M7-M8 Flashcards

1
Q

What is a characteristic of the Yet Another Next Generation (YANG) data model?

It uses a MIBs structure.
It uses a tree structure.
It uses the JSON data format.
It uses a list structure.

A

It uses a tree structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two application-specific media types can be used for RESTCONF to identify a YANG construct? (Choose two.)

application/yang+json+xml
application/yang-data+xml
application/yang-data+json
application/yang+xml
application/yang+json

A

application/yang-data+xml

application/yang-data+json

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the name of the Cisco SD-WAN dashboard?

vEdge
vManage
vBond
vSmart

A

vManage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Cisco Finesse?

an easy-to-use collaboration solution that keeps individuals and teams connected anytime and anywhere
a network management and analytics platform for Cisco Digital Network Architecture
a browser-based contact center agent and supervisor desktop
an application to manage phone users, phones, directory numbers, and to connect and manage calls to the desired destinations

A

a browser-based contact center agent and supervisor desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Software as a Service (SaaS) management platform offers API keys for remote or service access?

YANG Explorer
Management Information Tree
Cisco Intersight
APIC

A

Cisco Intersight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Cisco SDK is primarily a call widget that is embedded in an iframe within another web page for Cisco UCS application?

Jabber Guest SDK for Web
Jabber Guest SDK for iOS
Jabber Guest SDK for Android
Jabber Web SDK

A

Jabber Guest SDK for Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A developer is using a REST API to develop an application to communicate with a Webex Teams server. What is the default maximum number of items that can be returned by the Webex Teams API prior to using pagination?

100
150
25
50

A

100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Refer to the exhibit. A network administrator is developing an application that communicates with Cisco AMP using an AMP API. A response from an AMP service shows the API rate limits information. What is the unit of value indicated under the item x-ratelimit-limit?

x-ratelimit-limit:3000
x-ratelimit-reset: 3500
x-ratelimit-remaining: 2980

responses
requests
bytes
seconds

A

requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the default TCP port assigned for NETCONF over SSH?

22
1080
443
830

A

830

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where can a corporate developer access the API Explorer with the Firepower Threat Defense API?

the URL address of the device itself
the domain name of the company
the local computer of the developer
on the DevNet web site

A

the URL address of the device itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which underlying technology makes it possible for Cisco Umbrella to prevent a user from accessing a blocked site?

DNS
HTTP and HTTPS
Cisco Firewall
DHCP

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which language is used by the NETCONF protocol to encode both the configuration data and protocol messages?

XML
YAML
HTML
JSON

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three main capabilities provided by Cisco AMP? (Choose three.)

annihilation
detection
responses and automation
redirection
relaying
prevention

A

detection
responses and automation
prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which three functions are provided by Cisco Finesse REST APIS? (Choose three.)

They can be used to integrate into existing applications to add contact center functionality.
They can be used to get termination call detail (TCD) reports.
They can be used to get the call history of an agent.
They can be used to build a fully functioning agent desktop.
They can be used to build custom OpenSocial gadgets.
They can be used to build a script to automate tasks.

A

They can be used to integrate into existing applications to add contact center functionality.

They can be used to build a fully functioning agent desktop.

They can be used to build a script to automate tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which two benefits are provided by the Python-based WebEx Teams SDK? (Choose two.)

It integrates with the Webex Devices API.
It provides error reporting.
It provides access to more API calls within Webex Teams.
It manages requests with pagination.
It is better supported than the Webex Teams APIs.

A

It provides error reporting.

It manages requests with pagination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refer to the exhibit. Which data format is used to describe the list of interfaces?

JSON
YANG
XML
YAML

A

YANG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which two statements describe the usage of Cisco Finesse JavaScript APIs? (Choose two.)

They can be used to get the call history of an agent.
They can be used to build custom gadgets to be placed into applications other than Finesse.
They can be used to embed existing web pages into a custom gadget.
They can be used to build a custom gadget for the agent state workflow.
They can be used to build a fully functioning agent desktop.

A

They can be used to embed existing web pages into a custom gadget.

They can be used to build a custom gadget for the agent state workflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why does the Meraki dashboard API return a 404 rather than a 403 code in response to a request with an invalid API key?

The 404 return code determines whether unauthorized users will try again.
The 403 return code would indicate that the client definitely has an invalid API key.
The 404 return code prevents the system from indicating the existence of resources to unauthorized users.
The 403 return code would indicate that there are no resources at that endpoint but the API key could be correct.

A

The 404 return code prevents the system from indicating the existence of resources to unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does Cisco ISE do when it identifies a user or device accessing the network?

It logs the access attempt.
It automatically and securely places the device and user into the right part of the network.
It processes the originating IP address according to a whitelist.
It quarantines the device and user until an administrator releases the quarantine.

A

It automatically and securely places the device and user into the right part of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How are service profiles used by Cisco UCS Manager?

Cisco USC Manager uses an assigned service profile to each instance to define network policy.
Cisco UCS Manager uses service profiles to assign a unique identity to the server associated with each profile.
Cisco UCS Manager saves service profiles to recover servers in case of data loss.
Cisco UCS Manager uses service profiles as templates to provision policies to multiple versions of the same server.

A

Cisco UCS Manager uses service profiles to assign a unique identity to the server associated with each profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which function does the AXL interface provide for users?

provisions and manages objects in the Unified Communication Management Administration Console
looks up the top ten OWASP vulnerabilities and identifies which endpoints are vulnerable
updates network device configurations with a rollback mechanism
provisions Webex Devices and customizes each display

A

provisions and manages objects in the Unified Communication Management Administration Console

22
Q

What are three primary YANG sources in Cisco NSO? (Choose three.)

mapping model
data models from devices
NSO data model
configuration models
communication model
YANG service models

A

data models from devices

NSO data model

YANG service models

23
Q

What are two tasks a network administrator can perform with Cisco UCS Director? (Choose two.)

Manage multiple Cisco UCS Manager appliances.
Deploy and add capacity to converged infrastructures in a consistent and repeatable manner.
Load-balance data traffic.
Create, clone, and deploy service profiles and templates for all Cisco UCS servers and compute applications.
Create a direct line of communication between Cisco and non-Cisco components.

A

Deploy and add capacity to converged infrastructures in a consistent and repeatable manner.

Create, clone, and deploy service profiles and templates for all Cisco UCS servers and compute applications.

24
Q

What are two actions taken by Firepower for traffic control? (Choose two.)

using security intelligence data to filter traffic, including IP addresses, address blocks, domain names, and URLs
controlling which websites are available to the users on the network
shutting down the network in the event of a DDOS attack
directing heavy data traffic to free servers
load balancing during high-traffic time periods

A

using security intelligence data to filter traffic, including IP addresses, address blocks, domain names, and URLs

controlling which websites are available to the users on the network

25
What are two types of YANG models? (Choose two.) native model vendor model private model hybrid model open model
native model open model
26
What is the average cost per hour of an enterprise outage for the largest enterprises? $700,000.00 per hour $500,000.00 per hour $300,000.00 per hour $100,000.00 per hour
$300,000.00 per hour
27
What is idempotency in IT automation? the quality of software the reusing of shell commands the security level of software the scripting of shell commands
the quality of software
28
A student is creating an Ansible playbook to practice management automation of a Cisco router. Which command should the student add to the playbook to find the interface names, assigned IP addresses, and status of interfaces on the router? show running-config show ip interface brief show ip route ip address
show ip interface brief
29
When following the best practices and core principles of DevOps, how is failure considered? Failure is normal. Failure is simply “repair work”. Failure should only occur in Ops. Failure should not influence software design methodology.
Failure is normal.
30
What is a canary deployment? the switchover of selected users to a new release deployment a production test using a chaos tool to inject random failures with a limited blast-radius a server-by-server switchover to a new release deployment the use of two identical servers with load balancers to redirect traffic for an entire server as needed
the switchover of selected users to a new release deployment
31
What are two challenges of cloud computing technologies? (Choose two.) utilizing generic host environments maintaining access control maintaining configurational consistency of platforms managing costs requesting additional resources
maintaining access control managing costs
32
Which technology can run on bare metal or on large virtual machines to simulate Cisco networks and utilities? Git VIRL Puppet Ansible
VIRL
33
An analyst is using Ansible to perform remote management tasks on network devices. Which file type is in the Ansible file structure that describes the devices under management? role folders and files variable file inventory file playbook file
inventory file
34
What is an error budget in the DevOps/SRE culture? It is the planned percentage of a monetary contract that is given back to a customer when an SLO is not met. It is a best-practice metric for availability, equivalent to only six minutes of unplanned offline time per year. It is an internal-only metric for calculating the actual availability of a service. It is a method for measuring allowable errors as a gate on release speed.
It is a method for measuring allowable errors as a gate on release speed.
35
Which programming language is used by Chef to execute the recipes? Bash Python Ruby Javascript
Ruby
36
A developer issues a Linux command python3 -m venv devenv. What is the developer trying to achieve? to install the devnet tool sets in the Python 3 virtual environment named venv to activate the Python 3 virtual environment named devenv to enter the Python 3 virtual environment named venv using the devnet tool sets to create a Python 3 virtual environment named devenv
to create a Python 3 virtual environment named devenv
37
What is the most common cause of IT outages? a threat actor targeting the enterprise equipment an experienced engineer implementing a configuration using automation an engineer misconfiguring a device or network with manual changes an experienced engineer using an open source product
an engineer misconfiguring a device or network with manual changes
38
What is an unopinionated component in a software ecosystem? a component that does not show an increased preference for specific companion components or architectures unless those components or architectures are necessary a component that is classified as open source and does not require the implementation of specific vendor products a component that may function in a limited ability in order to compensate for the selection of companion components or architectures a component that requires a specific companion component in order to provide full stack implementation
a component that does not show an increased preference for specific companion components or architectures unless those components or architectures are necessary
39
In the use of container technologies, what is a function of platform abstraction when considering the deployment of a product in a cloud environment? Traditional complementary software components such as a database server and web server would be implemented as a single containerized application. Applications require re-engineering in order to implement scalability and consolidation. A containerized app can run on a generically-specified host environment. Applications are aware of underlying hardware configurations and are customized to provide increased functionality.
A containerized app can run on a generically-specified host environment.
40
A student is setting up the DEVASC-LAB VM and CSR1000v VM in VirtualBox that is installed on the local computer. Both VMs are imported to the VirtualBox successfully. The student starts both VMs and tries to verify communications to the CSR1000v VM by opening a web browser on the local computer and enters the URL https://192.168.56.101. After a few seconds, an error message displays that “The connection has timed out”. How can the student verify the IP address assigned by DHCP to the CSR1000v virtual router? Issue the ping 192.168.56.101 command on the local computer. Issue the show ip interface brief command in the CSR1000v VM. Issue the show running-config command in the CSR1000v VM. Issue the ifconfig command in the CSR1000v VM.
Issue the show ip interface brief command in the CSR1000v VM.
41
What is the historical correlation between software developers and IT operations? Developers had the job of creating applications. Operations had the job of verifying that these applications work for users. Operations had the job of brainstorming applications. Developers had the job of testing that these applications work for users and the business. Operations had the job of testing applications. Developers had the job of implementing these applications for clients. Developers had the job of testing applications. Operations had the job of implementing these applications for clients.
Developers had the job of creating applications. Operations had the job of verifying that these applications work for users.
42
How is an error budget calculated in the DevOps/SRE culture? An error budget is the difference between the SLO and the SLI. An error budget is the difference between the SLO and 100% availability. An error budget is the difference between the SLO and the SLA. An error budget is the difference between the and 100% availability.
An error budget is the difference between the SLO and 100% availability.
43
In reviewing a formalized agreement between an organization and a customer, what is the purpose of an SLI? An SLI is a specific set of steps for slowing releases as errors occur. An SLI is an easy to complete, external agreement that is set between the organization and the customer. An SLI is a benchmark metric used to determine and describe SLOs. An SLI is an agreed-upon number of errors per unit time.
An SLI is a benchmark metric used to determine and describe SLOs.
44
What is the default shell commonly used on macOS and Linux? Bash csh tcsh Bourne
Bash
45
Which type of automation includes scripting that may be dangerous if the starting state is not completely known and controlled? stateful stateless declarative procedural
procedural
46
What is an imperative procedure? An ordered sequence of commands that is used to reach a specific end state. A set of commands that require administrator privileges and can only be executed on a local system. A set of commands that is piped to a remote host and immediately executed. A set of commands that examines a target and only performs the tasks needed to achieve the desired state.
An ordered sequence of commands that is used to reach a specific end state.
47
Which statement describes the declarative static model? A declarative model will examine present circumstances and bring real infrastructure into alignment in order to reach a desired state. A declarative model will execute code that is sequentially task-driven instead of focusing on deployment-specific details. A declarative model will follow a specific order of sequential steps in order to effect changes on a target system. A declarative model will subdivide code into top-down sections and condition-driven handlers.
A declarative model will examine present circumstances and bring real infrastructure into alignment in order to reach a desired state.
48
Refer to the exhibit. A user is working on Ansible on the local NMS to manage remote network devices. The user issues the ansible webservers -m ping command to test the communication. However, an error message returns. What are two possible causes for the error? (Choose two.) The SSH credential is wrong. The destination host IP address is wrong. The switch -m should be -M The SSH client is not installed. The destination host alias is wrong. The SSH service does not start on the host.
The destination host IP address is wrong. The SSH service does not start on the host.
49
Which component in the pyATS ecology handles bundling and running jobs? EasyPy AEtest Genie Clover
EasyPy
50
An engineer has just created a backup file of a Cisco VIRL network simulation. Which command should be used to compare the most recent .virl file with the previous backup file? diff pyats knife source list
diff
51
While working in the Ansible code structure, which type of file contains a sequence of tasks, executed in top-down order? .virl .yml .py .txt
.yml
52
What is a standard command to create a Python virtual environment? sudo apt-get install python3-pip pip install [options] [package-index-options]… python3 -m venv /path/to/new/virtual/environment source bin/activate
python3 -m venv /path/to/new/virtual/environment