IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: DevNetA network security administrator is evaluating products that automate threat containment through APIs when a threat is detected. Which Cisco product with the desired capability provides a rule-based engine for enabling policy-based network access to users and devices?IT Administrator asked 3 years ago • DevNetA network administrator is developing an application to control a Webex device through xAPI. Which three protocols can be used to access xAPI? (Choose three.)IT Administrator asked 3 years ago • DevNetWhat platforms are provided by DevNet for community members to share solutions, tool kits, and other resources with each other?ITExamAnswers asked 3 years ago • DevNetRefer to the exhibit. Match the Python code components to the function. (Not all options are used.)ITExamAnswers asked 3 years ago • DevNetA student is learning REST API application. The student constructs an URI to query the MapQuest API for a route from New York, NY to Boston, MA. What is the valid URI format?ITExamAnswers asked 3 years ago • DevNetA software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Agile method. What is a characteristic of this method?ITExamAnswers asked 3 years ago • DevNetA network engineer needs to review the status of all network interfaces of a server running a Linux operating system. The engineer enters the command ifconfig -a . What is the result of this command?IT Administrator asked 3 years ago • DevNetWhich solution improves web response time by deploying multiple web servers and DNS servers?ITExamAnswers asked 3 years ago • DevNet, IoT Big Data & AnalyticsMatch the purpose with its DHCP message type. (Not all options are used.)ITExamAnswers asked 4 years ago • CCNA, DevNetRefer to the exhibit. Which data format is used to describe the list of interfaces?ITExamAnswers asked 3 years ago • CCNP, DevNetWhich protocol automates assignment of IP addresses on a network, and which port number does it use? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, DevNetWhich statement describes the term orchestration in IT automation?ITExamAnswers asked 3 years ago • DevNetWhich string of characters is used to identify the beginning of a new separate document when multiple documents are in a single YAML file?ITExamAnswers asked 3 years ago • DevNetA network engineer is creating a Docker container using the docker build command. If the engineer does not specify a tag, which tag will be used by default?ITExamAnswers asked 3 years ago • DevNetIn which situation would a company implement a reverse proxy as a security solution?ITExamAnswers asked 3 years ago • DevNet