3.0 Cisco Platforms and Development Flashcards

1
Q

3.2 What are Meraki’s APIs?

A
  1. Captive Portal
  2. Scanning API
  3. MV Sense Camera API
  4. Dashboard API
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3.2 What does Meraki’s Captive Portal API do?

A

This allows Network Administrators to completely control the content and authentication process that a user interacts with when connection to a Meraki wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3.2 What does Meraki’s Scanning API do?

A

Tracks WIFI and Bluetooth devices, providing location analytics and reports on user behaviors. This provides data in real time allowing for further processing. This can be used to track user locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3.2 What does Meraki’s MV Sense Camera API do?

A

The MV sense camera uses it onboard processor to run machine learning workloads at the edge. Providing object detection, classification, and tracking for application integration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3.2 What does Meraki’s Dashboard API do?

A

main uses include:
1. Provision new orgs, admins, networks and devices
2. configure networks at scale
3. Onboarding and decommissioning of clients
4. Building custom dashboards and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3.2 What pagination features does Meraki have?

A
  1. perPage: The number of entries to be returned in the current request
  2. startingAfter: A value used to indicate that the returned data will start immediately after this value
  3. endingBefore: A value used to indicate that the returned data will end immediately before this value
    Although the types of the startingAfter and endingBefore values differ based on API endpoints, they generally are either timestamps specifying windows in time for which the data should be returned or integer values specifying IDs and ranges of IDs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3.2 what are Cisco DNA centers 4 APIs?

A
  1. Intent API
  2. Integration API
  3. Multivendor SDK
  4. Events and notifications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3.2 What IPAM providers are supported by default in Cisco DNA Center?

A

Infoblox and Bluecat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3.2 What does Cisco DNA centers Intent API do?

A

a collection of northbound REST APIs that expose capabilities of the Cisco DNA Center platform. The APIs are designed to help users focus on outcomes instead of the mechanisms that implement them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3.2 What does Cisco DNA centers Integration API do?

A

This API can push network data, events, and notifications to extrenal systems and at the same time can consume from connected systems. Example: When a network issue is detected this can create a ticket and assign it to the correct personnel as well as provide suggested solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3.2 What does Cisco DNA centers Multivendor SDK do?

A

This allows their non-cisco devices to be managed by Cisco DNA center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3.2 What does Cisco DNA centers Events and Notifications do?

A

These are webhooks that can trigger, publishing events to configured receiving URLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3.2 What does Cisco SD-WAN do?

A

Seperates the data and control planes for WANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3.2 What are the 4 major products offered by Cisco SD-WAN?

A
  1. vManage
  2. vSmart
  3. vBond
  4. vEdge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3.2 What does Cisco SD-WAN’s vManage provide?

A

vManage is a centralized network management system that provides a GUI and REST API interface to the SD-WAN fabric. You can manage, monitor, and configure all componets from this single pane.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3.2 What does Cisco SD-WAN’s vSmart provide?

A

vSmart maintains a centralized routing table and policy that it propagates to all network edge devices via DTLS tunnels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

3.2 What does Cisco SD-WAN’s vBond provide?

A

vBond is the orchestrator of the fabric, authenticating vSmart controllers with vEdge devices. This is the only component that needs an external IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

3.2 What does Cisco SD-WAN’s vEdge provide?

A

vEdge routers are edge/access devices. They represent the data plane and move traffic accross the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

3.2 What are the two modes that a Cisco Nexus switch can run in?

A
  1. Stand-alone (NX-OS)
  2. ACI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

3.2 What is the name of the controller for Nexus switches when in ACI mode?

A

APIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

3.2 Explain how the ACI fabric works

A

APIC stores a object orentated scheme to store the logical configuration. The APIC then send the logical configuration to networking devices, which they turn into the concrete configuration on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

3.2 What is the most important object in the Cisco ACI fabric policy model?

A

The End Point Group (EPG) is the most important object in the policy model. An End Point Group is a collection of endpoints that have common policy requirements such as security, virtual machine mobility, QoS, or Layer 4 to Layer 7 services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

3.2 What is a tenant and what is an example of one?

A

A tenant are top level Managable Objects (MO) that identify and seperate admin control, application policies and failure domains. Example: an orginzation in an enterprise enviroment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

3.2 In Cisco UCS Manager what is the logical construct that contains the complete configuration of a physical server?

A

Service Profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

3.2 What is the Cisco UCS Manager Python SDK library called?

A

ucsmsdk (UCS Manager SDK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

3.2 What is the managed object browser called in Cisco UCS Manager?

A

Visore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

3.2 What are the two catagories a Tenant contains?

A

Networking and Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

3.2 What Python library for ACI covers the most common ACI workflows?

A

acitoolkit

29
Q

3.3 Up to how many servers can be included in the UCS fabric managed by one UCS Manager?

A

160

30
Q

3.3 What technology that supports all traffic from Cisco UCS servers over a single physical link?

A

Cisco SingleConnect

31
Q

3.3 What is Cisco UCS Manager?

A

a centralized software application that manages all components within a Cisco Unified Computing System (UCS), allowing administrators to configure, monitor, and provision servers, network, and storage resources across the entire UCS infrastructure through a single interface

32
Q

3.3 What language does UCS managers API use?

A

XML

33
Q

3.3 What is the Cisco UCS Platform emulator?

A

a virtualized version of the Cisco UCS Manager software that allows users to practice and test configurations on a simulated Cisco Unified Computing System (UCS) environment without requiring any physical UCS hardware

34
Q

3.3 What two authentications methods does Cisco Intersights support?

A

API keys and Session cookies

35
Q

3.3 What does MIM stand for and do?

A

Management Information Model, The general model that comprises all the physical and logical components of the ACI fabric

36
Q

3.3 What does MIT stand for and do?

A

Mangement Information Tree - A heirarchical representation of the MIM

37
Q

3.3 What does a Cisco Intersight REST API key contain?

A

keyId and keySecret

38
Q

3.4 What capabilities does Webex Team API have?

A
  • Administer for an Organization, user accounts, etc…
  • Create Teams, Spaces, And Memberships
  • Search for people
  • Post messages
  • Get history or be notified when new messages are posted.
39
Q

3.4 How is the Webex Teams heirarchy structured (hint there are 4 building blocks)

A

Top - Organization
Teams
Rooms
Bottom - Person(s)

40
Q

3.4 What are Personall Access Tokens and how long do they last?

A

You log onto Ciscos website to request one that grants you access for 12 hours. do not use outside of testing for development due to its temporary nature.

41
Q

3.4 What is Intergrations Authentications for Cisco Webex Teams?

A

the process of enabling third-party applications to securely interact with Webex services via APIs. It ensures that these integrations can access Webex data or perform actions on behalf of a user or organization while maintaining security and control.

42
Q

3.4 What are the 3 types of Bots for Cisco Webex teams?

A

Notification - Events from external services are brought in and posted

Controller - External Systems that have APIs allow 3rd party apps to be intergrated to control them.

Assistant - Virtual Assistants usually understand natural language, so a user can asak questions of bots as they would ask humans.

43
Q

3.4 What are two popular Bot Frameworks?

A

Flint - open-source with support for regex.

Botkit - open-source with advanced conversation suppoert and intergrations

44
Q

3.4 What is xAPI?

A

the API for collaboration endpoint software for both onprem video conference devices and devices registered to Cisco’s cloud service. You can use this to configure and/or monitor.

45
Q

3.4 What are the 4 major groups in xAPI?

A

Commands, Configurations, status, and Events

46
Q

3.4 What is Cisco Unified Communications Manager (CUCM)?

A

The call-processing component of the Cisco Unified Communication solution.

47
Q

3.4 What is Cisco Unified Communications Manager’s (CUCM) Administrative XML Layer (AXL)?

A

AXL is a SOAP-based API designed for administrative access to CUCM configuration. It is important for managing CUCM settings programmatically.

48
Q

3.4 What is Cisco Unified Communications Manager’s (CUCM) UDS (User Data Services)?

A

UDS is a RESTful API designed to retrieve user-related information. It is lightweight and focuses on user-specific operations.

49
Q

3.5 What are the 3 areas that Cisco’s security portfolio focus on?

A

Visibility, Segement, and Protect

50
Q

3.5 What is Cisco Umbrella?

A

A cloud-based secure gateway/dns server that blocks malware, ransomware, and phising attempts. as well as maintains a white/blacklist. This can be intergrated with Cisco AMP.

51
Q

3.5 What does Cisco Umbrella’s Enforcement API do?

A

Gives technology partners the ability to send security events from their platform/service/appliance to Umbrella, which then puts it on a block list.

52
Q

3.5 What does Cisco Umbrella’s Investigate API do?

A

Let’s technoogy partners query security events of the Umbrella database to deem a domain safe or not. This gives much more information than just good or not good.

53
Q

3.5 What is Cisco Secure Endpoint?

A

A cloud-managed solution for endpoint detection and response (EDR) that defends against malware and advanced threats.

54
Q

3.5 What is the Cisco ISE Session API?

A

The Session API provides real-time visibility and control over active network sessions for users and devices.

55
Q

3.5 What is the Cisco ISE ERS API?

A

The ERS API enables programmatic access to Cisco ISE for managing users, devices, policies, and network configurations.

56
Q

3.5 What is Cisco XDR?

A

Cisco XDR is a security platform that aggregates data from multiple security products to detect, investigate, and respond to threats across endpoints, networks, emails, and the cloud.

57
Q

3.5 What is Cisco Secure Malware Analytics?

A

Cisco Secure Malware Analytics is a sandboxing platform that performs dynamic analysis of suspicious files to detect malware behavior and generate detailed threat intelligence reports.

58
Q

3.5 What does Cisco Secure Malware Analytics Data API and Curated Feeds API do and what is the difference?

A

The Curated Feeds API is mostly used for GET requests to see if something is whitelisted in the database.

The Analytics Data API is mostly used to POST unknown files to for “scanning”.

59
Q

3.6

A
60
Q

3.6

A
61
Q

3.6

A
62
Q

3.6

A
63
Q

3.8 What is NETCONF?

A

A protocol that specifies the mechanisims to establish a connection and exchange data. It does not determine the format of data that would be YANG. Made in 2002

64
Q

3.8 What is YANG?

A

YANG (Yet Another Next Generation) is a data modeling language that is almost universally used. This means that no matter the vendor, if you send data in a YANG format it will be readable.

65
Q

3.8 How does NETCONF work?

A

NETCONF use Remote Procedure Calls (RPCs), a standard framework for client to send a request to a server to perform an action and return the result. This is XML formatted.

66
Q

3.8 What are the 3 types of data configuration stores that NETCONF has?

A

Run, Start, And Candidate
Canidate - A configuration that is ready to be applied into the start config whenevre a commit is ran.

67
Q

3.8 What data format is YANG expressed in?

A

XML

68
Q

3.8 What is RESTCONF?

A

an HTTP-based protocol that provides a programatic interface fir accessing data defined in YANG.