Network Automation Flashcards

1
Q

Which of the following configuration management tools uses agentless architecture for managing network devices?

(A) Ansible
(B) Puppet
(C) Chef
(D) Ansible and Puppet
(E) Puppet and Chef

A

Which of the following configuration management tools uses agentless architecture for managing network devices?

(A) Ansible
(B) Puppet
(C) Chef
(D) Ansible and Puppet
(E) Puppet and Chef

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Given the following JSON object, how many object keys found in the sample below?
{
“response”: {
“id”: “3”,
“name”: “Cisco Catalyst”,
“ipAddress”: {
“private”: “192.168.1.1”,
“public”: “156.157.1.1”
}
}
}

(A) 3
(B) 4
(C) 5
(D) 6

A

Given the following JSON object, how many object keys found in the sample below?
{
“response”: {
“id”: “3”,
“name”: “Cisco Catalyst”,
“ipAddress”: {
“private”: “192.168.1.1”,
“public”: “156.157.1.1”
}
}
}

(A) 3
(B) 4
(C) 5
(D) 6

JSON defines variables as key:value pairs, with the key on the left of the colon (:) and always enclosed in double quotation marks, with the value on the right.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CRUD is the acronym of the four primary actions performed by an application. What does CRUD stand for?

(A) Create, Read, Update, Delete
(B) Create, Read, Update, Done
(C) Create, Resolve, Update, Delete
(D) Create, Resolve, Update, Done

A

CRUD is the acronym of the four primary actions performed by an application. What does CRUD stand for?

**(A) Create, Read, Update, Delete **
(B) Create, Read, Update, Done
(C) Create, Resolve, Update, Delete
(D) Create, Resolve, Update, Done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Layer 2 switch examines a frame’s destination MAC address and forwards that frame out of the port G0/2. That action occurs as part of which plane of the switch?

(A) Data plane
(B) Management plane
(C) Control Plane
(D) None of the above

A

A Layer 2 switch examines a frame’s destination MAC address and forwards that frame out of the port G0/2. That action occurs as part of which plane of the switch?

**(A) Data plane **
(B) Management plane
(C) Control Plane
(D) None of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which answer correctly describes the format of the JSON text below? (Choose two answers)
(A) One JSON object that has one key:value pair
(B) One JSON object that has two key:value pairs
(C) One JSON object that has three key:value pair
(D) Two JSON objects that have two key:value pair
(E) A JSON object whose value is a second JSON object

A

Which answer correctly describes the format of the JSON text below? (Choose two answers)
(A) One JSON object that has one key:value pair
(B) One JSON object that has two key:value pairs
(C) One JSON object that has three key:value pair
(D) Two JSON objects that have two key:value pair
(E) A JSON object whose value is a second JSON object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identify the hostname part from the given URI: https://cluster.cisco.com/dna/intent/api/v1/business/sda/fabric? ipaddress=10.1.2.3.
(A) https://
(B) cluster.cisco
(C) cluster.cisco.com
(D) dna/intent/api/v1/business/sda/fabric
(E) ?ipaddress=10.1.2.3

A

Identify the hostname part from the given URI: https://cluster.cisco.com/dna/intent/api/v1/business/sda/fabric? ipaddress=10.1.2.3.
(A) https://
(B) cluster.cisco
(C) cluster.cisco.com
(D) dna/intent/api/v1/business/sda/fabric
(E) ?ipaddress=10.1.2.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following features of Cisco DNA Center discovers the actual path the packets will take from the source to the destination based on the current forwarding tables?
(A) Encrypted traffic analysis
(B) Device 360 and Client 360
(C) Network time travel
(D) Path trace

A

Which of the following features of Cisco DNA Center discovers the actual path the packets will take from the source to the destination based on the current forwarding tables?
(A) Encrypted traffic analysis
(B) Device 360 and Client 360
(C) Network time travel
(D) Path trace

Path trace – Discovers the actual path packets would take from source to destination based on current forwarding tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following features of Cisco DNA Center shows past client performance in a timeline for compar-
ison to current behavior?

(A) Encrypted traffic analysis
(B) Device 360 and Client 360
(C) Network time travel
(D) Path trace

A

Which of the following features of Cisco DNA Center shows past client performance in a timeline for compar-
ison to current behavior?

(A) Encrypted traffic analysis
(B) Device 360 and Client 360
(C) Network time travel
(D) Path trace

Network time travel – Shows past client performance in a timeline for comparison to current behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following features of Cisco DNA Center gives a comprehensive view of the health of the device?

(A) Encrypted traffic analysis
(B) Device 360 and Client 360
(C) Network time travel
(D) Path trace

A

Which of the following features of Cisco DNA Center gives a comprehensive view of the health of the device?

(A) Encrypted traffic analysis
(B) Device 360 and Client 360
(C) Network time travel
(D) Path trace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following features of Cisco DNA Center enables Cisco DNA to use algorithms to recognize security threats even in encrypted traffic?

(A) Encrypted traffic analysis
(B) Device 360 and Client 360
(C) Network time travel
(D) Path trace

A

Which of the following features of Cisco DNA Center enables Cisco DNA to use algorithms to recognize security threats even in encrypted traffic?

(A) Encrypted traffic analysis
(B) Device 360 and Client 360
(C) Network time travel
(D) Path trace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your company decides to move away from manual configuration methods, making changes by editing centralized configuration files. The issues you are facing with non-centralized configuration files are:
1) You don’t know who engineer made the changes in the configuration file.
2) You don’t know the changes in the configuration file over time. Which tool your company will use in order to solve these issues?

(A) Version Control System
(B) Version Control Configuration
(C) Version Control Change
(D) Version Control Edit

A

Your company decides to move away from manual configuration methods, making changes by editing centralized configuration files. The issues you are facing with non-centralized configuration files are:
1) You don’t know who engineer made the changes in the configuration file.
2) You don’t know the changes in the configuration file over time. Which tool your company will use in order to solve these issues?

(A) Version Control System
(B) Version Control Configuration
(C) Version Control Change
(D) Version Control Edit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One of the benefits of controller-based networks over traditional networks is that the configuration on the devices have fewer errors, and you spent less time troubleshooting the network.

(A) TRUE
(B) FALSE

A

One of the benefits of controller-based networks over traditional networks is that the configuration on the devices have fewer errors, and you spent less time troubleshooting the network.

(A) TRUE
(B) FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The ______________________ plane includes protocols that allow network engineers to manage the devices. (A) Management (B) Data (C) Control (D) Network

LLC, ExamsDigest; Gorgotsias, Nikolaos. CCNA 200-301 Practice Exam Questions 2020 [fully updated]: 230+ Practice Questions and Free One-month Unlimited Access on Examsdigest.com (Page 335). . Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly