DevnetAss
![]() |
![]() |
![]() |
Título del Test:![]() DevnetAss Descripción: Devasc1 |




Comentarios |
---|
NO HAY REGISTROS |
A pharmaceutical company wants to contract the services of a cloud provider to store employee data and company-specific applications with strict access security. Which type of cloud would be the most appropriate for this scenario?. community cloud. public cloud. hybrid cloud. private cloud. What is a function provided by an implementation of a read-only automation solution?. the ability to reduce risk by implementing security policies across the network infrastructure via automated changes. the ability to use GET and SET requests to retrieve and send data across the network infrastructure. the ability to use an automated request to audit configurations and manually deploy changes in order to implement compliance. the ability to implement network infrastructure that receives a configuration from a specific centralized server. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.). The TCP process running on the PC randomly selects the destination port when establishing a session with the server. UDP segments are encapsulated within IP packets for transport across the network. The UDP destination port number identifies the application or service on the server which will handle the data. TCP is the preferred protocol when a function requires lower network overhead. The TCP source port number identifies the sending host on the network. The source port field identifies the running application or service that will handle data returning to the PC. What type of attack targets an SQL database using the input field of a user?. buffer overflow. SQL injection. Cross site scripting. XML injection. Which command can be used on Linux and MAC hosts to get IP addressing information?. ipconfig. ip address. ifconfig. networksetup -getinfo. What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.). to create fewer collision domains. to create more broadcast domains. to enhance user bandwidth. to isolale ARP request messages from the rest of the networks. to eliminate virtual circuits. to isolate traffic between segments. Which tool might a developer use as part of a Continuous Integration pipeline in order to build and test source code?. SQL. REST. Docker. Jenkins. A packet is received by a server. The packet has a destination port number of 8008. What protocol or service is requested?. Telnet over SSH. RESTCONF. HTTP. NETCONF. A network contains multiple VLANs spanning multiple switches. What happens when a device in VLAN 20 sends a broadcast Ethernet frame?. Devices in VLAN 20 and the management VLAN see the frame. All devices in all VLANs see the frame. Only devices that are connected to the local switch see the frame. Only devices in VLAN 20 see the frame. Which piece of software is responsible for creating and managing virtual machines, including allocating system resources to each virtual machine as needed?. supervisor. hypervisor. host operating system. hosted operating system. How is an Ethernet MAC address constructed?. The first 3 bytes represent the network upon which the host resides, and the last 3 bytes uniquely identify the host. The first 3 bytes represent the vendor OUI, and the last 3 bytes are assigned uniquely by the vendor. The first 3 bytes are uniquely assigned by LANA, and the last 3 bytes represent the serial number of the host. The first 3 byles represent the vendor OUI, and the last 3 byles are assigned randorily by the operating system. Which Cisco SDK works with ACI?. Cobra. IMC. UCS. Instant Connect. What platforms are provided by DevNet for community members to share solutions, tool kits, and other resources with each other?. communities. forums. sandboxes. exchanges. Which two data formats can RESTCON use when requesting data or responding with data? (Choose two.). JSON. XML. YAML. YANG. HTML. Which DevNet resource would a developer use to look for a Python library that supports APIs for a specific Cisco product?. DevNet Learning Labs. Devlet Support. Code Exchange. DevNet Sandbox. A component was created with the intent of combining the disciplines and skills of Dev and Ops. This component created a new job role and implemented a best-practices playbook for doing Ops with software methods. Which component matches this description?. Agile Infrastructure and Operations. the SRE approach. automated infrastructure. shared Version control. uses the git hub api and human moderators to categorize and display related repositories. code. ecosystem. automation exchange. a collection of network automation use cases with different solutions and toolkits. automation exchange. ecosystem. code. provides solutions across differents technologies ,industries and geographies to jump start solution desing and development. code. automation exchange. ecosystem. Refer to the exhibit. A user is working on Ansible on the local NMS to manage remote network devices. Which file is the user creating? #Enter the devices for Ansible playbooks Main-RT ansible_user=clausseransible_password=class123!ansible_host=172.20.20.250. service. playbook. variable. hosts. Which DevNet resource would a developer use in order to test custom code in a production-like environment?. Devlet Support. DevNet Learning Labs. Code Exchange. DevNet Sandbox. In which situation would a company implement a reverse proxy as a security solution?. when the company has a database and needs to point to a DNS server that uses different IP addresses for development resources. when the company wants all responses to clients to look like they came from the same server instead of individual ones. when a hash is created based on the IP address of the request to a particular protected server. when responses frorri servers need to be sent over different paths to ensure quality response time to the client devices making the requests. A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Agile method. What is a characteristic of this method?. a software development process that prioritizes responding to change over following a plan. a software development method that tracks closely with the software development life cycle. a process that was developed for manufacturing, but adapted to other industries. a more traditional sollware developical procGSs as they have used this proCESS ini past projects. A network engineer is creating a Docker container using the docker build command. If the engineer does not specify a tag, which tag will be used by default?. tag. latest. (a blank space). default. Which component in the pyATS ecology handles bundling and running jobs?. AEtest. Clover. Genie. EasyPy. Which three avenues are available within DevNet for developers who need help with specific developer scenario questions concerning Cisco products? (Choose three.). logging a ticket. posting to the DevNet zone. posting to a news group. posting to a community forum. posting to a Webex Teams space. posting on the Cisco Learning Network. A student who is interested in network programmability approaches an instructor for advice on learning more about the subject. The student is a kinesthetic learner who learns by doing. Which DevNet resource should the instructor consider telling the student about?. DevNet Create. DevNet Learning Labs. DevNet Express. DevNet Zone. What is the default shell commonly used on macOS and Linux?. tcsh. csh. Bourne. Bash. What is immutable infrastructure in DevOps?. infrastructure that is deployed with all component versions locked except for the ability to perform manual configuration changes. infrastructure that is only deployed and maintained in containers. infrastructure that is entirely maintained and deployed in code and never subjected to manual changes. virtualized infrastructure that is deployed as golden images. What is the most common cause of IT outages?. an engineer misconfiguring a device or network with manual changes. an experienced engineer using an open source product. an experienced engineer implementing a configuration using automation. a threat actor largeting the enterprise equipment. Which string of characters is used to identify the beginning of a new separate document when multiple documents are in a single YAML file?. three slashes “///”. three dots “…”. three pound signs “###”. three dashes “—“. What is the difference between functions and methods in the Python programming structure?. Functions can use global variables whereas methods can only use local variables. Functions are called by a referencing object whereas methods are called by the names. Functions can pass arguments whereas methods can pass only predefined keywords. Functions are standalone code blocks whereas methods are code blocks associated with an object. Which command is used to create a new Git repository?. git init. git add. git commit. git clone. Which stakeholder determines the useful value of software product features in the Lean process?. the customer. the Scrum master. the reviewer. the programmer. Match the SDLC phase with its description. requirements and analysis. implementation. deployment. What is a principle of the Lean software development model?. adding additional product features that the customer did not ask for so that the customer is getting more than expected. assigning resources to multiple projects so that effort can be divided on more than one task at a time. making decisions as late as possible in the process so that more facts and details are available. ordering workers to do tasks they may not want to do to ensure they get done. What character is used to separate the key and value pairs in YAML?. colon :. semi colon ;. underscore _. forward slash /. Which git command is used to compare changes between files?. git diff. git merge. git checkout. git status. Refer to the exhibit. Match the missing components of the Python script for authenticating to the Cisco Network Services Orchestrator and obtaining a list of network devices using the username of “superadmin” and password of “soverysecure!”. (Not all options are used.) import request username= '_Component1_' password='_Component2_' url="https://devas-nsc-1.cisco.com/restconf/data/tail-ncs:devices/_Component3_" headers={ 'Content-Type':"application/yang-data+json" } reponse=request._Component4_(url,auth=(_Component5_,_Component6_), headers=headers, verify=False) print(reponse.text). device. superadmin. soverysecure. list. get. username. password. What is an example of a use supported by Cisco UCS Director and UCS Manager?. bare metal server provisioning and monitoring of virtual environments. call center and call management over IP networks. underlying central system workflow management and migration. telemetry data collection and analysis. How can a Webex Teams administrator retrieve additional details about a user through an API call?. by using the value of the organization name in the API call. by using the value of a Webex Teams registered email address in the API call. by using the value of the person id key in the API call. by using the value of orgld in the API call. Which library is the most commonly used Python library for connecting NETCONF clients with a NETCONF server?. posix. pyclient. ncclient. pypi. Refer to the exhibit. Match the missing components of the Python script for authenticating to the Cisco DNA Center and obtaining an authentication token using the username of “adminuser” and password of “Sup3rC1$c0”. (Not all options are used.) import request import json import sys dnacip="cisco44-dnacenter-31.cisco.com" username="admiduser" password="Sup3rC1$c0" def get_X_auth_token(_Component1_,username,password): pot_uri="https://"+dnacip+"/dna/system/api/v1/auth/token" print("\nAuthenticate:POST %s"%(post_uri)) try: r=requests.post(post_uri,_Component2_=(username,password),verify=False) return r.json()["Token"] except: print ("Status: %s" %r.status_code) print("Response :%s"%r.text) sys.exit() token=get_X_auth_token(dnacip,username,_Component3_) print("returned Authentication Token:", (token)). password. adminiduser. auth. dnacip. post. Refer to the exhibit. Match the missing components to the Python script for authenticating to the Cisco DNA Center and obtaining a token using the username of “secureuser” and password of “C1$c0”. (Not all options are used.) import request import json import sys dnacip="net12-dnacenter-31.cisco.com" username="secureuser" password="_Component1_" def get_X_auth_token(dnacip,username,password): post_uri="https://"+dnacip+"/dna/system/api/v1/auth/token" print("\nAuthenticate:POST %s"%(post_uri)) try: r=requests.post(post_uri,auth=(username,_Component2_),verify=False) return r.json()["Token"] except: print ("Status: %s" %r.status_code) print("Response :%s"%r.text) sys.exit() token=get_X_auth_Component3_(dnacip,username,password) print("returned Authentication Token:", (token)). password. token. securuser. success. C1$c0. request. Refer to the exhibit. Match the missing components of the Python script for the following tasks. (Not all options are used.) delete all previous demo rooms create a new demo room enroll Allan and Jane as members post a message to the new room. from webexteamssdk import WebexTeamsAPI api= WebexTeamsAPI() all_rooms= api.rooms.list() demo_rooms=[room for room in all_rooms if 'oldtest Demo' in room.title] for room in demo rooms: api.rooms. __Component1__(room.id) demo_room=api.rooms. __Component2__('newtest Demo') email_address=["Jane@test.com","Allan@test.com"] for email in email_addresses: api.__Components3__.create (demo_room.id,personEmail=email) api.messages.create(demo_room.is,__Component4__="Welcome to the room!" files=["https://www.webex.com/content/dam/wbx/us/images/dg-integ/teams_icon.png"]). delete. create. groups. text. memberships. post. Which two APIs allow for Cisco Meraki device provisioning and real-time notifications? (Choose two.). Webhook API. Investigation API. Dashboard API. Enforcement API. Reporting API. A packet is received by a server. The packet has a destination port number of 443. What protocol or service is requested?. HTTP. NTP. DHCP. HTTPS. When thinking about the functional planes of a network, what is unique about the data plane?. it includes protocols used to remotely access network devices. It includes the SSH protocol. It manipulates data and outputs it in the XML format. It is responsible for the switching of packets in hardware. When thinking about the functional planes of a network, what is unique about the data plane?. It forwards data through a network infrastructure device. It includes protocols used to remotely configure network devices. It manipulates data and outputs it in the JSON format. It includes network traffic being processed by EIGRP or OSPF. Which Docker component defines the steps needed to create an image that can be deployed in a variety of environments?. UnionFS. Dockerfile. cross-site script. namespaces. Which three statements describe characteristics of a virtual machine? (Choose three.). It is created and deployed using the Docker format. It includes a guest operating system. It runs on top of a hypervisor. It shares the operating system of the host computer.. It is completely self-contained with its own emulated storage, memory, and network interfaces. It requires Windows as the host operating system. Match the use cases of a load balancer to the description. (Not all options are used.). round robin. blue-green. canary. What are two characteristics of the staging environment of the four-tier deployment environment structure? (Choose two.). It is the point where code has been tested multiple times and is error free. It is structured as close as possible to the actual production environment. It is where the code undergoes final acceptance testing in a realistic environment. It is where end users will interact with the code. It often includes automated testing tools such as Jenkins, CircleCl, or Travis Cl. Refer to the exhibit. A network engineer has created a Jenkins pipeline. Which menu option would the engineer use to run the pipeline?. Configure. Changes. Build Now. Workspace. A network engineer is configuring a Jenkins job and finishing with the following script in order to trigger the build: node{ stage('Preparation'){ catchError(buildResult:'SUCCESS'){ sh 'docker stop samplerunning' sh 'docker rm samplerunning' } } stage('Build'){ build 'BuilAppJob' } stage('Result'){ build 'TestAppJob' } } What is the purpose of the preparation stage?. It makes sure that any previous instances of a particular Docker container are stopped and removed. It catches and removes any errors. It runs the SUCCESS Docker container. It places a log of any errors in the SUCCESS file. Which technique is used to make the output of password hashing nondeterministic?. password length and complexity. multifactor authentication. password salting. password strength validation tools. |