Pre-Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Refer to the exhibit. A developer needs to create a webhook to send all Cisco Webex messages to a third-party tool by using the Cisco Webex API. The developer must Auhenticate with the API before any API calls can be made. To automate the procedure, a Python script is used. Which code snippet must be placed onto the blank in the code?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 5

Refer to the exhibit. Which RESTCONF request results in this response?

A.

B.

C.

D.

Full Access
Question # 6

Refer to the exhibit. A network engineer must configure new interfaces on a set of devices and is planning to use an Ansible playbook for the task. All devices support SSH and NETCONF protocol, and the interface variables are unique per device. In which directory are the YAML files including variables hosted to automate the task with the netconf_config module?

A.

current working directory

B.

host_vars directory

C.

group_vars directory

D.

home directory

Full Access
Question # 7

How do XML and JSON compare regarding functionality?

A.

XML provides more human readability than JSON.

B.

JSON natively supports arrays and XML does not natively support arrays.

C.

XML provides more support for mapping data structures into host languages than JSON.

D.

JSON provides less support for data types than XML.

Full Access
Question # 8

Refer to the exhibit.

A network engineer must improve the fabric discovery process in a data center. The engineer wants to check current ACI scripts in the myproject repository and clone them to a folder named aci. The engineer will optimize the scripts from the new folder. Which command performs this task on the Git repository?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 9

Which port does HTTPS use by default?

A.

433

B.

443

C.

803

D.

883

Full Access
Question # 10

Which type of OWASP threat forges a malicious HTTP request into an application?

A.

Clickjacking

B.

SQL Injection

C.

CSRF

D.

XSS

Full Access
Question # 11

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Full Access
Question # 12

What is a capability of model-driven programmability for infrastructure automation?

A.

compatibility with any networking device

B.

automatic version control

C.

generic APIs that are compatible with multiple platforms

D.

a single data model acr oss the network

Full Access
Question # 13

A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing? The data contains sensitive information, so specialist encryption tools must be used to secure the data. Which application deployment model meets the requirements?

A.

edge

B.

private cloud

C.

public cloud

D.

hybrid cloud

Full Access
Question # 14

Drag and drop the API characteristics from the left onto the categories on the right.

Full Access
Question # 15

A developer creates an application that must provide an encrypted connection or API keys. The keys will be used to communicate with a REST API. Which command must be used for the secure connection?

B.

curl –v ‘ftp://username.app.com/endpoint/?api_key=12345abcdef’

Full Access
Question # 16

Which two HTTP code series relate to errors? (Choose two.

A.

400

B.

200

C.

500

D.

300

E.

100

Full Access
Question # 17

What is the purpose of grouping devices in a VLAN?

A.

Devices communicate as if they are connected on the same wire.

B.

Multicast network traffic is limited to the VLAN connected devices.

C.

Unicast messages are limited to the clients connected on the same VLAN.

D.

Network traffic is load balanced between the devices connected to the VLAN.

Full Access
Question # 18

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.

Full Access
Question # 19

A network engineer makes several API calls lo Cisco Prime to retrieve a list of all devices. Each time a response is received, only a subset of the devices is returned. The engineer :ices that HTTP code 429 is returned instead of 200 for some API calls. Why did the response exclude some of the devices?

A.

The API applied an offset that was indicated In the request.

B.

The API failed to identify how many items to retrieve.

C.

The API timed out the request.

D.

The API rate limited the request

Full Access
Question # 20

A file in a local Git repository has been updated and issued the git add . command. The git diff command has been run to compare the changes to the previous commit, but nothing shows. Which action identifies the problem?

A.

Run the git add . command again in the correct subdirectory to ensure changes added to the staging area.

B.

Run the git commit command before the differences are compared to receive the end state of the code.

C.

Run the git status command to see the differences between current and previous code review stages.

D.

Run the git diff --staged command to compare the code added to the staging area.

Full Access
Question # 21

Refer to the exhibit.

What occurs when the script runs?

A.

The contents of both files are displayed.

B.

The total length of the files is displayed.

C.

The files are combined.

D.

File differences are compared.

Full Access
Question # 22

Which IP service is responsible for automatically assigning an IP address to a device?

A.

DNS

B.

DHCP

C.

SNMP

D.

NAT

Full Access
Question # 23

Which Cisco platform is used to manage data center infrastructure through third-party tools and system integrations?

A.

Cisco DNA Center

B.

Cisco UCS Manager

C.

Cisco Intersight

D.

Cisco UCS Director

Full Access
Question # 24

A developer creates a program in which an object maintains a list of classes based on the observer pattern. The classes are dependent on the object. Whenever the state of the object changes, it notifies the dependent classes directly through callbacks. Which advantage of the observer pattern offers minimum dependencies and maximum flexibility between dependent objects or classes?

A.

tight coupling

B.

cohesion

C.

mediation

D.

loose coupling

Full Access
Question # 25

Which TCP port is used to connect to a network device by using Telnet?

A.

23

B.

69

C.

400

D.

830

Full Access
Question # 26

A development team is creating an application used for contactless payments. The application must:

Be web-based

Capture and process the credit card information for a purchase.

Which security action must the web application use to gather and process the private customer data?

A.

Enable RATs to monitor the web application remotely.

B.

Disable botnets to eliminate risks.

C.

Disable TLS to increase the connection speed.

D.

Enable the encryption of network traffic.

Full Access
Question # 27

Which function does a router provide to a network?

A.

broadcast domain segmentation

B.

unique host on a Layer 3 network

C.

unique hardware address for every node on a LAN

D.

broadcast domain extension

Full Access
Question # 28

Which Python function is used to parse a string that contains JSON data into a Python dictionary?

A.

json.dumps()

B.

json.to_json()

C.

json.parse()

D.

json.loads()

Full Access
Question # 29

Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer's account?

A.

The encoded credentials were available in the source code.

B.

The application was not encrypting the communication with the server.

C.

The credentials were encrypted in the source code.

D.

An SSL certificate was used instead of the TLS protocol to authenticate.

Full Access
Question # 30

A developer completed the creation of a script using Git. Before delivering it to the customer, the developer wants to be sure about all untracked files, without losing any information. Which command gathers this information?

A.

git clean –n

B.

git rm –f

C.

git clean –r

D.

git rm *

Full Access
Question # 31

What is an advantage of device-level management as compared to controller-level management to automate the configuration of network devices?

A.

Device-level management has access to all devices from a single point on the network and controller-level management does not.

B.

Device-level management supports all subsets of the potential device settings and controller-level management does not.

C.

Device-level management supports REST API-enabled devices and controller-level management does not.

D.

Device-level management requires one controller per vendor and controller-level management does not.

Full Access
Question # 32

Which tool simulates a network that runs Cisco equipment?

A.

Cisco Prime Infrastructure

B.

VMware

C.

Docker

D.

CML

Full Access
Question # 33

When a Cisco IOS XE networking device is configured by using RESTCONF, what is the default data encoding method?

A.

application/yaml-data+json

B.

application/yang-data+json

C.

application/xml-data+json

D.

application/json-data+xml

Full Access
Question # 34

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python script to retrieve a list of hosts using the Cisco DNA Center API. Not all options …used.

Full Access
Question # 35

A developer plans to deploy a new application that will use an API to implement automated data collection from Webex with these requirements:

The application was created by using the request library.

Requires HTTP basic authentication.

Provides data in JSON or XML formats.

Which Cisco DevNet resource helps the developer with how to use the API?

A.

DevNet sandbox

B.

API documentation

C.

forums

D.

DevNet code exchange

Full Access
Question # 36

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Full Access
Question # 37

What is a benefit of organizing code into modules?

A.

better maintainability

B.

reduced development costs

C.

simplified development

D.

compatibility with REST APIs

Full Access
Question # 38

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer will use an Ansible playbook to configure devices through Cisco NX REST API. Before the code is run, which resource must be used to verify that the REST API requests work as expected?

A.

Cisco Open NX-OS

B.

Cisco NX-OS SDK

C.

Cisco Learning Labs

D.

Cisco Code Exchange for Nexus

Full Access
Question # 39

During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?

A.

integration

B.

deployment

C.

development

D.

testing

Full Access
Question # 40

What is a capability of Ansible playbooks?

A.

They execute scheduled tasks regularly.

B.

They define the state for a device configuration.

C.

They collect SNMP logs from networking devices.

D.

They utilize the target device agent to execute.

Full Access
Question # 41

Refer to the exhibit.

What are two characteristics of the NETCONF response? (Choose two.)

A.

ospf is defined by the ietf-ospf module.

B.

ietf-ospf imports ietf-routing.

C.

redistribution is a module of type cisco-ospf.

D.

routing protocols is a list.

E.

The main module is routing.

Full Access
Question # 42

What is a capability of the AXL API?

A.

It adds a user to a collaboration space to share information and files.

B.

It executes SQL commands in Cisco Unified Communications Manager.

C.

It allows a meeting to be created with users that do not belong to same organization.

D.

It collects information about system, cluster, and database settings.

Full Access
Question # 43

Which traffic is handled on the control plane?

A.

BGP

B.

SMB

C.

NTP

D.

NETCONF

Full Access
Question # 44

Refer to the exhibit.

A developer needs to create a Docker image that listens on port 5000. Which code snippet must be placed onto the blank in the code?

A.

PORT 5000

B.

LISTEN 5000

C.

EXPOSE 5000

D.

OPEN 5000

Full Access
Question # 45

Drag and drop the functions from the left onto the networking devices on the right.

Full Access
Question # 46

Which OWASP threat takes advantage of a web application that the user has already authenticated to execute an attack?

A.

phishing

B.

DoS

C.

brute force attack

D.

CSRF

Full Access
Question # 47

Which protocol runs over TCP port 830?

A.

NETCONF

B.

Telnet

C.

RESTCONF

D.

HTTP

Full Access
Question # 48

What is a benefit of a model-driven approach for infrastructure automation?

A.

enforces the generation of all automation scripts through the modeling environment

B.

provides a small learning curve and helps system administrators with limited coding experience

C.

ensures that system administrators gain a good understanding of coding and expand their experience and capabilities

D.

enables a user to understand a declarative language to translate the model into an actionable script

Full Access
Question # 49

Refer to the exhibit.

Which infrastructure automation method is shown?

A.

Waterfall

B.

CI/CD pipeline

C.

Agile

D.

Lean

Full Access
Question # 50

Refer to the exhibit.

A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?

A.

results gathering of the show version and show ip int brief commands

B.

output of show ip int brief command on devices of type C9500-40X

C.

execution information of the show version and show ip int brief commands

D.

list of executed commands on C9500-40X and the information of show ip int brief command

Full Access
Question # 51

What is a capability of an agentless configuration management system?

A.

It requires managed hosts to have an interpreter for a high-level language such as Python or Ruby.

B.

It requires managed hosts to connect to a centralized host to receive updated configurations.

C.

It uses compiled languages as the basis of the domain-specific language to interface with managed hosts.

D.

It uses existing protocols to interface with the managed host.

Full Access
Question # 52

Refer to the exhibit.

Which JSON snippet configures a new interface according to YANG model?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 53

Refer to the exhibit. A network engineer must collect information from the network. The engineer prepares a script to automate workflow by using Cisco Meraki API. The script must run over nested loops to collect organization and network information and uses the collected data for final collection. Which process is being automated by using the Python script?

A.

Gather the IDs of the ACME organization, the BLDG21 network, and the dents on the network

B.

Provide the BLDG21 network information if it is part of the ACME organization

C.

Collect the IDs of the clients on the BLDG21 network

D.

List the IDs from the ACME organization

Full Access
Question # 54

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

Full Access
Question # 55

How does a synchronous API request differ from an asynchronous API request?

A.

clients receive responses with a task id for further processing

B.

clients subscribe to a webhook for operation results

C.

clients are able to access the results immediately

D.

clients poll for the status of the execution of operations

Full Access
Question # 56

How are load balancers used in modern application deployment?

A.

Allow traffic to continue as new compute units are brought up and old compute units are taken down.

B.

Allow http and https traffic to continue as old compute units are discontinued before new units are brought up.

C.

Turn off traffic and take down compute units, then update and bring the compute units back up.

D.

Bring up new compute units, test the compute units, and switch the traffic from old units to new units.

Full Access
Question # 57

Drag and drop the code snippets from the bottom into the Python script to write API output to a csv file. Not all options are used.

Full Access
Question # 58

Refer to the exhibit.

OWASP threat does this example demonstrate?

A.

Broken access control

B.

SQL injection

C.

Man-in-the-middle

D.

Cross-site-scripting

Full Access
Question # 59

Drag and drop the code snippets from the bottom to the blanks in the code to complete the HTTP response. Not all options are used.

Full Access
Question # 60

In which two ways is an application characterized when interacting with a webhook? (Choose two.)

A.

codec

B.

receiver

C.

transaction monitor

D.

processor

E.

listener

Full Access
Question # 61

Refer to the exhibit.

A developer wants to create a room named cisco through Webex API. The developer prepares the request by putting an API token inside the authorization header; however, the given HTTP call returns error code 400. How must the call parameters be changed to ensure a valid response?

A.

Replace the team body parameter with the name body parameter.

B.

Replace cisco with a valid name for a team.

C.

Change the token in the header with the authorization token.

D.

Change the HTTP method of the call to PUT.

Full Access
Question # 62

Refer to the exhibit.

A developer needs to upload a local file by using the REST API. The developer gathers information according to the documentation and sends the request by using the cURL command in the exhibit but gets an error code. Which action should be followed to get valid response?

A.

change content type as JSON

B.

add the authorization header with the access token

C.

add a username-password combination to request command

D.

change request method as GET

Full Access
Question # 63

Which advantage does the agile process offer compared to waterfall software development?

A.

to view the full scope of end-to-end work

B.

to have each phase end before the next begins

C.

to fix any issues at the end of the development cycle

D.

to add or update features with incremental delivery

Full Access
Question # 64

What is used in JSON to represent a Python Tuple?

A.

Object

B.

Array

C.

Dict

D.

Collection

Full Access
Question # 65

Refer to the exhibit. What does the load balancer enable in the network topology?

A.

hosted application to access Internet services

B.

external requests to be routed to the application servers

C.

workstations to access the Internet

D.

application to access the database server

Full Access
Question # 66

What is a benefit of organizing code into modules?

A.

improves overall performance

B.

reduces the length of code

C.

enables code to be multifunctional

D.

enables the reuse of code

Full Access
Question # 67

A developer created a new secure API and is testing the functionality locally. The API was added to a container for further testing, and other team members and applications need to connect to the API. Which command exposes the API in the container as port 8443 and allows connections external to the host?

A.

docker run -p 127.0.0.1:80:8443/tcp myapiservice

B.

docker run -p 0.0.0.0:443:8443/tcp myapiservice

C.

docker run -p 0.0.0.0:8443:443/tcp myapiservice

D.

docker run -p 127.0.0.1:443:8443/tcp myapiservice

Full Access
Question # 68

A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?

A.

Communication between the application and the services is not encrypted.

B.

The database credentials should be stored in the configuration files so that they are secured on the same server.

C.

The API keys are stored in the configuration files but should be stored in the vault service.

D.

The synchronization logs should be encrypted and not stored in a relational database.

Full Access
Question # 69

Refer to the exhibit.

A network engineer uses model-driven programmability to monitor and perform changes on the network. The network engineer decides to use the NETCONF RPC message to complete one of their tasks. What is accomplished by sending the RPC message?

A.

The running-config of the device is returned.

B.

The name of each interface is reset to a default name.

C.

All the YANG capabilities supported by the device are returned.

D.

A list of interface names is returned.

Full Access
Question # 70

Refer to the exhibit.

Which command, including arguments, is executed when the container starts?

A.

/bin/sh -c "/bin/sleep 30 && nginx -g 'daemon off;'"

B.

/bin/sh -c "/bin/sleep 10 && nginx -g 'daemon off;'"

C.

/bin/bash -c "/bin/sleep 30 && nginx -g 'daemon off;'"

D.

/bin/sh -c "/bin/sleep 30" && nginx -g 'daemon off;'

Full Access
Question # 71

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code,

which resource must be used to verify that the code works correctly?

A.

Cisco NX-OS SDK

B.

Cisco Learning Labs

C.

Cisco Code Exchange

D.

Cisco Modeling Labs

Full Access
Question # 72

Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:

• MySQL database that stores data about customers

• HTML5 and JavaScript UI that runs on Apache

• REST API written in Python

What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)

A.

to enable multiple views of the same data to be presented to different groups of users

B.

to provide separation between the view and the model by ensuring that all logic is separated out into the controller

C.

to ensure data consistency, which requires that changes to the view are also made to the model

D.

to ensure that only one instance of the data model can be created

E.

to provide only a single view of the data to ensure consistency

Full Access
Question # 73

Refer to the exhibit.

A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?

A.

compilation and configuration of the Cisco DevNet application so that it must be started manually

B.

compilation, installation, and configuration of the Cisco DevNet application so that it starts automatically

C.

compilation and installation of the Cisco DevNet application for an autonomous deployment model

D.

installation and configuration of the Cisco DevNet application so that it starts manually

Full Access
Question # 74

What are two benefits of using VLANs? (Choose two.)

A.

limits the devices that can join the network

B.

segments the broadcast domain

C.

extends the broadcast domain

D.

allows all network devices to be accessible from any host on the network

E.

enables the logical grouping of devices that belong to different Layer 2 devices

Full Access
Question # 75

Refer to the exhibit.

Drag and drop the code from the bottom onto the blanks in the code to construct a cURL command using the Cisco DNA Center API. which will provide the details of a WLAN controller with Id af397748444. Not at options are used.

Full Access
Question # 76

What is a benefit of organizing into modules?

A.

improves collaboration of the development team

B.

makes it easier to deal with large and complex systems

C.

enables the code to be broken down into layers

D.

enables the inclusion of more programming languages in the code

Full Access
Question # 77

Which protocol runs over TCP port 22?

A.

SSH

B.

HTTP

C.

Telnet

D.

NETCONF

Full Access
Question # 78

Refer to the exhibit.

A developer needs to automatically retrieve all of the messages of a Webex room with the roomld of

HY2l2Y292cGFyazovL3Vz397748444YjU5NjAtNTk0ZJ0xMWVhLTk0Mj". Using the Webex API documentation shown, drag and drop the code snippets from below onto the code to complete the Python script to list all of the messages in the room. Not all options are used.

Full Access
Question # 79

Where is an IP packet routed if the packet does not match any routes in the routing table?

A.

firewall

B.

load balancer

C.

central switch

D.

default gateway

Full Access
Question # 80

Drag and drop the code from the bottom onto the box where the code is missing in the Python script to complete a function to return all the clients on a network by using the Cisco Meraki Dashboard API. Not all options are used.

Full Access
Question # 81

Which protocol runs over TCP port 23?

A.

SSH

B.

NETCONF

C.

HTTP

D.

Telnet

Full Access
Question # 82

What is a benefit of model-driven programmability?

A.

It addresses the static architecture of traditional networks being decentralized and complex.

B.

By modeling data, it ensures that vast quantities of data are usable for monitoring.

C.

It provides a programmatic and standards-based way of writing configurations to any network device.

D.

It simplifies management and operations by decoupling the networking hardware from its control mechanism.

Full Access
Question # 83

Refer to the exhibit.

The script returns an output of 401. To use the supplied URL. an HTTP GET request must Be sent with an Authorization header. The header value is a BaseG4 encoded concatenation of the username and password. Which action must be taken to return an output of 200?

A.

Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication

B.

Modify the method from LOGIN to GET and supply the username ;password value as JSON payload

C.

Verify that the username and password values imported from the configuration file ate still valid.

D.

Insert an Authorization header with the values username password from the supplied configuration file.

Full Access
Question # 84

Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?

A.

100

B.

204

C.

302

D.

402

Full Access
Question # 85

What is the function of IP address in networking?

A.

specifies the type of traffic that is allowed to roam on a network

B.

represents the unique ID that is assigned to one host on a network

C.

specifies resource's location and the mechanism to retrieve it

D.

represents a network connection on specific devices

Full Access
Question # 86

What is the main purpose of a code review?

A.

To provide the technical lead visibility into all code

B.

To identify and review errors with the team

C.

To ensure that all code is checked in simultaneously

D.

To detect logical errors

Full Access
Question # 87

A developer is working on a feature for a new application. The changes in the existing branch named 'feat00304' must be integrated into a single commit with the current working primary branch named 'prodapp411926287'. Which git command must be used?

A.

git rebase --merge feat00304

B.

git merge --squash feat00304

C.

git push --rebase feat00304

D.

git checkout --squash feat00304

Full Access
Question # 88

What is a requirement when authenticating a RESTCONF API session with a router that runs Cisco IOS XE Software?

A.

No authentication is required.

B.

OAuth must be used.

C.

Basic authentication must be used.

D.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

Full Access
Question # 89

Refer to the exhibit.

Which command needs to be placed on the box where the code is missing to output the value of page_jd in the Python 3.7 script?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 90

Refer to the exhibit.

A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?

A.

enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

B.

enable_function(‘iana-if-type:softwareLoopback’, Loopback1, true,)

C.

def enable_function(‘iana-if-type:softwareLoopback’, Loopback1, false,)

D.

def enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

Full Access
Question # 91

Refer to the exhibit.

The Cisco Meraki API manages two organizations. In each organization, two independent networks are defined. How many calls to the /organizations/(orgid)networks endpoint will be run parallel by the GetAllNetwork function of the API client?

A.

0

B.

1

C.

2

D.

4

Full Access
Question # 92

What is a benefit of using functions in the code for the development process?

A.

better user experience in the end product

B.

improves code performance

C.

easier to compile the code

D.

fester code development

Full Access
Question # 93

What is a difference between a synchronous API and an asynchronous API?

A.

An asynchronous API can make offline calls while synchronous APIs do not have this capability.

B.

Synchronous API calls are returned immediately while asynchronous calls do not guarantee an immediate response.

C.

Synchronous API calls require an authentication header to be sent while asynchronous calls do not require authentication.

D.

An asynchronous API can make a larger number of calls in a specified time period than a synchronous API.

Full Access
Question # 94

Which configuration management tool has an agentless capability?

A.

Chef

B.

Puppet

C.

Ansible

D.

CFEngine

Full Access
Question # 95

Which response status code is used by a RESTful interface to indicate successful execution of a request?

A.

200

B.

404

C.

405

D.

500

Full Access
Question # 96

What is a function of the default gateway in a network?

A.

to drop traffic that is destined to the default gateway

B.

to drop traffic that is not destined to the default gateway

C.

to forward traffic to the same subnet

D.

to forward traffic to different subnets

Full Access
Question # 97

Refer to the exhibit.

What does the python function do?

A.

It returns DNAC user and password.

B.

It returns HTTP Basic Authentication.

C.

It returns an authorization token.

D.

It reads a token from a local JSON file and posts the token to the DNAC URL.

Full Access
Question # 98

Which task is performed because the test-driven development approach is being used?

A.

testing existing software before developing new code

B.

refactoring code that is covered by existing tests

C.

writing code without committing any coding violations

D.

creating test scenarios based on continuous development

Full Access
Question # 99

Refer to Exhibit.

Which JSON is equivalent to the XML-encoded data.

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 100

Refer to the exhibit.

Which two statements about the network diagram are true? (Choose two.)

A.

PC-A and PC-B are in the same subnet.

B.

One of the routers has two connected serial interfaces.

C.

The subnet of PC-C can contain 256 hosts.

D.

R1 and R3 are in the same subnet.

E.

The subnet address of PC-B has 18 bits dedicated to the network portion.

Full Access
Question # 101

A developer is writing an application that a REST API and the application requires a valid from the API which element of the response is used in the conditional check?

A.

URL

B.

Status code

C.

Link

D.

Body

E.

Headers

Full Access
Question # 102

Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?

A.

OAuth must be used.

B.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

C.

Basic authentication must be used.

D.

No authentication is required.

Full Access
Question # 103

Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.

Full Access
Question # 104

Refer to the exhibit.

What caused the error in this API request?

A.

The API resource does not support the POST operation

B.

The API resource does not support JSON format payloads.

C.

The submitted JSON payload includes a field that is not supported by the API resource.

D.

The submitted JSON payload has a formatting issue

Full Access
Question # 105

Refer to the exhibit.

Which two statement describe the configuration of the Ansible script is run? (Choose two.)

A.

Traffic on port 0/2 and 0/3 is connected to port 0/6.

B.

Traffic from ports 0/2 to 0/5 can flow on port 0/1 due to the trunk.

C.

Traffic can flow between ports 0/2 to 0/5 due to the trunk on port 0/1.

D.

GigabitEthernet0/2 and GigabitEthernet0/3 are access ports for VLAN 6.

E.

GiabitEthernet0/1 is left unconfigured.

Full Access
Question # 106

Refer to the exhibit.

The JSON data in the exhibit has been parsed and stored in a variable, “data”. What returns the value “172.16.0.11” ?

A.

data['items'][0]['host']['value']

B.

data['items']['1']['host']['value']

C.

data['items']['host'][1]

D.

data['items']['host']['value']

Full Access
Question # 107

Drag and drop the function on the left onto the type of plane that handles the function on the right.

Full Access
Question # 108

What are two benefit of managing network configuration via APIs? (Choose two.)

A.

configuration on devices becomes less complex

B.

more security due to locking out manual device configuration

C.

increased scalability and consistency of network changes

D.

eliminates the need of legacy management protocols like SNMP

E.

reduction in network changes performed manually

Full Access
Question # 109

Which two items are Cisco DevNet resources? (Choose two.)

A.

TAC support

B.

Bitbucket

C.

Sandbox

D.

Software research

E.

API Documentation

Full Access
Question # 110

A developer needs to prepare the file README.md in the working tree for the next commit operation using Git. Which command needs to be used to accomplish this?

A.

git add README.md staging

B.

git -a README.md

C.

git add README.md

D.

git commit README.md

Full Access
Question # 111

Refer to the exhibit.

What is the value of the node defined by this YANG structure?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 112

Which device is a system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?

A.

Switch

B.

Router

C.

Firewall

D.

Load balancer

Full Access
Question # 113

What is the purpose of the Cisco VIRL software tool?

A.

To verify configurations against compliance standards

B.

To simulate and model networks

C.

To automate API workflows

D.

To test performance of an application

Full Access
Question # 114

Refer to the exhibit.

The output of a unified diff when comparing two versions of a python script is shown. Which two “single_request _timeout ()”

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 115

Which API is used to obtain data voicemail ports?

A.

Finesse gadgets

B.

Cisco Unified Communications manager

C.

Webex devices

D.

Webex teams

Full Access
Question # 116

Refer to the exhibit.

What is the function of the python script?

A.

Count and print the total number of available devices.

B.

Iterate over a list of network devices and write all device names and management IP addresses to an output file.

C.

Iterate over a list of network devices and write all device type and associated management IP address.

D.

For each device that is returned, display the device and, for each device, print the device name and management IP address.

E.

Loop through the returned list of network devices and, for each device, print the device name management IP address.

Full Access
Question # 117

Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.

Full Access
Question # 118

Which platform has an API that be used to obtain a list of vulnerable software on user devices?

A.

Cisco Umbrella

B.

Cisco Firepower

C.

Cisco Identity Services Engine

D.

Cisco Advanced Malware Protection

Full Access
Question # 119

Which two statements about JSON and XML are true? (Choose two.)

A.

JSON objects are collection of key value pair.

B.

The syntax of JSON contains tags, elements, and attributes.

C.

JSON arrays are an unordered set of key value pairs.

D.

The syntax of XML contains tags, elements, and attributes.

E.

XML objects are collections of key-value pairs.

Full Access
Question # 120

Which two statements describe the advantages of using a version control system? (Choose two.)

A.

It allows for branching and merging so that different tasks are worked on in isolation before they are merged into a feature or master branch.

B.

It allows multiple engineers to work against the same code and configuration files and manage differences and conflicts.

C.

It provides tooling to automate application builds and infrastructure provisioning.

D.

It allows developers to write effective unit tests.

E.

It provides a system to track User Stories and allocate to backlogs.

Full Access
Question # 121

What is an example of a network interface hardware address?

A.

domain name

B.

IP address

C.

workstation name

D.

MAC address

Full Access
Question # 122

In DNS, which record specifies an alias that refers to another name that ultimately resolves to an IP address?

A.

AAA

B.

SOA

C.

NS

D.

CNAME

Full Access
Question # 123

What are the two purposes for using a VLAN in a network? (Choose two)

A.

It is used to create the routing table.

B.

It creates a collection of MAC addresses.

C.

It is used for VM network traffic.

D.

It segments a network.

E.

It creates a broadcast domain.

Full Access
Question # 124

How is a branch called "my-bug-fix" started to develop a fix needed in a product?

A.

git branch -b my-bug-fix

B.

git checkout -b my-bug-fix

C.

git checkout my-bug-fix

D.

git branch my-bug-fix

Full Access
Question # 125

Drag and drop the network component names from the left onto the correct descriptions on the right. Not all options are used.

Full Access
Question # 126

Which HTTP status Code means that the server cannot or will not process the request because of perceived client error?

A.

100

B.

203

C.

303

D.

400

Full Access
Question # 127

Refer to the exhibit.

Fill in the blanks to complete the cURL command to the list of networks in the Meraki organization with an id of 384279060

Full Access
Question # 128

Which two encoding formats do YANG interfaces support?

A.

JSON

B.

XML

C.

XHTML

D.

Plain text

E.

BER

Full Access
Question # 129

Refer to the exhibit.

The definition of the YANG module and a RESTCONF query sent to a Cisco IOc XE device is shown. Which statement is correct if the RESTCONF interface responds with a 204 status code?

A.

The query failed at retrieving the logging seventy level.

B.

The query failed to set the logging seventy level due to an invalid path.

C.

The query retrieved the logging seventy level.

D.

The query updated the logging seventy level or created it if not present on the device.

Full Access
Question # 130

What operation is performed with YANG model-driven programmability in NX-OS?

A.

configure a device with native and OpenConfig-based models

B.

send CLI commands to a device and retrieve output in JSON format

C.

run Linux commands natively on the device

D.

bootstrap a device that has a factory-default configuration

Full Access
Question # 131

What is used in Layer 2 switches to direct packet transmission to the intended recipient?

A.

spanning tree

B.

IPv4 address

C.

IPv6 address

D.

MAC address

Full Access
Question # 132

Drag and drop the characteristics from the left onto the corresponding software development methodologies on the right?

Full Access
Question # 133

Drag and drop the element of the Finesse API on the left onto the description of its functionally on the right.

Full Access
Question # 134

Refer to the exhibit.

Which python data structure does my_json contain?

A.

List

B.

Json

C.

Map

D.

Dict

Full Access
Question # 135

Which mechanism is used to consume a RESTful API design when large amounts of data are returned?

A.

Data sets

B.

Scrolling

C.

Blobs

D.

Pagination

Full Access
Question # 136

Which detail is included in a routing table?

A.

IP protocol

B.

Broadcast address

C.

TCP or UDP port number

D.

Destination next hop or outgoing interface

Full Access
Question # 137

Which REST architectural constraint indicates that no client context should be stored on the server between requests?

A.

stateless

B.

uniform interface

C.

cacheable

D.

client-server

Full Access
Question # 138

Before which process is code review performed when version control is used?

A.

committing code

B.

branching code

C.

merge of code

D.

checkout of code

Full Access
Question # 139

A developer is reviewing a code that was written by a colleague. It runs fine, but there are many lines of code to do a seemingly simple task repeatedly. Which action organizes the code?

A.

Refactor the code by removing any unnecessary tests

B.

Using functions, rewrite any pieces of code that are repeated

C.

Reverse engineer and rewrite the code logic

D.

Modify the code to use loops

Full Access
Question # 140

What is the purpose of a firewall in application deployment?

A.

adds TLS support to an application that does not support it natively

B.

forwards traffic to a pool of instances of the application

C.

provides translation for an application's hostname to its IP address

D.

limits traffic to only ports required by the application

Full Access