DevAss
![]() |
![]() |
![]() |
Título del Test:![]() DevAss Descripción: Devass3 |




Comentarios |
---|
NO HAY REGISTROS |
Refer to the exhibit. A student constructs a URI to query the MapQuest API for a route from New Orleans, LA to New York, NY. Match the components to the MapQuest URL. (Not all options are used.) https://www.mapquestapi.com/component1?component2&component3&component4. directions/v2/route. key=get_your_api_key. to=New+York%2C+NY. from=New+Orleans%2C+LA. Refer to the exhibit. Match the Python code components to the function. (Not all options are used.) import request import json from tabulate import* from apic_em_functions_sol import* post_url ='https://sandboxapicem.cisco.com/api/v1/host' ticket = get_ticket() headers ={ 'content-type':'application/json','X-Auth-Token} try: resp=request.get(post_url,headers=hreaders,params="",verify=false) response_json=resp.json() print('Status of /host request: ' + str(resp.status_code)) except: print ('Something is wrong with GET /host request') sys.exit() host_list=[] i=0 for item in response_json['response']: i+=1 host_list.append([i,item['hostType'],item[hostIP]]) print (tabulate(host_list,headers= ['Number','Type','IP'],tablefmt='rst'). sys.exit(). api/v1/host. tablefmt='rst'. verify=false. str(resp.status_code). 'X-Auth-Token'-ticket. content-type. application. A packet is received by a server. The packet has a destination port number of 123. What protocol or service is requested?. SSH. DNS. NTP. RESTCONF. Which scenario exhibits the “social proof” principle of human influence?. A user receives a phone call from someone claiming to be from the IT department who needs to verify user credentials. A user visits a web site offering a free gift if the user provides contact information. A user opens an email advertising a free trial on a website that is only available for a few hours. A user completes a survey requesting personal information after seeing co-workers completing the survey. Which SQL injection defense method should be used only as a last resort?. escaping all user-supplied input. using a database firewall. implementing whitelist input validation. using parameterized queries. Which type of ISE node provides network access, posturing, guest access, client provisioning, and profiling services?. monitoring. administration. pxGrid. policy service. Which communication protocol does Ansible use to connect to remote devices?. Telnet over VPN. HTTPS. Secure FTP. SSH. Refer to the exhibit. Router R2 is configured with static NAT. Place in order the steps that occur when the client accesses the web server through the router. (Not all options are used.) webserver------sw1-------r2-----internet---client. step1. step2. step3. step4. step5. Refer to the exhibit. What is the function of the identified missing information in regards to the parameter and method contained in the request? The exhibit contains the following Python code:import requests access_token = ‘your_token_here’url = ‘https://webexapis.com/v1/rooms’headers = { ‘Authorization’: ‘Bearer {}’.format(access_token), ‘Content-Type’: ‘application/json’}params={‘title’: ‘___?____’}res = requests.post(url, headers=headers, json=params)print(res.json()). A Webex Teams space will be identified by using a specified title, and additional details will be retrieved. It provides the name for a Webex teams space to be deleted. A Webex Teams space will be identified and a message will be posted with the title specified. It provides the name for a new Webex teams space. What is an architectural constraint to which a true RESTful API web service must adhere?. It must support XML-RPC and JSON-RPC. It allows resource caching. It should be behind a firewall. It operates as a cloud service. What is an architectural constraint to which a true RESTful API web service must adhere?. It operates in a stateless way. It uses HTTPS to transport data. It must operate along with a DNS server. It operates as a cloud service. A packet is received by a server. The packet has a destination port number of 53. What protocol or service is requested?. DNS. NetBIOS (NetBT). POP3. IMAP. Which statement accurately describes dynamic NAT?. It always maps a private IP address to a public IP address. It provides an automated mapping of inside local to inside global IP addresses. It provides a mapping of internal host names to IP addresses. It dynamically provides IP addressing to internal hosts. A packet is received by a server. The packet has a destination port number of 830. What protocol or service is requested?. NTP. DHCP. NETCONF. HTTPS. Which programming language is supported by the Webex xAPI to develop macros for on-device customization?. Java. Python. JavaScript. C++. Which Cisco management system is designed as the solution for Software-Defined Networking and runs on Nexus 9000 hardware?. Application Centric Infrastructure platform (ACI). IOS XE. Nexus Operating System (NX-OS). DNA Center. A developer issues a Linux command python3 -m venv devenv . What is the developer trying to achieve?. to install the devnet tool sets in the Python 3 virtual environment named venv. to create a Python 3 virtual environment named devenv. to activate the Python 3 virtual environment named devenv. to enter the Python 3 virtual environment named venv using the devnet tool sets. Refer to the exhibit. Match the missing components of the Python script for the APIC-EM REST API request for the user “secureuser”. (Not all options are used.). secureuser. request. header. Two network engineers are discussing the methods used to forward frames through a switch. What is an important concept related to the cut-through method of switching?. The fragment-free switching offers the lowest level of latency. Fast-forward switching can be viewed as a compromise between store-and-forward switching and fragment-free switching. Fragment-free switching is the typical cut-through method of switching. Packets can be relayed with errors when fast-forward switching is used. When thinking about the functional planes of a network, what is unique about the control plane?. It forwards data through a network device. It manipulates data and outputs it in the XML format. It includes the SNMP protocol. It includes network traffic being processed by EIGRP or OSPF. When thinking about the functional planes of a network, what is unique about the control plane?. It forwards data based on STP settings. It includes applications and protocols used between network devices such as routers. It includes protocols used to monitor network devices. It is responsible for the switching of packets in hardware. When thinking about the functional planes of a network, what is unique about the control plane?. It manipulates data and outputs it in the JSON format. It includes the SNMP protocol. It processes data in hardware. It processes network traffic that is paramount to maintaining the functionality of the network infrastructure. Refer to the exhibit. If PC1 is communicating with a web server on the Internet, which two TCP/IP layers are responsible for encapsulating the message that requests data from that particular server and assigning a source port number? (Choose two.). session. network. transport. application. physical. A network security administrator is evaluating products that automate threat containment through APIs when a threat is detected. Which Cisco product with the desired capability provides a rule-based engine for enabling policy-based network access to users and devices?. Identity Services Engine. Umbrella. Threat Grid. Advanced Malware Protection. Match the purpose with its DHCP message type. (Not all options are used.). a message that is used to locate any avairable DHCP server on a network. a message is used to identify the explicit server and lease offer to accept. a message that is used to acknowledge that the lease is successful. a message that is used to suggest a lease to a client. When thinking about the functional planes of a network, what is unique about the management plane?. It forwards data based on STP settings. It is responsible for the switching of packets in hardware. It includes protocols used to monitor network devices. It includes applications and protocols used between network devices such as routers. |