SDN, Automation Flashcards

1
Q

Which statement about the Cisco ACI fabric is most accurate?
A. The APIC is able to enforce security by inserting itself into the data path.
B. The fabric header carries the EPG from the egress to the ingress leaf switch.
C. An APIC is a cluster of at least three APIC controllers, providing a single point of management without a single point of failure.
D. The spine switch rewrites the EPG from ingress to egress when it performs the forwarding proxy function

A

C. An APIC is a cluster of at least three APIC controllers, providing a single point of management without a single point of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which API is used in controller-based architectures to interact with edge devices?
A. overlay
B. northbound 
C. underlay 
D. southbound
A

D. southbound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are two characteristics of a controller-based network? (Choose two)
A. The administrator can make configuration updates from the CLI
B. It uses northbound and southbound APIs to communicate between architectural layers
C. It moves the control plane to a central point
D. It decentralizes the control plane, which allows each device to make its own forwarding decisions
E. It uses Telnet to report system issues.

A

B. It uses northbound and southbound APIs to communicate between architectural layers
C. It moves the control plane to a central point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
What are two southbound APIs? (Choose two)
A. Thrift
B. NETCONF 
C. Open Flow 
D. DSC
E. CORBA
A

B. NETCONF

C. Open Flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which statement correctly compares traditional networks and controller-based networks?
A. Only traditional networks offer a centralized control plane
B. Only traditional networks natively support centralized management
C. Traditional and controller-based networks abstract policies from device configurations
D. Only controller-based networks decouple the control plane and the data plane

A

D. Only controller-based networks decouple the control plane and the data plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two capacities of Cisco DNA Center make it more extensible? (Choose two)
A. adapters that support all families of Cisco IOS software
B. SDKs that support interaction with third-party network equipment
C. customized versions for small, medium, and large enterprises
D. REST APIs that allow for external applications to interact natively with Cisco DNA Center
E. modular design that is upgradable as needed

A

B. SDKs that support interaction with third-party network equipment
D. REST APIs that allow for external applications to interact natively with Cisco DNA Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What makes Cisco DNA Center different from traditional network management applications and their management of networks?

A. It only supports auto-discovery of network elements in a green field deployment.
B. It modular design allows someone to implement different versions to meet the specific needs of an organization
C. It abstracts policy from the actual device configuration
D. It does not support high availability of management functions when operating in cluster mode

A

C. It abstracts policy from the actual device configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which option best describes an API?
A. communication often uses either Java scripting, Python, XML, or simple HTTP
B. an architectural style (versus a protocol) for designing applications
C. a stateless client-server model
D. request a certain type of data by specifying the URL path that models the data

A

C. a stateless client-server model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which option about JSON is true?
A. uses predefined tags or angle brackets (<>) to delimit markup text
B. used to describe structured data that includes arrays
C. used for storing information
D. similar to HTML, it is more verbose than XML

A

B. used to describe structured data that includes arrays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following is the JSON encoding of a dictionary or hash?
A. {“key”: “value”} 
B. [“key”, “value”] 
C. {“key”, “value”} 
D. (“key”: “value”)
A

A. {“key”: “value”}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which two encoding methods are supported by REST APIs? (Choose two)
A. YAML 
B. JSON
C. EBCDIC 
D. SGML 
E. XML
A

B. JSON

E. XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two benefits of network automation? (Choose two)
A. reduced operational costs
B. reduced hardware footprint
C. faster changes with more reliable results
D. fewer network failures
E. increased network security

A

A. reduced operational costs

C. faster changes with more reliable results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Drag and Drop Question

Ansible:

Chef:

Puppet:

+ uses TCP port 10002 for configuration push jobs
+ uses SSH for remote device communication
+ uses Ruby for fundamental configuration elements
+ uses TCP port 10002 for configuration push jobs
+ fundamental configuration elements are stored in a manifest
+ uses Ruby for fundamental configuration elements
+ uses TCP 8140 for communication
+ uses YAML for fundamental configuration elements

A

Ansible:
+ uses SSH for remote device communication
+ uses YAML for fundamental configuration elements
Chef:
+ uses Ruby for fundamental configuration elements
+ uses TCP port 10002 for configuration push jobs
Puppet:
+ fundamental configuration elements are stored in a manifest
+ uses TCP 8140 for communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which three statements about MAC addresses are correct? (Choose three)
A. To communicate with other devices on a network, a network device must have a unique MAC address
B. The MAC address is also referred to as the IP address
C. The MAC address of a device must be configured in the Cisco IOS CLI by a user with administrative privileges
D. A MAC address contains two main components, the first of which identifies the manufacturer of the hardware and the second of which uniquely identifies the hardware
E. An example of a MAC address is 0A:26:B8:D6:65:90
F. A MAC address contains two main components, the first of which identifies the network on which the host resides and the second of which uniquely identifies the host on the network

A

A. To communicate with other devices on a network, a network device must have a unique MAC address
the Cisco IOS CLI by a user with administrative privileges
D. A MAC address contains two main components, the first of which identifies the manufacturer of the hardware and the second of which uniquely identifies the hardware
E. An example of a MAC address is 0A:26:B8:D6:65:90

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Cisco IOS command will indicate that interface GigabitEthernet 0/0 is configured via DHCP?
A. show ip interface GigabitEthernet 0/0 dhcp
B. show interface GigabitEthernet 0/0
C. show ip interface dhcp
D. show ip interface GigabitEthernet 0/0
E. show ip interface GigabitEthernet 0/0 brief

A

D. show ip interface GigabitEthernet 0/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which command can you enter to allow Telnet to be supported in addition to SSH?
A. transport input telnet ssh 
B. transport input telnet
C. no transport input telnet 
D. privilege level 15
A

A. transport input telnet ssh

17
Q

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
A. It drops lower-priority packets before it drops higher-priority packets
B. It can identify different flows with a high level of granularity
C. It guarantees the delivery of high-priority packets
D. It can mitigate congestion by preventing the queue from filling up
E. It supports protocol discovery

A

A. It drops lower-priority packets before it drops higher-priority packets
D. It can mitigate congestion by preventing the queue from filling up

18
Q
Which command enables a router to become a DHCP client?
A. ip address dhcp 
B. ip helper-address 
C. ip dhcp pool
D. ip dhcp client
A

A. ip address dhcp

19
Q
Which feature or protocol determines whether the QoS on the network is sufficient to support IP services?
A. LLDP 
B. CDP 
C. IP SLA 
D. EEM
A

C. IP SLA

20
Q
A network engineer must back up 20 network router configurations globally within a customer environment. Which protocol allows the engineer to perform this function using the Cisco IOS MIB?
A. COP 
B. SNMP 
C. SMTP 
D. ARP
A

B. SNMP

21
Q

How do TCP and UDP differ in the way that they establish a connection between two endpoints?
A. TCP uses synchronization packets, and UDP uses acknowledgment packets
B. UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bits
C. UDP provides reliable message transfer and TCP is a connectionless protocol
D. TCP uses the three-way handshake and UDP does not guarantee message delivery

A

D. TCP uses the three-way handshake and UDP does not guarantee message delivery

22
Q

A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?
A. It allows the traffic to pass through unchanged
B. It drops the traffic
C. It tags the traffic with the default VLAN
D. It tags the traffic with the native VLAN

A

A. It allows the traffic to pass through unchanged