Module #4 Flashcards

1
Q

Refer to the exhibit. A network administrator is using a Python script to test a REST API request. The traceback message indicates that there is an error in the URI. What is a possible issue?

The protocol is wrong.
The query component is missing.
The destination host address is wrong.
The SSL certificate is invalid.

A

The destination host address is wrong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an architectural constraint to which a true RESTful API web service must adhere?

It operates in a stateless way.
It uses HTTPS to transport data.
It must operate along with a DNS server.
It operates as a cloud service.

A

It operates in a stateless way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refer to the exhibit. A network administrator is using a Python script to send a REST API request. What is the purpose of the line of code resp = requests.get(url, verify = False) ?

It bypasses the certificate validation check.
It tests the function of the Python requests library
It omits the sending URL in the response.
It skips the URL verification step and tests the resource path.

A

It bypasses the certificate validation check.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A client is sending a REST API request to a web server. The request includes the need for data compression. Which three values are acceptable for the Accept-Encoding request header? (Choose three.)

*
xz
br
gzip
tar
zip

A

*
br
gzip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the meaning of the term flow as it relates to the OAuth 2.0 authorization framework?

It is the number of requests contained in the token bucket.
It is a process for an API request to send authentication credentials to a web service.
It is a process for an API user to obtain an access token from the authorization server.
It is the sequence of data exchanged between a REST API request and a response.

A

It is a process for an API user to obtain an access token from the authorization server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a characteristic of a RESTful API?

It uses HTTP methods to gather and manipulate data.
It is a southbound API.
It facilitates the configuration changes from a network controller to end devices.
It supports a secure data transmission between a remote user and an enterprise network.

A

It uses HTTP methods to gather and manipulate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the REST API request URI example http://example.com/update/person?id=42&email=person%40example.com , which term describes the component example.com ?

query
path
scheme
authority

A

authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which characteristic of the SOAP architecture specifies communication between all similar and dissimilar application types?

independence
interface uniformity
neutrality
extensibility

A

independence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which SOAP message root element defines the XML document as a SOAP message?

Meta tag
Body
Envelope
Header

A

Envelope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of credential information is used for the bearer authentication in REST APIs?

a username and password set by the client
a password encoded using Base64
an MD5 hash string generated by the client application
a string generated by an authentication server

A

a string generated by an authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are two purposes for using rate limits on public and unrestricted APIs? (Choose two.)

to avoid a server overloading from too many requests at the same time
to limit the number of authorization requests per API call
to provide better service and response time to all users
to ensure a client uses a multifactor authentication mechanism
to limit the number of passwords that a client can have in making API requests

A

to avoid a server overloading from too many requests at the same time

to provide better service and response time to all users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which HTTP response status code indicates that the user is not authenticated to access the site?

201
400
401
403
404

A

401

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which API architectural style uses an XML-based messaging protocol to communicate between applications?

SOAP
REST
NFS
XML-RPC

A

SOAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network engineer is learning about Rest APIs. When executing a particular API, the server responds with curl. How is this information useful?

Curl shows the retrieved information in JSON format.
Curl shows how to access the content displayed in the response body using curl.
Curl shows the information the API returned from the server.
Curl shows the URL used in the API request.

A

Curl shows how to access the content displayed in the response body using curl.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In which situation would a synchronous API be used?

when a server is not part of the process
when the original API request or data from the request is delayed
when data is being retrieved from a database
when the client is not required to take action

A

when data is being retrieved from a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is REST?

It is a protocol that allows administrators to manage nodes on an IP network.
It is a way to store and interchange data in a structured format.
It is a human readable data structure that is used by applications for storing, transforming, and reading data.
It is an architecture style for designing web service applications.

A

It is an architecture style for designing web service applications.

17
Q

Which HTTP response status code indicates that the request to update the database is completed?

403
200
201
401
404
400

A

201

18
Q

How many elements does a SOAP message contain?

5
3
2
4

A

4

19
Q

Refer to the exhibit. A network administrator is using a Python script to test a REST API request. The traceback message indicates there is an error in the URI. What is the error?

The query component is missing.
The destination web host address is invalid.
The protocol is missing.
The path in the URI is invalid.

A

The protocol is missing.

20
Q

Which type of encoding is used in basic authentication for REST APIs?

Base64
UTF-16
Base32
UTF-8

A

Base64

21
Q

What is an architectural constraint to which a true RESTful API web service must adhere?

It must support the XML data format.
It uses HTTPS to transport data.
It operates as a cloud service.
It runs as client/server model.

A

It runs as client/server model.

22
Q

What is a reason that a network engineer would use APIs?

to automate configuration or data collection tasks
to provide a more robust security architecture
to facilitate features across network devices that operate at different layers
to provide upper management with information about network performance

A

to automate configuration or data collection tasks

23
Q

What is a webhook for REST APIs?

It is an HTTP redirect to forward the API request to another web service.
It is an HTTP PUT message to update information on a website.
It is an HTTP UPDATE message to notify the user that an API request is successfully completed.
It is an HTTP callback to a URL to notify the client application that an event has occurred.

A

It is an HTTP callback to a URL to notify the client application that an event has occurred.

24
Q

As part of creating an API request using Python, the following commands are entered. What is the purpose of this step?
ipaddr = 10.1.50.1
interface = Ethernet1/1
hostname = R1

to import Python modules
to request JSON data
to create functions to test the code
to create variables

A

to create variables

25
Q

A web service uses a rate limit algorithm that puts all incoming REST API requests into a queue in the order in which they arrive. The algorithm allows incoming requests to arrive at any rate, but the server processes the requests from the queue at a fixed rate. Which rate limit algorithm is used by the web service?

token bucket
fixed window counter
sliding window counter
leaky bucket

A

leaky bucket

26
Q

What is an application requirement in order to receive a notification from a webhook provider?

The application must provide a syslog service.
The application must accept HTTP UPDATE messages from the webhook provider.
The application must register a unique domain name from a certificate authority.
The application must always be running to receive HTTP POST requests.

A

The application must always be running to receive HTTP POST requests.

27
Q

Which RESTful operation corresponds to the HTTP GET method?

update
patch
read
post

A

read