Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESEDevAss

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
DevAss

Descripción:
Devasc2

Autor:
AVATAR

Fecha de Creación:
27/01/2022

Categoría:
Informática

Número preguntas: 28
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
What does self-service refer to in the context of enterprise IT? imaging frequently used server configurations for rapid deployment distributing and implementing broad access to public cloud infrastructure-as-a-service services mainstreamed processes that promote a lower IT headcount by implementing automation automated tools and methods that deliver preconfigured developer platforms on demand.
Which statement describes the term orchestration in IT automation? Orchestration is aimed at managing workload lifecycles and reacting dynamically to changing conditions in order to optimize processes. Orchestration is the process of preparing a server through the installation of libraries or daemons. Orchestration is the building, arranging, integration, and preparation of multi-component applications across multiple nodes. Orchestration is the obtaining and provisioning of compute, storage, and network infrastructure.
What is an example of a read-only automation solution? streamlining the management of L3 firewall rules in Cisco Meraki networks gathering SD-WAN inventory data using Python and recording the values in a database simplifying the automation of network device authentication, configuration, and consistency gathering the current list of ACL entries on an IOS XE router and enforcing consistency.
A student is setting up the CSR1000v VM in VirtualBox that is already installed on the local computer. The VM is imported to the VirtualBox and starts successfully. The student tries to verify communications to the CSR1000v VM by opening the Firefox web browser on the local computer and enters the URL https://192.168.56.101 . A security message “Warning: Potential Security Risk Ahead” appears. What is the security issue that results in this message? The SSL/TLS certificate uses a public key size of less than 1024 bits. The SSL/TLS certificate is self-signed by the router. The CA for the SSL/TLS certificate cannot be reached. The traffic to the VM is not encrypted.
How do APIs affect traditional IT tasks? They are used to replace network infrastructure and implement network virtualization. They are used to eliminate repetitive manual tasks and replace them with automation. They are used to increase computer processing speed and lower power consumption. They are used to increase hardware speed and lower power consumption.
Refer to the exhibit. PC1 needs to resolve the host name of the web server into an IP address by using DNS. What destination IP address and destination port number will PC1 assign to the DNS query packet? s1 Fa0/0 Fa0/1 s2 DNS server 192.168.10.1 192.168.20.1 192.168.20.3 pc 192.168.10.2 webserver 192.168.20.2 192.168.20.2 port 80 192.168.20.3 port 53 192.168.20.3 port 80 192.168.10.1 port 53.
Which two statements are true about NTP servers in an enterprise network? (Choose two.) There can only be one NTP server on an enterprise network All NTP servers synchronize directly to a stratum 1 time source. NTP servers at stratum 1 are directly connected to an authoritative time source. NTP servers ensure an accurate time stamp on logging and debugging information. NTP servers control the mean time between failures (MTBF) for key network devices.
Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.) step1 step2 step3 step4 step5.
A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed? traceroute ipconfig telnet netstat.
Which two HTTP functions correspond to the UPDATE function in CRUD? (Choose two.) POST DELETE PATCH PUT GET.
Match the term to the RESTAPI request http://example.com/update/person?id=42&email=person%40example.com. (Not all options are used.) path query method scheme authority.
Which HTTP status code category is used in the response to indicate that a REST API request contains an error on the client side? 1xx 2xx 3xx 4xx 5xx.
Refer to the exhibit. A network administrator is using a Python script to test a REST API request. The traceback message indicates that there is an error in the URI. What is the error? import request url="https://sandboxdnac123.cisco.com/dna/intent/api/v1/network-device" resp=request.get(url) Tracepack messsage : request.exceptions.SSLError: HTTPSConnectionPool(host='sandboxdna123.cisco.com',port=443): Max retries exceeded with url :/dna /intent/api/v1/network-device The protocol is wrong. The resource path is wrong. The SSL certificate is invalid. The destination web host address is invalid.
What are two requirements for an application to communicate with a webhook provider? (Choose two.) The application must support JSON. The application must always be running. The application must register a URL with the webhook provider. The host where the application is running must have an SSH client installed. The host where the application is running must have an SSH server running.
A student is learning network automation by using a REST API. The student sends a request to a network device and receives a response with the status code of 202. What does this status code mean? The request was understood but has been rejected by the server. The request was successful and typically includes a payload. The request has been accepted for processing, but the processing has not been completed. Because of a server error, the request cannot be fulfilled.
What are two characteristics of stateless applications? (Choose two.) They must run on container orchestrators like Kubernetes. They can be scaled only by redeploying them and destroying the data that users or operators previously needed. They maintain the user state within the local user machine so that automation can work non-destructively. They can store a user state in an accessible database separate from application servers and other components.
What is a characteristic of the continuous integration component of the CI/CD philosophy for software development? Code changes are continually merged with the main branch of the application, so change sets are small. Code changes are tested and integrated with the main branch then tested again before they are deployed into production. Code is constantly deployed into production where users serve as the final testers. Application development is performed in short sprints so that enough code is always in a deployable state.
A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Waterfall method. What is a characteristic of this method? A software development process that prioritizes responding to change over following a plan A process that eliminates inefficient ways of working like expecting coders to multitask A software development process that focuses on frequent delivery of working software as well as collaboration between developers and business employees A software devilment process that can only go forward.
In which SDLC phase is the software product installed into the production environment to decide if it is ready for release? implementation deployment design testing.
Which convention is used in Python to indicate that methods and variables in a class are private and not to be used outside of the class? by using a single preceding underscore ( _ ) for a method or variable by using the command class private classname() : to start the class definition by using two preceding hyphens ( — ) for a method or variable by declaring a private method or variable in the beginning of the class definition.
A packet is received by a server. The packet has a destination port number of 80. What protocol or service is requested? DHCP Telnet over SSH HTTP RESTCONF.
A network administrator is developing an application to control a Webex device through xAPI. Which three protocols can be used to access xAPI? (Choose three.) Telnet HTTP XML RS-232 FTP JSON.
Which type of request is used to send a message to a Webex Teams space using Python and the Messages API? PUT POST GET PATCH.
A network administrator is assigned the 172.16.0.0/24 block of addresses to use in designing an IP addressing scheme. The administrator submits this design for approval: 172.16.0.0/26 172.16.0.64/27 172.16.0.96/26 172.16.0.128/27 What should be the response from the senior network engineer regarding this design? This design is flawed because the 172.16.0.128/27 network number is invalid. This design will work for the branch office. This design is flawed because no design could have two networks that use a /26 mask and are not consecutive blocks of addresses. This design is flawed because the 172.16.0.96/26 network is not a valid block of addresses. This design is flawed because the 172.16.0.96/26 network overlaps with other addresses.
Which statement describes a stateful firewall? It can filter packets based on information at Layers 3, 4, 5 and 7 of the OSI reference model. It can determine if the connection is in the initiation, data transfer, or termination phase. It can only filter packets based on limited Layer 3 and 4 information. It can expand the number of IP addresses available and can hide network addressing design.
A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Lean method. What is a characteristic of this method? a process that eliminates inefficient ways of working like expecting coders to multitask a software development process that focuses on frequent delivery of working software as well as collaboration between developers and business employees a software development process that has the results of one phase feed into the next phase a software development process that can only go forward a software development process where the highest priority is to satisfy the customer through early and continuous delivery of valuable software a software development process that can only go forward a process that amplifies learning as well as delivers as quickly as possible a more traditional software development process as they have used this process in past projects a software development process where a particular phase depends on the results of the previous phase a process that was developed for manufacturing, but adapted to other industries.
Refer to the exhibit. Match the Python coding information in the authentication request to the Cisco DNA Center to the location in the script. (Not all options are used.) import request url="http://myservice/api/v1/resources/house/rooms/id/code_a" resp=request.get(code_B,code_C,verify=False) print(resp.status_code) print(resp.text) import json 1001001027331 url auth=("person1","super2").
A student is learning REST API application. The student constructs an URI to query the MapQuest API for a route from New York, NY to Boston, MA. What is the valid URI format? www.mapquestapi.com/directions/v2/route?key=key&from=New+York+NY&to=Boston+MA www.mapquestapi.com/directions/v2/route?key=key&from%2C+NY&to:Boston%2C+MA www.mapquestapi.com/directions/v2/route?key=key&fromto==Boston www.mapquestapi.com/directions/v2/route?key=key&from=NewYork%2C+NY&to=Boston%2C+MA.
Denunciar test Consentimiento Condiciones de uso