MODULE 8 Flashcards
What is a characteristic of the Yet Another Next Generation (YANG) data model?
It uses a MIBs structure
It uses a tree structure
It uses the JSON data format
It uses a list structure
It uses a tree structure
Which two application-specific media types can be used for RESTCONF to identify a YANG construct? (Choose two.)
application/yang+json+xml
application/yang-data+xml
application/yang-data+json
application/yang+xml
application/yang+json
application/yang-data+xml
application/yang-data+json
What is the name of the Cisco SD-WAN dashboard?
vEdge
vManage
vBond
vSmart
vManage
What is Cisco Finesse?
an easy-to-use collaboration solution that keeps individuals and teams connected anytime and anywhere
a network management and analytics platform for Cisco Digital Network Architecture
a browser-based contact center agent and supervisor desktop
an application to manage phone users, phones, directory numbers, and to connect and manage calls to the desired destinations
a browser-based contact center agent and supervisor desktop
Which Software as a Service (SaaS) management platform offers API keys for remote or service access?
YANG Explorer
Management Information Tree
Cisco Intersight
APIC
Cisco Intersight
Which Cisco SDK is primarily a call widget that is embedded in an iframe within another web page for Cisco UCS application?
Jabber Guest SDK for Web
Jabber Guest SDK for iOS
Jabber Guest SDK for Android
Jabber Web SDK
Jabber Guest SDK for Web
A developer is using a REST API to develop an application to communicate with a Webex Teams server. What is the default maximum number of items that can be returned by the Webex Teams API prior to using pagination?
100
150
25
50
100
A network administrator is developing an application that communicates with Cisco AMP using an AMP API. A response from an AMP service shows the API rate limits information. What is the unit of value indicated under the item x-ratelimit-limit?
x-ratelimit-limit: 3000
x-ratelimit-reset: 3588
x-ratelimit-remaining: 2980
responses
requests
bytes
seconds
requests
What is the default TCP port assigned for NETCONF over SSH?
22
1080
443
830
830
Where can a corporate developer access the API Explorer with the Firepower Threat Defense API?
the URL address of the device itself
the domain name of the company
the local computer of the developer
on the DevNet web site
the URL address of the device itself
Which underlying technology makes it possible for Cisco Umbrella to prevent a user from accessing a blocked site?
DNS
HTTP and HTTPS
Cisco Firewall
DHCP
DNS
Which language is used by the NETCONF protocol to encode both the configuration data and protocol messages?
XML
YAML
HTML
JSON
XML
What are the three main capabilities provided by Cisco AMP? (Choose three.)
annihilation
detection
responses and automation
redirection
relaying
prevention
detection
responses and automation
prevention
Which three functions are provided by Cisco Finesse REST APIs? (Choose three.)
They can be used to integrate into existing applications to add contact center functionality.
They can be used to get termination call detail (TCD) reports.
They can be used to get the call history of an agent.
They can be used to build a fully functioning agent desktop.
They can be used to build custom OpenSocial gadgets.
They can be used to build a script to automate tasks.
They can be used to integrate into existing applications to add contact center functionality.
They can be used to build a fully functioning agent desktop.
They can be used to build a script to automate tasks.
Which two benefits are provided by the Python-based WebEx Teams SDK? (Choose two.)
It integrates with the Webex Devices API.
It provides error reporting.
It provides access to more API calls within Webex Teams.
It manages requests with pagination.
It is better supported than the Webex Teams APIs.
It provides error reporting.
It manages requests with pagination.
Which two statements describe the usage of Cisco Finesse JavaScript APIs? (Choose two.)
They can be used to get the call history of an agent.
They can be used to build custom gadgets to be placed into applications other than Finesse.
They can be used to embed existing web pages into a custom gadget.
They can be used to build a custom gadget for the agent state workflow.
They can be used to build a fully functioning agent desktop.
They can be used to embed existing web pages into a custom gadget.
They can be used to build a custom gadget for the agent state workflow.
Why does the Meraki dashboard API return a 404 rather than a 403 code in response to a request with an invalid API key?
The 404 return code determines whether unauthorized users will try again.
The 403 return code would indicate that the client definitely has an invalid API key.
The 404 return code prevents the system from indicating the existence of resources to unauthorized users.
The 403 return code would indicate that there are no resources at that endpoint but the API key could be correct.
The 404 return code prevents the system from indicating the existence of resources to unauthorized users.
What does Cisco ISE do when it identifies a user or device accessing the network?
It logs the access attempt
It automatically and securely places the device and user into the right part of the network
It processes the originating IP address according to a whitelist
It quarantines the device and user until an administrator releases the quarantine
It automatically and securely places the device and user into the right part of the network
How are service profiles used by Cisco UCS Manager?
Cisco USC Manager uses an assigned service profile to each instance to define network policy
Cisco USC Manager saves service profiles to recover servers in case of data loss
Cisco USC Manager uses service profiles as templates to provision policies to multiple versions of the same server
Cisco USC Manager uses service profiles to assign a unique identity to the server associated with each profile
Cisco USC Manager uses service profiles to assign a unique identity to the server associated with each profile
Which function does the AXL interface provide for users?
provisions and manages objects in the Unified Communication Management Administration Console
looks up the top ten OWASP vulnerabilities and identifies which endpoints are vulnerable
updates network device configurations with a rollback mechanism
provision Webex Devices and customizes each display
provisions and manages objects in the Unified Communication Management Administration Console
What are three primary YANG sources in Cisco NSO? (Choose three.)
mapping model
data models from devices
NSO data model
configuration models
communication model
YANG service models
data models from devices
NSO data model
YANG service models
What are two tasks a network administrator can perform with Cisco UCS Director? (Choose two.)
Manage multiple Cisco UCS Manager appliances.
Deploy and add capacity to converged infrastructures in a consistent and repeatable manner.
Load-balance data traffic.
Create, clone, and deploy service profiles and templates for all Cisco UCS servers and compute applications.
Create a direct line of communication between Cisco and non-Cisco component.
Deploy and add capacity to converged infrastructures in a consistent and repeatable manner.
Create, clone, and deploy service profiles and templates for all Cisco UCS servers and compute applications.
What are two actions taken by Firepower for traffic control? (Choose two.)
using security intelligence data to filter traffic, including IP addresses, address blocks, domain names, and URLs
controlling which websites are available to the users on the network
shutting down the network in the event of a DDOS attack
directing heavy data traffic to free servers
load balancing during high-traffic time periods
using security intelligence data to filter traffic, including IP addresses, address blocks, domain names, and URLs
controlling which websites are available to the users on the network
What are two types of YANG models? (Choose two.)
native model
vendor model
private model
hybrid model
open model
native model
open model