Book Resume 8-9 Devasc Flashcards
Is a set of software development tools that
developers can use to create software or applications for a certain platform, operating system,
computer system, or device.
An SDK (software development kit) or devkit
A good SDK has these qualities:
■■ Is easy to use
■■ Is well documented
■■ Has value-added functionality
■■ Integrates well with other SDKs
■■ Has minimal impact on hardware resources
SDKs provide the following advantages:
■■ Quicker integration
■■ Faster and more efficient development
■■ Brand control
■■ Increased security
■■ Metrics
From a programmability perspective, the Meraki cloud platform provides several APIs:
■■ Captive Portal API
■■ Scanning API
■■ MV Sense Camera API
■■ Dashboard API
The Meraki Dashboard API supports three special query
parameters for pagination:
■■ perPage: The number of entries to be returned in the current request
■■ startingAfter: A value used to indicate that the returned data will start immediately
after this value
■■ endingBefore: A value used to indicate that the returned data will end immediately
before this value
Is an open, extensible, software-driven architecture
from Cisco that accelerates and simplifies enterprise network operations.
Cisco Digital Network Architecture (DNA)
From a programmability perspective, Cisco DNA Center provides a set of REST APIs and
SDKs through the Cisco DNA Center platform that are grouped in the following categories:
■■ Intent API
■■ Integration API
■■ Multivendor SDK
■■ Events and notifications
One of the main goals of the Cisco DNA Center platform is..?
To simplify and streamline end-to-
end IT processes. The Integration API was created for exactly this purpose
The Intent API is organized into several distinct categories:
■■ Know Your Network category:
■■ Site Management category:
■■ Connectivity category:
■■ Operational Tools category:
Is a cloud-first architecture for
deploying WAN connectivity.
Cisco SD-WAN (Software-Defined Wide Area Network)
Cisco SD-WAN offering contains several products that perform different functions, what are:
vManage
vSmart
vBond
vEdge
A control protocol used to exchange routing,
policy, and management information within Cisco SD-WAN fabrics.
Overlay Management Protocol (OMP)
Is the SDN-based solution from Cisco for
data center deployment, management, and monitoring.
Cisco Application Centric Infrastructure (ACI)
Provides intelligent cloud-powered infrastructure management
for Cisco UCS and Cisco HyperFlex platforms.
Cisco Intersight
The Intersight web service supports two authentication methods:
■■ API keys
■■ Session cookies
Webex Teams take place in virtual meeting rooms called
Spaces
There are four ways to access the Webex Teams APIs:
■■ Personal access tokens
■■ Integrations
■■ Bots
■■ Guest issuers
What type of comunications Bots are?
■■ Notification Bot
■■ Controller Bot
■■ Assistant Bot
These are two popular bot frameworks?
■■ Flint
■■ Botkit
Is an open-source bot framework with support for regex pattern matching for messages and more.
Flint
Is a popular open-source bot framework with advanced conversational
support as well as integrations with a comprehensive array of natural language processing
and storage providers.
Botkit
Is a call agent and supervisor desktop solution designed to meet
the growing needs of agents, supervisors, and the administrators and developers who support
them.
The Cisco Finesse desktop
Is the API for collaboration endpoint software (Cisco CE and RoomOS) for both onpremises
registered video conferencing devices
xAPI
The Umbrella ________ API provides enrichment of security events with intelligence
to SIEM or other security visibility tool.
The Umbrella Investigate API
The Umbrella Enforcement API involves an HTTP ______ request, which internally
comprises an _____ API to check whether the domain is safe.
POST, Investigate
In the Firepower Management Center API, the token is generated and returned via
________.
the HTTP header X-auth-access-token
A _______ object is a reusable configuration that associates a name with a value.
named
Which of the following allows bad actors to gain access to and control endpoint
resources over an extended period to steal valuable data without being detected?
Advanced persistent threat
Enables devices and users to be identified and provisioned and enables policies to be applied?
Cisco ISE
Describes Threat Grid?
A unified malware analysis and threat intelligence platform
Which of the following are used to indicate that a system has been affected by some
form of malware?
IOCs