MODULE 8 Flashcards

1
Q

What is a characteristic of the Yet Another Next Generation (YANG) data model?

It uses a MIBs structure

It uses a tree structure

It uses the JSON data format

It uses a list structure

A

It uses a tree structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two application-specific media types can be used for RESTCONF to identify a YANG construct? (Choose two.)

application/yang+json+xml

application/yang-data+xml

application/yang-data+json

application/yang+xml

application/yang+json

A

application/yang-data+xml
application/yang-data+json

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the name of the Cisco SD-WAN dashboard?

vEdge

vManage

vBond

vSmart

A

vManage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Cisco Finesse?

an easy-to-use collaboration solution that keeps individuals and teams connected anytime and anywhere

a network management and analytics platform for Cisco Digital Network Architecture

a browser-based contact center agent and supervisor desktop

an application to manage phone users, phones, directory numbers, and to connect and manage calls to the desired destinations

A

a browser-based contact center agent and supervisor desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Software as a Service (SaaS) management platform offers API keys for remote or service access?

YANG Explorer

Management Information Tree

Cisco Intersight

APIC

A

Cisco Intersight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Cisco SDK is primarily a call widget that is embedded in an iframe within another web page for Cisco UCS application?

Jabber Guest SDK for Web

Jabber Guest SDK for iOS

Jabber Guest SDK for Android

Jabber Web SDK

A

Jabber Guest SDK for Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A developer is using a REST API to develop an application to communicate with a Webex Teams server. What is the default maximum number of items that can be returned by the Webex Teams API prior to using pagination?

100

150

25

50

A

100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network administrator is developing an application that communicates with Cisco AMP using an AMP API. A response from an AMP service shows the API rate limits information. What is the unit of value indicated under the item x-ratelimit-limit?

x-ratelimit-limit: 3000
x-ratelimit-reset: 3588
x-ratelimit-remaining: 2980

responses

requests

bytes

seconds

A

requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the default TCP port assigned for NETCONF over SSH?

22

1080

443

830

A

830

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where can a corporate developer access the API Explorer with the Firepower Threat Defense API?

the URL address of the device itself

the domain name of the company

the local computer of the developer

on the DevNet web site

A

the URL address of the device itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which underlying technology makes it possible for Cisco Umbrella to prevent a user from accessing a blocked site?

DNS

HTTP and HTTPS

Cisco Firewall

DHCP

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which language is used by the NETCONF protocol to encode both the configuration data and protocol messages?

XML

YAML

HTML

JSON

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three main capabilities provided by Cisco AMP? (Choose three.)

annihilation

detection

responses and automation

redirection

relaying

prevention

A

detection
responses and automation
prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which three functions are provided by Cisco Finesse REST APIs? (Choose three.)

They can be used to integrate into existing applications to add contact center functionality.

They can be used to get termination call detail (TCD) reports.

They can be used to get the call history of an agent.

They can be used to build a fully functioning agent desktop.

They can be used to build custom OpenSocial gadgets.

They can be used to build a script to automate tasks.

A

They can be used to integrate into existing applications to add contact center functionality.

They can be used to build a fully functioning agent desktop.

They can be used to build a script to automate tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which two benefits are provided by the Python-based WebEx Teams SDK? (Choose two.)

It integrates with the Webex Devices API.

It provides error reporting.

It provides access to more API calls within Webex Teams.

It manages requests with pagination.

It is better supported than the Webex Teams APIs.

A

It provides error reporting.

It manages requests with pagination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two statements describe the usage of Cisco Finesse JavaScript APIs? (Choose two.)

They can be used to get the call history of an agent.

They can be used to build custom gadgets to be placed into applications other than Finesse.

They can be used to embed existing web pages into a custom gadget.

They can be used to build a custom gadget for the agent state workflow.

They can be used to build a fully functioning agent desktop.

A

They can be used to embed existing web pages into a custom gadget.
They can be used to build a custom gadget for the agent state workflow.

17
Q

Why does the Meraki dashboard API return a 404 rather than a 403 code in response to a request with an invalid API key?

The 404 return code determines whether unauthorized users will try again.

The 403 return code would indicate that the client definitely has an invalid API key.

The 404 return code prevents the system from indicating the existence of resources to unauthorized users.

The 403 return code would indicate that there are no resources at that endpoint but the API key could be correct.

A

The 404 return code prevents the system from indicating the existence of resources to unauthorized users.

18
Q

What does Cisco ISE do when it identifies a user or device accessing the network?

It logs the access attempt

It automatically and securely places the device and user into the right part of the network

It processes the originating IP address according to a whitelist

It quarantines the device and user until an administrator releases the quarantine

A

It automatically and securely places the device and user into the right part of the network

19
Q

How are service profiles used by Cisco UCS Manager?

Cisco USC Manager uses an assigned service profile to each instance to define network policy

Cisco USC Manager saves service profiles to recover servers in case of data loss

Cisco USC Manager uses service profiles as templates to provision policies to multiple versions of the same server

Cisco USC Manager uses service profiles to assign a unique identity to the server associated with each profile

A

Cisco USC Manager uses service profiles to assign a unique identity to the server associated with each profile

20
Q

Which function does the AXL interface provide for users?

provisions and manages objects in the Unified Communication Management Administration Console

looks up the top ten OWASP vulnerabilities and identifies which endpoints are vulnerable

updates network device configurations with a rollback mechanism

provision Webex Devices and customizes each display

A

provisions and manages objects in the Unified Communication Management Administration Console

21
Q

What are three primary YANG sources in Cisco NSO? (Choose three.)

mapping model

data models from devices

NSO data model

configuration models

communication model

YANG service models

A

data models from devices

NSO data model

YANG service models

22
Q

What are two tasks a network administrator can perform with Cisco UCS Director? (Choose two.)

Manage multiple Cisco UCS Manager appliances.

Deploy and add capacity to converged infrastructures in a consistent and repeatable manner.

Load-balance data traffic.

Create, clone, and deploy service profiles and templates for all Cisco UCS servers and compute applications.

Create a direct line of communication between Cisco and non-Cisco component.

A

Deploy and add capacity to converged infrastructures in a consistent and repeatable manner.

Create, clone, and deploy service profiles and templates for all Cisco UCS servers and compute applications.

23
Q

What are two actions taken by Firepower for traffic control? (Choose two.)

using security intelligence data to filter traffic, including IP addresses, address blocks, domain names, and URLs

controlling which websites are available to the users on the network

shutting down the network in the event of a DDOS attack

directing heavy data traffic to free servers

load balancing during high-traffic time periods

A

using security intelligence data to filter traffic, including IP addresses, address blocks, domain names, and URLs

controlling which websites are available to the users on the network

24
Q

What are two types of YANG models? (Choose two.)

native model

vendor model

private model

hybrid model

open model

A

native model
open model