final Flashcards
(169 cards)
- A pharmaceutical company wants to contract the services of a cloud provider to store employee data and company-specific applications with strict access security. Which type of cloud would be the most appropriate for this scenario?
community cloud
public cloud
hybrid cloud
private cloud
private cloud
What is a function provided by an implementation of a read-only automation solution?
the ability to reduce risk by implementing security policies across the network infrastructure via automated changes
the ability to use GET and SET requests to retrieve and send data across the network infrastructure
the ability to use an automated request to audit configurations and manually deploy changes in order to implement compliance
the ability to implement network infrastructure that receives a configuration from a specific centralized server
the ability to use an automated request to audit configurations and manually deploy changes in order to implement compliance
Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)
The TCP process running on the PC randomly selects the destination port when establishing a session with the server.
UDP segments are encapsulated within IP packets for transport across the network
The TCP source port number identifies the sending host on the network
The UDP destination port number identifies the application or service on the server which will handle the data.
The source port field identifies the running application or service that will handle data returning to the PC
TCP is the preferred protocol when a function requires lower network overhead
UDP segments are encapsulated within IP packets for transport across the network
The UDP destination port number identifies the application or service on the server which will handle the data.
The source port field identifies the running application or service that will handle data returning to the PC
What type of attack targets an SQL database using the input field of a user?
buffer overflow
SQL injection
Cross site scripting
XML injection
SQL injection
Which command can be used on Linux and MAC hosts to get IP addressing information?
ipconfig
ip address
ifconfig
networksetup -getinfo
ifconfig
What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)
to create fewer collision domains
to create more broadcast domains
to enhance user bandwidth
to isolale ARP request messages from the rest of the network
to eliminate virtual circuits
to isolate traffic between segments
to enhance user bandwidth
to isolate traffic between segments
Which tool might a developer use as part of a Continuous Integration pipeline in order to build and test source code?
SQL
REST
Docker
Jenkins
Jenkins
A packet is received by a server. The packet has a destination port number of 8008. What protocol or service is requested?
Telnet over SSH
RESTCONF
HTTP
NETCONF
RESTCONF
A network contains multiple VLANs spanning multiple switches. What happens when a device in VLAN 20 sends a broadcast Ethernet frame?
Devices in VLAN 20 and the management VLAN see the frame.
All devices in all VLANs see the frame
Only devices that are connected to the local switch see the frame
Only devices in VLAN 20 see the frame.
Only devices in VLAN 20 see the frame.
Which piece of software is responsible for creating and managing virtual machines, including allocating system resources to each virtual machine as needed?
supervisor
hypervisor
host operating system
hosted operating system
hypervisor
How is an Ethernet MAC address constructed?
The first 3 bytes represent the network upon which the host resides, and the last 3 bytes uniquely identify the host.
The first 3 bytes represent the vendor OUI, and the last 3 bytes are assigned uniquely by the vendor
The first 3 bytes are uniquely assigned by LANA, and the last 3 bytes represent the serial number of the host
The first 3 byles represent the vendor OUI, and the last 3 byles are assigned randorily by the operating system.
The first 3 bytes represent the vendor OUI, and the last 3 bytes are assigned uniquely by the vendor
Which Cisco SDK works with ACI?
Cobra
IMC
UCS
Instant Connect
Cobra
What platforms are provided by DevNet for community members to share solutions, tool kits, and other resources with each other?
communities
forums
sandboxes
exchanges
exchanges
Which two data formats can RESTCON use when requesting data or responding with data? (Choose two.)
JSON
XML
YAML
YANG
HTML
JSON
XML
Which DevNet resource would a developer use to look for a Python library that supports APIs for a specific Cisco product?
DevNet Learning Labs
Devlet Support
Code Exchange
DevNet Sandbox
Code Exchange
A component was created with the intent of combining the disciplines and skills of Dev and Ops. This component created a new job role and implemented a best-practices playbook for doing Ops with software methods. Which component matches this description?
Agile Infrastructure and Operations
the SRE approach
automated infrastructure
shared Version control
the SRE approach
Match the DevNet exhange type with the decription.
uses the GitHub API and human moderators to categorize and display related repositories
choices:
code
ecosystem
automation exchange
code
Match the DevNet exhange type with the decription.
a collection of network automation use cases with different solutions and toolkits
choices:
code
ecosystem
automation exchange
automation exchange
Match the DevNet exhange type with the decription.
provides solutions across different technologies, industries, and geographies to jump start solution design and development
choices:
code
ecosystem
automation exchange
ecosystem
Enter the devices for Ansible playbooks
Refer to the exhibit. A user is working on Ansible on the local NMS to manage remote network devices. Which file is the user creating?
Main-RT ansible_user=classuser ansible_password=class123! ansible_host=172.20.20.250
service
playbook
variable
hosts
hosts
Which DevNet resource would a developer use in order to test custom code in a production-like environment?
Devlet Support
DevNet Learning Labs
Code Exchange
DevNet Sandbox
DevNet Sandbox
In which situation would a company implement a reverse proxy as a security solution?
when the company has a database and needs to point to a DNS server that uses different IP addresses for development resources
when the company wants all responses to clients to look like they came from the same server instead of individual ones
when a hash is created based on the IP address of the request to a particular protected server
when responses frorri servers need to be sent over different paths to ensure quality response time to the client devices making the requests
when the company wants all responses to clients to look like they came from the same server instead of individual ones
A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Agile method. What is a characteristic of this method?
a software development process where the highest priority is to satisfy the customer through early and continuous delivery of valuable software
a process that eliminates anything that does not add value to the project including meetings and documentation
a software development process that has the results of one phase feed into the next phase
a more traditional software development process as they have used this process in past projects
a software development process that has the results of one phase feed into the next phase
A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Agile method. What is a characteristic of this method?
a software development process that prioritizes responding to change over following a plan
a software development method that tracks closely with the software development life cycle
a process that was developed for manufacturing, but adapted to other industries
a more traditional sollware developical process as they have used this process ini past projects
a software development method that tracks closely with the software development life cycle