.3.6 Lab – Use NETCONF to Access an IOS XE Device (Answers) Objectives Part 1: Build the Network and Verify Connectivity Part 2: Use a NETCONF Session to Gather Information Part 3: Use ncclient to Connect to NETCONF Part 4: Use ncclient to Retrieve the Configuration Part 5: …
8.3.5 Lab – Explore YANG Models (Answers) Objectives Part 1: Launch the DEVASC VM Part 2: Explore a YANG Model on GitHub Part 3: Explore a YANG Model Using pyang Background / Scenario YANG models define the exact structure, data types, syntax and validation rules for the content …
7.6.3 Lab – Automated Testing Using pyATS and Genie (Answers) Objectives Part 1: Launch the DEVASC VM Part 2: Create a Python Virtual Environment Part 3: Use the pyATS Testing Library Part 4: Use Genie to Parse IOS Command Output Part 5: Use Genie to Compare Configurations Part …
7.4.8 Lab – Use Ansible to Automate Installing a Web Server (Answers) Objectives Part 1: Launch the DEVASC VM Part 2: Configure Ansible Part 3 Verify Communications with the Local Webserver Part 4: Create Ansible Playbooks to Automate Webserver Installation Part 5: Add Options to Your Ansible Playbook …
7.4.7 Lab – Use Ansible to Back Up and Configure a Device (Answers) Objectives Part 1: Launch the DEVASC VM and CSR1000v VM Part 2: Configure Ansible Part 3: Use Ansible to Back up a Configuration Part 4: Use Ansible to Configure a Device Background / Scenario In …
7.0.3 Lab – Install the CSR1000v VM (Answers) Objectives Part 1: Install the CSR1000v VM on VirtualBox Part 2: Verify Communications to CSR1000v VM Background / Scenario In this lab, you will install the CSR1000v Cloud Services Router. This is a Cisco software virtual router deployed on a …
6.5.10 Lab – Explore the Evolution of Password Methods (Answers) Objectives Part 1: Launch the DEVASC VM Part 2: Explore Python Code Storing Passwords in Plain Text Part 3: Explore Python Code Storing Passwords Using a Hash Background / Scenario In this lab, you will create an application …
1. Which two statements describe characteristics of the command line interface (CLI)? (Choose two.) Commands can be scripted. The interface protects against misconigurations. Commands cannot be encrypted. Commands are well known and documented. The command-line interface supports a small number of commands. 2. What is a characteristic of …
6.3.6 Lab – Build a CI-CD Pipeline Using Jenkins (Answers) Objectives Part 1: Launch the DEVASC VM Part 2: Commit the Sample App to Git Part 3: Modify the Sample App and Push Changes to Git Part 4: Download and Run the Jenkins Docker Image Part 5: Configure …