Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following Kafka components represents a stream of messages of a particular category?

A.

Producer

B.

Broker

C.

Topic

D.

Consumer

Full Access
Question # 5

Which of the following is NOT an NSP application?

A.

Service Fulfilment

B.

Network Supervision

C.

IP/MPLS Optimization

D.

Network Virtualization

Full Access
Question # 6

Which of the following is NOT part of the Augmented Assurance features provided by the NSP?

A.

Sorting NEs by highest severity issues

B.

Intelligent visualization

C.

Commissioning of equipment

D.

On-demand OAM testing

Full Access
Question # 7

Which of the following statements about the NSP Workflow Manager (WFM) application is FALSE?

A.

It allows network management tasks to be automated.

B.

Only one workflow can be executed at one time.

C.

Actions and expressions are extensible using Python.

D.

A workflow action can run against RESTCONF APIs.

Full Access
Question # 8

Which of the following is NOT a benefit of Intent Manager?

A.

Allows the parallel execution of many workflows.

B.

Provides flexible capabilities for achieving high-level bus

C.

Allows programmable and flexible logic.

D.

Provides concepts for finding misalignments.

Full Access
Question # 9

Based on the exhibit, which attribute of the target-component determines the component name displayed in the UI?

A.

i18n-text

B.

function-name

C.

name

D.

order

Full Access
Question # 10

Which of the following statements about POSTMAN is FALSE?

A.

A Postman account allows you to create a maximum of 3600 workspaces for free.

B.

Postman allows you to add a parameter to a request. 1mm

C.

Postman allows you to define a variable to store and re-use values in a request.

D.

Postman pre-request scripts are executed before the main request.

Full Access
Question # 11

How long is the system token valid before expiring?

A.

Never expires

B.

24 hours

C.

60 minutes

D.

Configurable

Full Access
Question # 12

Which of the following statements does NOT applyto YANG modules?

A.

Consists of containers and leaves

B.

Uses NETCONF and RE5TCONF to transport data

C.

Requires proprietary MIBS

D.

Provides separation of configuration and state data

Full Access