NPDESI-Cisco
Which of the following are examples of on-box automation and scripting mechanisms? (Choose two.) DevOps Tools Tool Command Language (TCL) RESTCONF Python
/sections/1/pages/4> B,D
Network automation is used for which common tasks. (Choose two.) Device Provisioning Accounting Data Entry Reporting
/sections/1/pages/5> A,D
Cisco platforms use which of the following APIs to provide network operators off-box programmability? (Choose two.) Tool Command Language (TCL) NETCONF/RESTCONF Python NX-API
/sections/1/pages/6> B,D
Which two statements are correct concerning Nexus APIs? (Choose two.) NX-OS provides a built-in webserver to respond to HTTP GET calls. NX-OS provides a built-in webserver to respond to HTML POST calls. Supported APIs include NETCONF, NX-API CLI, NX-API REST, and XMPP. Supported APIs include NETCONF, IOS-API CLI, IOS-API REST, and HTML.
/sections/10/pages/2> A,C
Which command will allow you to print the working directory? ls pwd grep print
/sections/2/assessments/1/questions/1> B
Which tool is used to navigate the ACI managed objects in real-time? ARYA ACI Toolkit Postman Visore
/sections/19/assessments/1/questions/3> D
Which of the following are two ACI class objects? (Choose two.) fvTenant vzFilter vzBD fvNet
/sections/19/assessments/1/questions/4> A,B
Which tool is an online based service for validating YANG modules? Pyang Ydk-gen Ydk-py Yang Validator
/sections/15/assessments/1/questions/1> D
Which library can be used to make configuration changes on device? Ydk-py Ydk-gen Ydk-yang Ydk-pyang
/sections/15/assessments/1/questions/2> A
Which tool can be used to visually browse YANG models? Yang Validator Ydk-py Yang Explorer Yang Sandbox
/sections/15/assessments/1/questions/3> C
Which library can be used to create your own Python bindings given a custom YANG module? Ydk-gen Ydk-py Ydk-yang Ydk-pyang
/sections/15/assessments/1/questions/4> A
Which three components make up ydk-py? (Choose three.) Models Nodes Services Providers
/sections/15/assessments/1/questions/5> A,C,D
Which two output methods are supported by pyang? (Choose two.) Tree JSON XML Array
/sections/15/assessments/1/questions/6> A,C
Which two statements are correct regarding YANG Explorer? (Choose two.) It is a web tool that allows you to browse models Command line tool to visually view models You cannot make APIs from YANG Explorer You can make API calls directly from YANG Explorer
/sections/15/assessments/1/questions/7> A,D
Content Review Question Which of the following two statements is correct regarding the YANG Explorer? (Choose two.) Yang Explorer is a web-based tool that allows you to view YANG models in a graphical web interface. Yang Explorer is an application that allows you to create YANG models in an off-line Linux-based interface. Yang Explorer is also open source and available from http://www.yangexp.com. Yang Explorer is also open source and available on?GitHub
/sections/15/pages/10> A,D
Which of the following two statements are correct concerning YANG Validator? (Choose two.) The YANG Validator is similar to common validators you will find online that validate JSON and XML objects. The YANG Validator is similar to common validators you will find online that validate RESTCONF and NETCONF objects. You can upload one or more YANG models to verify them together (but only if the modules do not use includes and imports). You can upload one or more YANG models to verify them together (if the modules use includes and imports).
/sections/15/pages/2> A,D
Content Review Question Which of the following three formats are supported by Pyang? (Choose three.) hypertree dsdl hyperds tree yangtree
/sections/15/pages/4> A,B,D
What are two aspects of client-side validation? (Choose two.) YDK service will automatically perform local validation. Semantic check (key uniqueness/presence, mandatory leafs, and so on). Remote static check (enum, string, range, pattern,and so on). YDK service will automatically perform remote off-line validation.
/sections/15/pages/7> A,B
Models group Python APIs. How are these models generated? They are manually generated using?ydk-gen. They are auto-generated using?ydk-gen. They are auto-generated using?ydk-py. They are manually generated using?ydk-py. Submit
/sections/15/pages/8> B
What are two benefits of controller-based networking? (Choose two.) Centralized Policy Management Unified API OpenFlow Networking Single place to issue CLI commands
/sections/16/assessments/1/questions/1> A,B
Which are two limitations of OpenFlow? (Choose two.) It's difficult to program using OpenFlow Hardware and table sizes It does not support CLI commands Scalability
/sections/16/assessments/1/questions/2> B,D
Choose the three deployment models of an OpenFlow enabled network. (Choose three.) Proactive Reactive Hybrid Distributed Logically Centralized
/sections/16/assessments/1/questions/3> A,B,C
Which two protocols are used as both northbound and southbound protocols? (Choose two.) SNMP RESTCONF SSH NETCONF
/sections/16/assessments/1/questions/4> B,D
Which four protocols are commonly used as southbound protocols? (Choose four.) SSH SNMP OSPF BGP NETCONF
/sections/16/assessments/1/questions/5> A,B,D,E
Which organization manages the development of the OpenFlow protocol? IEEE Open Networking Foundation (ONF) CCITT IETF
/sections/16/assessments/1/questions/6> B
What are two common uses cases for using controllers? (Choose two.) Improved Telemetry NETCONF SNMP Monitoring Traffic Engineering
/sections/16/assessments/1/questions/7> A,D
Which of the following two features can be defined as characteristics of controller-based networking use cases? (Choose two.) Centralized Policy High Availability Load Sharing Improved Telemetry
/sections/16/pages/2> A,D
Which of the following correctly defines the three main components in an OpenFlow architecture? (Choose three.) OpenFlow Analytics OpenFlow Protocol OpenFlow Network Device OpenFlow Controller OperFlow GitHub
/sections/16/pages/3> B,C,D
Which deployment model provides vertical partitioning by assigning certain resources in the switch or router to be controlled by the OpenFlow controller? Reactive Mode—Integrated Proactive Mode—Ships-in-the-Night Hybrid OpenFlow—Integrated Hybrid OpenFlow—Ships-in-the-Night Proactive Mode—Integrated
/sections/16/pages/4> D
OpenDaylight project embraces which of the following three core principles? (Choose three.) Security Code Design Acceptance Community
/sections/17/pages/2> B,D,E
hich of the following three options are identified as being a part of the OpenDaylight Controller Architecture? (Choose three.) Device Plugin Core Network Applications Transport
/sections/17/pages/3> A,B,D
Which of the following use cases does ODL address? Network Resources Optimization Cloud and Network Function Visualization Automated Service Delivery Visibility and Control All the above
/sections/17/pages/4> E
What type of policy capabilities does APIC-EM provide? intent-based user-based traffic-based congestion-based
/sections/18/assessments/1/questions/1> A
What does northbound communication from APIC-EM rely on? SNMP CLI REST APIs CDP
/sections/18/assessments/1/questions/2> C
What service infrastructure forms the basis for the APIC-EM system? Grapevine APIC-EM Inventory Manager Network Information Database None of the above.
/sections/18/assessments/1/questions/3> A
What two mechanisms does the APIC-EM network discovery use to find devices on the network? (Choose two.) CDP ping RESTCONF HTTPS
/sections/18/assessments/1/questions/4> A,B
Which of the following are four built-in APIC-EM applications? (choose four.) IWAN Plug-and-Play TracerRT Path Trace EasyQoS CVP AutoQoS
/sections/18/assessments/1/questions/5> A,B,D,E
Which Chrome application interacts with APIC-EM in order to utilize REST APIs? IWAN Postman Network Plug and Play Python 3
/sections/18/assessments/1/questions/6> B
What are the two primary network types APIC-EM is meant for? (Choose two.) Data Center Enterprise Campus WAN Service Provider Backbone
/sections/18/assessments/1/questions/7> B,C
Which of the following is not a feature and benefit of APIC-EM? Network Information Database Private Key Encryption service Network Topology Visualization Cisco Intelligent WAN Application
/sections/18/pages/2> B
Which of the following two statements correctly defines the APIC-EM Platform Architecture? (Choose two.) The northbound abstraction layer utilizes several protocols to speak with devices from which DNS and SNMP are supported. APIC-EM Applications use the northbound NETCONF API. APIC-EM Services are the capabilities, features, and functionalities of APIC-EM. The basis of the APIC-EM system is the Grapevine elastic services infrastructure based on a platform-as-a-service model.
/sections/18/pages/3> C,D
Which of the following roles has the similar privileges to the Administrator, but with no access to the controller settings? Administrator Assistant Observer Installer Policy Administrator Subordinate Administrator
/sections/18/pages/5> D
Which of the following options are two system components of Network Plug-and-Play? (Choose two.) PnP Agent PnP Client PnP Director Service PnP Protocol
/sections/18/pages/7> A,D
Which of the following is is a framework or set of rules for REST APIs that give structure to the description and visualization of RESTful web services? NETCONF Postman Swagger REST
/sections/18/pages/8> C
Which two statements are true about the APIC REST API? (Choose two.) It is based off YANG data models. The APIC GUI is an APIC REST API client. Anything that you can do from the GUI can be done in the API. APIC REST API uses NETCONF as transport.
/sections/19/assessments/1/questions/1> B,C
Match the ACI programmability tool to its description: Generates Python code from XML/JSON objects ARYA Lightweight Python library and a collection of applications that solve common workflows when using ACI ACI Toolkit Full blown Python SDK that works with ACI Cobra Used to browse Managed Objects Visore
/sections/19/assessments/1/questions/2>
Which of the following two statements are correct? (Choose two.) DN is a Distinguished name (unique hierarchical name of the object in the MIT tree) of the object queries. RN is a Distinguished name (unique hierarchical name of the object in the MIT tree) of the object queries. Every managed object in the system can be identified by a unique distinguished name (DN). Every managed object in the system can be identified by a unique class name
/sections/19/assessments/1/questions/5> A,C
Which two types of queries can you make using the APIC REST API? (Choose two.) Class Based RN Based DN Based Tenant Based
/sections/19/assessments/1/questions/6> A,C
What methods are supported with the APIC REST API? PUT, POST, GET, DELETE PATCH, POST, GET, DELETE POST, GET, DELETE POST GET, DELETE, REMOVE
/sections/19/assessments/1/questions/7> C
Which of the following three Python statements are required to log in to the APIC (Choose three.) session = Login(apic, username, password) session = LoginSession(apic, username, password) moDir = Directory(session) moDir = MoDirectory(session) moDir.login() Dir.login()
/sections/19/pages/10> B,D,E
Which of the following two statements are correct concerning Arya? (Choose two.) Arya offers a way to auto-generate Python code from XML or JSON objects. Arya offers a way to auto-generate Python code from HTML objects Arya is open source and available on GitHub at: https://github.com/datacenter/arya Arya is licensed source code directly from www.cisco.com. Arya also provides several flags that can be used when generating the TCL code.
/sections/19/pages/11> A,C
Which of the following options are three core components of the ACI toolkit? (Choose three.) Applications Scripts Containers Package Codes Python library (classes)
/sections/19/pages/13> A,B,E
Which statement is correct concerning the CLI? The CLI enables functions such as switching tenants, creating contexts, creating bridge domains, and creating endpoint groups. To run CLI commands from the APIC, navigate to the acitookit/login directory. CLI commands can be run from the XML or JSON interfaces remotely. Supported commands can be found on the github directory at www.cisco.com. Submit
/sections/19/pages/14> A
Which of the following two statements are correct concerning the ACI Toolkit Diagram Tool? (Choose two.) Auto-generate visual representation of bridge domain objects. Auto-generates visual representation of tenant objects. The ACI Diagram Tool is an application to connect to a Cisco ACI Application Policy Infrastructure Server using the JSON library. The ACI Diagram Tool is a simple tool to connect to a Cisco ACI Application Policy Infrastructure Controller using the acitoolkit library.
/sections/19/pages/16> B,D
Which of the following two statements are correct concerning ACI Lint? (Choose two.) ACI Lint can be run against the current running APIC configuration or a previously saved set of configuration snapshot files. ACI Lint can only be run against the current running APIC configuration. ACI Lint can only be run against a previously saved set of configuration snapshot files. ACI Lint is a static analysis tool that can be used for Configuration Analysis. ACI Lint is a static analysis tool that can be used to monitor EPG and bridge domains.
/sections/19/pages/18> A,D
Which two statements are correct regarding the cable plan? (Choose two.) Cable Plan can be used to build a cable plan NETCONF file, query a cable plan, and test a cable plan scenario. Cable Plan can be used to build a cable plan XML file, query a cable plan, and modify a cable plan. The Cable Plan application allows you to easily export existing cable plans from XML files, export the currently running cable plan from an APIC controller, and monitor existing cable plan changes. The Cable Plan application allows you to easily import existing cable plans from XML files, import the currently running cable plan from an APIC controller, export previously imported cable plans to a file, and compare cable plans.
/sections/19/pages/20> B,D
Which of the following are two valid use cases for the ACI Events to Atom Feed application? (Choose two.) Display updated tenants on an IPTV Reconfigure endpoints in a NOC Build multiple eventfeed applications Monitor EPG changes in a feed client
/sections/19/pages/21> A,D
Which of the following two statements are correct concerning Fake APIC? (Choose two.) The Fake APIC is designed for users to view Managed Objects (and their properties) based on HTML configuration files The Fake APIC is designed for users to view Managed Objects (and their properties) based on JSON configuration files The Fake APIC works as an offline-tool for users who may not have access to the APIC, but still want to see certain (or all) Managed Objects on the network. The Fake APIC works as an online-tool for users who may not have access to the APIC, but still want to see certain (or all) Managed Objects on the network.
/sections/19/pages/22> B,C
Which of the following are two valid modes of operation for the Nexus 9000? (Choose two.) ACI mode WAN mode NXOS mode of operation IOS mode of operation
/sections/19/pages/2> A,C
In the ACI Object Model, which of the following elements logically separates customers, business units, or departments to restrict visibility into the ACI fabric. VRF (L3) Tenant BD Endpoint Group
/sections/19/pages/5> B
Which of the following two statements are correct concerning APIC REST APIs? (Choose two.) Requests and responses can be made and received in only XML format. Requests and responses can be made and received in either JSON or XML formats. Before any request can be issued to the APIC, a successful login must occur. When you perform a task in the APIC GUI, the GUI creates and sends an external JSON message to the remote API server to execute the task. All requests that are issued to the APIC can be sent from the available webpage or CLI without administrative privileges.
/sections/19/pages/7> B,C
Which of the following two statements is correct concerning Postman? (Choose two.) When utilizing Postman or another application to issue individual calls to the Cisco APIC, one must first specify whether the call is a POST or GET. When utilizing Postman or another application to issue individual calls to the Cisco APIC, one must first specify whether the call is a PUSH or PATCH. Much like Visore, Postman can be used to return all properties of a specific object by using the full distinguished name. Unlike Visore, Postman cannot be used to return all properties of a specific object by using the full distinguished name.
/sections/19/pages/9> A,C
What Cisco platform can be used in the data center if ACI is not being used to simplify tenant and overlay management? NSO UCS-D VTS. WAE
/sections/20/assessments/1/questions/1> C
Which two Cisco platforms can be used together to easily model WAN services, examine a change's impact, and then deploy the change? (Choose two.) NSO VTS WAE ACI
/sections/20/assessments/1/questions/2> B&D
Which Cisco solution can be used to convert a Nexus switch into a matrix switch? LMS PRIME NDB VTS
/sections/20/assessments/1/questions/3> C
Which two features are unique to UCS Manager? (Choose two.) Service Profiles VLAN Management Service Profile Templates Service Assurance
/sections/20/assessments/1/questions/4> A&C
Which solution has the ability to use OpenFlow? VTS LMS NDB WAE
/sections/20/assessments/1/questions/5> C
Which Cisco solution uses model driven APIs based off YANG models? VTS NSO UCS Manager ACI
/sections/20/assessments/1/questions/6> B
Which solution would you use if you want to centralize monitoring tools such as IPS, packet sniffers, and real-time analytics? VTS NDB NSO WAE
/sections/20/assessments/1/questions/7> B
Which of the following can be identified as two key capabilities of the Virtual Topology System? (Choose two.) Flexible Overlays Static Overlays Security High Availability Scalable VXLAN Management Load Sharing and Capabilities Testing Submit
/sections/20/pages/2> A & D
Which of the following two statements are correct concerning the Cisco Nexus Data Broker? (Choose two.) Cisco Nexus Data Broker is an application content broker solution that includes Nexus switches and a VPN controller. Cisco Nexus Data Broker is a network packet broker solution that includes Nexus switches and an SDN controller. Cisco Nexus Data Broker data broker lets you interconnect the Cisco Nexus switches to build a scalable TAP and SPAN aggregation infrastructure. Cisco Nexus Data Broker data broker lets you interconnect the Cisco Nexus switches to build a load sharing infrastructure with existing IOS switches.
/sections/20/pages/3> B&C
Network Service Orchestrator includes which of the following three features? (Choose three.) Open architecture Fail-safe Optimization Multiprotocol Analysis
/sections/20/pages/4> A, B, D
The WAN Automation Engine includes which of the following three modules? (Choose three.) NetFlow Designer Optimization and Prediction Deployer Analysis
/sections/20/pages/5>
Which of the following is not a key feature of Cisco UCS Manager? Service Profiles Management Interface Options Service Profile Templates Policy Domain Service Templates
/sections/20/pages/6> D
Which of the following two statements applies to the Cisco UCS Director? (Choose two.) Multiple-pane infrastructure management Policy Driven Infrastructure Automation and Management OpenStack Solution Multivendor Solution VMware Solution
/sections/20/pages/7> B&D
Which of the following are three examples of software development methodologies? (Choose three.) Waterfall Extreme Programming Agile Divide and Conquer
/sections/21/assessments/1/questions/1> A,B,C
What characteristics are of the Agile Software Development Process? Requires well-defined requirements upfront Use sprints Linear Development Iterates through the life of the project
/sections/21/assessments/1/questions/3> B,D
Which of the following is an advantage of Waterfall over Agile? More flexible Better documentation? Shorter process More efficient process
/sections/21/assessments/1/questions/4> B
Which of the following is an advantage of Agile over Waterfall? Obtains customer feedback and refines requirements over time Better documentation Sequential Design Approach easier to work with
/sections/21/assessments/1/questions/5> A
What is Lean philosophy? Eliminate any form of waste Every employee should follow a strict diet to improve productivity Changes should be made often A good design comes before anything
/sections/21/assessments/1/questions/6> A
What is a Sprint? A short run program in Lean 26 minute developer hackathon A short time period in which people focus on small, but meaningful development tasks The time just before a deadline, when everybody has to work harder
/sections/21/assessments/1/questions/7> C
Which of the following options are three valid development methodologies? (Choose three.) Refining Prototyping Waterfall Agile Static
/sections/21/pages/2> B,C, D
Which of the following statements are two advantages that pertain to the waterfall development process? (Choose two.) Design errors are removed or hidden before any code is written, saving time during the implementation phase. Design errors are highlighted before any code is written, saving time during the implementation phase. Since the process is flexible and unstructured, it is easy to measure progress and set milestones. Since the process is rigid and structured, it is easy to measure progress and set milestones.
/sections/21/pages/3> B,D
What are three major key points of the lean philosophy? (Choose three.) Purpose Process Function People Design Submit
/sections/21/pages/4> A,B,D
Which of the following two statements correctly defines a Scrum? (Choose two.) Scrum is a Lean project management methodology, though it is helpful to consider it more of a framework for managing configuration codes. Scrum is an Agile project management methodology, though it is helpful to consider it more of a framework for managing processes. Scrum is an Agile project design methodology, though it is helpful to consider it more of a framework for managing documentation. Scrum is an Agile software component useful for management of project des
/sections/21/pages/5> B,D
Which of the following are three key concepts of DevOps? (Choose three.) Increase collaboration between team Ensure that everyone is automating as much as possible Measuring results and keeping key metrics for as much as possible Ensure that Developers and Operators do not collaborate
/sections/22/assessments/1/questions/1> A,B,C
What does CALMS stand for? Culture, Automation, Lean, Management, Sharing Culture, Automation, Lean, Measurement, Sharing Culture, Ansible, Lean, Management, Sharing Collaboration, Automation, Lean, Measurement, Sharing
/sections/22/assessments/1/questions/2> B
What is the idea called of leveraging Chat Bots in day to day operations? SlackBot HubBot ChatOps ChatDevOps
/sections/22/assessments/1/questions/3> C
What are common types of tools used by those embracing DevOps? Source Code Management Configuration Management Collaboration tools All the above
/sections/22/assessments/1/questions/4> D
Developers: Care about delivering new features & unit tests passing. Operations: Care about stability & not being called at 3am.
/sections/22/assessments/1/questions/5>
What is a common practice by teams who have embraced DevOps? Conservative programming approach Working all night Blameless postmortems Use of IRC chat
/sections/22/assessments/1/questions/6> C
Before tools and technology are deployed to adopt DevOps practices, which three actions must occur? (Choose three.) Define and document manual processes that shall be automated Have everyone, from engineer to executive, agree, and buy-in to the concepts of CALMS Have a team-building event Ensure that the right team is in place The team concept is optional and ensures that a subject matter expert is managing the process
/sections/22/assessments/1/questions/7> A,B,D
Which of the following two statements are correct regarding development and operations? (Choose two.) Developers care about writing software. Operations traditionally do not pay as much attention to what happens after the software application goes into a production data center. Operations care about software standards and stability. The drivers and the definition of success is the same between developers and operations.
/sections/22/pages/2> A,C
Which of the following three characteristics apply to DevOps? (Choose three.) utilizing the same development and operations approach to control variables Enhanced level of communication Creates independent silos for quality production and services Requires commitment at all levels Cultural Movement
/sections/22/pages/3> B,D,E
The Periodic Table of DevOps Tools contains which of the following three categories? (Choose three.) Continuous Integration Maintenance Cloud Network Configuration and Implementation Software Change Management
/sections/22/pages/4> A,C,E
Which of the following two features is correct concerning a Version Control System? (Choose two.) It is a way to ensure sure you're running the correct OS version on your lab environment. It is a way to manage changes to a file over time. It is a way to ensure you're running the correct version of software on network devices. It is a way to manage IOS image files over time.
/sections/23/assessments/1/questions/1> B,C
When should you use a Version Control System? When code backup is needed When multiple people work on the same project History of changes to files are required All the above
/sections/23/assessments/1/questions/2> D
Which is not a Git command? git add git commit git update git push
/sections/23/assessments/1/questions/3> C
What is the command used to create and move to a new git branch? git add?<branch> git branch?<branch> git checkout?<branch> git checkout -b?<branch>
/sections/23/assessments/1/questions/4> D
Which three core components are used within a CI pipeline? (Choose three.) Version control system Build server Test suite GitHub
/sections/25/assessments/1/questions/1> A,B,C
When you create a new project, which of the following commands must be used locally on your machine in order to initialize a project to work with git? git merge git init git status git add git config
/sections/23/assessments/1/questions/5> B
What does the?git add?command do? Adds files to the staging area Adds files to a remote repo Tracks files and adds them to the staging area Tracks files
/sections/23/assessments/1/questions/6> C
Initializes an empty git repository git init Copies a remote repo git clone Configures a repo to use a remote git server git remote add Takes a local snapshot git commit Copies your local snapshot to a remote repo git push
/sections/23/assessments/1/questions/7>
Which of the following are two valid reasons for version control? (Choose two.) Create a Documentation Database Collaboration Restoring Previous Versions Configuration Change Management
/sections/23/pages/2> B,C
Which of the following three components comprise the Git Architecture? (Choose three.) Remote Repository Working Active Repository Database Access Area Staging Area Local Repository
/sections/23/pages/3> A,D,E
Which command correctly adds a remote? $ git remote add local ~/local_remote/: $ git add remote local ~/local_remote/: $ git add local ~/local_remote/: $ git remote add local dir
/sections/23/pages/4> A
Which two command are valid when working with branches? (Choose two.) git branch git include git check git merge
/sections/23/pages/5> A,D
Which of the following commands is used to create a branch from the current workspace? git checkout git clone git status git branch
/sections/23/pages/6> A,D
Which of the following commands can be used to view the differences of files in your working directory that is compared to the same file in your local repository? git change git diff git check git init
/sections/23/pages/7> B
Which of the following two characteristics apply to GitHub? (Choose two.) GitHub offers code review functionality. Offers the ability for people to contribute to projects through the Push & Pull model. GitHub is a centralized version control system that is based on Git that is a web-based hosting service. Anyone can create a free account, create public repositories, and start sharing projects.
/sections/23/pages/8> A,D
What is the final step to review and merge the pull request? There is no action that is required since the Fork operation automatically implements the pull request. Log out as contributor and have the administrator run the Merge Pull Request. Provide feedback to the contributor as part of the code review process and press the "Merge Push Request" button. Provide feedback to the contributor as part of the code review process and press the "Merge Pull Request" button.
/sections/23/pages/9> D
Which of the following options define two advantages of virtual test environments? (Choose two.) Lower cost Great for API testing Great for performance testing Requires no maintenance
/sections/24/assessments/1/questions/1> A,B
Which two hypervisor platforms can be used to test virtual appliances? (Choose two.) VirtualBox vSphere DevNet VirtualNet
/sections/24/assessments/1/questions/2> A,B
Which two Cisco platforms and solutions are meant to simplify network testing? (Choose two.) VirtualBox VIRL DevNet Sandboxes Cisco ACI
/sections/24/assessments/1/questions/3> B,C
Which of the following is a virtual network emulator? Learning Labs VirtualBox VIRL None of the above
/sections/24/assessments/1/questions/4> C
What is the smallest unit of testing when performing unit testing? Test fixture Test runner Test collector Test case
/sections/24/assessments/1/questions/5> D
Which of the following options are two common ways network testing occurs today? (Choose two.) Ping SNMP show commands DevNet
/sections/24/assessments/1/questions/6> A,C
When should you look to automate network testing? Verify network reachability Pre and post change Configuration Compliance All the above
/sections/24/assessments/1/questions/7> D
Which of the following three characteristics correctly identifies the network labs of tomorrow? (Choose three.) Single click deployment Software Centric Hardware Centric Quick speed to deploy Higher increased cost
/sections/24/pages/2> A,B,D
Which of the following statements identifies two key benefits of VIRL? (Choose two.) The latest Cisco software running on the newest Cisco physical routers and switch platforms. Cisco virtual machines running the same network operating systems as used in Cisco's physical routers and switches. Powerful SSH and Telnet access for direct network configuration control. Powerful GUI for network design and simulation control.
/sections/24/pages/3> B,D
Which of the following statements best describes DevNet? DevNet is a simple website consisting of a website, an interactive developer community, coordinated developer tools, integrated discussion forums. DevNet is a simple website, for coordinated developer tools, integrated discussion forums, and sandboxes. DevNet is much more than a simple website. DevNet is a fully integrated developer program consisting of a website, an interactive developer community, coordinated developer tools, integrated discussion forums, and sandboxes. DevNet is a licensed application for developer tools, integrated discussion forums, and sandboxes.
/sections/24/pages/4> C
Which of the following test can be used to verify the real-time state of network devices? Performance tests Reachability tests Ephemeral data tests Configuration and compliance tests
/sections/24/pages/8> C
Which of the following options are two components of a unittest framework? (Choose two.) Test fixture Test type Test site Test runner
/sections/24/pages/9> A,D
Build system that is used on-premises that you have to install and configure Jenkins Build system that is hosted and natively integrates to GitHub Travis CI
/sections/25/assessments/1/questions/2>
What of the following two features define the value of CI? (Choose two.) Ensures that tests get run quarterly Ensures that tests get run each time code is contributed Allows for rapid development of features It allows you the chance to use a CI build system Previous Page?
/sections/25/assessments/1/questions/3> B,C
What is the name of the Travis CI config file? travis.yml .travis.yml .travis-ci.yml
/sections/25/assessments/1/questions/4> B
What are two common outcomes when using CI? (Choose two.) Fewer bugs Increased testing early and often Infrequent testing Unhappy customers
/sections/25/assessments/1/questions/5> A,B
What are common tools used for build environments? Vagrant Docker Packer All the above
/sections/25/assessments/1/questions/6> D
If you need to deploy a CI pipeline that exists fully in your data center, what build server should you use? Circle CI VCS Jenkins GitHub
/sections/25/assessments/1/questions/7> C
Which of the following tools for application portability and development environments is an open source software application that creates and configures virtual development environments? VirtualBox Vagrant Packer Stacker Docker
/sections/25/pages/2> B
Which of the following two statements best describes Travis CI? (Choose two.) Travis CI is a hosted continuous integration service that makes it extremely easy to test your GitHub projects. Travis CI is a downloadable application that makes it extremely easy to test your GitHub projects. There are many options for configuring Travis. There is a single option from the GUI for configuring Travis.
/sections/25/pages/3> A,C
What does it mean if an automation tool is an agent-based solution? It requires a master server It requires a software agent to be installed on every machine to be automated It installs a pseudo stub-agent just during job execution It requires a software agent to be installed on a master server.
/sections/26/assessments/1/questions/1>
What are two examples of agent-based automation tools? (Choose two.) Puppet Chef Ansible NX-API
/sections/26/assessments/1/questions/2> A,B
Match the tool to what it calls the tasks it's automating. Manifest Puppet Recipe Chef Playbook Ansible
/sections/26/assessments/1/questions/3>
Which is one of the oldest agent-based solutions on the market, which is written in Ruby? Ansible SaltStack Puppet Chef
/sections/26/assessments/1/questions/4> C
Which of the following two characteristics define Hiera in the context of Puppet? (Choose two.) A way to decouple node-specific data from your manifests It is the hierarchy of a manifest Node-specific data that are modeled in a yaml file It is the relationship between the puppet master and agents
/sections/26/assessments/1/questions/5> A,C
What is idempotency? Characteristics of an API call or automation tool that allows you to repeatedly perform the same operation with making the change only once, the first time. It reflects the potency of an API call It's how tasks are itemized in a Playbook None of the above.
/sections/26/assessments/1/questions/6> A
What three core base modules for Ansible? (Choose three.) *_template *_config *_command *_show *_showme
/sections/26/assessments/1/questions/7> A,B,C
Which of the following three actions are required to establish a server-agent connection with Puppet? (Choose three.) Add certificates Configure agent /etc/hosts Reboot the client server Start Puppet Server Remove and reconfigure agent /etc/hosts
/sections/26/pages/10> A,B,D
Which of the following three tools manages systems in a declarative manner. Meaning, that you define the state the target system should be in without worrying about how it happens. (Choose three.) Puppet Chef Ansible VIRL
/sections/26/pages/2> B,D
Which of the following three tools manages systems in a declarative manner. Meaning, that you define the state the target system should be in without worrying about how it happens. (Choose three.) Puppet Chef Ansible VIRL
/sections/26/pages/2> A,B,C
Which of the following directives automatically creates a new variable and assigns it the value of the JSON object returned? config.j2 debug assert register
/sections/26/pages/4> D
Which of the following two statements are correct regarding base and feature modules? (Choose two.) Base modules provide for a way to manage devices using CLI commands, but in an automated fashion. Base modules provide for a way to manage devices using CLI commands, but in a manual fashion. Feature models eliminate the need to know the precise commands that are required to configure a feature. Instead, you simply declare the state that the resource should be in, and then the module ensure that the resource is in that state. Feature models require the need to know the precise commands to configure a feature.
/sections/26/pages/6> A,C
Which component is used to gather information about a device when using Puppet? Puppet Agent Puppet Facter Cloud Master Puppet Master Cloud Based Puppet Forge
/sections/26/pages/8> B
Which of the following is not a supported agent environment for Puppet Agent Installation? Guestshell (Cisco Nexus N3k, N9k) Open Agent Container (Cisco Nexus N5k, N6k, N7k) IOS-shell (Cisco Nexus N3k, N9k) Bash-shell (Cisco Nexus N3k, N9k)
/sections/26/pages/9> C
Match each Response Code with its correct meaning. OK—Standard response for successful requests 200 Created—Request completed; new resource created 201 No Content—Server successfully processed request; no content is being returned 204 Bad Request—Invalid query parameters 400 Not Found—The provided URL does not match an existing resource 404 Next Page
/sections/9/assessments/1/questions/1>
Which version of code is required for the ASA REST API? 9.4.x and above 9.3(2) or 9.4(1) and above 9.4(5) and 9.5(0) and above None of the above
/sections/9/assessments/1/questions/2> B
What format is data returned in for the ASA REST API? XML JSON HTML None of the above.
/sections/9/assessments/1/questions/4> B
What are two goals of the open source software trend? (Choose 2.) Community involvement in continuous improvement Inaccessibility to the underlying network operating system The use of proprietary protocols Using open APIs to interact with network devices
/sections/1/assessments/1/questions/1> A,D
Which two are considered programmatic protocols for managing network devices? (Choose 2.) TELNET NETCONF REST SSH
/sections/1/assessments/1/questions/2> B,C
Which of the following is an example of an open source off-box method that network operations teams might use for managing network devices? Ansible EEM APIC-EM TCL
/sections/1/assessments/1/questions/3> A
Which of the following are common tasks that network programmability techniques can perform? (Choose 3.) Device provisioning Device procurement Data collection Compliance checks WAN provisioning
/sections/1/assessments/1/questions/4> A,C,E
What is SDN? Set of techniques, not necessarily a technology, used to control, manage, and change the way networks are built and managed. Any network that uses a controller A virtual appliance that contains one or more VMs It is a set of products that you can purchase to enhance the way you deploy Campus and Data Center networks
/sections/1/assessments/1/questions/5> A
In the DevOps culture, what does the acronym CALMS stand for? Culture, Automation, Lean, Manageability, Source Code Culture, Automation, Lean, Measurement, Sharing Culture, Autonomy, Lean, Measurement, Speed Culture, Autonomy, Limited, Manageability, Speed
/sections/1/assessments/1/questions/6> B
Cisco Nexus switches use which API for network programmability? (Choose 3.) NETCONF NX-API CLI gRPC NX-API REST NX-JSON
/sections/1/assessments/1/questions/7> A,B,D
Which of the following is not an aspect of Software-Defined Networking? A concept that leverages programmatic interfaces to enable external systems to influence network provisioning, control, and operations. An approach and architecture in networking where control and data planes are decoupled and intelligence and state are logically centralized. An approach that leverages the existing network infrastructure for centralized control. Enablement where underlying network infrastructure is abstracted from the applications [network virtualization].
/sections/1/pages/2> C
Which of the following are reasons to implement SDNs in the network. (Choose two.) A device-by-device approach is more efficient Increased need for programmatic interfaces which allow faster and automated execution of processes and workflows with reduced errors Decreased programmability and cost to deploy Need for a 'central source of truth' and touch-point.
/sections/1/pages/3> B,D
Which two statements correctly describe the NX-API CLI? (Choose two.) NX-API CLI improves accessibility of the CLI by making them available on box. NX-API CLI improves accessibility of the CLI by making them available off box. NX-API CL supports put commands, configurations, and Ubuntu Bash. NX-API CL supports show commands, configurations, and Linux Bash.
/sections/10/pages/3> B,D
Which of the following two statements are correct regarding Python and the NX-API Sandbox? (Choose two.) By using the NX-API Sandbox, you can auto-generate Python code to give you a jump a start on writing scripts. All requests using NX-API CLI use HTTP POSTs. All requests using NX-API CLI use HTML POSTs. By using the NX-API Sandbox, you must manually generate Python code to write scripts. Submit
/sections/10/pages/5> A,B
Which statement is correct concerning?xmlin? The?xmlin?interactive tool can also be used to generate XML request documents for configuration objects. The?xmlin?interactive tool can also be used to generate HTTPS request documents for configuration objects. The?xmlin?interactive tool can also be used to generate XML request documents for viewable module functions. The?xmlin?optionally automated tool can also be used to generate HTML request documents for configuration objects.
/sections/10/pages/6> A
Which of the following options are two REST methods that have an Idempotent behavior? (Choose two.) POST GET DELETE PUSH
/sections/10/pages/7> A,C
Which CLI command API prints the output of the CLI command directly to stdout and returns nothing to Python? clio() clip() clid() cli()
/sections/10/pages/8> B
IOS XE supports which of the two programmatic interfaces? (Choose two.) NETCONF NX-CLI RESTCONF gRPC
/sections/11/pages/2> A,C
What are three required steps to get started with RESTCONF on IOS? (Choose three.) Enable RESTCONF Enable REST Ensure a user of privilege 15 exists on the device—it can be a local user or AAA user. Ensure a user of privilege 3 exists on the device—it must be a local user. Enable http(s) servers Enable dns servers
/sections/11/pages/3> A,C,E
What are two required steps to get started with using NETCONF? (Choose two.) Enable NETCONF-YANG RESTCONF must first be enabled User with Privilege 5 User with Privilege 15 Submit
/sections/11/pages/4> A,D
Which of the following are three options are supported APIs of IOS XR? (Choose three.) NETCONF RESTCONF gRPC XR-API Next Page
/sections/12/assessments/1/questions/1> A,B,C
Which of the following three YANG model types are supported by Cisco IOS XR? (Choose three.) OpenConfig Cisco IETF OpenDaylight
/sections/12/assessments/1/questions/2> A,B,C
Which command or commands enable NETCONF over SSH on IOS XR? netconf ; ssh netconf agent tty netconf-yang agent ; ssh netconf-yang agent
/sections/12/assessments/1/questions/3> C
Which of the following two utilities can be used to interface with the NETCONF API on IOS XR? (Choose two.) netconf server (sub system) pyncc ncclient netclient
/sections/12/assessments/1/questions/4> A,C
Which exec command drops you into the NETCONF sub-system? Once entered, it is where you can test XML documents. netconf restconf netconf-yang netconf-ssh
/sections/12/assessments/1/questions/5> A
Which APIs on IOS XR are driven by YANG models? NETCONF RESTCONF gRPC all the above
/sections/12/assessments/1/questions/6> D
NETCONF—XML, RESTCONF—XML+JSON, and gRPC—SON.
/sections/12/assessments/1/questions/7> Which two statements are correct regarding the management plane? (Choose two.) The management plane is an optional functionality that is not required for software defined networking. The management plane provides the ability for configuration, management, and monitoring of a network device. The management plane is not part of the network, and therefore, it is not susceptible to security attacks and does not require protection. The management plane includes utilize SSH, SNMP NetFlow, and all APIs including NETCONF, REST APIs, RESTCONF, gRPC, and so on to manage devices. From <https://ondemandelearning.cisco.com/cisco/npdesi10/sections/13/pages/2> B,D
When using IOS XR NETCONF APIs, what are two client requirements? (Choose two.) The client machine must have SNMP installed. The client machine must have SSHv2 installed. The client machine must have an XML management tool that supports NETCONF over SSH. The client machine must have an XML management tool that supports NETCONF over SNMP.
/sections/12/pages/2> B,C
Management sessions typically use which of the following three protocols to communicate with a network device? (choose three.) SSH REST (web) APIs SIP NETCONF
/sections/13/assessments/1/questions/1> A,B,D
What is a main purpose of an out of band management network? To segregate dynamic routing protocol traffic among network devices To physically segregate management traffic from general network traffic To enable the use of APIs on a network To deny certain traffic inbound on interfaces that are configured with IP addresses
/sections/13/assessments/1/questions/2> B
If the management plane of a network device is compromised, which other two planes are most likely to be compromised next? (Choose two.) data plane transport plane control plane socket plane
/sections/13/assessments/1/questions/3> A,C
When configuring ACLs, which are said to be a good practice? Blacklist: Allow all traffic inbound and block the specific ports and subnets that should not have access to a network device. Whitelist: Permit just the traffic required. There is no need for ACLs. ACLs should only be used on the perimeter of the network.
/sections/13/assessments/1/questions/4> B
What is the management plane responsible for? Forwarding Traffic Configuration and Monitoring OpenFlow Routing Protocol Updates
/sections/13/assessments/1/questions/5> B
Which of the following Linux commands correctly displays the local routing table? netstat-i netstat-r dig netstat-dir
/sections/3/pages/2> B
What should be added to an access list protecting management interface that connects to an out of band management network explicitly permit all other ip traffic explicitly deny all other ip traffic permit specific management workstations It does not matter since it is an?OOB?network
/sections/13/assessments/1/questions/6> C
Why is more attention to security required when using network programmability methods to manage network devices? Using Out of Band Management networks creates increased attack vectors ACLs no longer meet the needs of securing management interface Network devices are using more protocols in order to implement API API enabled devices circumvent traditional device access controls
/sections/13/assessments/1/questions/7> C
Which two statements are correct regarding the management plane? (Choose two.) The management plane is an optional functionality that is not required for software defined networking. The management plane provides the ability for configuration, management, and monitoring of a network device. The management plane is not part of the network, and therefore, it is not susceptible to security attacks and does not require protection. The management plane includes utilize SSH, SNMP NetFlow, and all APIs including NETCONF, REST APIs, RESTCONF, gRPC, and so on to manage devices.
/sections/13/pages/2> B,D
For the strongest protection of infrastructure devices, where should access lists be deployed? Avoid using access list on ingress direction to observe best practices. Only on loopback and vlan interfaces for which an IP address has been configured. In the egress, direction on all interfaces for which an IP address has been configured. In the ingress, direction on all interfaces for which an IP address has been configured. Submit
/sections/13/pages/3> D
Which command-line command is used for package management in Debian distributions including Ubuntu? .rpm yum .deb apt-get
/sections/2/assessments/1/questions/2> D
The?grep?command allows a user to do which of the following? search the contents of a file for a specified value display the first 10 lines of a file streams the entire contents of a file without pausing navigates to another directory
/sections/2/assessments/1/questions/3> A
Match the correct options: Derivatives include CentOS and Fedora Red Hat The most popular derivative is Ubuntu Debian Focused on penetration and security testing Kali Linux Focused on home router functionality OpenWrt
/sections/2/assessments/1/questions/4>
Which command is necessary to execute a command with root privileges? pushd sudo cat head
/sections/2/assessments/1/questions/5> B
Which command can be used to change a file's permissions? chown chmod mod chperm
/sections/2/assessments/1/questions/6> B
Which command allows the user to scroll up and down within the output of a file? touch cat stat less
/sections/2/assessments/1/questions/7> D
Which of the following are reasons why the network programmability engineer should learn Linux (Choose two.) Network devices now expose the underlying Linux shell Network devices now enable engineers to run sectors on the actual network device Standard operating systems such as NX-OS and IOS all have a Linux foundation Most software development environments are Linux-based
/sections/2/pages/2> A,D
Which two statements are correct regarding the Linux file system. (Choose two.) Linux uses a single root file system which means all directories exist inside a single namespace referred to as $. Linux uses a single root file system which means all directories exist inside a single namespace referred to as /. The?sudo?command is short for "super user do" and is necessary to run programs as other users. The?sudo?command is short for "super user domain" and is necessary to run programs as the admin user only.
/sections/2/pages/3> B,C
Which of the two main operating systems from which most distributions are derived. (Choose two.) Debian NX-OS Red Hat NX Linux Red Hat Enterprise Linux
/sections/2/pages/4> A,D
Which command would be correct to move a file that is called?class.txt?from its current directory to a directory called?MyClass? cisco@cisco: ~$?mv?MyClass class.txt cisco@cisco: ~$?mv?class.txt MyClass cisco@cisco: ~$?move?class.txt MyClass cisco@cisco: ~$?move?MyClass class.txt
/sections/2/pages/5> B
Which command displays real time processor utilization in an easier to read format? ps aux ps top htop
/sections/2/pages/6> D
In which file is DNS information referenced? resolv.conf /etc/network/interfaces host dns.conf
/sections/3/assessments/1/questions/1> A
Which command displays local interface information? interfaces ifconfig route ipconfig
/sections/3/assessments/1/questions/2> B
What are two ways to display DNS information about either the local host or external device? (Choose two.) dig netstat host traceroute
/sections/3/assessments/1/questions/3> A
What are two ways to display DNS information about either the local host or external device? (Choose two.) dig netstat host traceroute
/sections/3/assessments/1/questions/3> A,C
Which two commands will allow you to view the host's routing table? (Choose two.) route print route ip route list ip table
/sections/3/assessments/1/questions/5> A,C
When changing an interface address with the?ip addr?command, the configuration will not persist through a system restart. How do you make the change persist? Ensure that you run the command with?sudo Make the same change in the /etc/network file Make the same change in the?/etc/network/interfaces?file Use the?ifconfig?command instead
/sections/3/assessments/1/questions/6> C
You update the proper network configuration file on your Ubuntu host and still do not see that the changes take effect, which command should you run? sudo networking restart sudo service networking restart sudo process networking restart sudo service restart networking
/sections/3/assessments/1/questions/7> B
Which of the following two statements are correct regarding DNS? (Choose two.) Dynamically constructed from files located in:?/etc/resolvconf/resolv.conf.d/ Linux uses configured DNS servers from the hierarchal structure. DNS information is stored in the?etc.conf?file. DNS information is stored in the?/etc/resolv.conf?file.
/sections/3/pages/3> A,D
Match the Core component of an?API?to examples of their implementation: XML/JSON Encoding NETCONF/RESTCONF/gRPC Protocols SSH/TLS/HTTP(S) Transport Next Page
/sections/8/assessments/1/questions/1>
Which option most closely maps to the dictionary data type in Python? XML JSON HTML All the above
/sections/8/assessments/1/questions/2> B
Which protocols are used to expose?YANG?data models? NETCONF RESTCONF gRPC All the above
/sections/8/assessments/1/questions/3> D
What is a command line tool for consuming?REST?APIs? Postman Firefox cURL Python Requests
/sections/8/assessments/1/questions/4> C
Match the transport to the Protocol: HTTP RESTCONF SSH NETCONF HTTP/2 gRPC
/sections/8/assessments/1/questions/5>
What are the four core layers of the NETCONF protocol stack? XML, SSH, Content, Messages Transport Protocol, Messages, Operations, Content Messages, Transport Protocol, Content, XML JSON, SSH, XML, HTTP
/sections/8/assessments/1/questions/6> B
Which client is used with NETCONF? ncclient Postman cURL python requests
/sections/8/assessments/1/questions/7> A
Which of the following HTTP verbs creates new resources, which means it is not considered a "safe" method? GET POST PUT PATCH
/sections/8/pages/10> B
Which of the following two statements are correct regarding NETCONF? (Choose two.) NETCONF is a next-generation network management protocol that is designed specifically for transactional-based network management and to improve upon the weaknesses of SNMP. NETCONF is a next-generation network management protocol that is designed specifically for an API call that is used when configuring multiple objects and to improve upon the strengths of SMTP. NETCONF supports device transaction which means that when you make an API call configuring multiple objects and one fails, the entire transaction fails, and you do not end up with a partial configuration. NETCONF supports device transaction which means that when you make a post configuring a single object and it fails, all other transactions will pass, and you end up with a partial configuration.
/sections/8/pages/11> A,C
Which of the following two encoding types are supported by RESTCONF? (Choose two.) REST HTML JSON XML
/sections/8/pages/13> C,D
Which Cisco devices include an implementation of gRPC? IOS-XR devices IOS-NX2 devices IOS-VM devices NX-XE devices
/sections/8/pages/14> A
Which are three key attributes of next-generation programmatic interfaces? (Choose three.) They must support different types of transport: http, SSH, TLS. They must be flexible and support different types of encoding formats such as TCL and Python. They must support different types of transport: https, Telnet, TCP. There must be extensible and open APIs: REST, RESTCONF, NETCONF, gRPC. They must be flexible and support different types of encoding formats such as XML and JSON.
/sections/8/pages/2> A,D,E
Which of the following are two main encoding formats. (Choose two.) NETCONF HTTP JSON XML
/sections/8/pages/3> C,D
Which of the following two statements are correct regarding JSON. (Choose two.) Cisco has been adding JSON support on various IOS-based platforms. Cisco has been adding JSON support on various device platforms. Using a JSON schema definition can help build an input function. Using a JSON schema definition can help validate an input.
/sections/8/pages/4> B,D
Which two statements are correct regarding XML and HTML. (Choose two.) HTML was designed to display data. XML tags are created by the author. XML tags are predefined in the XML standard HTML was designed to describe data
/sections/8/pages/6> A,B
Which management protocol is tightly coupled with YANG? NETCONF REST RESTCONF gRPC
/sections/8/pages/8> A
Which of the following two protocols are valid within the model-driven programmability stack? (Choose two.) RESTCONF JSON XML NETCONF
/sections/8/pages/9> A,D
A Privilege Level 7 can do which of the two following operations using the Cisco REST API? (Choose two.) Any GET Request PUT requests within /api/monitoring GET requests within /api/monitoring Any PUSH, POST, or GET request Previous Page?
/sections/9/assessments/1/questions/3> A,C
Which HTTP Request would you use in /api/monitoring? PUSH POP VIEW GET
/sections/9/assessments/1/questions/5> D
What command turns on the REST API? service rest-api rest-api agent no service rest-api no rest-api agent
/sections/9/assessments/1/questions/6> B
Match up the HTTP Methods with their function: Retrieves data from the specified object GET Adds the supplied information PUT Creates the object with the supplied information POST Applies partial modifications to the specified object PATCH
/sections/9/assessments/1/questions/7> C
Which two statements are correct regarding the REST API/ (Choose two.) Cisco has added an industry standard REST API to interact with the ASA operating system using standard JSON practices. Data is encoded in XML. Cisco has added an industry standard REST API to interact with the ASA operating system using standard RESTful practices. Data is encoded in JSON.
/sections/9/pages/2> C,D
Which privilege level is required for invoking PUT operations? Privilege level 3 Privilege level 1 Privilege level 13 Privilege level 15
/sections/9/pages/3> D
Which of the following are two valid ways to authenticate using the API? (Choose two.) SHA MD5 Authentication Basic Authentication X-Auth-Token ESP Token
/sections/9/pages/4> B,C
Which statement is correct regarding the Generic CLI Command Executor? The Generic CLI Command Executor is simply a wrapper for sending any command that you would send via the CLI. The Generic CLI Command Executor is a function for receiving CLI commands. The Generic CLI Command Executor is downloadable module for managing the CLI command history. The Generic CLI Command Executor is licensed feature available from http://www.cisco.com?for enabling and disabling secure CLI functionality.
/sections/9/pages/5> A