DevNet Quiz
JWT
Guest users of Webex Teams authenticate with guest tokens, which use _____. Base64 No token JWT Sessions
0
What is the largest number of child nodes a YANG leaf node can
xAPI allows developers to programmatically invoke commands and query the status of devices that run collaboration endpoint software or Webex RoomOS software.
Which of the following is the application programming interface (API) for collaboration endpoint software? MQTT TAPI DevNet xAPI
NetDevOps
Which of the following is the practice of ongoing development of your network infrastructure using DevOps tools and processes to automate and orchestrate your network operations? DevOps DevSecOps NetDevOps Networking
Docker container
You have a two-tier application: an open-source SQL database tier and an ASP.NET web front-end tier. Which application deployment type is the most suitable for continuous integration (CI) with automatic integration testing? bare metal Docker container Linux with Wine virtual machine
YANG
Which language is used in the Cisco Network Services Orchestrator (NSO) to describe the network service intent? Python XML YAML YANG
SSH HTTP Websocket
xAPI on a device can be accessed via which of the following protocol methods? (Choose all that apply.) SSH FTP HTTP Websocket
using unescaped user input (request.getParameter("CC"))
(String) page += "<input name='creditcard' type='TEXT' value='" + request.getParameter("CC") + "'>"; Which part of the code snippet above is vulnerable to XSS injection? mixing single and double quotes in constructing strings using input of type text which is not safe (type='TEXT') using String type instead of CreditCard type using unescaped user input (request.getParameter("CC"))
named
A _______ object is a reusable configuration that associates a name with a value. simple named objective network
The command is being entered from the wrong mode of operation.
A network technician is attempting to configure a router interface by entering the following command: R1(config)# ip address 192.168.2.1 255.255.255.0 Why is the command rejected by the device? The command is being entered from the wrong mode of operation. The command syntax is wrong. The interface is in shutdown mode and must be enabled. The subnet mask information is incorrect.
Advanced persistent threat
Which of the following allows bad actors to gain access to and control endpoint resources over an extended period to steal valuable data without being detected? Malware Medium persistent threat Advanced persistent threat Ransomware
Video Calling Bots Remote Expert
Which of the following are part of the Cisco collaboration portfolio? (Choose three.) Video Calling Bots Remote Expert Connected Mobility Experience
IOCs
Which of the following are used to indicate that a system has been affected by some form of malware? IoTs IOCs Snort Reports
Visibility and threat detection Malware analysis
Cisco Stealthwatch provides cloud security by offering which of the following? Select 2 answers DNS resolution Visibility and threat detection VPN service Malware analysis Endpoint security
AMP for endpoints
Cisco _____ offers cloud-delivered next-generation antivirus, endpoint protection platform (EPP). Stealthwatch ISE Firepower AMP for endpoints Umbrella
A unified malware analysis and threat intelligence platform
Which of the following describes Threat Grid? A VPN solution from Cisco A unified malware analysis and threat intelligence platform A threat intelligence organization An intelligence security framework
Cisco ISE
Which of the following enables devices and users to be identified and provisioned and enables policies to be applied? Cisco AMP Cisco ISE Cisco Threat Grid Cisco Firepower Management Center
enabled=true
Examine the following Ansible task. tasks: - name: Configure Apache Web Server service: name=apache2 state=started Which parameter should we add to the service module so that Apache starts on boot? auto=true boot=true enabled=true installed=true
Administration XML
Which of the following provides a mechanism for inserting, retrieving, updating, and removing data from Cisco Unified Communications Manager? Session Initiation Protocol Administration XML Skinny REST API
BOSH
Finesse implements the XMPP specification. The purpose of this specification is to allow the XMPP server (for Notification Service) to get information published to XMPP topics and then to send XMPP events to entities subscribed to the topic. The Finesse Notification Service then sends XMPP over _______ messages to agents that are subscribed to certain XMPP nodes. MQTT BOSH HTTP None of the above
The code author leads the code reviewer through the code.
How is the peer review process performed in the walkthrough peer review? The code author leads the code reviewer through the code. The code author leads the scrum master through the code. The code reviewer leads the code author through the code. The product owner leads the code author through the code.
A bot can participate in 1-to-1 and group spaces.
In Cisco Webex Teams, which statement is true about bot capabilities? A bot can participate in 1-to-1 and group spaces. A bot can perform actions within Webex Teams. A bot can read all messages in the group space. A bot must always be @mentioned to answer.
NetconfServiceProvider.
In YDK-Py, the object of which class must be instantiated to create a NETCONF session for use with CRUD operations on YANG data represented as Python objects? CRUDService Manager NetconfServiceProvider NetconfSession
improved maintainability. Refactoring makes it easier to fix bugs and read the code, which reduces development time.
In test-driven development, what is the main advantage of refactoring? improved maintainability reduced amount of code reduced number of bugs reduced program execution time
Cisco routers, Cisco switches, and Cisco Wireless LAN Controllers.
In the Cisco Software-Defined Access solution, which three network elements are used to build the underlay network? (Choose three.) Cisco DNA Center Cisco Identity Services Engine Cisco routers Cisco switches Cisco Wireless LAN Controllers
the HTTP header X-auth-access-token
In the Firepower Management Center API, the token is generated and returned via ________. the HTTP header X-auth-access-token JSON object XML object JWT
Choosing "cli" is required to get structured data in response, while choosing "cli_ascii" results in a response with raw ASCII text.
In the NX-API Developer Sandbox presented in the figure, what is the difference between choosing the "cli" or the "cli_ascii" command type option? Choosing "cli" is required for the correct display of Unicode output, while "cli_ascii" must be chosen for pure ASCII output. Choosing "cli" is required to get structured data in response, while choosing "cli_ascii" results in a response with raw ASCII text. Choosing "cli" is required when input contains Unicode text, while "cli_ascii" must be chosen for pure ASCII input. Choosing "cli" requires structured data as input, while choosing "cli_ascii" allows input of ASCII plaintext commands.
notify()
In the Observer software design pattern, which method defines the action to be taken when the subject provides data to the interface?
response.json()
In the code snippet, there is an HTTP POST request implemented and sent. Which command will be used to get a JSON-formatted response? JSON.response() request.json() response.json() response.jsonParse()
response.status_code
In the presented code snippet, there is an HTTP POST request implemented and sent. Which command will be used to see the status code of the sent request? request.status requests.status_code response.getStatusCode response.status_code
Port 830
On which port does Netconf operate on default?
rdp-cookie
You are using HAProxy to balance traffic between several web servers. It is necessary that a user connects to the same back-end server during the session duration. What is the correct configuration option for the "balance" directive? leastconn roundrobin rdp-cookie sticky uri
cloud bursting
You run a tax filing website that handles personal information. Tax season approaches and traffic to the website increases tenfold. What is the optimal solution in this situation? a high-availability cluster a large private cloud a public cloud cloud bursting cloud migration
X-Cloupia-Request-Key
Question Id : DEVASC-200901-DIKTA-09-008 Cisco UCS Director What is the name of the header that contains the Cisco UCS Director REST API access key? X-Cloupia-Access-Key X-Cloupia-Request-Key X-Cloupia-Secret-Key X-Cloupia-API-Access
The router can receive the default gateway parameter via DHCP.
Refer to the exhibit. An ISP is providing internet connectivity to an enterprise. The ISP allocates an IPv4 address dynamically to the enterprise outbound router. Which statement about this setup is true? The IPv4 address of the router outbound interface is manually assigned. The router can receive the default gateway parameter via DHCP. The router must have a DHCP server enabled on the outbound interface. The router must probe the ISP to obtain the next hop IPv4 address for the default route.
R1(config)# ip route 10.10.3.0 255.255.255.0 10.1.1.1 An IP static route is configured as "ip route [destination network] [destination network subnet mask] [IP address of the next-hop router]." The destination network in the example above is the 10.10.3.0/24 network. The IP address of the next hop router (R3) is 10.1.1.1.
Refer to the exhibit. PC1 needs connectivity with server SRV1. Which command correctly implements an IP static route on a router that allows PC1 accessibility to SRV1? R1(config)# ip route 10.1.1.0 255.255.255.0 10.10.3.1 R1(config)# ip route 10.10.1.0 255.255.255.0 10.10.3.1 R1(config)# ip route 10.10.3.0 255.255.255.0 10.1.1.1 R1(config)# ip route 10.10.3.30 255.255.255.0 10.10.1.1
POST, Investigate
The Umbrella Enforcement API involves an HTTP ______ request, which internally comprises an _____ API to check whether the domain is safe. POST, Reporting GET, Investigate POST, Investigate GET, Reporting
Investigate
The Umbrella ________ API provides enrichment of security events with intelligence to SIEM or other security visibility tool. Enforcement Investigate Management Reporting
It will forward the frame out of the Fa0/1 port.
The switch receives a frame from the device with the MAC address of 00e0.b048.11da. The destination MAC address of the frame is not in the switch MAC address table. What will the switch do with the frame?
The HTTP method for the XML APIs is always POST. The data in the body of the POST will indicate which function of the API is being called, whether it is getting, creating, updating, or deleting data. This is important to understand foundationally that is different from REST API calls.
To use an XML API, which HTTP method does one use? POST GET PUT PATCH DELETE Depends on the action
Yes, if both ports on the switch belong to the same VLAN.
Two computers are connected to a Cisco Catalyst Layer 2 switch. PC1 is assigned the address 10.250.20.20/26 and PC2 is assigned the address 10.250.20.50/26. When a user on PC1 issues the ping 10.250.20.63 command, will PC2 respond to it? No, because 10.250.20.63 is not in the subnet that PC1 belongs to. No, because 10.250.20.63 is not the IP of PC2. Yes, if both ports on the switch belong to the same VLAN. Yes, if the ip routing command is configured on the switch.
GET /items?state=active
URL parameters are the easiest way of adding basic filtering to REST APIs. Which option can be used for filtering all active items if the resource is named "/items"? GET /get?active?state GET /items?state=active GET /items?where_state=active GET /items=state=active GET /state?active=items
yaml.load(stream, Loader=Loader)
Using the Python library PyYAML, which line parses a YAML stream into a Python object?
Use timeouts in your code.
What measures should you take when an API call reaches its rate limit? Optimize your code. Refactor your code. Use callbacks. Use timeouts in your code.
nslookup
What popular network utility is used to troubleshoot DNS issues? traceroute dnslookup nslookup ping
UDP 123 Explanation: The main role of NTP is to synchronize the time on a network of devices. The IETF developed NTP, and the latest version of the protocol, version 4, is defined in RFC 5905. It uses User Datagram Protocol (UDP) at the transport layer, and port 123 is reserved for NTP.
What transport layer protocol and port are used by NTP? TCP 123 TCP 120 UDP 120 UDP 123
Basic auth
What type of authentication do the Cisco DNA Center platform APIs use? No auth API key Basic auth Hash-based message authentication
unit tests
What type of testing verifies the smallest components in your application? compliance tests integration tests stress tests unit tests
Captive Portal API, and Scanning API, (MV Sense Camera API, and Dashboard API).
What APIs does the Cisco Meraki platform provide to developers? Captive Portal API Scanning API Access Point API Infrastructure API
DNS resolver
What DNS component is configured on a network client? Root server TLD server DNS resolver TLC server
Infoblox Bluecat Explanation:IP Address Management (IPAM) integrations are also supported by the Integration APIs. Importing IP pools information from IPAM systems like Infoblox and Bluecat into Cisco DNA Center is seamless. Synchronization of IP pool/sub-pool information between Cisco DNA Center and IPAM systems is also supported.
What IPAM providers are supported by default in Cisco DNA Center? NetBox Solarwinds IP Address Manager Infoblox Bluecat
Faster resolution times Reduced resources utilization Reduced bandwidth utilization
What are some of the benefits of DNS caching? Faster resolution times Reduced resources utilization Faster lease times Reduced bandwidth utilization Select 3 answers
Reduced network endpoint configuration tasks and costs Centralized management of network parameters configuration
What are some of the benefits that DHCP offers? (Choose two.) Reduced network endpoint configuration tasks and costs Elimination of single points of failure for network parameter configuration Decentralized management of network configuration Centralized management of network parameters configuration Select 2 answers
Quicker integration Faster development
What are the advantages of using an SDK? (Choose two.) Quicker integration Faster development Advanced customization Error handling
Running, candidate, startup
What are the three configuration data stores defined in NETCONF? Startup, running, deleted Initialized, candidate, commit Config, running, startup Running, candidate, startup
conserving network resources reduced network latency
What are the two primary benefits of edge computing? (Choose two.) Lower maintenance cost conserving network resources higher network utilization improved security reduced network latency simpler network design
deployment of code to production increasing code coverage preventing shipment of broken code
What are three benefits of CI (continuous integration)? (Choose three.) automatic code reviews deployment of code to production increasing code coverage no need for manual tests preventing shipment of broken code
flexibility loose coupling reusability
What are three improvements of the Model-View-Controller (MVC) design pattern over previous designs, which used to lump all MVC objects together? (Choose three.) ease of navigation flexibility loose coupling reusability single technology
accurate fast reliable
What are three properties of a good CI/CD pipeline? (Choose three.) accurate fast minimal reliable static
efficiency latency
What are two advantages webhooks have over polling? (Choose two.) easier setup efficiency latency lightweight implementation simplicity
Code can be separated from the rest of the application Module code can be used by multiple applications.
What are two benefits of separating a software code into modules? (Choose two.) Code can be separated from the rest of the application. Code packaged inside a module can run on any platform. Module code can be used by multiple applications. Modules provide a stable interface for other modules. Modules simplify the testing process of the application.
It supports JSON data encoding. Operations map to HTTP methods.
What are two characteristics of RESTCONF? (Choose two.) It is a session-oriented and stateful protocol. It supports JSON data encoding. It supports the confirmed-commit operation. It uses SSH transport. Operations map to HTTP methods.
Dynamic Configured
What types of subscriptions are supported by model-driven telemetry? (Choose two.) Static Dynamic Configured Hard-coded Select 2 answers
102." The other answers are incorrect, as message-id is incremented by a value of one in the response message.
What will be the value of the message-id attribute in the NETCONF response message if the NETCONF request message contains the attribute message-id with the value 102? "" "101" "102" "103"
A default route is added to the host's routing table. The size of the host's ARP table is reduced, because it does not get populated with the IP to MAC address mappings for the hosts on remote networks.
What are two results of configuring a default gateway on a host? (Choose two.) A default route is added to the host's routing table. The host can get an IP address from the DHCP. The host can start communicating with other hosts on the same network. The host's ARP table gets populated with IP to MAC address mappings of the hosts on remote networks. The size of the host's ARP table is reduced, because it does not get populated with the IP to MAC address mappings for the hosts on remote networks.
Create Merge Replace
What attributes are supported by the NETCONF <edit-config> operation? (Choose all that apply.) Add Create Merge Remove Replace Select 3 answers
Translating IPv4 addresses from the RFC 1918 private subnets to public IPv4 addresses Translating public IPv4 addresses into private IPv4 addresses Translating IPv4 addresses from private subnets to IPv4 addresses from another set of private subnets
What can Network Address Translation (NAT) be used for? Translating private MAC addresses to private IP addresses Translating IPv4 addresses from the RFC 1918 private subnets to public IPv4 addresses Translating public IPv4 addresses into private IPv4 addresses Translating IPv4 addresses from private subnets to IPv4 addresses from another set of private subnets None of the above Select 3 answers
Responds with DHCPACK message containing the IP address of the DHCP server and the IP address of the client.
What does the DHCP server do after it receives a DHCPREQUEST message from a client? Responds with DHCPACK message containing only the IP address of the client. Responds with DHCPACK message containing initial network information for the client. Responds with DHCPACK message containing the IP address of the DHCP server and the IP address of the client. The DCHP server waits for the lease timer to expire.
Method Not Allowed
What does the HTTP 405 response status code indicate?
a supervisor of many operating systems
What is a hypervisor? a software virtualization provider a supervisor of kernel resources in an operating system a supervisor of many operating systems software that runs only on bare metal and provides infrastructure virtualization
a standard that defines how edge computing should work
What is fog computing? a multi-cloud environment a programming pattern to create cloud-agnostic applications a standard that defines how edge computing should work an Internet of Things (IoT) computing principle
https://api.webex.com/WBXService/XMLService
What is the Cisco WebEx Meetings XMLAPI endpoint? https://developer.webex.com/XMLService https://api.webex.com/WBXService/XMLService https://api.ciscopark.com/WBXXMLService https://webexapis.com/WBXXMLService
https://api.meraki.com/api/v0
What is the base URL for the Cisco Meraki Dashboard API? https://api.meraki.com/api/v0 https://api.meraki.com/v1/api https://api.meraki.cisco.com/api/v0 https://api.meraki.cisco.com/v1/api
usage of a parametrized API.
What is the best approach for the mitigation of injection vulnerabilities? regular code reviews separation of command and data usage of a parametrized API white-list validation of user inputs
ADD unpacks a tar archive source into a directory, while COPY does not.
What is the difference between the ADD and COPY instructions in Dockerfile? ADD assigns UID/GID to 0, while COPY preserves UID/GID. ADD invalidates build cache, while COPY does not. ADD unpacks a tar archive source into a directory, while COPY does not. COPY can specify a URL as a source, while ADD cannot.
Enable API access in the Organization > Settings menu and save the changes
What is the first step to take to have access to the Cisco Meraki Dashboard API after you have logged in? Generate new API key Navigate to https://dashboard.meraki.com and select Dashboard API Enable API access in the Organization > Settings menu and save the changes Save the Dashboard API access configuration
providing the tools to set predefined variables and incorporate the variables into the topology
What is the main purpose of the Cisco Virtual Internet Routing Lab (VIRL) AutoNetkit component? providing a REST API to manage the OpenStack components underneath Cisco VIRL providing a REST API to manage the topologies and simulations defined in Cisco VIRL providing SSH and Telnet access to manage the configuration of the network devices providing the tools to set predefined variables and incorporate the variables into the topology
Intent API
What is the name of the Cisco DNA Center Northbound REST API?
management information tree (MIT)
What is the name of the hierarchical tree structure where the configuration and state information of the switch is stored for NX-API REST?
Device package Explanation:Cisco DNA Center allows customers to have their non-Cisco devices managed by DNA Center through a multivendor SDK. Cisco DNA Center communicates with the third-party devices through device packages. The device packages are developed using the multivendor SDK and implement southbound interfaces based on the CLI, SNMP, or NETCONF. Prev
What is the output of the multivendor SDK for Cisco DNA Center platform? Device driver Device package Software driver Software package
removing the side effects of complex, real objects.
What is the purpose of mock objects? real object testing removing the side effects of complex, real objects testing if components in an application operate with each other writing test documentation
writing a test
What is the recommended first step in test-driven development?
Token Bucket Model The rate limiting technique that the Dashboard API implements is based on the token bucket model. The token bucket is an algorithm used to check that the data that is transmitted in a certain amount of time complies to set limits for bandwidth and burstiness. Based on this model, if the number of API requests crosses the set threshold for a certain amount of time, you will have to wait a set amount of time until you can make another request to the API. The time you must wait depends on how many more requests you performed above the allowed limit, with the more requests you have performed, the more time you would have to wait.
What is the technique used in Cisco Meraki Dashboard API to limit the rate of API calls? Sliding Window Model Token Bucket Model Fixed Window Model Token Cluster Model
The servers network interface card.
Where is a server's MAC address stored?
POST https://api.ciscospark.com/v1/webhooks
Which API call is used to create a webhook on Cisco Webex Teams? GET https://api.ciscospark.com/v1/webhooks POST https://api.ciscospark.com/v1/webhooks POST https://api.ciscospark.com/v1/webhooks/{webhookId} PUT https://api.ciscospark.com/v1/webhooks/{webhookId}
git pull
Which Git command fetches and merges changes on the remote server to your local Git repository? git merge git pull git push git remote
Reactive FastMap,
Which NSO feature or component allows implementing a service that requires sequential staged deployment? Layered Service Architecture Mapping Logic Network Element Drivers Reactive FastMap
dir()
Which Python built-in function do you use to find out which names are defined in a module?
xml.etree.ElementTree
Which Python module is best suited for parsing XML documents?
vManage
Which SD-WAN component do you communicate with when attaching or detaching device templates via REST API calls? vBond vEdge vManage vSmart
rpc-reply
Which XML tag is sent as the first node in a response to the NETCONF request message? rpc rpc-answer rpc-reply rpc-response
augment
Which YANG statement allows insertion of additional YANG nodes into the existing data model without editing the model itself? augment identity if-feature uses
grouping
Which YANG statement defines a reusable collection of nodes?
It runs the equivalent of the apt-get update before the operation. The update_cache parameter controls if we want to update the APT cache before any APT operation.
Which action does the APT module perform if the update_cache parameter is set to yes? It cleans the local repository of retrieved package files. It purges the configuration files if the state is set to absent. It removes unused dependency packages for all module states. It runs the equivalent of the apt-get update before the operation.
avoiding unique environment configuration that cannot be reproduced automatically increasing consistency by representing the desired environment state via code making infrastructure deployments repeatable and preventing runtime issues
Which are the three benefits of using Infrastructure as Code (IaC) for managing deployment environments? (Choose three.) avoiding unique environment configuration that cannot be reproduced automatically enabling organizations to deploy applications in cloud environments automatically improving the quality of the code by running tests automatically increasing consistency by representing the desired environment state via code making infrastructure deployments repeatable and preventing runtime issues
lower costs high reliability no maintenance
Which are three advantages of using a public cloud instead of an on-premise solution? (Choose three.) flexibility high reliability improved security lower costs no maintenance
automated provisioning continuous integration incremental testing
Which are three attributes of DevOps practices? (Choose three.) automated provisioning continuous integration creating a detailed test plan end-to-end testing focus on user experience incremental testing
Personal access token
Which authentication method is the least secure mechanism for an end user to gain access to the Cisco WebEx APIs? Personal access token Bot token OAuth token Guest issuer application
OAuth authentication
Which authentication method is token-based? authentication with API keys digest authentication HTTP basic authentication OAuth authentication
drop-sensitive
Which characteristic describes video traffic? benign traffic delay-insensitive drop-sensitive smooth traffic
Network (or infrastructure) as code is the base component required to implement CI/CD in infrastructure automation, or DevNetOps.
Which component is required to implement CI/CD in infrastructure automation?
vManage
Which component of the Cisco SD-WAN fabric exposes a public REST API interface? vSmart vBond vManage vEdge
EXPOSE
Which instruction in Dockerfile informs Docker that a container listens on the specified network ports at run time? EXPOSE MAP NETWORK PORT SERVICE
YANG
Which language is used in the Cisco Network Services Orchestrator (NSO) to describe the network service intent?
Software-defined network architecture separates the control plane from network devices.
Which of the following statements describes the difference between traditional and software-defined network architecture? Large software-defined networks are more complex to manage than their traditional network counterparts. Software-defined network architecture combines the control and data plane on network devices. Software-defined network architecture is more difficult to scale than traditional network architecture. Software-defined network architecture separates the control plane from network devices.
Bots
Which of the following use webhooks in Webex Teams? Bots Guests Nobody Integrations
"| xmlin".
Which pipe option would you use on a Cisco Nexus switch CLI to convert a CLI command into its XML equivalent? "| xml" "| xmlin" "| xmlout" "| xsd"
23
Which port is the default port for the TCP Telnet protocol? 20 21 22 23
single responsibility principle
Which principle states that every module, class, or function should implement only a part of the functionality provided by the software? common-reuse principle interface segregation principle single functionality principle single responsibility principle
acyclic dependencies principle
Which software design principle is violated in the Python code above? acyclic dependencies principle dependency inversion principle Liskov substitution principle open-closed principle
dynamically generated token is required Custom token authentication required a token which is dynamically generated. New token is generated when an old one expires
Which statement is correct about custom token authentication? username and password are required pre-generated API key is required dynamically generated token is required statically generated token is required
The model contains only the pure application data.
Which statement is correct about the model in the Model-View-Controller (MVC) design pattern? The model contains only the pure application data. The model contains the logic on how to present the data. The model handles storage data and passes it to view. The model presents the data to the application user.
A Status Line consists of three parts: HTTP Protocol Version. Status Code. Reason Phrase.
Which three elements are parts of an HTTP status line?
protocol version status code status message
Which three elements are parts of an HTTP status line? (Choose three.) protocol version requested method status code status message target URL
host operating system infrastructure operating system virtualization layer
Which three layers are vital parts of a container stack? (Choose three.) guest operating system host operating system infrastructure infrastructure virtualization layer operating system virtualization layer
devices, interfaces, and links
Which three objects are modeled in a pyATS testbed? (Choose three.) devices interfaces links test cases test reports
Ansible Docker Vagrant
Which three of the following tools are found in a Continuous Integration and Continuous Delivery (CI/CD) pipeline for infrastructure automation? (Choose three.) Ansible Docker Robot Framework SonarQube Vagrant
A unique generated key is assigned to each user or application. An API key is used to confirm the identity of a user or an application. API keys have no expiration time; they can be used indefinitely.
Which three statements about API keys are correct? (Choose three.) A unique generated key is assigned to each user or application. An API key is used to confirm the identity of a user or an application. API keys are a method of authentication and authorization. API keys are not accessible to clients, which increases security. API keys have no expiration time; they can be used indefinitely.
8.0.0.0 is a public address. 10.8.0.0 is a private address. 127.0.0.1 is a reserved address.
Which three statements about IPv4 addresses are true? (Choose three.) 8.0.0.0 is a public address. 10.8.0.0 is a private address. 127.0.0.1 is a reserved address. 172.30.0.0 is a public address. 192.170.0.0 is a private address.
It examines traffic in both directions It forms a barrier between two parts of a network. It has a presence on the network.
Which three statements about a standard firewall on an Application Control Engine (ACE) are correct? (Choose three.) It accepts or rejects packets and does not modify packets. It examines traffic in both directions. It examines traffic in one direction. It forms a barrier between two parts of a network. It has a presence on the network. It has no presence on the network.
APIs provide a callback to the requester when the requested resource is read. Asynchronous calls do not block or wait for the API call to return from the server. Multiple actions can take place at one time, which decreases waiting time for users.
Which three statements about asynchronous APIs are correct? (Choose three.) APIs provide a callback to the requester when the requested resource is read. Asynchronous calls do not block or wait for the API call to return from the server. Multiple actions can take place at one time, which decreases waiting time for users. Resource availability and data store service are immediate. Until a response is returned by the API, your application will not execute any further.
PIs provide a callback to the requester when the requested resource is read, Asynchronous calls do not block or wait for the API call to return from the server Multiple actions can take place at one time, which decreases waiting time for users.
Which three statements about asynchronous APIs are correct? (Choose three.) APIs provide a callback to the requester when the requested resource is read. Asynchronous calls do not block or wait for the API call to return from the server. Multiple actions can take place at one time, which decreases waiting time for users. Resource availability and data store service are immediate. Until a response is returned by the API, your application will not execute any further.
JSON can be used when data is sent from a server to a web page JSON does not support comments. JSON is a hierarchical data format.
Which three statements are correct about the JSON data format? (Choose three.) Empty values cannot be used in the JSON data format. JSON arrays separate elements using a semicolon. JSON can be used when data is sent from a server to a web page. JSON does not support comments. JSON is a hierarchical data format.
JSON can be used when data is sent from a server to a web page, JSON does not support comments, JSON is a hierarchical data format.
Which three statements are correct about the JSON data format? (Choose three.) Empty values cannot be used in the JSON data format. JSON arrays separate elements using a semicolon. JSON can be used when data is sent from a server to a web page. JSON does not support comments. JSON is a hierarchical data format.
Change requirements can be implemented even in late development. Daily cooperation between customers and developers is present. Working software is frequently delivered.
Which three statements are correct about the agile software development methodology? (Choose three.) Change requirements can be implemented even in late development. Daily cooperation between customers and developers is present. The development process is divided into distinct phases. The testing phase comes after the build phase. Working software is frequently delivered.
Design errors are highlighted before any code is written. It is difficult to move back to make changes from previous phases. You cannot change the scope of the requirements once project development starts.
Which three statements are correct about the waterfall software development methodology? (Choose three.) Design errors are highlighted before any code is written. Each phase of a project is followed by a verification phase. It is difficult to move back to make changes from previous phases. The waterfall methodology is ideal for a large-size project. You cannot change the scope of the requirements once project development starts.
Each instruction creates a new image to optimize the process of building a Docker image, The last-modified time is not considered in the COPY instruction cache lookup Using the --no-cache=true option on the Docker build command skips cache.
Which three statements are true regarding the Docker image build cache? (Choose three.) Each instruction creates a new image to optimize the process of building a Docker image. The last-modified time is not considered in the COPY instruction cache lookup. The same ADD instruction in Dockerfile always invalidates cache. The same RUN instruction in Dockerfile always invalidates cache. Using the --no-cache=true option on the Docker build command skips cache.
desktops, IP phones, and printers.
Which three types of devices are typically connected to access switches in an enterprise network? (Choose three.) desktops firewalls IP phones printers routers
libcgroups The libcgroups library provides resource limiting, prioritization, accounting, and control to groups of tasks.
Which tool can be used to allocate CPU and memory among groups of tasks in Linux? chmod fence_tool libcgroups ulimit
JavaScript Library REST APIs
Which two APIs are available with Cisco Finesse? (Choose two.) Intent API JavaScript Library JSON RPC Open XML APIs REST APIs
declarative imperative
Which two approaches are used in Infrastructure as Code (IaC) when defining the target configuration? (Choose two.) declarative dynamic formal imperative static
XML XPath
Which two encodings for the <filter> element are supported in NETCONF <get-config> and <get> operations? (Choose two.) JSON XML XPath YAML YANG
json xml
Which two encodings must a RESTCONF client support in order to interoperate with a RESTCONF server? (Choose two.) csv json soap xml yaml
access control guest access management
Which two functionalities represent the primary functions provided by Cisco ISE? (Choose two.) access control device configuration tool guest access management device monitoring mobile device management
UCS PowerTool and the Python SDK are built on top of the UCS Management open XML APIs; they compose the XML needed for the API request and parse the response. Of course you can always go straight to the source and use the XML API directly. There are user guides for each of the UCS XML API choices.
Which two items are Cisco UCS Manager programmability frameworks that are built on top of the Cisco UCS Management Open XML APIs?
Cisco UCS PowerTool Cisco UCS Python SDK
Which two items are Cisco UCS Manager programmability frameworks that are built on top of the Cisco UCS Management open XML APIs? (Choose two.) IMC Supervisor Cisco UCS Central Cisco UCS IMC Redfish Cisco UCS PowerTool Cisco UCS Python SDK
Chef Puppet
Which two of the following Infrastructure as Code (IaC) tools use the pull method to configure servers? (Choose two.) Ansible Chef Cisco NSO Puppet Terraform
Raspbian running on Raspberry Pi Ubuntu running on Cisco UCS
Which two of the following are bare metal deployments? (Choose two.) Cisco Nexus 1000v running on ESXi Raspbian running on Raspberry Pi Ubuntu running inside Docker Ubuntu running on Cisco UCS Ubuntu running on hypervisor
It forces you to first think about the interface. It produces self-testing code by design.
Which two of the following are direct benefits of test-driven development (TDD)? (Choose two.) It forces you to write tests after code. It forces you to first think about the interface. It forces you to split the code into smaller modules. It produces self-testing code by design. It does not require code refactoring.
configure a device retrieve data about the environmental parameters of a device.
Which two operations can an SNMP manager process perform in a network? (Choose two.) authenticate users accessing a device configure a device construct a management information base (MIB) on a device retrieve data about the environmental parameters of a device retrieve data about the price of a device
A password sent using HTTP basic authentication can easily be decoded. HTTP basic authentication utilizes a username and a password.
Which two statements about HTTP basic authentication are correct? (Choose two.) A password sent using HTTP basic authentication can easily be decoded. HTTP basic authentication is also responsible for authorization. HTTP basic authentication is recommended due to security reasons. HTTP basic authentication utilizes a username and a password. In HTTP basic authentication, credentials are sent only in the first request.
Inter-app communication is fast. It offers the best performance.
Which two statements about bare metal deployment are correct? (Choose two.) Conflicts between application dependencies are rare. Inter-app communication is fast. It involves optimal hardware utilization. It offers the best performance. Migrating an application is easy.
The API key is associated with a Dashboard administrator account and The API key is generated in the Meraki Dashboard API access section.
Which two statements about the Cisco Meraki API key are true? (Choose two.) The API key is associated with a Dashboard administrator account. The API key is generated in the Meraki Dashboard API access section. The API key is generated locally on the Dashboard administrator's PC. The API key is never revoked once generated. The API key is stored in the Dashboard in plaintext.
system user
Which two values can be used with the "ordered-by" YANG list substatement? (Choose two.) admin random root system user
Explanation: The authoritative name server is the final step in the resolution process. It is the authoritative server for that specific domain. In the case of cisco.com, there are three authoritative servers: ns1.cisco.com, ns2.cisco.com and ns3.cisco.com. Whenever a public domain is registered, it is mandatory to specify one or more authoritative name servers for that domain. These name servers will be responsible for resolving that public domain to IP addresses.
Which type of DNS name server is contacted in the final step of the name resolution process? Authoritative name server Top-level domain name server Recursive resolver Root name server
Streamline incident response processes Consolidate endpoint security tools into a single solution Automate threat detection and remediation processes
With Cisco AMP for Endpoints, security teams leverage an integrated solution to proactively and efficiently combat threats in which of the following? (Choose all that apply.)Select 3 answers Streamline incident response processes Consolidate endpoint security tools into a single solution Password protection Automate threat detection and remediation processes Digital signature verification
Python and Perl
With Cisco Firepower Management Center (FMC) API Explorer, in which two languages can you get sample code snippets for a selected REST API function?
tenant = Tenant('tutorial') app = AppProfile('myapp', tenant) resp = tenant.push_to_apic(session) First the object of the Tenant class is created, after which the object of the AppProfile class is instantiated, referring to the tenant as its parent object. Then the configuration of the tenant is pushed to the APIC fabric.
With the ACI Toolkit, what is the correct order of creating and applying a configuration?
Enforcement API
Your company now uses Umbrella services for all public DNS requests. You want to make sure that certain malicious domains should NOT be accessible. Which API will be used for this use case? Enforcement API Management API Investigate API Reporting API Console API
database application live streaming video
Your manager has asked you to analyze the network traffic of your company. Which two types of traffic are considered delay-sensitive? (Choose two.) database application Domain Name System (DNS) email live streaming video peer-to-peer file sharing
Cisco ISE
_______ is a policy engine for controlling endpoint access and network device administration for enterprises. It allows central control of access policies for wired, wireless, and VPN endpoints in a network. Cisco Umbrella Cisco ISE Cisco Firepower Cisco Stealthwatch Cisco AMP
Cisco ISE
________ builds context about the endpoints that include users and groups (who), device type (what), access time (when), access location (where), access type (wired/wireless/VPN) (how), threats, and vulnerabilities. Cisco Umbrella Cisco ISE Cisco Firepower Cisco Stealthwatch Cisco AMP