final Flashcards

(169 cards)

1
Q
  1. A pharmaceutical company wants to contract the services of a cloud provider to store employee data and company-specific applications with strict access security. Which type of cloud would be the most appropriate for this scenario?

community cloud
public cloud
hybrid cloud
private cloud

A

private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a function provided by an implementation of a read-only automation solution?

the ability to reduce risk by implementing security policies across the network infrastructure via automated changes
the ability to use GET and SET requests to retrieve and send data across the network infrastructure
the ability to use an automated request to audit configurations and manually deploy changes in order to implement compliance
the ability to implement network infrastructure that receives a configuration from a specific centralized server

A

the ability to use an automated request to audit configurations and manually deploy changes in order to implement compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)

The TCP process running on the PC randomly selects the destination port when establishing a session with the server.
UDP segments are encapsulated within IP packets for transport across the network
The TCP source port number identifies the sending host on the network
The UDP destination port number identifies the application or service on the server which will handle the data.
The source port field identifies the running application or service that will handle data returning to the PC
TCP is the preferred protocol when a function requires lower network overhead

A

UDP segments are encapsulated within IP packets for transport across the network

The UDP destination port number identifies the application or service on the server which will handle the data.

The source port field identifies the running application or service that will handle data returning to the PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of attack targets an SQL database using the input field of a user?

buffer overflow
SQL injection
Cross site scripting
XML injection

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which command can be used on Linux and MAC hosts to get IP addressing information?

ipconfig
ip address
ifconfig
networksetup -getinfo

A

ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)

to create fewer collision domains
to create more broadcast domains
to enhance user bandwidth
to isolale ARP request messages from the rest of the network
to eliminate virtual circuits
to isolate traffic between segments

A

to enhance user bandwidth

to isolate traffic between segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which tool might a developer use as part of a Continuous Integration pipeline in order to build and test source code?

SQL
REST
Docker
Jenkins

A

Jenkins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A packet is received by a server. The packet has a destination port number of 8008. What protocol or service is requested?

Telnet over SSH
RESTCONF
HTTP
NETCONF

A

RESTCONF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network contains multiple VLANs spanning multiple switches. What happens when a device in VLAN 20 sends a broadcast Ethernet frame?

Devices in VLAN 20 and the management VLAN see the frame.
All devices in all VLANs see the frame
Only devices that are connected to the local switch see the frame
Only devices in VLAN 20 see the frame.

A

Only devices in VLAN 20 see the frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which piece of software is responsible for creating and managing virtual machines, including allocating system resources to each virtual machine as needed?

supervisor
hypervisor
host operating system
hosted operating system

A

hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is an Ethernet MAC address constructed?

The first 3 bytes represent the network upon which the host resides, and the last 3 bytes uniquely identify the host.
The first 3 bytes represent the vendor OUI, and the last 3 bytes are assigned uniquely by the vendor
The first 3 bytes are uniquely assigned by LANA, and the last 3 bytes represent the serial number of the host
The first 3 byles represent the vendor OUI, and the last 3 byles are assigned randorily by the operating system.

A

The first 3 bytes represent the vendor OUI, and the last 3 bytes are assigned uniquely by the vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Cisco SDK works with ACI?

Cobra
IMC
UCS
Instant Connect

A

Cobra

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What platforms are provided by DevNet for community members to share solutions, tool kits, and other resources with each other?

communities
forums
sandboxes
exchanges

A

exchanges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two data formats can RESTCON use when requesting data or responding with data? (Choose two.)

JSON
XML
YAML
YANG
HTML

A

JSON
XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which DevNet resource would a developer use to look for a Python library that supports APIs for a specific Cisco product?

DevNet Learning Labs
Devlet Support
Code Exchange
DevNet Sandbox

A

Code Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A component was created with the intent of combining the disciplines and skills of Dev and Ops. This component created a new job role and implemented a best-practices playbook for doing Ops with software methods. Which component matches this description?

Agile Infrastructure and Operations
the SRE approach
automated infrastructure
shared Version control

A

the SRE approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Match the DevNet exhange type with the decription.

uses the GitHub API and human moderators to categorize and display related repositories

choices:
code
ecosystem
automation exchange

A

code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Match the DevNet exhange type with the decription.

a collection of network automation use cases with different solutions and toolkits

choices:
code
ecosystem
automation exchange

A

automation exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Match the DevNet exhange type with the decription.

provides solutions across different technologies, industries, and geographies to jump start solution design and development

choices:
code
ecosystem
automation exchange

A

ecosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Enter the devices for Ansible playbooks

Refer to the exhibit. A user is working on Ansible on the local NMS to manage remote network devices. Which file is the user creating?

Main-RT ansible_user=classuser ansible_password=class123! ansible_host=172.20.20.250

service
playbook
variable
hosts

A

hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which DevNet resource would a developer use in order to test custom code in a production-like environment?

Devlet Support
DevNet Learning Labs
Code Exchange
DevNet Sandbox

A

DevNet Sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In which situation would a company implement a reverse proxy as a security solution?

when the company has a database and needs to point to a DNS server that uses different IP addresses for development resources
when the company wants all responses to clients to look like they came from the same server instead of individual ones
when a hash is created based on the IP address of the request to a particular protected server
when responses frorri servers need to be sent over different paths to ensure quality response time to the client devices making the requests

A

when the company wants all responses to clients to look like they came from the same server instead of individual ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Agile method. What is a characteristic of this method?

a software development process where the highest priority is to satisfy the customer through early and continuous delivery of valuable software
a process that eliminates anything that does not add value to the project including meetings and documentation
a software development process that has the results of one phase feed into the next phase
a more traditional software development process as they have used this process in past projects

A

a software development process that has the results of one phase feed into the next phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Agile method. What is a characteristic of this method?

a software development process that prioritizes responding to change over following a plan
a software development method that tracks closely with the software development life cycle
a process that was developed for manufacturing, but adapted to other industries
a more traditional sollware developical process as they have used this process ini past projects

A

a software development method that tracks closely with the software development life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A network engineer is creating a Docker container using the docker build command. If the engineer does not specify a tag, which tag will be used by default? tag latest (a blank space) default
latest
26
Which component in the pyATS ecology handles bundling and running jobs? AEtest Clover Genie EasyPy
EasyPy
27
Which three avenues are available within DevNet for developers who need help with specific developer scenario questions concerning Cisco products? (Choose three.) logging a ticket posting to the DevNet zone posting to a news group posting to a community forum posting to a Webex Teams space posting on the Cisco Learning Network
logging a ticket posting to a community forum posting to a Webex Teams space
28
A student who is interested in network programmability approaches an instructor for advice on learning more about the subject. The student is a kinesthetic learner who learns by doing. Which DevNet resource should the instructor consider telling the student about? DevNet Create DevNet Learning Labs DevNet Express DevNet Zone
DevNet Learning Labs
29
What is the default shell commonly used on macOS and Linux? tcsh csh Bourne Bash
Bash
30
What is immutable infrastructure in DevOps? infrastructure that is deployed with all component versions locked except for the ability to perform manual configuration changes infrastructure that is only deployed and maintained in containers infrastructure that is entirely maintained and deployed in code and never subjected to manual changes virtualized infrastructure that is deployed as golden images
infrastructure that is entirely maintained and deployed in code and never subjected to manual changes
31
What is the most common cause of IT outages? an engineer misconfiguring a device or network with manual changes an experienced engineer using an open source product an experienced engineer implementing a configuration using automation a threat actor largeting the enterprise equipment
an engineer misconfiguring a device or network with manual changes
32
Which string of characters is used to identify the beginning of a new separate document when multiple documents are in a single YAML file? three slashes “///” three dots “…” three pound signs “###” three dashes “—“
three dashes “—“
33
What is the difference between functions and methods in the Python programming structure? Functions can use global variables whereas methods can only use local variables. Functions are called by a referencing object whereas methods are called by the names. Functions can pass arguments whereas methods can pass only predefined keywords. Functions are standalone code blocks whereas methods are code blocks associated with an object.
Functions are standalone code blocks whereas methods are code blocks associated with an object.
34
Which command is used to create a new Git repository? git init git add git commit git clone
git init
35
Which stakeholder determines the useful value of software product features in the Lean process? the customer the Scrum master the reviewer the programmer
the customer
36
Match the SDLC phase with its description. (Not all options are used.) requirements & analysis choices: software is installed into the production environment code is developed according to low level and high level design documents code is installed into a testing environment to look for bugs the product owner and qualified team members gather the requirements for the software to be built
the product owner and qualified team members gather the requirements for the software to be built
37
Match the SDLC phase with its description. (Not all options are used.) implementation choices: software is installed into the production environment code is developed according to low level and high level design documents code is installed into a testing environment to look for bugs the product owner and qualified team members gather the requirements for the software to be built
code is developed according to low level and high level design documents
38
Match the SDLC phase with its description. (Not all options are used.) deployment choices: software is installed into the production environment code is developed according to low level and high level design documents code is installed into a testing environment to look for bugs the product owner and qualified team members gather the requirements for the software to be built
software is installed into the production environment
39
What is a principle of the Lean software development model? adding additional product features that the customer did not ask for so that the customer is getting more than expected assigning resources to multiple projects so that effort can be divided on more than one task at a time making decisions as late as possible in the process so that more facts and details are available ordering workers to do tasks they may not want to do to ensure they get done
making decisions as late as possible in the process so that more facts and details are available
40
What character is used to separate the key and value pairs in YAML? colon : semi colon ; underscore _ forward slash /
colon :
41
Which git command is used to compare changes between files? git diff git merge git checkout git status
git diff
42
Refer to the exhibit. Match the missing components of the Python script for authenticating to the Cisco Network Services Orchestrator and obtaining a list of network devices using the username of “superadmin” and password of “soverysecure!”. (Not all options are used.) import requests username = '_Component1_' password = '_Component2_' url = "https://devasc-nsc-1.cisco.com/restconf/data/talif-ncs:devices/_Component3_" headers = { 'Content-Type': "application/yang-data+json" } response = requests._Component4_(url, auth=(_Component5_, _Component6_), headers=headers, verify=False) print(response.text) question: Component 1 choices soverysecure! superadmin list get username password device
superadmin
43
Refer to the exhibit. Match the missing components of the Python script for authenticating to the Cisco Network Services Orchestrator and obtaining a list of network devices using the username of “superadmin” and password of “soverysecure!”. (Not all options are used.) import requests username = '_Component1_' password = '_Component2_' url = "https://devasc-nsc-1.cisco.com/restconf/data/talif-ncs:devices/_Component3_" headers = { 'Content-Type': "application/yang-data+json" } response = requests._Component4_(url, auth=(_Component5_, _Component6_), headers=headers, verify=False) print(response.text) question: Component 2 choices soverysecure! superadmin list get username password device
soverysecure!
44
Refer to the exhibit. Match the missing components of the Python script for authenticating to the Cisco Network Services Orchestrator and obtaining a list of network devices using the username of “superadmin” and password of “soverysecure!”. (Not all options are used.) import requests username = '_Component1_' password = '_Component2_' url = "https://devasc-nsc-1.cisco.com/restconf/data/talif-ncs:devices/_Component3_" headers = { 'Content-Type': "application/yang-data+json" } response = requests._Component4_(url, auth=(_Component5_, _Component6_), headers=headers, verify=False) print(response.text) question: Component 3 choices soverysecure! superadmin list get username password device
list
45
Refer to the exhibit. Match the missing components of the Python script for authenticating to the Cisco Network Services Orchestrator and obtaining a list of network devices using the username of “superadmin” and password of “soverysecure!”. (Not all options are used.) import requests username = '_Component1_' password = '_Component2_' url = "https://devasc-nsc-1.cisco.com/restconf/data/talif-ncs:devices/_Component3_" headers = { 'Content-Type': "application/yang-data+json" } response = requests._Component4_(url, auth=(_Component5_, _Component6_), headers=headers, verify=False) print(response.text) question: Component 4 choices soverysecure! superadmin list get username password device
get
46
Refer to the exhibit. Match the missing components of the Python script for authenticating to the Cisco Network Services Orchestrator and obtaining a list of network devices using the username of “superadmin” and password of “soverysecure!”. (Not all options are used.) import requests username = '_Component1_' password = '_Component2_' url = "https://devasc-nsc-1.cisco.com/restconf/data/talif-ncs:devices/_Component3_" headers = { 'Content-Type': "application/yang-data+json" } response = requests._Component4_(url, auth=(_Component5_, _Component6_), headers=headers, verify=False) print(response.text) question: Component 5 choices soverysecure! superadmin list get username password device
username
47
Refer to the exhibit. Match the missing components of the Python script for authenticating to the Cisco Network Services Orchestrator and obtaining a list of network devices using the username of “superadmin” and password of “soverysecure!”. (Not all options are used.) import requests username = '_Component1_' password = '_Component2_' url = "https://devasc-nsc-1.cisco.com/restconf/data/talif-ncs:devices/_Component3_" headers = { 'Content-Type': "application/yang-data+json" } response = requests._Component4_(url, auth=(_Component5_, _Component6_), headers=headers, verify=False) print(response.text) question: Component 6 choices soverysecure! superadmin list get username password device
password
48
What is an example of a use supported by Cisco UCS Director and UCS Manager? bare metal server provisioning and monitoring of virtual environments call center and call management over IP networks underlying central system workflow management and migration telemetry data collection and analysis
bare metal server provisioning and monitoring of virtual environments
49
How can a Webex Teams administrator retrieve additional details about a user through an API call? by using the value of the organization name in the API call by using the value of a Webex Teams registered email address in the API call by using the value of the person id key in the API call by using the value of orgld in the API call
by using the value of the person id key in the API call
50
Which library is the most commonly used Python library for connecting NETCONF clients with a NETCONF server? posix pyclient ncclient pypi
ncclient
51
Refer to the exhibit. Match the missing components of the Python script for authenticating to the Cisco DNA Center and obtaining an authentication token using the username of “adminuser” and password of “Sup3rC1$c0”. (Not all options are used.) import requests import json import sys dnacip = "cisco44-dnacenter-31.cisco.com" username = "adminuser" password = "Sup3rC1$c0" def get_X_auth_token(_Component1_,username,password): post_uri = "https://"+dnacip+"/dna/system/api/v1/auth/token" print ("\nAuthenticate: POST %s"% (post_uri) try: r = requests.post(post_uri, _Component2_=(username, password), verify=False) return r.json() ["Token'] except: print ("Status: %s"%r.status_code) print ("Response: %s"%r.text) sys.exit() token = get_X_auth_token (dnacip, username, _Component3_) print ("returned Authentication Token: ", (token)) Question: Component 1 Choices: password adminuser auth dnacip post
dnacip
52
Refer to the exhibit. Match the missing components of the Python script for authenticating to the Cisco DNA Center and obtaining an authentication token using the username of “adminuser” and password of “Sup3rC1$c0”. (Not all options are used.) import requests import json import sys dnacip = "cisco44-dnacenter-31.cisco.com" username = "adminuser" password = "Sup3rC1$c0" def get_X_auth_token(_Component1_,username,password): post_uri = "https://"+dnacip+"/dna/system/api/v1/auth/token" print ("\nAuthenticate: POST %s"% (post_uri) try: r = requests.post(post_uri, _Component2_=(username, password), verify=False) return r.json() ["Token'] except: print ("Status: %s"%r.status_code) print ("Response: %s"%r.text) sys.exit() token = get_X_auth_token (dnacip, username, _Component3_) print ("returned Authentication Token: ", (token)) Question: Component 2 Choices: password adminuser auth dnacip post
auth
53
Refer to the exhibit. Match the missing components of the Python script for authenticating to the Cisco DNA Center and obtaining an authentication token using the username of “adminuser” and password of “Sup3rC1$c0”. (Not all options are used.) import requests import json import sys dnacip = "cisco44-dnacenter-31.cisco.com" username = "adminuser" password = "Sup3rC1$c0" def get_X_auth_token(_Component1_,username,password): post_uri = "https://"+dnacip+"/dna/system/api/v1/auth/token" print ("\nAuthenticate: POST %s"% (post_uri) try: r = requests.post(post_uri, _Component2_=(username, password), verify=False) return r.json() ["Token'] except: print ("Status: %s"%r.status_code) print ("Response: %s"%r.text) sys.exit() token = get_X_auth_token (dnacip, username, _Component3_) print ("returned Authentication Token: ", (token)) Question: Component 3 Choices: password adminuser auth dnacip post
password
54
Refer to the exhibit. Match the missing components to the Python script for authenticating to the Cisco DNA Center and obtaining a token using the username of “secureuser” and password of “C1$c0”. (Not all options are used.) import requests import json import sys dnacip = "net12-dnacenter-1.cisco.com" username = "secureuser" password = "_Component1_" def get_X_auth_token(dnacip,username,password): post_uri = "https://"+dnacip+"/dna/system/api/v1/auth/token" print ("\nAuthenticate: POST %s"% (post_uri) try: r = requests.post(post_uri, _Component2_=(username, password), verify=False) return r.json() ["Token'] except: print ("Status: %s"%r.status_code) print ("Response: %s"%r.text) sys.exit() token = get_X_auth_token__Component3_ (dnacip, username, password) print ("returned Authentication Token: ", (token)) Question: Component 1 Choices: password token secureuser success C1$s0 requests
C1$s0
55
Refer to the exhibit. Match the missing components to the Python script for authenticating to the Cisco DNA Center and obtaining a token using the username of “secureuser” and password of “C1$c0”. (Not all options are used.) import requests import json import sys dnacip = "net12-dnacenter-1.cisco.com" username = "secureuser" password = "_Component1_" def get_X_auth_token(dnacip,username,password): post_uri = "https://"+dnacip+"/dna/system/api/v1/auth/token" print ("\nAuthenticate: POST %s"% (post_uri) try: r = requests.post(post_uri, _Component2_=(username, password), verify=False) return r.json() ["Token'] except: print ("Status: %s"%r.status_code) print ("Response: %s"%r.text) sys.exit() token = get_X_auth_token__Component3_ (dnacip, username, password) print ("returned Authentication Token: ", (token)) Question: Component 2 Choices: password token secureuser success C1$s0 requests
password
56
Refer to the exhibit. Match the missing components to the Python script for authenticating to the Cisco DNA Center and obtaining a token using the username of “secureuser” and password of “C1$c0”. (Not all options are used.) import requests import json import sys dnacip = "net12-dnacenter-1.cisco.com" username = "secureuser" password = "_Component1_" def get_X_auth_token(dnacip,username,password): post_uri = "https://"+dnacip+"/dna/system/api/v1/auth/token" print ("\nAuthenticate: POST %s"% (post_uri) try: r = requests.post(post_uri, _Component2_=(username, password), verify=False) return r.json() ["Token'] except: print ("Status: %s"%r.status_code) print ("Response: %s"%r.text) sys.exit() token = get_X_auth_token__Component3_ (dnacip, username, password) print ("returned Authentication Token: ", (token)) Question: Component 1 Choices: password token secureuser success C1$s0 requests
token
57
Refer to the exhibit. Match the missing components of the Python script for the following tasks. (Not all options are used.) delete all previous demo rooms create a new demo room enroll Allan and Jane as members post a message to the new room from webexteamssdk import WebexTeamsAPI api = WebeTeamsAPI() all_rooms = api.rooms.list() demo_rooms = [room for room in all_rooms if 'oldtest Demo' in room.title] for room in demo_rooms: api.rooms. __Component1__(room.id) demo_room = api.rooms. __Component2__('newtest Demo') email_addresses = ["Jane@test.com", "Allan@test.com] for email in email_addresses: api. __Component3__.create(demo_room.id, personEmail=email) api.messages.create(demo_room.id, __Component4__="Welcome to the room!" files=["https://www.webex.com/content/dam/wbx/us/images/dg-integ/teams_icon.png"]) Question: Component 1 Choices: test delete create memberships
delete
58
Refer to the exhibit. Match the missing components of the Python script for the following tasks. (Not all options are used.) delete all previous demo rooms create a new demo room enroll Allan and Jane as members post a message to the new room from webexteamssdk import WebexTeamsAPI api = WebeTeamsAPI() all_rooms = api.rooms.list() demo_rooms = [room for room in all_rooms if 'oldtest Demo' in room.title] for room in demo_rooms: api.rooms. __Component1__(room.id) demo_room = api.rooms. __Component2__('newtest Demo') email_addresses = ["Jane@test.com", "Allan@test.com] for email in email_addresses: api. __Component3__.create(demo_room.id, personEmail=email) api.messages.create(demo_room.id, __Component4__="Welcome to the room!" files=["https://www.webex.com/content/dam/wbx/us/images/dg-integ/teams_icon.png"]) Question: Component 2 Choices: test delete create memberships
create
59
Refer to the exhibit. Match the missing components of the Python script for the following tasks. (Not all options are used.) delete all previous demo rooms create a new demo room enroll Allan and Jane as members post a message to the new room from webexteamssdk import WebexTeamsAPI api = WebeTeamsAPI() all_rooms = api.rooms.list() demo_rooms = [room for room in all_rooms if 'oldtest Demo' in room.title] for room in demo_rooms: api.rooms. __Component1__(room.id) demo_room = api.rooms. __Component2__('newtest Demo') email_addresses = ["Jane@test.com", "Allan@test.com] for email in email_addresses: api. __Component3__.create(demo_room.id, personEmail=email) api.messages.create(demo_room.id, __Component4__="Welcome to the room!" files=["https://www.webex.com/content/dam/wbx/us/images/dg-integ/teams_icon.png"]) Question: Component 3 Choices: test delete create memberships
memberships
60
Refer to the exhibit. Match the missing components of the Python script for the following tasks. (Not all options are used.) delete all previous demo rooms create a new demo room enroll Allan and Jane as members post a message to the new room from webexteamssdk import WebexTeamsAPI api = WebeTeamsAPI() all_rooms = api.rooms.list() demo_rooms = [room for room in all_rooms if 'oldtest Demo' in room.title] for room in demo_rooms: api.rooms. __Component1__(room.id) demo_room = api.rooms. __Component2__('newtest Demo') email_addresses = ["Jane@test.com", "Allan@test.com] for email in email_addresses: api. __Component3__.create(demo_room.id, personEmail=email) api.messages.create(demo_room.id, __Component4__="Welcome to the room!" files=["https://www.webex.com/content/dam/wbx/us/images/dg-integ/teams_icon.png"]) Question: Component 4 Choices: test delete create memberships
test
61
A packet is received by a server. The packet has a destination port number of 443. What protocol or service is requested? HTTP NTP DHCP HTTPS
HTTPS
62
When thinking about the functional planes of a network, what is unique about the data plane? It includes protocols used to remotely access network devices. It includes the SSH protocol. It manipulates data and outputs it in the XML format. It is responsible for the switching of packets in hardware.
It is responsible for the switching of packets in hardware.
63
When thinking about the functional planes of a network, what is unique about the data plane? It forwards data through a network infrastructure device. It includes protocols used to remotely configure network devices. It manipulates data and outputs it in the JSON format. It includes network traffic being processed by EIGRP or OSPF.
It forwards data through a network infrastructure device.
64
When thinking about the functional planes of a network, what is unique about the data plane? It manipulates traffic using Python. It includes applications and protocols used between network devices such as routers. It includes the SNMP protocol. It forwards data through a network device such as a router or a switch.
It forwards data through a network device such as a router or a switch.
65
When thinking about the functional planes of a network, what is unique about the data plane? It forwards data through a network device. It includes routing protocols. It manipulates data and outputs it in the XML format. It includes protocols used to monitor network devices.
It forwards data through a network device.
66
Which Docker component defines the steps needed to create an image that can be deployed in a variety of environments? UnionFS Dockerfile cross-site script namespaces
Dockerfile
67
Which three statements describe characteristics of a virtual machine? (Choose three.) It is created and deployed using the Docker format. It includes a guest operating system. It runs on top of a hypervisor It shares the operating system of the host computer. It is completely self-contained with its own emulated storage, memory, and network interfaces. It requires Windows as the host operating system.
It includes a guest operating system. It runs on top of a hypervisor It is completely self-contained with its own emulated storage, memory, and network interfaces.
68
Match the use cases of a load balancer to the description. (Not all options are used.) Question: canary Choices: sends traffic to a new environment, but keeps the old environment ready in case of issues diverts a small amount of traffic to a new production environment that is changed sends requests to the next server on the list
diverts a small amount of traffic to a new production environment that is changed
69
Match the use cases of a load balancer to the description. (Not all options are used.) Question: blue-green Choices: sends traffic to a new environment, but keeps the old environment ready in case of issues diverts a small amount of traffic to a new production environment that is changed sends requests to the next server on the list
sends traffic to a new environment, but keeps the old environment ready in case of issues
70
Match the use cases of a load balancer to the description. (Not all options are used.) Question: round robin Choices: sends traffic to a new environment, but keeps the old environment ready in case of issues diverts a small amount of traffic to a new production environment that is changed sends requests to the next server on the list
sends requests to the next server on the list
71
What are two characteristics of the staging environment of the four-tier deployment environment structure? (Choose two.) It is the point where code has been tested multiple times and is error free. It is structured as close as possible to the actual production environment. It is where the code undergoes final acceptance testing in a realistic environment. It is where end users will interact with the code. It often includes automated testing tools such as Jenkins, CircleCl, or Travis Cl.
It is structured as close as possible to the actual production environment. It is where the code undergoes final acceptance testing in a realistic environment.
72
Refer to the exhibit. A network engineer has created a Jenkins pipeline. Which menu option would the engineer use to run the pipeline? Configure Changes Build Now Workspace
Build Now
73
A network engineer is configuring a Jenkins job and finishing with the following script in order to trigger the build: node { stage('Preparation') { catchError(buildResult: 'SUCCES') { sh 'docker stop samplerunning' sh 'docker rm samplerunning' } } stage('Build') { build 'BuildAppJob' } stage('Results') { build 'TestAppJob' } } node { stage('Preparation') { catchError(buildResult: 'SUCCES') { sh 'docker stop samplerunning' sh 'docker rm samplerunning' } } stage('Build') { build 'BuildAppJob' } stage('Results') { build 'TestAppJob' } } What is the purpose of the preparation stage? It makes sure that any previous instances of a particular Docker container are stopped and removed. It catches and removes any errors. It runs the SUCCESS Docker container. It places a log of any errors in the SUCCESS file.
It makes sure that any previous instances of a particular Docker container are stopped and removed.
74
Which technique is used to make the output of password hashing nondeterministic? password length and complexity multifactor authentication password salting password strength validation tools
password salting
75
What does self-service refer to in the context of enterprise IT? imaging frequently used server configurations for rapid deployment distributing and implementing broad access to public cloud infrastructure-as-a-service services mainstreamed processes that promote a lower IT headcount by implementing automation automated tools and methods that deliver preconfigured developer platforms on demand
automated tools and methods that deliver preconfigured developer platforms on demand
76
Which statement describes the term orchestration in IT automation? Orchestration is aimed at managing workload lifecycles and reacting dynamically to changing conditions in order to optimize processes. Orchestration is the process of preparing a server through the installation of libraries or daemons. Orchestration is the building, arranging, integration, and preparation of multi-component applications across multiple nodes. Orchestration is the obtaining and provisioning of compute, storage, and network infrastructure.
Orchestration is aimed at managing workload lifecycles and reacting dynamically to changing conditions in order to optimize processes.
77
What is an example of a read-only automation solution? streamlining the management of L3 firewall rules in Cisco Meraki networks gathering SD-WAN inventory data using Python and recording the values in a database simplifying the automation of network device authentication, configuration, and consistency gathering the current list of ACL entries on an IOS XE router and enforcing consistency
gathering SD-WAN inventory data using Python and recording the values in a database
78
A student is setting up the CSR1000v VM in VirtualBox that is already installed on the local computer. The VM is imported to the VirtualBox and starts successfully. The student tries to verify communications to the CSR1000v VM by opening the Firefox web browser on the local computer and enters the URL https://192.168.56.101. A security message “Warning: Potential Security Risk Ahead” appears. What is the security issue that results in this message? The SSL/TLS certificate uses a public key size of less than 1024 bits. The SSL/TLS certificate is self-signed by the router. The CA for the SSL/TLS certificate cannot be reached. The traffic to the VM is not encrypted.
The SSL/TLS certificate is self-signed by the router.
79
How do APIs affect traditional IT tasks? They are used to replace network infrastructure and implement network virtualization. They are used to eliminate repetitive manual tasks and replace them with automation. They are used to increase computer processing speed and lower power consumption. They are used to increase hardware speed and lower power consumption.
They are used to eliminate repetitive manual tasks and replace them with automation.
80
Refer to the exhibit. PC1 needs to resolve the host name of the web server into an IP address by using DNS. What destination IP address and destination port number will PC1 assign to the DNS query packet? 192.168.20.2 port 80 192.168.20.3 port 53 192.168.20.3 port 80 192.168.10.1 port 53
192.168.20.3 port 53
81
Which two statements are true about NTP servers in an enterprise network? (Choose two.) There can only be one NTP server on an enterprise network All NTP servers synchronize directly to a stratum 1 time source. NTP servers at stratum 1 are directly connected to an authoritative time source. NTP servers ensure an accurate time stamp on logging and debugging information. NTP servers control the mean time between failures (MTBF) for key network devices.
NTP servers at stratum 1 are directly connected to an authoritative time source. NTP servers ensure an accurate time stamp on logging and debugging information.
82
Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.) Question: step 1 Choices: R1 replaces the address 192.168.10.10 with a translated inside global address. R1 checks the NAT configuration to determine if this packet should be translated. R1 selects an available global address from the dynamic address pool. The host sends packets that request a connection to the server at the address 209.165.200.254. If there is no translation entry for this IP address, R1 determines that the source address 192.168.10.10 must be translated.
The host sends packets that request a connection to the server at the address 209.165.200.254.
83
Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.) Question: step 2 Choices: R1 replaces the address 192.168.10.10 with a translated inside global address. R1 checks the NAT configuration to determine if this packet should be translated. R1 selects an available global address from the dynamic address pool. The host sends packets that request a connection to the server at the address 209.165.200.254. If there is no translation entry for this IP address, R1 determines that the source address 192.168.10.10 must be translated.
R1 checks the NAT configuration to determine if this packet should be translated.
84
Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.) Question: step 3 Choices: R1 replaces the address 192.168.10.10 with a translated inside global address. R1 checks the NAT configuration to determine if this packet should be translated. R1 selects an available global address from the dynamic address pool. The host sends packets that request a connection to the server at the address 209.165.200.254. If there is no translation entry for this IP address, R1 determines that the source address 192.168.10.10 must be translated.
If there is no translation entry for this IP address, R1 determines that the source address 192.168.10.10 must be translated.
85
Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.) Question: step 4 Choices: R1 replaces the address 192.168.10.10 with a translated inside global address. R1 checks the NAT configuration to determine if this packet should be translated. R1 selects an available global address from the dynamic address pool. The host sends packets that request a connection to the server at the address 209.165.200.254. If there is no translation entry for this IP address, R1 determines that the source address 192.168.10.10 must be translated.
R1 selects an available global address from the dynamic address pool.
86
Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.) Question: step 4 Choices: R1 replaces the address 192.168.10.10 with a translated inside global address. R1 checks the NAT configuration to determine if this packet should be translated. R1 selects an available global address from the dynamic address pool. The host sends packets that request a connection to the server at the address 209.165.200.254. If there is no translation entry for this IP address, R1 determines that the source address 192.168.10.10 must be translated.
R1 replaces the address 192.168.10.10 with a translated inside global address.
87
A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed? traceroute ipconfig telnet netstat
traceroute
88
Which two HTTP functions correspond to the UPDATE function in CRUD? (Choose two.) POST DELETE PATCH PUT GET
PATCH PUT
89
Match the term to the RESTAPI request http://example.com/update/person?id=42&email=person%40example.com. (Not all options are used.) Question: scheme Choices: http update/person example.com id=42&email=person%40example.com
http
90
Match the term to the RESTAPI request http://example.com/update/person?id=42&email=person%40example.com. (Not all options are used.) Question: path Choices: http update/person example.com id=42&email=person%40example.com
update/person
91
Match the term to the RESTAPI request http://example.com/update/person?id=42&email=person%40example.com. (Not all options are used.) Question: authority Choices: http update/person example.com id=42&email=person%40example.com
example.com
92
Match the term to the RESTAPI request http://example.com/update/person?id=42&email=person%40example.com. (Not all options are used.) Question: query Choices: http update/person example.com id=42&email=person%40example.com
id=42&email=person%40example.com
93
Which HTTP status code category is used in the response to indicate that a REST API request contains an error on the client side? 1xx 2xx 3xx 4xx 5xx
4xx
94
Refer to the exhibit. A network administrator is using a Python script to test a REST API request. The traceback message indicates that there is an error in the URI. What is the error? import requests url = "https://sandboxdnac123/cisco.com/dna/intent/api/v1/network-device" resp = requests.get(url) Traceback message: requests.exceptions.SSLError: HTTPSConnectionPool(host='sandboxdnac123.cisco.com', port=443): Max retries exceeded with url: /dna/intent/api/v1/network-device The protocol is wrong. The resource path is wrong. The SSL certificate is invalid. The destination web host address is invalid.
The SSL certificate is invalid.
95
What are two requirements for an application to communicate with a webhook provider? (Choose two.) The application must support JSON. The application must always be running. The application must register a URL with the webhook provider. The host where the application is running must have an SSH client installed. The host where the application is running must have an SSH server running.
The application must always be running. The application must register a URL with the webhook provider.
96
A student is learning network automation by using a REST API. The student sends a request to a network device and receives a response with the status code of 202. What does this status code mean? The request was understood but has been rejected by the server. The request was successful and typically includes a payload. The request has been accepted for processing, but the processing has not been completed. Because of a server error, the request cannot be fulfilled.
The request has been accepted for processing, but the processing has not been completed.
97
What are two characteristics of stateless applications? (Choose two.) They must run on container orchestrators like Kubernetes. They can be freely scaled across available capacity without disrupting ongoing customer connections. They can be scaled only by redeploying them and destroying the data that users or operators previously needed. They maintain the user state within the local user machine so that automation can work non-destructively. They can store a user state in an accessible database separate from application servers and other components.
They can be freely scaled across available capacity without disrupting ongoing customer connections. They can store a user state in an accessible database separate from application servers and other components.
98
What is a characteristic of the continuous integration component of the CI/CD philosophy for software development? Code changes are continually merged with the main branch of the application, so change sets are small. Code changes are tested and integrated with the main branch then tested again before they are deployed into production. Code is constantly deployed into production where users serve as the final testers. Application development is performed in short sprints so that enough code is always in a deployable state.
Code changes are continually merged with the main branch of the application, so change sets are small.
99
A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Waterfall method. What is a characteristic of this method? a process that amplifies learning as well as delivers as quickly as possible a software development process where the highest priority is to satisfy the customer through early and continuous delivery of valuable software a software development process where a particular phase depends on the results of the previous phase a process that eliminates anything that does not add value to the project including meetings and documentation
a software development process where a particular phase depends on the results of the previous phase
100
A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Waterfall method. What is a characteristic of this method? A software development process that prioritizes responding to change over following a plan A process that eliminates inefficient ways of working like expecting coders to multitask A software development process that focuses on frequent delivery of working software as well as collaboration between developers and business employees A software devilment process that can only go forward.
A software devilment process that can only go forward.
101
A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Waterfall method. What is a characteristic of this method? a software development process that has the results of one phase feed into the next phase a process that eliminates anything that does not add value to the project including meetings and documentation a software development process that focuses on frequent delivery of working software as well as collaboration between developers and business employees a process that eliminates inefficient ways of working like expecting coders to multitask
a software development process that has the results of one phase feed into the next phase
102
In which SDLC phase is the software product installed into the production environment to decide if it is ready for release? implementation deployment design testing
deployment
103
Which convention is used in Python to indicate that methods and variables in a class are private and not to be used outside of the class? by using a single preceding underscore ( _ ) for a method or variable by using the command class private classname() : to start the class definition by using two preceding hyphens ( — ) for a method or variable by declaring a private method or variable in the beginning of the class definition
by using a single preceding underscore ( _ ) for a method or variable
104
A packet is received by a server. The packet has a destination port number of 80. What protocol or service is requested? DHCP Telnet over SSH HTTP RESTCONF
HTTP
105
A network administrator is developing an application to control a Webex device through xAPI. Which three protocols can be used to access xAPI? (Choose three.) Telnet HTTP XML RS-232 FTP JSON
Telnet HTTP RS-232
106
Which type of request is used to send a message to a Webex Teams space using Python and the Messages API? PUT POST GET PATCH
POST
107
A network administrator is assigned the 172.16.0.0/24 block of addresses to use in designing an IP addressing scheme. The administrator submits this design for approval: 172.16.0.0/26 172.16.0.64/27 172.16.0.96/26 172.16.0.128/27 What should be the response from the senior network engineer regarding this design? This design is flawed because the 172.16.0.128/27 network number is invalid. This design will work for the branch office. This design is flawed because no design could have two networks that use a /26 mask and are not consecutive blocks of addresses. This design is flawed because the 172.16.0.96/26 network is not a valid block of addresses. This design is flawed because the 172.16.0.96/26 network overlaps with other addresses.
This design is flawed because the 172.16.0.96/26 network is not a valid block of addresses.
108
Which statement describes a stateful firewall? It can filter packets based on information at Layers 3, 4, 5 and 7 of the OSI reference model. It can determine if the connection is in the initiation, data transfer, or termination phase. It can only filter packets based on limited Layer 3 and 4 information. It can expand the number of IP addresses available and can hide network addressing design.
It can determine if the connection is in the initiation, data transfer, or termination phase.
109
A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Lean method. What is a characteristic of this method? a process that eliminates inefficient ways of working like expecting coders to multitask a software development process that focuses on frequent delivery of working software as well as collaboration between developers and business employees a software development process that has the results of one phase feed into the next phase a software development process that can only go forward
a software development process that has the results of one phase feed into the next phase
110
A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Lean method. What is a characteristic of this method? a software development process where the highest priority is to satisfy the customer through early and continuous delivery of valuable software a software development process that can only go forward a process that amplifies learning as well as delivers as quickly as possible a more traditional software development process as they have used this process in past projects
a process that amplifies learning as well as delivers as quickly as possible
111
A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Lean method. What is a characteristic of this method? a process that was developed for manufacturing, but adapted to other industries a software development process where a particular phase depends on the results of the previous phase a software development process that can only go forward a software development method that tracks closely with the software development life cycle
a software development process where a particular phase depends on the results of the previous phase
112
Refer to the exhibit. Match the Python coding information in the authentication request to the Cisco DNA Center to the location in the script. (Not all options are used.) import requests url = "http://myservice/api/v1/resources/house/rooms/id/code_A" resp = requests.get(code_B, code_C, verify = False) print (resp.status_code) print (resp.text) Question: 1001001027331 Choices: code_A code_B code_C
code_A
113
Refer to the exhibit. Match the Python coding information in the authentication request to the Cisco DNA Center to the location in the script. (Not all options are used.) import requests url = "http://myservice/api/v1/resources/house/rooms/id/code_A" resp = requests.get(code_B, code_C, verify = False) print (resp.status_code) print (resp.text) Question: url Choices: code_A code_B code_C
code_B
114
Refer to the exhibit. Match the Python coding information in the authentication request to the Cisco DNA Center to the location in the script. (Not all options are used.) import requests url = "http://myservice/api/v1/resources/house/rooms/id/code_A" resp = requests.get(code_B, code_C, verify = False) print (resp.status_code) print (resp.text) Question: auth=(“person1″,”super2”) Choices: code_A code_B code_C
code_C
115
A student is learning REST API application. The student constructs an URI to query the MapQuest API for a route from New York, NY to Boston, MA. What is the valid URI format? https://www.mapquestapi.com/directions/v2/route?key=key&from=New+York+NY&to=Boston+MA https://www.mapquestapi.com/directions/v2/route?key==key&from==New+York%2C+NY&to==Boston%2C+MA https://www.mapquestapi.com/directions/v2/route?key:key&from:New+York%2C+NY&to:Boston%2C+MA https://www.mapquestapi.com/directions/v2/route?key= key&from=New+York%2C+NY&to=Boston%2C+MA
https://www.mapquestapi.com/directions/v2/route?key= key&from=New+York%2C+NY&to=Boston%2C+MA
116
Refer to the exhibit. A student constructs a URI to query the MapQuest API for a route from New Orleans, LA to New York, NY. Match the components to the MapQuest URL. (Not all options are used.) https://www.mapquestapi.com/component1?component2&component3&component4 Question: directions/v2/route Choices: component1 component2 component3 component4
component1
117
Refer to the exhibit. A student constructs a URI to query the MapQuest API for a route from New Orleans, LA to New York, NY. Match the components to the MapQuest URL. (Not all options are used.) https://www.mapquestapi.com/component1?component2&component3&component4 Question: component1 Choices: directions/v2/route key=get_your_api_key to=New+York%2C+NY dest=New+York%2C+NY orig=New+Orleans%2C+LA from=New+Orleans%2C+LA
component2
118
Refer to the exhibit. A student constructs a URI to query the MapQuest API for a route from New Orleans, LA to New York, NY. Match the components to the MapQuest URL. (Not all options are used.) https://www.mapquestapi.com/component1?component2&component3&component4 Question: component2 Choices: directions/v2/route key=get_your_api_key to=New+York%2C+NY dest=New+York%2C+NY orig=New+Orleans%2C+LA from=New+Orleans%2C+LA
key=get_your_api_key
119
Refer to the exhibit. A student constructs a URI to query the MapQuest API for a route from New Orleans, LA to New York, NY. Match the components to the MapQuest URL. (Not all options are used.) https://www.mapquestapi.com/component1?component2&component3&component4 Question: component3 Choices: directions/v2/route key=get_your_api_key to=New+York%2C+NY dest=New+York%2C+NY orig=New+Orleans%2C+LA from=New+Orleans%2C+LA
from=New+Orleans%2C+LA
120
Refer to the exhibit. A student constructs a URI to query the MapQuest API for a route from New Orleans, LA to New York, NY. Match the components to the MapQuest URL. (Not all options are used.) https://www.mapquestapi.com/component1?component2&component3&component4 Question: component4 Choices: directions/v2/route key=get_your_api_key to=New+York%2C+NY dest=New+York%2C+NY orig=New+Orleans%2C+LA from=New+Orleans%2C+LA
to=New+York%2C+NY
121
import requests import json from tabulate import * from apic_em_functions_scl import * post_url = 'https://sandboxapicem.cisco.com/api/v1/host' ticket = get_ticket() headers = {'content-type':'application/json', 'X-Auth-Token':ticket} try: resp = requests.get(post_url, headers=headers, params="", verify = False) response_json = resp.json() print ('Status of /host request: ' + str(resp.status_code)) except: print ('Something is wrong with GET /host request!') sys.exit() host_list=[] i=0 for item in response_json['response']: i+=1 host_list.append([i, item['hostType'], item['hostIp']]) print (tabulate(host_list,headers=['Number','Type','IP'],tablefmt='rst')) Question: converts data format Choices: sys.exit() api/v1/host tablefmt='rst' verify = False str(resp.status_code) ‘X-Auth-Token’:ticket ‘content-type’:’application/json’
str(resp.status_code)
122
import requests import json from tabulate import * from apic_em_functions_scl import * post_url = 'https://sandboxapicem.cisco.com/api/v1/host' ticket = get_ticket() headers = {'content-type':'application/json', 'X-Auth-Token':ticket} try: resp = requests.get(post_url, headers=headers, params="", verify = False) response_json = resp.json() print ('Status of /host request: ' + str(resp.status_code)) except: print ('Something is wrong with GET /host request!') sys.exit() host_list=[] i=0 for item in response_json['response']: i+=1 host_list.append([i, item['hostType'], item['hostIp']]) print (tabulate(host_list,headers=['Number','Type','IP'],tablefmt='rst')) Question: disables SSL handshake Choices: sys.exit() api/v1/host tablefmt='rst' verify = False str(resp.status_code) ‘X-Auth-Token’:ticket ‘content-type’:’application/json’
verify = False
123
import requests import json from tabulate import * from apic_em_functions_scl import * post_url = 'https://sandboxapicem.cisco.com/api/v1/host' ticket = get_ticket() headers = {'content-type':'application/json', 'X-Auth-Token':ticket} try: resp = requests.get(post_url, headers=headers, params="", verify = False) response_json = resp.json() print ('Status of /host request: ' + str(resp.status_code)) except: print ('Something is wrong with GET /host request!') sys.exit() host_list=[] i=0 for item in response_json['response']: i+=1 host_list.append([i, item['hostType'], item['hostIp']]) print (tabulate(host_list,headers=['Number','Type','IP'],tablefmt='rst')) Question: identifies API to be called Choices: sys.exit() api/v1/host tablefmt='rst' verify = False str(resp.status_code) ‘X-Auth-Token’:ticket ‘content-type’:’application/json’
api/v1/host
124
import requests import json from tabulate import * from apic_em_functions_scl import * post_url = 'https://sandboxapicem.cisco.com/api/v1/host' ticket = get_ticket() headers = {'content-type':'application/json', 'X-Auth-Token':ticket} try: resp = requests.get(post_url, headers=headers, params="", verify = False) response_json = resp.json() print ('Status of /host request: ' + str(resp.status_code)) except: print ('Something is wrong with GET /host request!') sys.exit() host_list=[] i=0 for item in response_json['response']: i+=1 host_list.append([i, item['hostType'], item['hostIp']]) print (tabulate(host_list,headers=['Number','Type','IP'],tablefmt='rst')) Question: defines API authentication Choices: sys.exit() api/v1/host tablefmt='rst' verify = False str(resp.status_code) ‘X-Auth-Token’:ticket ‘content-type’:’application/json’
‘X-Auth-Token’:ticket
125
import requests import json from tabulate import * from apic_em_functions_scl import * post_url = 'https://sandboxapicem.cisco.com/api/v1/host' ticket = get_ticket() headers = {'content-type':'application/json', 'X-Auth-Token':ticket} try: resp = requests.get(post_url, headers=headers, params="", verify = False) response_json = resp.json() print ('Status of /host request: ' + str(resp.status_code)) except: print ('Something is wrong with GET /host request!') sys.exit() host_list=[] i=0 for item in response_json['response']: i+=1 host_list.append([i, item['hostType'], item['hostIp']]) print (tabulate(host_list,headers=['Number','Type','IP'],tablefmt='rst')) Question: stops the program execution Choices: sys.exit() api/v1/host tablefmt='rst' verify = False str(resp.status_code) ‘X-Auth-Token’:ticket ‘content-type’:’application/json’
sys.exit()
126
import requests import json from tabulate import * from apic_em_functions_scl import * post_url = 'https://sandboxapicem.cisco.com/api/v1/host' ticket = get_ticket() headers = {'content-type':'application/json', 'X-Auth-Token':ticket} try: resp = requests.get(post_url, headers=headers, params="", verify = False) response_json = resp.json() print ('Status of /host request: ' + str(resp.status_code)) except: print ('Something is wrong with GET /host request!') sys.exit() host_list=[] i=0 for item in response_json['response']: i+=1 host_list.append([i, item['hostType'], item['hostIp']]) print (tabulate(host_list,headers=['Number','Type','IP'],tablefmt='rst')) Question: identifies request data format Choices: sys.exit() api/v1/host tablefmt='rst' verify = False str(resp.status_code) ‘X-Auth-Token’:ticket ‘content-type’:’application/json’
‘content-type’:’application/json’
127
A packet is received by a server. The packet has a destination port number of 123. What protocol or service is requested? DNS SSH NTP RESTCONF
NTP
128
Which scenario exhibits the “social proof” principle of human influence? A user receives a phone call from someone claiming to be from the IT department who needs to verify user credentials. A user visits a web site offering a free gift if the user provides contact information. A user opens an email advertising a free trial on a website that is only available for a few hours. A user completes a survey requesting personal information after seeing co-workers completing the survey.
A user completes a survey requesting personal information after seeing co-workers completing the survey.
129
Which SQL injection defense method should be used only as a last resort? escaping all user-supplied input using a database firewall implementing whitelist input validation using parameterized queries
escaping all user-supplied input
130
Which type of ISE node provides network access, posturing, guest access, client provisioning, and profiling services? monitoring administration pxGrid policy service
policy service
131
Which communication protocol does Ansible use to connect to remote devices? Telnet over VPN HTTPS Secure FTP SSH
SSH
132
Refer to the exhibit. Router R2 is configured with static NAT. Place in order the steps that occur when the client accesses the web server through the router. (Not all options are used.) Question: Step 1 Choices: R2 receives the packet on its outside interface, then checks and locates the destination address in its NAT table. The web server responds to the client using its outside global address as the source address R2 replaces the inside global address with the inside local address of the web server and forwards the packet to the web server. The web server uses the outside global address of the client as the destination address when responding. R2 receives the packet from the web server. R2 checks the NAT table, then translates the source address of the web server into an inside global address and forwards the packet. The client uses the inside global address of the web server as the destination address to send a packet to the web server.
The client uses the inside global address of the web server as the destination address to send a packet to the web server.
133
Refer to the exhibit. Router R2 is configured with static NAT. Place in order the steps that occur when the client accesses the web server through the router. (Not all options are used.) Question: Step 2 Choices: R2 receives the packet on its outside interface, then checks and locates the destination address in its NAT table. The web server responds to the client using its outside global address as the source address R2 replaces the inside global address with the inside local address of the web server and forwards the packet to the web server. The web server uses the outside global address of the client as the destination address when responding. R2 receives the packet from the web server. R2 checks the NAT table, then translates the source address of the web server into an inside global address and forwards the packet. The client uses the inside global address of the web server as the destination address to send a packet to the web server.
R2 receives the packet on its outside interface, then checks and locates the destination address in its NAT table.
134
Refer to the exhibit. Router R2 is configured with static NAT. Place in order the steps that occur when the client accesses the web server through the router. (Not all options are used.) Question: Step 3 Choices: R2 receives the packet on its outside interface, then checks and locates the destination address in its NAT table. The web server responds to the client using its outside global address as the source address R2 replaces the inside global address with the inside local address of the web server and forwards the packet to the web server. The web server uses the outside global address of the client as the destination address when responding. R2 receives the packet from the web server. R2 checks the NAT table, then translates the source address of the web server into an inside global address and forwards the packet. The client uses the inside global address of the web server as the destination address to send a packet to the web server.
R2 replaces the inside global address with the inside local address of the web server and forwards the packet to the web server.
135
Refer to the exhibit. Router R2 is configured with static NAT. Place in order the steps that occur when the client accesses the web server through the router. (Not all options are used.) Question: Step 4 Choices: R2 receives the packet on its outside interface, then checks and locates the destination address in its NAT table. The web server responds to the client using its outside global address as the source address R2 replaces the inside global address with the inside local address of the web server and forwards the packet to the web server. The web server uses the outside global address of the client as the destination address when responding. R2 receives the packet from the web server. R2 checks the NAT table, then translates the source address of the web server into an inside global address and forwards the packet. The client uses the inside global address of the web server as the destination address to send a packet to the web server.
The web server uses the outside global address of the client as the destination address when responding.
136
Refer to the exhibit. Router R2 is configured with static NAT. Place in order the steps that occur when the client accesses the web server through the router. (Not all options are used.) Question: Step 4 Choices: R2 receives the packet on its outside interface, then checks and locates the destination address in its NAT table. The web server responds to the client using its outside global address as the source address R2 replaces the inside global address with the inside local address of the web server and forwards the packet to the web server. The web server uses the outside global address of the client as the destination address when responding. R2 receives the packet from the web server. R2 checks the NAT table, then translates the source address of the web server into an inside global address and forwards the packet. The client uses the inside global address of the web server as the destination address to send a packet to the web server.
R2 receives the packet from the web server. R2 checks the NAT table, then translates the source address of the web server into an inside global address and forwards the packet.
137
Refer to the exhibit. What is the function of the identified missing information in regards to the parameter and method contained in the request? import requests access_token = 'your_token_here' url = 'https://webexapis.com/v1/rooms' headers = { 'Authorization': 'Bearer {}'.format(access_token), 'Content-Type': 'application/json' } params={'title': '_________?_________' res = requests.post(url, headers=headers, json=params) print(res.json()) Choices: A Webex Teams space will be identified by using a specified title, and additional details will be retrieved. It provides the name for a Webex teams space to be deleted. A Webex Teams space will be identified and a message will be posted with the title specified. It provides the name for a new Webex teams space.
It provides the name for a new Webex teams space.
138
What is an architectural constraint to which a true RESTful API web service must adhere? It must support XML-RPC and JSON-RPC. It allows resource caching. It should be behind a firewall. It operates as a cloud service.
It allows resource caching.
139
What is an architectural constraint to which a true RESTful API web service must adhere It operates in a stateless way. It uses HTTPS to transport data. It must operate along with a DNS server. It operates as a cloud service.
It operates in a stateless way.
140
A packet is received by a server. The packet has a destination port number of 53. What protocol or service is requested? DNS NetBIOS (NetBT) POP3 IMAP
DNS
141
Which statement accurately describes dynamic NAT? It always maps a private IP address to a public IP address. It provides an automated mapping of inside local to inside global IP addresses. It provides a mapping of internal host names to IP addresses. It dynamically provides IP addressing to internal hosts.
It provides an automated mapping of inside local to inside global IP addresses.
142
A packet is received by a server. The packet has a destination port number of 830. What protocol or service is requested? NTP DHCP NETCONF HTTPS
NETCONF
143
Which programming language is supported by the Webex xAPI to develop macros for on-device customization? Java Python JavaScript C++
JavaScript
144
Which Cisco management system is designed as the solution for Software-Defined Networking and runs on Nexus 9000 hardware? Application Centric Infrastructure platform (ACI) IOS XE Nexus Operating System (NX-OS) DNA Center
Application Centric Infrastructure platform (ACI)
145
A developer issues a Linux command python3 -m venv devenv. What is the developer trying to achieve? to install the devnet tool sets in the Python 3 virtual environment named venv to create a Python 3 virtual environment named devenv to activate the Python 3 virtual environment named devenv to enter the Python 3 virtual environment named venv using the devnet tool sets
to create a Python 3 virtual environment named devenv
146
Refer to the exhibit. Match the missing components of the Python script for the APIC-EM REST API request for the user “secureuser”. (Not all options are used.) import requests import json CONTROLLER_IP="devnetapi.cisco.com/sandbox/apic_em" GET="get" POST="post" def getServiceTicket(): ticket=None payload = {"username":"__Component1__","password":"Cisco123!" url = "https://" + CONTROLLER_IP + "/api/v1/ticket" header = {"content-type": "application/json"} response= __Component2__.post(url,data=json.dumps(payload), headers=__Component3__, verify=False) if(not response): print ("Data Not Returned!") else: r_json=response.json() ticket = r_json["response"]["serviceTicket"] print ("ticket: ", ticket) return ticket Question: Component1 Choices: url requests Cisco123! header secureuser
secureuser
147
Refer to the exhibit. Match the missing components of the Python script for the APIC-EM REST API request for the user “secureuser”. (Not all options are used.) import requests import json CONTROLLER_IP="devnetapi.cisco.com/sandbox/apic_em" GET="get" POST="post" def getServiceTicket(): ticket=None payload = {"username":"__Component1__","password":"Cisco123!" url = "https://" + CONTROLLER_IP + "/api/v1/ticket" header = {"content-type": "application/json"} response= __Component2__.post(url,data=json.dumps(payload), headers=__Component3__, verify=False) if(not response): print ("Data Not Returned!") else: r_json=response.json() ticket = r_json["response"]["serviceTicket"] print ("ticket: ", ticket) return ticket Question: Component2 Choices: url requests Cisco123! header secureuser
requests
148
Refer to the exhibit. Match the missing components of the Python script for the APIC-EM REST API request for the user “secureuser”. (Not all options are used.) import requests import json CONTROLLER_IP="devnetapi.cisco.com/sandbox/apic_em" GET="get" POST="post" def getServiceTicket(): ticket=None payload = {"username":"__Component1__","password":"Cisco123!" url = "https://" + CONTROLLER_IP + "/api/v1/ticket" header = {"content-type": "application/json"} response= __Component2__.post(url,data=json.dumps(payload), headers=__Component3__, verify=False) if(not response): print ("Data Not Returned!") else: r_json=response.json() ticket = r_json["response"]["serviceTicket"] print ("ticket: ", ticket) return ticket Question: Component3 Choices: url requests Cisco123! header secureuser
header
149
Two network engineers are discussing the methods used to forward frames through a switch. What is an important concept related to the cut-through method of switching? The fragment-free switching offers the lowest level of latency. Fast-forward switching can be viewed as a compromise between store-and-forward switching and fragment-free switching. Fragment-free switching is the typical cut-through method of switching. Packets can be relayed with errors when fast-forward switching is used.
Packets can be relayed with errors when fast-forward switching is used.
150
When thinking about the functional planes of a network, what is unique about the control plane? It forwards data through a network device. It manipulates data and outputs it in the XML format. It includes the SNMP protocol. It includes network traffic being processed by EIGRP or OSPF.
It includes network traffic being processed by EIGRP or OSPF.
151
When thinking about the functional planes of a network, what is unique about the control plane? It forwards data based on STP settings. It includes applications and protocols used between network devices such as routers. It includes protocols used to monitor network devices. It is responsible for the switching of packets in hardware.
It includes applications and protocols used between network devices such as routers.
152
When thinking about the functional planes of a network, what is unique about the control plane? It manipulates data and outputs it in the JSON format. It includes the SNMP protocol. It processes data in hardware. It processes network traffic that is paramount to maintaining the functionality of the network infrastructure.
It processes network traffic that is paramount to maintaining the functionality of the network infrastructure.
153
Refer to the exhibit. If PC1 is communicating with a web server on the Internet, which two TCP/IP layers are responsible for encapsulating the message that requests data from that particular server and assigning a source port number? (Choose two.) session network transport physical application
transport application
154
A network security administrator is evaluating products that automate threat containment through APIs when a threat is detected. Which Cisco product with the desired capability provides a rule-based engine for enabling policy-based network access to users and devices? Identity Services Engine Umbrella Threat Grid Advanced Malware Protection
Identity Services Engine
155
Match the purpose with its DHCP message type. (Not all options are used.) Question: a message that is used to locate any available DHCP server on a network Choices: DHCPREQUEST DHCPDISCOVER DHCPNAK DHCPOFFER DHCPACK
DHCPDISCOVER
156
Match the purpose with its DHCP message type. (Not all options are used.) Question: a message that is used to identify the explicit server and lease offer to accept Choices: DHCPREQUEST DHCPDISCOVER DHCPNAK DHCPOFFER DHCPACK
DHCPREQUEST
157
Match the purpose with its DHCP message type. (Not all options are used.) Question: a message that is used to acknowledge that the lease is successful Choices: DHCPREQUEST DHCPDISCOVER DHCPNAK DHCPOFFER DHCPACK
DHCPACK
158
Match the purpose with its DHCP message type. (Not all options are used.) Question: a message that is used to suggest a lease to a client Choices: DHCPREQUEST DHCPDISCOVER DHCPNAK DHCPOFFER DHCPACK
DHCPOFFER
159
Refer to the exhibit. Match the missing components to the Meraki API script to complete the following tasks. (Not all options are used.) retrieve the organizations retrieve the networks and the corresponding id retrieve the devices and corresponding device id import __Component1__ import json meraki_api_key = "ac70ec3c4fc356f60609227a4133c6092b34c1c" url = "https://api.meraki.com/api/v0/organizations" headers = { "X-Cisco-Meraki-API-Key": __Component2__, } orgs = requests.get(url,headers=headers) orgs = orgs.json() print(json.dumps(orgs, indent=4)) for orgs in orgs: print(org['id']) __Component3__ = "https//api.meraki.com/api/v0/organizations/"+org['id']+"/networks" networks = requests.get(url, headers=headers) networks = networks.json() print(json.dumps(networks, indent=4)) for __Component4__ in networks: print(network['id']) url = "https://api.meraki.com/api/v0/networks/"+network['id']+"/devices" devices = requests.get(url,headers=headers) devices = devices.json() print(json.dumps(devices, indent=4)) for __Component5__ in devices: print(device['serial']) Question: Component 1 Choices: url deice requests serial network meraki_api_key
requests
160
Refer to the exhibit. Match the missing components to the Meraki API script to complete the following tasks. (Not all options are used.) retrieve the organizations retrieve the networks and the corresponding id retrieve the devices and corresponding device id import __Component1__ import json meraki_api_key = "ac70ec3c4fc356f60609227a4133c6092b34c1c" url = "https://api.meraki.com/api/v0/organizations" headers = { "X-Cisco-Meraki-API-Key": __Component2__, } orgs = requests.get(url,headers=headers) orgs = orgs.json() print(json.dumps(orgs, indent=4)) for orgs in orgs: print(org['id']) __Component3__ = "https//api.meraki.com/api/v0/organizations/"+org['id']+"/networks" networks = requests.get(url, headers=headers) networks = networks.json() print(json.dumps(networks, indent=4)) for __Component4__ in networks: print(network['id']) url = "https://api.meraki.com/api/v0/networks/"+network['id']+"/devices" devices = requests.get(url,headers=headers) devices = devices.json() print(json.dumps(devices, indent=4)) for __Component5__ in devices: print(device['serial']) Question: Component 2 Choices: url deice requests serial network meraki_api_key
meraki_api_key
161
Refer to the exhibit. Match the missing components to the Meraki API script to complete the following tasks. (Not all options are used.) retrieve the organizations retrieve the networks and the corresponding id retrieve the devices and corresponding device id import __Component1__ import json meraki_api_key = "ac70ec3c4fc356f60609227a4133c6092b34c1c" url = "https://api.meraki.com/api/v0/organizations" headers = { "X-Cisco-Meraki-API-Key": __Component2__, } orgs = requests.get(url,headers=headers) orgs = orgs.json() print(json.dumps(orgs, indent=4)) for orgs in orgs: print(org['id']) __Component3__ = "https//api.meraki.com/api/v0/organizations/"+org['id']+"/networks" networks = requests.get(url, headers=headers) networks = networks.json() print(json.dumps(networks, indent=4)) for __Component4__ in networks: print(network['id']) url = "https://api.meraki.com/api/v0/networks/"+network['id']+"/devices" devices = requests.get(url,headers=headers) devices = devices.json() print(json.dumps(devices, indent=4)) for __Component5__ in devices: print(device['serial']) Question: Component 3 Choices: url deice requests serial network meraki_api_key
url
162
Refer to the exhibit. Match the missing components to the Meraki API script to complete the following tasks. (Not all options are used.) retrieve the organizations retrieve the networks and the corresponding id retrieve the devices and corresponding device id import __Component1__ import json meraki_api_key = "ac70ec3c4fc356f60609227a4133c6092b34c1c" url = "https://api.meraki.com/api/v0/organizations" headers = { "X-Cisco-Meraki-API-Key": __Component2__, } orgs = requests.get(url,headers=headers) orgs = orgs.json() print(json.dumps(orgs, indent=4)) for orgs in orgs: print(org['id']) __Component3__ = "https//api.meraki.com/api/v0/organizations/"+org['id']+"/networks" networks = requests.get(url, headers=headers) networks = networks.json() print(json.dumps(networks, indent=4)) for __Component4__ in networks: print(network['id']) url = "https://api.meraki.com/api/v0/networks/"+network['id']+"/devices" devices = requests.get(url,headers=headers) devices = devices.json() print(json.dumps(devices, indent=4)) for __Component5__ in devices: print(device['serial']) Question: Component 4 Choices: url deice requests serial network meraki_api_key
network
163
Refer to the exhibit. Match the missing components to the Meraki API script to complete the following tasks. (Not all options are used.) retrieve the organizations retrieve the networks and the corresponding id retrieve the devices and corresponding device id import __Component1__ import json meraki_api_key = "ac70ec3c4fc356f60609227a4133c6092b34c1c" url = "https://api.meraki.com/api/v0/organizations" headers = { "X-Cisco-Meraki-API-Key": __Component2__, } orgs = requests.get(url,headers=headers) orgs = orgs.json() print(json.dumps(orgs, indent=4)) for orgs in orgs: print(org['id']) __Component3__ = "https//api.meraki.com/api/v0/organizations/"+org['id']+"/networks" networks = requests.get(url, headers=headers) networks = networks.json() print(json.dumps(networks, indent=4)) for __Component4__ in networks: print(network['id']) url = "https://api.meraki.com/api/v0/networks/"+network['id']+"/devices" devices = requests.get(url,headers=headers) devices = devices.json() print(json.dumps(devices, indent=4)) for __Component5__ in devices: print(device['serial']) Question: Component 5 Choices: url deice requests serial network meraki_api_key
device
164
Refer to the exhibit. A student constructs a URI to query the MapQuest API for a route from New Orleans, LA to New York, NY. Match the components to the MapQuest URI. (Not all options are used.) https://www.mapquestapi.com/component1?component2&componet3&component4 Question: component 1 Choices: directions/v2/route key=get_your_api_key to=New+York%2C+NY dest=New+York%2C+NY orig=New+Orleans%2C+LA from=New+Orleans%2C+LA
directions/v2/route
165
Refer to the exhibit. A student constructs a URI to query the MapQuest API for a route from New Orleans, LA to New York, NY. Match the components to the MapQuest URI. (Not all options are used.) https://www.mapquestapi.com/component1?component2&componet3&component4 Question: component 2 Choices: directions/v2/route key=get_your_api_key to=New+York%2C+NY dest=New+York%2C+NY orig=New+Orleans%2C+LA from=New+Orleans%2C+LA
key=get_your_api_key
166
Refer to the exhibit. A student constructs a URI to query the MapQuest API for a route from New Orleans, LA to New York, NY. Match the components to the MapQuest URI. (Not all options are used.) https://www.mapquestapi.com/component1?component2&componet3&component4 Question: component 3 Choices: directions/v2/route key=get_your_api_key to=New+York%2C+NY dest=New+York%2C+NY orig=New+Orleans%2C+LA from=New+Orleans%2C+LA
from=New+Orleans%2C+LA
167
Refer to the exhibit. A student constructs a URI to query the MapQuest API for a route from New Orleans, LA to New York, NY. Match the components to the MapQuest URI. (Not all options are used.) https://www.mapquestapi.com/component1?component2&componet3&component4 Question: component 4 Choices: directions/v2/route key=get_your_api_key to=New+York%2C+NY dest=New+York%2C+NY orig=New+Orleans%2C+LA from=New+Orleans%2C+LA
to=New+York%2C+NY
168
When thinking about the functional planes of a network, what is unique about the management plane? It forwards data based on STP settings. It is responsible for the switching of packets in hardware. It includes protocols used to monitor network devices. It includes applications and protocols used between network devices such as routers.
It includes protocols used to monitor network devices.
169
Which two data formats can RESTCONF use when requesting data or responding with data? (Choose two.) XML YANG JSON YAML HTML
XML JSON