Part 5 Flashcards

1
Q

What is YANG used for?

A. scraping data via CLI

B. processing SNMP read-only polls

C. describing data models

D. providing a transport for network configuration data between client and server

A

C. describing data models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session?

A. HTTP Status Code: 200

B. HTTP Status Code: 302

C. HTTP Status Code: 401

D. HTTP Status Code: 504

A

C. HTTP Status Code: 401

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which protocol does REST API rely on to secure the communication channel?

A. HTTP

B. SSH

C. HTTPS

D. TCP

A

A. HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

At which layer does Cisco DNA Center support REST controls?

A. session layer

B. northbound APIs

C. EEM applets or scripts

D. YAML output from responses to API calls

A

B. northbound APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which algorithms are used to secure REST API from brute attacks and minimize the impact?

A. SHA-512 and SHA-384

B. MD5 algorithm-128 and SHA-384

C. SHA-1, SHA-256, and SHA-512

D. PBKDF2, BCrypt, and SCrypt

A

D. PBKDF2, BCrypt, and SCrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which method of account authentication does OAuth 2.0 use within REST APIs?

A. username/role combination

B. access tokens

C. cookie authentication

D. basic signature workflow

A

B. access tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which two protocols are used with YANG data models? (Choose two.)

A. TLS

B. RESTCONF

C. SSH

D. NETCONF

E. HTTPS

A

B. RESTCONF

D. NETCONF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a benefit of data modeling languages like YANG?

A. They create more secure and efficient SNMP OIDs.

B. They provide a standardized data structure, which results in configuration scalability and consistency.

C. They enable programmers to change or write their own applications within the device operating system.

D. They make the CLI simpler and more efficient.

A

B. They provide a standardized data structure, which results in configuration scalability and consistency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which protocol infers that a YANG data model is being used?

A. SNMP

B. RESTCONF

C. REST

D. NX-API

A

B. RESTCONF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which method displays text directly into the active console with a synchronous EEM applet policy?

A. event manager applet boom event syslog pattern ג€˜UPג€™ action 1.0 syslog priority direct msg ג€˜logging directly to consoleג€™

B. event manager applet boom event syslog pattern ג€˜UPג€™ action 1.0 gets ג€˜logging directly to consoleג€™

C. event manager applet boom event syslog pattern ג€˜UPג€™ action 1.0 string ג€˜logging directly to consoleג€™

D. event manager applet boom event syslog pattern ג€˜UPג€™ action 1.0 puts ג€˜logging directly to consoleג€™

A

B. event manager applet boom event syslog pattern ג€˜UPג€™ action 1.0 gets ג€˜logging directly to consoleג€™

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two steps are required for a complete Cisco DNA Center upgrade? (Choose two.)

A. automation backup

B. system update

C. golden image selection

D. proxy configuration

E. application updates

A

A. automation backup

B. system update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?

A. event manager applet ondemand event none action 1.0 syslog priority critical msg ג€˜This is a message from ondemandג€™

B. event manager applet ondemand action 1.0 syslog priority critical msg ג€˜This is a message from ondemandג€™

C. event manager applet ondemand event register action 1.0 syslog priority critical msg ג€˜This is a message from ondemandג€™

D. event manager applet ondemand event manual action 1.0 syslog priority critical msg ג€˜This is a message from ondemandג€™

A

A. event manager applet ondemand event none action 1.0 syslog priority critical msg ג€˜This is a message from ondemandג€™

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does this EEM applet event accomplish?
“event snmp oid 1.3.6.1.3.7.6.5.3.9.3.8.7 get-type next entry-op gt entry-val 75 poll-interval 5”

A. Upon the value reaching 75%, a SNMP event is generated and sent to the trap server.

B. It reads an SNMP variable, and when the value exceeds 75%, it triggers an action.

C. It issues email when the value is greater than 75% for five polling cycles.

D. It presents a SNMP variable that can be interrogated.

A

B. It reads an SNMP variable, and when the value exceeds 75%, it triggers an action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a requirement for an Ansible-managed node?

A. It must have an SSH server running.

B. It must be a Linux server or a Cisco device.

C. It must support ad hoc commands.

D. It must have an Ansible Tower installed.

A

A. It must have an SSH server running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which characteristic distinguishes Ansible from Chef?

A. Ansible uses Ruby to manage configurations. Chef uses YAML to manage configurations.

B. The Ansible server can run on Linux, Unix or Windows. The Chef server must run on Linux or Unix.

C. Ansible pushes the configuration to the client. Chef client pulls the configuration from the server.

D. Ansible lacks redundancy support for the primary server. Chef runs two primary servers in an active/active mode.

A

C. Ansible pushes the configuration to the client. Chef client pulls the configuration from the server.

Explanation:
Ansible works by connecting to your nodes and pushing out small programs, called ג€Ansible modulesג€ to them. These programs are written to be resource models of the desired state of the system. Ansible then executes these modules (over SSH by default), and removes them when finished.
Chef is a much older, mature solution to configure management. Unlike Ansible, it does require an installation of an agent on each server, named chef-client. Also, unlike Ansible, it has a Chef server that each client pulls configuration from.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A
17
Q

Refer to the exhibit. What does the snippet of code achieve?

A. It creates an SSH connection using the SSH key that is stored, and the password is ignored.

B. It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.

C. It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

D. It opens a tunnel and encapsulates the login information, if the host key is correct.

A

C. It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

18
Q

Which two characteristics define the Intent API provided by Cisco DNA Center? (Choose two.)

A. northbound API

B. business outcome oriented

C. device-oriented

D. southbound API

E. procedural

A

A. northbound API

B. business outcome oriented

19
Q

In a Cisco DNA Center Plug and Play environment, why would a device be labeled unclaimed?

A. The device has not been assigned a workflow.

B. The device could not be added to the fabric.

C. The device had an error and could not be provisioned.

D. The device is from a third-party vendor.

A

C. The device had an error and could not be provisioned.

20
Q

What does the Cisco DNA Center use to enable the delivery of applications through a network and to yield analytics for innovation?

A. process adapters

B. Command Runner

C. intent-based APIs

D. domain adapters

A

C. intent-based APIs

21
Q

Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?

A. all devices integrating with ISE

B. selected individual devices

C. all devices in selected sites

D. all wired devices

A

C. all devices in selected sites

22
Q

Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on devices with similar network settings?

A. Command Runner

B. Application Policies

C. Template Editor

D. Authentication Template

A

C. Template Editor

23
Q

In which part of the HTTP message is the content type specified?

A. HTTP method

B. body

C. header

D. URI

A

C. header

24
Q

An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use? event manager applet LogMessage event routing network 172.30.197.0/24 type all

A. action 1 syslog msg ג€OSPF ROUTING ERRORג€

B. action 1 syslog send ג€OSPF ROUTING ERRORג€

C. action 1 syslog pattern ג€OSPF ROUTING ERRORג€

D. action 1 syslog write ג€OSPF ROUTING ERRORג€

A

A. action 1 syslog msg ג€OSPF ROUTING ERRORג€

25
Q

An engineer runs the code against an API of Cisco DNA Center, and the platform returns this output. What does the response indicate?

A. The authentication credentials are incorrect.

B. The URI string is incorrect.

C. The Cisco DNA Center API port is incorrect.

D. The HTTP method is incorrect.

A

D. The HTTP method is incorrect.

26
Q

What are two benefits of YANG? (Choose two.)

A. It enforces the use of a specific encoding format for NETCONF.

B. It collects statistical constraint analysis information.

C. It enables multiple leaf statements to exist within a leaf list.

D. It enforces configuration semantics.

E. It enforces configuration constraints.

A

A. It enforces the use of a specific encoding format for NETCONF.

E. It enforces configuration constraints.

27
Q
A
28
Q

Refer to the exhibit. After running the code in the exhibit, which step reduces the amount of data that the NETCONF server returns to the NETCONF client, to only the interfaceג€™s configuration?

A. Use the Ixml library to parse the data returned by the NETCONF server for the interfaceג€™s configuration.

B. Create an XML filter as a string and pass it to get_config() method as an argument.

C. Create a JSON filter as a string and pass it to the get_config() method as an argument.

D. Use the JSON library to parse the data returned by the NETCONF server for the interfaceג€™s configuration.

A

D. Use the JSON library to parse the data returned by the NETCONF server for the interfaceג€™s configuration.

29
Q

Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?

A. from ncclient import

B. import manager

C. from ncclient import *

D. import ncclient manager

A

D. import ncclient manager

30
Q

Which line must be added in the Python function to return the JSON object {ג€cat_9kג€: ג€FXS1932Q2SEג€}?

A. return (json.dumps({d[ג€˜hostnameג€™]: d[ג€˜serialNumberג€™] for d in json.loads(test_json)[ג€˜responseג€™]}))

B. return (json.dumps({for d in json.loads(test_json)[ג€˜responseג€™]: d[ג€˜hostnameג€™]: d[ג€˜serialNumberג€™]}))

C. return (json.loads({d[ג€˜hostnameג€™]: d[ג€˜serialNumberג€™] for d in json.dumps(test_json)[ג€˜responseג€™}))

D. return (json.loads({for d in json.dumps(test_json)[ג€˜responseג€™]: d[ג€˜hostnameג€™]: d[ג€˜serialNumberג€™]}))

A

D. return (json.loads({for d in json.dumps(test_json)[ג€˜responseג€™]: d[ג€˜hostnameג€™]: d[ג€˜serialNumberג€™]}))

31
Q

Refer to the exhibit. Which code results in the working Python script displaying a list of network devices from the Cisco DNA Center?

A. network_device_list(dnac[ג€hostג€], dnac[ג€usernameג€],dnac[ג€passwordג€]) login = dnac_login(dnac) print(dnac_devices)

B. login = dnac_login(dnac[ג€hostג€], dnac[ג€usernameג€], dnac[ג€passwordג€]) network_device_list(dnac, login) print(dnac_devices)

C. login = dnac_login(dnac[ג€hostג€], dnac[ג€usernameג€], dnac[ג€passwordג€]) network_device_list(dnac, login) for item in dnac_devices: print(dnac_devices.item)

D. network_device_list(dnac[ג€hostג€], dnac[ג€usernameג€], dnac[ג€passwordג€]) login = dnac_login(dnac) for item in dnac_devices: print(dnac_devices.item)

A

C. login = dnac_login(dnac[ג€hostג€], dnac[ג€usernameג€], dnac[ג€passwordג€]) network_device_list(dnac, login) for item in dnac_devices: print(dnac_devices.item)

32
Q

What does the Cisco DNA REST response indicate?

A. Cisco DNA Center has the incorrect credentials for cat3850-1

B. Cisco DNA Center is unable to communicate with cat9000-1

C. Cisco DNA Center has the incorrect credentials for cat9000-1

D. Cisco DNA Center has the incorrect credentials for RouterASR-1

A

C. Cisco DNA Center has the incorrect credentials for cat9000-1

33
Q

What is a characteristic of YANG?

A. It is a Cisco proprietary language that models NETCONF data.

B. It allows model developers to create custom data types.

C. It structures data in an object-oriented fashion to promote model reuse.

D. It provides loops and conditionals to control flow within models.

A

C. It structures data in an object-oriented fashion to promote model reuse.

34
Q

Drag and drop the snippets onto the blanks within the code to construct a script that changes the routing from gateway 1 to gateway 2 from 11:00 p.m. to 12:00 a.m. (2300 to 2400) only, daily. Not all options are used, and some options may be used twice.

A
35
Q

Refer to the exhibit. The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?

A. event manager applet EEM_IP_SLA event track 10 state down

B. event manager applet EEM_IP_SLA event track 10 state unreachable

C. event manager applet EEM_IP_SLA event sla 10 state unreachable

D. event manager applet EEM_IP_SLA event sla 10 state down

A

A. event manager applet EEM_IP_SLA event track 10 state down

36
Q

What is used to validate the authenticity of client and is sent in HTTP requests as a JSON object?

A. SSH

B. HTTPS

C. JWT

D. TLS

A

C. JWT