Module #8 Flashcards

1
Q

What is a characteristic of the Yet Another Next Generation (YANG) data model?

It uses a MIBs structure.
It uses a tree structure.
It uses the JSON data format.
It uses a list structure.

A

It uses a tree structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two application-specific media types can be used for RESTCONF to identify a YANG construct? (Choose two.)

application/yang+json+xml
application/yang-data+xml
application/yang-data+json
application/yang+xml
application/yang+json

A

application/yang-data+xml
application/yang-data+json

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the name of the Cisco SD-WAN dashboard?

vEdge
vManage
vBond
vSmart

A

vManage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Cisco Finesse?

an easy-to-use collaboration solution that keeps individuals and teams connected anytime and anywhere
a network management and analytics platform for Cisco Digital Network Architecture
a browser-based contact center agent and supervisor desktop
an application to manage phone users, phones, directory numbers, and to connect and manage calls to the desired destinations

A

a browser-based contact center agent and supervisor desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Software as a Service (SaaS) management platform offers API keys for remote or service access?

YANG Explorer
Management Information Tree
Cisco Intersight
APIC

A

Cisco Intersight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Cisco SDK is primarily a call widget that is embedded in an iframe within another web page for Cisco UCS application?

Jabber Guest SDK for Web
Jabber Guest SDK for iOS
Jabber Guest SDK for Android
Jabber Web SDK

A

Jabber Guest SDK for Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A developer is using a REST API to develop an application to communicate with a Webex Teams server. What is the default maximum number of items that can be returned by the Webex Teams API prior to using pagination?

100
150
25
50

A

100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Refer to the exhibit. A network administrator is developing an application that communicates with Cisco AMP using an AMP API. A response from an AMP service shows the API rate limits information. What is the unit of value indicated under the item x-ratelimit-limit?

responses
requests
bytes
seconds

A

requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the default TCP port assigned for NETCONF over SSH?

22
1080
443
830

A

830

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where can a corporate developer access the API Explorer with the Firepower Threat Defense API?

the URL address of the device itself
the domain name of the company
the local computer of the developer
on the DevNet web site

A

the URL address of the device itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which underlying technology makes it possible for Cisco Umbrella to prevent a user from accessing a blocked site?

DNS
HTTP and HTTPS
Cisco Firewall
DHCP

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which language is used by the NETCONF protocol to encode both the configuration data and protocol messages?

XML
YAML
HTML
JSON

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three main capabilities provided by Cisco AMP? (Choose three.)

annihilation
detection
responses and automation
redirection
relaying
prevention

A

detection
responses and automation
prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which three functions are provided by Cisco Finesse REST APIS? (Choose three.)

They can be used to integrate into existing applications to add contact center functionality.
They can be used to get termination call detail (TCD) reports.
They can be used to get the call history of an agent.
They can be used to build a fully functioning agent desktop.
They can be used to build custom OpenSocial gadgets.
They can be used to build a script to automate tasks.

A

They can be used to integrate into existing applications to add contact center functionality.
They can be used to build a fully functioning agent desktop.
They can be used to build a script to automate tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which two benefits are provided by the Python-based WebEx Teams SDK? (Choose two.)

It integrates with the Webex Devices API.
It provides error reporting.
It provides access to more API calls within Webex Teams.
It manages requests with pagination.
It is better supported than the Webex Teams APIs.

A

It provides error reporting.
It manages requests with pagination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refer to the exhibit. Which data format is used to describe the list of interfaces?
JSON
YANG
XML
YAML

A

YANG

17
Q

Which two statements describe the usage of Cisco Finesse JavaScript APIs? (Choose two.)

They can be used to get the call history of an agent.
They can be used to build custom gadgets to be placed into applications other than Finesse.
They can be used to embed existing web pages into a custom gadget.
They can be used to build a custom gadget for the agent state workflow.
They can be used to build a fully functioning agent desktop.

A

They can be used to embed existing web pages into a custom gadget.
They can be used to build a custom gadget for the agent state workflow.

18
Q

Which function does the AXL interface provide for users?

provisions and manages objects in the Unified Communication Management Administration Console
looks up the top ten OWASP vulnerabilities and identifies which endpoints are vulnerable
updates network device configurations with a rollback mechanism
provisions Webex Devices and customizes each display

A

provisions and manages objects in the Unified Communication Management Administration Console

19
Q

What does Cisco ISE do when it identifies a user or device accessing the network?

It logs the access attempt.
It automatically and securely places the device and user into the right part of the network.
It processes the originating IP address according to a whitelist.
It quarantines the device and user until an administrator releases the quarantine.

A

It automatically and securely places the device and user into the right part of the network.

20
Q

How are service profiles used by Cisco UCS Manager?

Cisco USC Manager uses an assigned service profile to each instance to define network policy.
Cisco UCS Manager uses service profiles to assign a unique identity to the server associated with each profile.
Cisco UCS Manager saves service profiles to recover servers in case of data loss.
Cisco UCS Manager uses service profiles as templates to provision policies to multiple versions of the same server.

A

Cisco UCS Manager uses service profiles to assign a unique identity to the server associated with each profile.

21
Q

Why does the Meraki dashboard API return a 404 rather than a 403 code in response to a request with an invalid API key?

The 404 return code determines whether unauthorized users will try again.
The 403 return code would indicate that the client definitely has an invalid API key.
The 404 return code prevents the system from indicating the existence of resources to unauthorized users.
The 403 return code would indicate that there are no resources at that endpoint but the API key could be correct.

A

The 404 return code prevents the system from indicating the existence of resources to unauthorized users.

22
Q

What are three primary YANG sources in Cisco NSO? (Choose three.)

mapping model
data models from devices
NSO data model
configuration models
communication model
YANG service models

A

data models from devices
NSO data model
YANG service models

23
Q

What are two tasks a network administrator can perform with Cisco UCS Director? (Choose two.)

Manage multiple Cisco UCS Manager appliances.
Deploy and add capacity to converged infrastructures in a consistent and repeatable manner.
Load-balance data traffic.
Create, clone, and deploy service profiles and templates for all Cisco UCS servers and compute applications.
Create a direct line of communication between Cisco and non-Cisco components.

A

Deploy and add capacity to converged infrastructures in a consistent and repeatable manner.
Create, clone, and deploy service profiles and templates for all Cisco UCS servers and compute applications.

24
Q

What are two actions taken by Firepower for traffic control? (Choose two.)

using security intelligence data to filter traffic, including IP addresses, address blocks, domain names, and URLs
controlling which websites are available to the users on the network
shutting down the network in the event of a DDOS attack
directing heavy data traffic to free servers
load balancing during high-traffic time periods

A

using security intelligence data to filter traffic, including IP addresses, address blocks, domain names, and URLs
controlling which websites are available to the users on the network

25
Q

What are two types of YANG models? (Choose two.)

native model
vendor model
private model
hybrid model
open model

A

native model
open model