Part 5 Flashcards
What is YANG used for?
A. scraping data via CLI
B. processing SNMP read-only polls
C. describing data models
D. providing a transport for network configuration data between client and server
C. describing data models
Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session?
A. HTTP Status Code: 200
B. HTTP Status Code: 302
C. HTTP Status Code: 401
D. HTTP Status Code: 504
C. HTTP Status Code: 401
Which protocol does REST API rely on to secure the communication channel?
A. HTTP
B. SSH
C. HTTPS
D. TCP
A. HTTP
At which layer does Cisco DNA Center support REST controls?
A. session layer
B. northbound APIs
C. EEM applets or scripts
D. YAML output from responses to API calls
B. northbound APIs
Which algorithms are used to secure REST API from brute attacks and minimize the impact?
A. SHA-512 and SHA-384
B. MD5 algorithm-128 and SHA-384
C. SHA-1, SHA-256, and SHA-512
D. PBKDF2, BCrypt, and SCrypt
D. PBKDF2, BCrypt, and SCrypt
Which method of account authentication does OAuth 2.0 use within REST APIs?
A. username/role combination
B. access tokens
C. cookie authentication
D. basic signature workflow
B. access tokens
Which two protocols are used with YANG data models? (Choose two.)
A. TLS
B. RESTCONF
C. SSH
D. NETCONF
E. HTTPS
B. RESTCONF
D. NETCONF
What is a benefit of data modeling languages like YANG?
A. They create more secure and efficient SNMP OIDs.
B. They provide a standardized data structure, which results in configuration scalability and consistency.
C. They enable programmers to change or write their own applications within the device operating system.
D. They make the CLI simpler and more efficient.
B. They provide a standardized data structure, which results in configuration scalability and consistency.
Which protocol infers that a YANG data model is being used?
A. SNMP
B. RESTCONF
C. REST
D. NX-API
B. RESTCONF
Which method displays text directly into the active console with a synchronous EEM applet policy?
A. event manager applet boom event syslog pattern ג€˜UPג€™ action 1.0 syslog priority direct msg ג€˜logging directly to consoleג€™
B. event manager applet boom event syslog pattern ג€˜UPג€™ action 1.0 gets ג€˜logging directly to consoleג€™
C. event manager applet boom event syslog pattern ג€˜UPג€™ action 1.0 string ג€˜logging directly to consoleג€™
D. event manager applet boom event syslog pattern ג€˜UPג€™ action 1.0 puts ג€˜logging directly to consoleג€™
B. event manager applet boom event syslog pattern ג€˜UPג€™ action 1.0 gets ג€˜logging directly to consoleג€™
Which two steps are required for a complete Cisco DNA Center upgrade? (Choose two.)
A. automation backup
B. system update
C. golden image selection
D. proxy configuration
E. application updates
A. automation backup
B. system update
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?
A. event manager applet ondemand event none action 1.0 syslog priority critical msg ג€˜This is a message from ondemandג€™
B. event manager applet ondemand action 1.0 syslog priority critical msg ג€˜This is a message from ondemandג€™
C. event manager applet ondemand event register action 1.0 syslog priority critical msg ג€˜This is a message from ondemandג€™
D. event manager applet ondemand event manual action 1.0 syslog priority critical msg ג€˜This is a message from ondemandג€™
A. event manager applet ondemand event none action 1.0 syslog priority critical msg ג€˜This is a message from ondemandג€™
What does this EEM applet event accomplish?
“event snmp oid 1.3.6.1.3.7.6.5.3.9.3.8.7 get-type next entry-op gt entry-val 75 poll-interval 5”
A. Upon the value reaching 75%, a SNMP event is generated and sent to the trap server.
B. It reads an SNMP variable, and when the value exceeds 75%, it triggers an action.
C. It issues email when the value is greater than 75% for five polling cycles.
D. It presents a SNMP variable that can be interrogated.
B. It reads an SNMP variable, and when the value exceeds 75%, it triggers an action.
What is a requirement for an Ansible-managed node?
A. It must have an SSH server running.
B. It must be a Linux server or a Cisco device.
C. It must support ad hoc commands.
D. It must have an Ansible Tower installed.
A. It must have an SSH server running.
Which characteristic distinguishes Ansible from Chef?
A. Ansible uses Ruby to manage configurations. Chef uses YAML to manage configurations.
B. The Ansible server can run on Linux, Unix or Windows. The Chef server must run on Linux or Unix.
C. Ansible pushes the configuration to the client. Chef client pulls the configuration from the server.
D. Ansible lacks redundancy support for the primary server. Chef runs two primary servers in an active/active mode.
C. Ansible pushes the configuration to the client. Chef client pulls the configuration from the server.
Explanation:
Ansible works by connecting to your nodes and pushing out small programs, called ג€Ansible modulesג€ to them. These programs are written to be resource models of the desired state of the system. Ansible then executes these modules (over SSH by default), and removes them when finished.
Chef is a much older, mature solution to configure management. Unlike Ansible, it does require an installation of an agent on each server, named chef-client. Also, unlike Ansible, it has a Chef server that each client pulls configuration from.