Chapter 3 Software-Defined Networking Security and Network Programmability Flashcards

1
Q

Which of the following are the three different “planes” in traditional networking?

A. The management, control, and data planes

B. The authorization, authentication, and accountability planes

C. The authentication, control, and data planes

D. None of these answers is correct.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is true about Cisco ACI?

A. Spine nodes interconnect leaf devices, and they can also be used to establish connections from a Cisco ACI pod to an IP network or interconnect multiple Cisco ACI pods.

B. Leaf switches provide the Virtual Extensible LAN (VXLAN) tunnel endpoint (VTEP) function.

C. The APIC manages the distributed policy repository responsible for the definition and deployment of the policy-based configuration of the Cisco ACI infrastructure.

D. All of these answers are correct.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is used to create network overlays?

A. SDN-Lane

B. VXLAN

C. VXWAN

D. None of these answers is correct.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an identifier or a tag that represents a logical segment?

A. VXLAN Network Identifier (VNID)

B. VXLAN Segment Identifier (VSID)

C. ACI Network Identifier (ANID)

D. Application Policy Infrastructure Controller (APIC)

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is network traffic between servers (virtual servers or physical servers), containers, and so on?

A. East-west traffic

B. North-south traffic

C. Micro-segmentation

D. Network overlays

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is an HTTP status code message range related to successful HTTP transactions?

A. Messages in the 100 range

B. Messages in the 200 range

C. Messages in the 400 range

D. Messages in the 500 range

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a Python package that can be used to interact with REST APIs?

A. argparse

B. requests

C. rest_api_pkg

D. None of these answers is correct.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a type of API that exclusively uses XML?

A. APIC

B. REST

C. SOAP

D. GraphQL

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a modern framework of API documentation and is now the basis of the OpenAPI Specification (OAS)?

A. SOAP

B. REST

C. Swagger

D. WSDL

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following can be used to retrieve a network device configuration?

A. RESTCONF

B. NETCONF

C. SNMP

D. All of these answers are correct.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The RESTCONF interface is built around a small number of standardized requests. Which of the following are requests supported by RESTCONF?

A. GET

B. PUT

C. PATCH

D. All of these answers are correct.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NETCONF messages are encoded in a(n) ________ structure defined by the NETCONF standard.

A. JSON

B. XML

C. OWASP

D. RESTCONF

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a Cisco resource where you can learn about network programmability and obtain sample code?

A. APIC

B. ACI

C. DevNet

D. NETCONF

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

. A YANG-based server publishes a set of YANG modules, which taken together form the system’s _________.

A. YANG model

B. NETCONF model

C. RESTCONF model

D. gRPC model

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following HTTP methods sends data to the server typically used in HTML forms and API requests?

A. POST

B. GET

C. TRACE

D. PUT

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a solution that allows you to detect security threats in encrypted traffic without decrypting the packets?

A. ETA

B. ESA

C. WSA

D. None of these answers is correct.

A

A

17
Q

Which of the following is an open source project that allows you to deploy micro-segmentation policy-based services in container environments?

A. OVS

B. Contiv

C. ODL

D. All of the above

A

B

18
Q

NFV nodes such as virtual routers and firewalls need which of the following components as an underlying infrastructure?

A. A hypervisor

B. A virtual forwarder to connect individual instances

C. A network controller

D. All of these answers are correct.

A

D

19
Q

There have been multiple IP tunneling mechanisms introduced throughout the years. Which of the following are examples of IP tunneling mechanisms?

A. VXLAN

B. SST

C. NVGRE

D. All of these answers are correct.

A

D

20
Q

Which of the following is true about SDN?

A. SDN provides numerous benefits in the area of management plane. These benefits are in both physical switches and virtual switches.

B. SDN changed a few things in the management, control, and data planes. However, the big change was in the control and data planes in software-based switches and routers (including virtual switches inside of hypervisors).

C. SDN is now widely adopted in data centers.

D. All of these answers are correct.

A

D