Untitled Deck Flashcards

1
Q

Which four modifications to Josh’s backup utility would you implement to meet her requirements? (choose 4)

A

A. Leverage the Python asyncio library to support backup multiple devices concurrently.
B. Update the Python environment used for the backup tool. To Python 3 and run the scripts as it is to migrate code.
C. Add an optional argument to the script for “—device” to limit backup jobs. Run to justify to just identify devices.
D. Compare the checksum from the last stored backup to the latest one before saving to disk.
E. Use 2to3 automatically update the script score code to support Python 3 syntax.
F. Split the network inventory into four pieces and run an instance of the backup script for each piece.
G. Check the configuration last modified time on the device and skip if there has been no change since the last successful backup.

Answer: A, C, E, G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Based on the challenges Sara is having, which three recommendations would you make for changes to her PPM workflows? Choose three.

A

A. Create a pre-added hook to run the formatting and style checkers to verify code quality.
B. Create a bunch of branches for each major version of a tool and tag each minor release on that branch.
C. Create a new feature branch based on the current main branch and merge in your changes.
D. Consider rebasing your feature branch from the main and run all tests prior to merging.
E. Create a pre commit hook to run the formatting and style checks to verify quote code quality.
F. Major, minor version releases of tools should be tagged and maintained on the main branch.

Answer: B, D, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which recommendation would you suggest to Josh’s related to her request for feedback on testing needs?

A

A. Perform integration testing to check if different modules work correctly under heavy when combined as a group.
B. Implement testing to ensure that framework functions correctly under heavy load and numerous simultaneously requests.
C. Implement systems verification testing to ensure that the various modules function correctly with one another.
D. Perform testing to ensure that each framework component operates correctly as independent unit.
E. Implement a set of paths and tests that they perform to examine the several different user flows through the modules.

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is not a suggestion for scalability testing that you would recommend as Sara?

A

A. Using a baseline of 10 requests per second, find the number of users the system can concurrently support.
B. Each test iteration must begin with verification of base functionality of system before scale testing begins.
C. Measure request to response time for all the tasks to track impact on the application performance and not just look for failure.
D. An order of magnitude 10 times increasing steps. Find the maximum number of requests per second supported by a single user.

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What 3 architecture decisions for software upgrade process which satisfy the giving requirements? Choose three.

A

A. Task queues should be used to decouple HTTP request processing from the code responsible for the software upgrades.
B. Spawn tasks workers for software upgrades on-demand and the cloud, e.g., using serverless.
C. Task workers which perform software upgrades should be distributed across the sites.
D. Perform the software upgrades on one device at a time to minimize the risk as much as possible.
E. Software upgrades to redundant pairs of switches should be done only on one of two devices at a time.
F. The application should perform software upgrades on all devices at once to reduce total execution time.
G. Have several task workers perform software update concentrated in the central data center.
H. Software upgrade should be done seriously synchronously to HTTP requests processing inside Flask view to maximize this system complexity.

Answer: A, C, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which three options must be considered when designing a telemetry strategy for Carl and Merrill, Mary? Choose 3.

A

A. Data normalization schema.
B. Data modeling schema type.
C. Telemetry protocol.
D. Subscription configuration mode.
E. Data encoding.
F. Data flow direction.

Answer: C, D, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which networking mode exposes all ports from the container as is to the underlying host?

A

B. Exposes all ports from the container as is to the underlying host.

Answer: Host networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which networking mode requires to explicitly list host: container port mappings?

A

A. Requires to explicitly list host: container port mappings.

Answer: Bridge Networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two approaches would you recommend to improve input validation? Choose 2.

A

A. Add a CAPTCHA to each web page where users enter data.
B. Create a fuzzing service that periodically hits the front end with bad data.
C. Escape invalid characters from text input fields.
D. Use prepared statements when inserting the data into the database, even after input validation is performed.
E. Duplication, client-side validation checks and the server-side code.

Answer: D, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which recommendation would you make to call and the leadership team to Defy gravity could take advantage of the hybrid cloud architecture?

A

A. District reliance of defy gravity to be complete operational for operations makes it a poor choice for our cloud project.
B. Deploy application tiers within public cloud, private cloud, and a plant location in parallel.
C. Install automated coordination machine engines within the closest public cloud region or zone to head to each plant.
D. Install a data service satellite on premises at each plant for data security.
E. Deploy front end 2.0 at each public and private cloud location with users directed to service based on network conditions.

Answer: E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which set of features will Mike and her OPS team want to consider implementing in their script to achieve her goals?

A

A. HTTP methods, proposed data store, validate, transaction, lock.
B. HTTP methods, candidates store, verify config, batch, lock.
C. HTTP methods, Proposed data store, validate, commit, release.
D. RPC’s, candidate database data store, verify config, transaction, release.
E. RPC’s, proposed data store, validate, batch, release.
F. RPC’s, candidate data store, validate, transaction, lock.

Answer: F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What HTTP methods are not responsible for rush comp?

A

GET, PATCH, PUT, DELETE, POST.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you remove the primary IP address assigned to a physical interface?

A

Use the DELETE method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you look up the current primary IP address assigned to a physical interface?

A

Use the GET method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you change the primary IP address assigned to a physical interface that has one configured?

A

Use the PATCH or PUT method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you configure the primary IP address assigned to a physical interface that currently has no IP address configured?

A

Use the PATCH or PUT method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is one suggestion for Sam regarding sensitive data in the YAML file?

A

Sensitive data should be provided as environment variables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are three pieces of data included in Mary’s CSR Baseline requirements?

A

Elliptic curve parameter file, elliptic curve length of 256 bits, common name of *.ops.pm.example.com.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the characteristics of Elliptical curve cryptography?

A

Asymmetric cryptographic algorithm, provides protection against man in the middle attacks, recommended key length between 160 and 521 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the characteristics of RSA?

A

Older, more established algorithm, known to be broken with short key lengths, recommended key length greater than 1024 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are five design recommendations for creating Ansible roles?

A

Combine network connection-specific playbooks, combine platform-specific playbooks, group configuration steps by network features, define default values for variables, standardize on variable names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What approach should be recommended for finding problem commits and testing them independently?

A

Use ‘git bisect good|bad’ to track down problem commits and git cherry-pick ‘HASH_FROM_BISECT’ for testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of Sam’s Netconf payload snippets are valid?

A

Option C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which two NETCONF request payloads are valid with respect to Yang model snippets?

A

Option B and Option C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What nodes are shown in response based on service health?
Node is always shown in response, value of node shown in response, internal value of node, data node shown in response, actual data type of node, node is read only.
26
What are the key recommendations for validating the environment before changes?
Ensure the development lab has all hardware models used in the field, build pre-checks that validate the environment meets requirements, allow the operations team to schedule changes at critical locations.
27
How do microservices communicate?
Microservices communicate through defined and documented APIs, allowing each to be independently developed.
28
What command is used to create a new feature branch?
Git checkout -b NETAUO-###-USERNAME-SHORT-DESCRIPITION
29
What command is used to commit changes?
Git commit
30
What command is used to push changes to your branch?
Git push origin NETAUTO-###-USERNAME-SHORT-DESCRIPITION
31
What command is used to sync feature with main after MMR approval?
Git checkout NETAUO-###-USERNAME-SHORT-DESCRIPITION, Git rebase -i main
32
What command is used to add your changes to main?
Git merge NETAUO-###-USERNAME-SHORT-DESCRIPITION
33
Which tool should be used to write network test cases according to Jessica's email?
C. Pytest + scrapli
34
What recommendation helps Sarah configure a role based on switch type?
D. Use Ansible_network_OS as part of a 'when' condition to determine specific tasks per host.
35
Which telemetry selection will be accepted by Mary's Telegraph server?
B. gRPC, dial-out, compact port buff. Key value pairing coding.
36
What are two suggestions for why the container cannot reach the target application?
C. The container is using the default bridge network which has an IP range overlapping the next target application. D. The health check network is not configured for IP masquerading.
37
Which principle should be applied to limit access to logs?
C. Apply the principle of least privilege.
38
What recommendation is suggested for Jackson's testing needs?
C. Perform testing to ensure that offering can be provided. Scale up or scale down facilities as needed.
39
What is not a suggestion for scalability testing?
D. Test cases must run through all possible workflow logic and steps to verify operational state of the system.
40
What type of Docker networking exposes all ports from the container to the host?
Host networking
41
What type of Docker networking provides DNS service between attached containers?
Bridge Networking
42
What three pieces of data should be included in Mary's CSR?
C. RSA key length of 2048 bits. E. Common name of 'telegraf.ops.pm.example.com'. G. Common name of '*.ops.ppm.example.com'.
43
What command is used to create a new feature branch?
Git checkout -b NETAUO-###-USERNAME-SHORT-DESCRIPITION
44
What command is used to commit changes?
Git commit
45
What command is used to push changes to your branch?
Git push origin NETAUTO-###-USERNAME-SHORT-DESCRIPITION
46
What command is used to sync feature with main after MMR approval?
Git checkout NETAUO-###-USERNAME-SHORT-DESCRIPITION, Git rebase -i main
47
What command is used to add your changes to main?
Git merge NETAUO-###-USERNAME-SHORT-DESCRIPITION
48
Which tool should be used to write network test cases according to Jessica's email?
C. Pytest + scrapli
49
What recommendation helps Sarah configure a role based on switch type?
D. Use Ansible_network_OS as part of a 'when' condition to determine specific tasks per host.
50
Which telemetry selection will be accepted by Mary's Telegraph server?
B. gRPC, dial-out, compact port buff. Key value pairing coding.
51
What are two suggestions for why the container cannot reach the target application?
C. The container is using the default bridge network which has an IP range overlapping the next target application. D. The health check network is not configured for IP masquerading.
52
Which principle should be applied to limit access to logs?
C. Apply the principle of least privilege.
53
What recommendation is suggested for Jackson's testing needs?
C. Perform testing to ensure that offering can be provided. Scale up or scale down facilities as needed.
54
What is not a suggestion for scalability testing?
D. Test cases must run through all possible workflow logic and steps to verify operational state of the system.
55
What type of Docker networking exposes all ports from the container to the host?
Host networking
56
What type of Docker networking provides DNS service between attached containers?
Bridge Networking
57
What three pieces of data should be included in Mary's CSR?
C. RSA key length of 2048 bits. E. Common name of 'telegraf.ops.pm.example.com'. G. Common name of '*.ops.ppm.example.com'.
58
Which telemetry section will be accepted by Mary's Telegraph server?
Download the certificate that Mary used in the Telegraph and install on devices.
59
What are the suggested migration actions for Harry's concern?
Centralized authentication and authorization. ## Footnote E. Centralized authentication and authorization. A. They implement session management. B. Enforce specific queries only instead of wild card searches. D. Office or normalized sensitive data.
60
Which 4 modifications to the backup utility would you implement?
Leverage the Python asyncio library to support backing up multiple devices concurrently. Add an optional argument to the script for limiting backup jobs. Use futurize to automatically update the script source code. Configuration diff before saving to disk.
61
What is Continuous Integration (CI)?
A Continuous integration (CI) is a software development practice that involves developers frequently merging code changes into a central repository.
62
What is Canary deployment?
Canary deployment is a progressive rollout of an application that routes traffic between an already deployed version and a new version.
63
What is A/B testing?
A/B testing, also known as split testing, is a research method that compares two versions of a variable to determine which performs better.
64
What is Blue-green Deployment?
Blue-green deployment is a release management technique that uses two environments to run different versions of the application.
65
What is Rolling deployment?
Rolling deployment is a software release strategy that staggers deployment across multiple phases.
66
What deployment strategies should be followed for back-end servers?
CI, Rolling.
67
What deployment strategies should be followed for back-end APIs?
CI, Blue-Green.
68
What deployment strategy should be followed for front-end APIs?
A/B Testing.
69
What deployment strategy should be followed for network automation scripts?
CI.
70
What options must be considered when designing a telemetry stage for Carl and Mary?
Data encryption, data model selection, data element.
71
What is the correct telemetry encoding app used for gNMI dial in?
Protobuf.
72
What should be chosen to reduce bandwidth issues in telemetry?
Sample interval 0.
73
What two approaches would you recommend to improve input validation?
Use prepared statements when inserting data into the database. Duplication client-side validation checks in server-side code.
74
Which three pieces of data should be included in Mary's CSR?
Elliptic curve parameter file, Elliptic curve length of 2048 bits, Common name of * .ops.ppm.example.com.
75
What characteristics define Elliptical curve cryptography and RSA?
Asymmetric cryptographic algorithm, Provides protection against man-in-the-middle attacks.
76
What should be done regarding root certificate security?
Use an intermediate cert and store the root in a safe offline location.
77
What should be included in the design of rules for network hosts?
Roles should be included in connections plugged as part of the role name. Roles should support network_CLI and HTTP API connection plugins.