GOALS
Which way should be used to safely the API keys? A. In an environment variable unique to the system database - prolly B. Encrypted in a configuration file that is separate from the code C. Encrypted in the code in a function D. Plain text in the code as a constant
Encrypted in a configuration file that is separate from the code
Which device is a system that monitors and controls incoming and outgoing network traffic based on predetermined security rules? A. Switch B. Router C. Firewall D. Load balancer
Firewall
Which statement describes the benefit of using functions in programming? A. Functions allow problems to be split into simpler, smaller groups, and reduce code repetition, which makes the code easier to read. B. Functions ensure that a developer understands the inner logic contained before using them as part of a script or application. C. Functions create the implementation of secret and encrypted algorithms. D. Functions store mutable values within a script 01 application.
Functions allow problems to be split into simpler, smaller groups, and reduce code repetition, which makes the code easier to read.
Which type of HTTP method is used by the Meraki nad webex teams APIs to send webhook notifications? A. HTTP GET B. HTTP PUT C. HTTP HEAD D. HTTP POST
HTTP POST
Which two concepts describe test-driven development? (Choose two.) A. It enables code refactoring. B. Write a test before writing code. C. Implementation is driven by incremental testing of release candidates. D. User acceptance testers development the test requirements. E. Tests are created when code is ready for release.
It enables code refactoring. Write a test before writing code.
Which description of a default gateway if true? A. It is a device that receives IP packets that have no explicit next-hop in the routing table. B. It is a feature that translates between public and private addresses. C. It is a security feature that denies certain traffic. D. It is a device that receives Layer 2 frames with an unknown destination address.
It is a device that receives IP packets that have no explicit next-hop in the routing table.
Which is an advantage of using network programmability? A. It removes CLI access for devices. B. It provides for more scalable and replicable network provisioning. C. Manual configuration is faster. D. No cloud abstraction occurs.
It provides for more scalable and replicable network provisioning.
What is the benefit of edge computing? A. It reduces network latency by moving processing closer to the data source. B. It simplifies security as devices and processing are brought closer together C. It removes the need for centralized data processing. D. It reduces data velocity from devices or other data sources.
It reduces network latency by moving processing closer to the data source./
What are two advantages of version control software? (Choose two.) A. It supports tracking and comparison of changes in binary formate files. B. It allows old versions of packaged applications to be hosted on the Internet C. It provides wiki collaboration software for documentation. D. It supports comparisons between revisions of source code files. E. It allows new team members to access the current code and history.
It supports comparisons between revisions of source code files. It allows new team members to access the current code and history.
Which two encoding formats do YANG interfaces support? A. JSON B. XML C. XHTML D. Plain text E. BER
JSON XML
Which two statements about JSON and XML are true? (Choose two.) A. JSON objects arc collection of key value paire. B. The syntax of JSON contains tags, elements, and attributes. C. JSON arrays are an unordered set of key value pairs. D. The syntax of XML contains tags, elements, and attributes. E. XML objects are collections of key-value pairs.
JSON objects arc collection of key value paire. The syntax of XML contains tags, elements, and attributes.
Which CI/CD tool is an automation tool used to build, test, and deploy software? A. Nagios B. Gradle C. Jenkins D. Git
Jenkins
Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.) A. Processor B. Codec C. Listener D. Receiver E. Transaction monitor
Listener Receiver
An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device mut be at fault? A. Laptop on which the script is running B. Router C. Switch D. Load balancer
Load balancer
What is an example of a network interface hardware address? A. domain name B. IP address C. workstation name D. MAC address
MAC address
What is used in Layer 2 switches to direct packet transmission to the intended recipient? A. spanning tree B. IPv4 address C. IPv6 address D. MAC address
MAC address
Which two items are Cisco DevNet resources? (Choose two.) A. TAC support B. Bitbucket C. Sandbox D. Software research E. API Documentation
Sandbox API Documentation
Which two types of NAT are used in a network? (Choose two.) A. Static NAT B. Normal NAT C. Multicast NAT D. Dynamic NAT E. Router NAT
Static NAT Dynamic NAT
A developer is writing an application that a REST API and the application requires a valid from the API which element of the response is used in the conditional check? A. URL B. Status code C. Link D. Body E. Headers
Status code
A small company has 5 servers and 50 clients. What are two reasons an engineer should split this network into separate client and server subnets? (Choose two.) check A. Subnets will split domains to limit failures. B. A router will limit the traffic types between the clients and servers. C. Subnets provide more IP address space for clients and servers. D. A router will bridge the traffic between clients and servers. E. Internet access to the servers will be denied on the router.
Subnets will split domains to limit failures. Internet access to the servers will be denied on the router.
A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without error and the bundles are produced. However, when the script is run during business hours, report poor voice quality of phones calls. What explains this behavior? A. The application is running in the Voice VLAN and causes delays and jitter in the subnet. B. The speed and duplex settings in Cisco DNA Center are sot incorrectly, which causes the transfer to be too slow. C. 9 The script is written in a low-level programming language where there is no memory safety. This causes a buffer overflow and disruption on the network. D. Generating the logs causes the CPU on the network controller to spike, which causes delays m forwarding the voice IP packets.
The application is running in the Voice VLAN and causes delays and jitter in the subnet.
A 401 HTTP response code is returned when calling a REST API. What is the error state identified by this response code? A. The server cannot process the request as it has detected an issue in the request syntax or body. B. The server accepted the request but the client is not authorized for this content. C. The request has not been accepted because it requires authentication. D. The server cannot find the requested resource because the path specified is incorrect.
The request has not been accepted because it requires authentication.
Package updates from a local server fail to download. However, the same updates work when a much slower external repository is used. Way are local updates failing? A. The update utility is trying to use a proxy to access the internal resource. B. The Internet connection is too slow. C. The Internet is down at the moment, which causes the local server to not be able to respond. D. The server is running out of disk space.
The update utility is trying to use a proxy to access the internal resource.
A developer is reviewing a code that was written by a colleague. It runs fine, but there are many lines of code to do a seemingly simple task repeatedly. Which action organizes the code? A. Refactor the code by removing any unnecessary tests B. Using functions, rewrite any pieces of code that are repeated C. Reverse engineer and rewrite the code logic D. Modify the code to use loops
Using functions, rewrite any pieces of code that are repeated
How does requesting a synchronous API operation differ from requesting an asynchronous API operation? A. clients poll for the status of the execution of operations B. clients subscribe to a webhook for operation results C. clients can access the results immediately D. clients receive responses with a task id for further processing
clients can access the results immediately
What operation is performed with YANG model-driven programmability in NX-OS? A. configure a device with native and OpenConfig-based models B. send CLI commands to a device and retrieve output in JSON format C. run Linux commands natively on the device D. bootstrap a device that has a factory-default configuration
configure a device with native and OpenConfig-based models
On which network plane is routing protocol traffic handled? A. data plane B. management plane C. authentication plane D. control plane
control plane
Which principle is a value from the manifesto for Agile software development? A. adhering to a plan over responding to requirements B. detailed documentation over working software C. processes and tools over teams and inter actions D. customer collaboration over contract negotiation
customer collaboration over contract negotiation
When using the Bash shell, how it the output of the devnet command saved to a tile named "output.txt"? A. devnet & output.txt B. devnet > output.txt C. devnet < output.txt D. devnet I output.txt
devnet > output.txt
What is the purpose of a firewall in application deployment? A. adds TLS support to an application that does not support it natively B. forwards traffic to a pool of instances of the application C. provides translation for an application's hostname to its IP address D. limits traffic to only ports required by the application
limits traffic to only ports required by the application
An application calls a REST API and expects a result set of more than 550 records, but each time the call is made, only 25 are returned. Which feature limits the amount of data that is returned by the API? A. pagination B. payload limit C. rate limiting D. service timeouts
rate limiting
What are two benefit of managing network configuration via APIs? (Choose two.) A. configuration on devices becomes less complex B. more security due to locking out manual device configuration C. increased scalability and consistency of network changes D. eliminates the need of legacy management protocols like SNMP E. reduction in network changes performed manually
reduction in network changes performed manually increased scalability and consistency of network changes
Which task is performed because the test-driven development approach is being used? A. testing existing software before developing new code B. refactoring code that is covered by existing tests C. writing code without committing any coding violations D. creating test scenarios based on continuous development
refactoring code that is covered by existing tests
In python, which expression checks whether the script returns a success status code when the Requests library is used? A. response.status_code== requests.ok B. response.status_code== requests.codes.ok C. response.code== requests.codes.ok D. response.status_code ! == requests.codes.ok
response.status_code== requests.codes.ok
Which device is used to transport traffic from one broadcast domain to another broadcast domain? A. load balancer B. layer 2 switch C. router D. proxy server
router
What are two advantages of the Model-view-controller software design pattern? (Choose two.) A. simplifies network automation B. allows for multiple views of the same model C. makes code easier to deploy using Cl/CD pipelines D. reduces need for error handling E. separates responsibilities of the code, which makes future modifications easier
separates responsibilities of the code, which makes future modifications easier allows for multiple views of the same model
Which REST architectural constraint indicates that no client context should be stored on the server between requests? A. stateless B. uniform interface C. cacheable D. client-server
stateless
What should a CI/CD pipeline aim to achieve? A. to allow manual testing before deployment B. to require minimal manual interaction C. to support new deployments on a fixed monthly schedule D. to provide a documented process for feedback
to require minimal manual interaction
Which platform is run directly using a hypervisor? A. bare metal systems B. containers C. virtual machines D. applications
virtual machines
Which two use cases are supported by Meraki APIs? (Choose two.) one more A. Retrieve live streams from a Meraki Camera. B. Build a custom Captive Portal for Mobile Apps. C. Configure network devices via the Dashboard API. D. Build location-aware apps from Wi-Fi and LoRaWAN devices. E. Deploy applications onto the devices.
Build a custom Captive Portal for Mobile Apps. Configure network devices via the Dashboard API.
Which action does the Git command git merge allow the development to perform? A. Combine multiple sequence of commits into one unified history. B. Push changes to the remote repository C. Switch between branches D. Create, list, rename, and delete branches
Combine multiple sequence of commits into one unified history.
What is the outcome of executing this command? git clone ssh://[email protected]/path/to/my-project_git A. Creates a local copy of a repository called "my project" B. Creates a copy of a branch called "my project" C. Initiates a new Git repository called "my project" D. Creates a new branch called "my project"
Creates a local copy of a repository called "my project"
Which service provides a directory lookup for IP addresses and host names? A. DNS B. DHCP C. SNMP D. NAT
DNS
Which detail is included in a routing table? A. IP protocol B. Broadcast address C. TCP or UDP port number D. Destination next hop or outgoing interface
Destination next hop or outgoing interface
Which Cisco DevNet resource allows access to products in a development lab to explore, learn, and build application that use Cisco APLs? A. DevNet communities B. DevNet code Exchange C. DevNet Automation Exchange D. DevNet sandbox
DevNet sandbox
Which status code is used by a REST API to indicate that the submitted payload is incorrect? A. 400 B. 403 C. 405 D. 429
400
On which port does NETCONF operate by default? A. 23 B. 443 C. 822 D. 830
830
Which two NETCONF operations cover the RESTCONF GET operation? (Choose two.) A. <get> B. <edit> C. <get-update> D. <modify-config> E. <get-config>
<get> <get-config>
Which line is an example of the start of a chunk from a unified diff? A. @@ -90,88 +20191008T1349@@ B. @@ -20191007T1200 +88,90 @@ C. @@ -20191007T1200 +20191008T1349@@ D. @@ -88,10 +88,6 @@
@@ -88,10 +88,6 @@
Which two statements describe the traits of an asynchronous API call? (Choose two.) A. The order in which API calls return can be guaranteed B. A call to an API does not block the code, but rather it allows application processing to continue C. The end user can experience latency or performance lag while waiting for the API call to return D. Code execution blocks or waits for the call to an API to return. E. A callback function typically is used to process the response from an API call
A call to an API does not block the code, but rather it allows application processing to continue A callback function typically is used to process the response from an API call
Users cannot access a webserver and after the traffic is captured. the capture tool shows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue? A. A router along the path is misrouting the packets in a wrong direction. B. A router along the path has the wrong time. C. The server is too far away and the packets require too much time to reach it D. The server is too loaded and the connection could not be handled in time
A router along the path is misrouting the packets in a wrong direction.
Which two statements describe the advantages of using a version control system? (Choose two.) A. It allows for branching and merging so that different tasks are worked on in isolation before they are merged into a feature or master branch. B. It allows multiple engineers to work against the same code and configuration files and manage differences and conflicts. C. It provides tooling to automate application builds and infrastructure provisioning. D. It allows developers to write effective unit tests. E. It provides a system to track User Stories and allocate to backlogs.
A. It allows for branching and merging so that different tasks are worked on in isolation before they are merged into a feature or master branch. 2 B. It allows multiple engineers to work against the same code and configuration files and manage differences and conflicts.
Users cannot access a webserver and after the traffic is captured, the capture too* shows an ICMP packet that reports "communication administratively prohibited" What Is the cause of this webserver access Issue? A. An access list along the path is blocking the traffic B. The traffic is not allowed to be translated with NAT and dropped. C. Users must authenticate on the webserver to access It D. A router along the path is overloaded and thus dropping traffic
An access list along the path is blocking the traffic
Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.) A. An artifact repository allows to compare and merge changes in the source code of files involved in a build process. B. An artifact repository is needed only for CI/CD pipeline executed on a public cloud infrastructure. C. An artifact repository provides traceability, search, and management of binary files. D. An artifact repository is needed only for managing open source software. E. An artifact repository stores files needed and generated during the build process.
An artifact repository stores files needed and generated during the build process. An artifact repository provides traceability, search, and management of binary files.
Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose two.) A. Cisco Intersight API interactions can be encoded in XML or JSON and require an APIs key in the HTTP header for authentication. B. USC Director API interactions can be XML- or JSON-encoded and require an APLs key in the HTTP header for authentication. C. UCS manager API interactions are XML-encoded and require a cookie in the method for authentication. D. Cisco Intersight uses XML to encoded API interactions and requires an API key pair for authentication. E. UCS manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the HTTP header for authentication.
B. USC Director API interactions can be XML- or JSON-encoded and require an APLs key in the HTTP header for authentication. C. UCS manager API interactions are XML-encoded and require a cookie in the method for authentication
Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true? A. OAuth must be used. B. A token must be retrieved and the associated string must be embedded in the X-Auth-Token header. C. Basic authentication must be used. D. No authentication is required.
Basic authentication must be used.
What are two characteristics of Bare Metal environments that are related to application deployment? (Choose two.) check not sure A. Provide the hypervisor to host virtual servers B. Specifically designed for container-based workloads. C. Provides workloads with access to hardware features D. Suitable for legacy application that do not support virtualization E. Not compatible with other cloud services such as PaaS or SaaS offerings.
C. Provides workloads with access to hardware features D. Suitable for legacy application that do not support virtualization
In DNS, which record specifies an alias that refers to another name that ultimately resolves to an IP address? A. AAA B. SOA C. NS D. CNAME
CNAME
Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve statement using RESTCONF on a CSR 1000V? A. Change the HTTP method to PUT. B. Change the transport protocol to HTTPS. C. Check the MIMF types in the HTTP headers. D. Check the authentication credentials.
Check the authentication credentials.
Which platform has an API that be used to obtain a list of vulnerable software on user devices? A. Cisco Umbrella B. Cisco Firepower C. Cisco Identity Services Engine D. Cisco Advanced Malware Protection
Cisco Advanced Malware Protection
Which product provides network controller-level management features? A. Cisco DNA Center B. Cisco NX-OS C. Cisco UCS Manager D. Cisco ISE
Cisco DNA Center
Which API is used to obtain data voicemail ports? A. Finesse gadgets B. Cisco Unified Communications manager C. Webex devices D. Webex teams
Cisco Unified Communications manager
Which type of threat occur when an attacker can send hostile data to an interpreter within an application? A. Cross-site scripting B. Sensitive data exposure C. Broken authentication D. Injection
Injection
Which mechanism is used to consume a RESTful API design when large amounts of data are returned? A. Data sets B. Scrolling C. Blobs D. Pagination
Pagination
What is the purpose of the Cisco VIRL software tool? A. To verify configurations against compliance standards B. To simulate and model networks C. To automate API workflows D. To test performance of an application
To simulate and model networks
What is the purpose of a MAC address? A. To uniquely identify a router in a LAN B. To uniquely identify a network interface in a LAN C. To uniquely identify a device on the internet D. To uniquely identify a switch in a LAN
To uniquely identify a network interface in a LAN
What is the first development task in test-driven development? A. Write code that implements a desired function. B. Write a failing test case for a desired function. C. Write a passing test case for existing code. D. Reverse engineer the code for a desired function.
Write a failing test case for a desired function.
When a Cisco IOS XE networking device is configured using RESTCONF, what is the default data encoding method? A. XML B. x-form-encoding C. YANG D. YAML
XML
Which two elements are foundational principles of DevOps? (Choose two.) A. designing applications as microservices B. encouraging containers for the deployment of applications C. organizing cross-functional teams over organizational silos D. optimizing the cost of infrastructures E. automating over documenting
automating over documenting organizing cross-functional teams over organizational silos
What are two security benefits of a Docker-based application? A. easier to patch because Docker containers include only dependencies that the application requires B. prevents information leakage that can occur when unhandled exceptions are returned in HTTP responses C. allows for separation of application that traditionally run in the same host D. natively secures access to secrets that are used by the running application E. guarantees container images are secured and free of vulnerabilities
easier to patch because Docker containers include only dependencies that the application requires allows for separation of application that traditionally run in the same host
What is an advantage of a version control system? A. forces the practice of trunk-based development B. prevents over-writing code or configuration files C. facilitates resolving conflicts when merging code D. ensures that unit tests are written
facilitates resolving conflicts when merging code
Which model-driven programmability protocol does Cisco IOS XE Software support? A. CORBA B. SSH C. gNMI D. SOAP
gNMI
What is the Git command to delete a local branch named "experiment" without a warning? A. git branch -n experiment B. git branch -rm experiment C. git branch -f experiment D. git branch -D experiment
git branch -D experiment
How is a branch called "my-bug-fix" started to develop a fix needed in a product? A. git branch -b my-bug-fix B. git checkout -b my-bug-fix C. git checkout my-bug-fix D. git branch my-bug-fix
git checkout -b my-bug-fix
Before which process is code review performed when version control is used? A. committing code B. branching code C. merge of code D. checkout of code
merge of code
What are two advantages of YANG-based approaches for infrastructure automation? (Choose two.) A. directly maps to JavaScript B. multi-platform vendor abstraction C. designed to reflect networking concepts D. compiles to executables that run on network devices E. command line driven interface
multi-platform vendor abstraction designed to reflect networking concepts