1. Refer to the exhibit.
PC1 needs to resolve the host name of the web
server into an IP address by using DNS. What destination IP
address and destination port number will PC1 assign to the DNS
query packet?
a) [Link] port 53
b) [Link] port 80
c) [Link] port 53
d) [Link] port 80
e) [Link] port 53
2. How is an Ethernet MAC address constructed ?
a) The first 3 bytes represent the network upon which the host
resides, and the last 3 bytes uniquely identify the host.
b) The first 3 bytes represent the vendor OUI, and the last 3 bytes
are assigned randomly by the operating system.
c) The first 3 bytes represent the vendor OUI, and the last 3 bytes
are assigned uniquely by the vendor.
d) The first 3 bytes are uniquely assigned by IANA, and the last 3
bytes represent the serial number of the host.
3. Refer to the exhibit. Router R2 is configured with static NAT.
Place in order the steps that accur when the client accesses the web
server through the router.
4. Refer to the exhibit. If PC1 is communicating with a web server on
the interent, which two TCP/IP layers are responsible for
encapsulating the message that requests data from that particular
server and assigning a source port number? (choose two)
a) Network
b) Physical
c) Application
d) Session
e) Transport
5. Data is being sent from a source PC to a destination server. which
three statements correctly describe the function of TCP or UDP in
this situation? (choose three)
a) The UDP destination port number identifies the application or
service on the server which will handle the data
b) UDP segments are encapsulated within IP packets for transport
across the network.
c) The TCP source port number identifies the sending host on the
network.
d) TCP is the preferred protocol when a function requires lower
network overhead.
e) The TCP process running on the PC randomly selects the
destination port when establishing a session with the server.
f) The source port field identifies the running application or
service that will handle data returing to the PC
6. Which two statements are true about NTP servers in an enterprise
network ? (choose two)
a) NTP servers ensure an accurate time stamp on logging and
debugging information
b) NTP servers control the mean time between failures(MTBF) for
key network devices
c) There can only be one NTP server on an enterprise network
d) All NTP server synchronize directly to a stratum 1 time source
e) NTP servers at stratum 1 are directly connected to an
authoritative time source
7. What type of attack targets an SQL database using the input field
of a user?
a) Xmp injection
b) SQL injection
c) Buffer overflow
d) Cross-site scripting
8. What is an architectural constraint to which a ture RESTful API
web service must adhere?
a) It allowes resource caching
b) It should be behind a firewall
c) It operates as a cloud service
d) It must support XMP RPC and JSON RPC
9. Which two HTTP funcitons correspond two the UPDATE function
in CRUD ? (choose two)
a) POST
b) DELETE
c) PATCH
d) PUT
e) GET
10. Math the term to the RESTAPI request
[Link]
[Link]
11. Which HTTP status code category is used in the response to
indicate that a REST API request contains an error on the client
side?
a) 2xx
b) 1xx
c) 5xx
d) 4xx
e) 3xx
12. Match the SDLC phase with its description
a) Implmentation
b) Deployment
c) Requirements & analysis
13. In which SDLC phase is the software product installed into
the production environment to decide if it is ready for release?
a) Design
b) Deployment
c) Testing
d) Implementation
14. Which stakeholder determines the useful valu of software
product features In the lean process?
a) The reviewer
b) The programmer
c) The customer
d) The Scrum master
15. How do APIs affect traditional IT tasks?
a) They are used to eliminate repetitive manual tasks and replace
them with automation
b) They are used to increase hardware speed and lower power
consumption
c) They are used to increase computer processing speed and lower
power consumption
d) They are userd to replace network infrastructure and implement
network virtualization
16. Which string of characters is used to identify the beginning
of a new separate document when multiple documents are in a
single YAML file?
a) Three dots “…”
b) There dashes “---“
c) There slashes “///”
d) There pound signs “###”
17. Which DevNet resource would a developer user to look for a
python library that supports APIs for a specific cisco product ?
a) DevNet Sandbox
b) Code exchange
c) Devnet learning Labs
d) Devnet support
18. Which Devnet resource would a developer use in order to test
custom code in a production like environment
a) Code exchange
b) Devnet support
c) Devnet Learning labs
d) Devnet sandbox
19. What character is used to separate the key and value pairs in
YAML?
a) Forward slash /
b) Semi colon ;
c) Underscore _
d) Colon :
20. Which git command is used to compare changes between
files?
a) Git checkout
b) Git merge
c) Git diff
d) Git status
21. Which library is the most commonly used python library for
connecting NETCONF clients with a NETCONF server ?
a) Posix
b) Pypi
c) Ncclient
d) Pyclient
22. What are two characteristics of the staging environment of
the four tier deployment environment structure (choose tow )
a) It is structured as close as possible to the actual production
environment
b) It is the point where code has been tested multiple times and is
error free
c) It is where the code undergoes final acceptance testing in a
realistic environment
d) It is where end users will interact with the code
e) It often includes automated testing tools such as Jenkins,
circlecl, or travis Cl
23. Which SQL injection defense method should be used only as
a last resort?
a) Using parameterized queries
b) Using a database firewall
c) Implementing whitelist input validation
d) Escaping all user supplied input
24. What is an example of a use supported by cisco UCS
Director and UCS manager?
a) Underlying central system workflow management and
migration
b) Bare metal server provisioning and monitoring of virtual
environments
c) Call venter and call management over IP networks
d) Telemetry data collection and analysis
25. Which programming language is supported by the webex
xAPI to develop macros for on device customization
a) Python
b) Java
c) Javascript
d) C++
26. What is a function provided by an implementation of a read
only automation solution
a) The ability to use an automated request to audit configurations
and manually deploy changes in order to implement compliance
b) The ability to implement network infrastructure that receives a
configuration from a specific centralization server
c) The ability to use GET and SET requests to retrieve and send
data across the network infrastructure
d) The ability to reduce risk by implementing security policies
across the network infrastructure via automated changes
27. What is an example of a read only automation solution ?
a) Gathering SD-WAN inventory data using python and recording
the values in a database
b) Gathering the current list of ACL entries on an IOS XE router
and enforcing consistency
c) Streamlining the management of L3 firewall rules in cisco
meraki network
d) Simplifying the automation of network device authentication,
configuration , and consistency
28. What does self service refer to in the context of enterprise
IT?
a) Automated tools and methods that deliver preconfigured
developer platforms on demand
b) Distributing and Implementing broad access to public cloud
infrastructure as a service services
c) Imaging frequently used server configurations for rapid
deployment
d) Mainstreamed processes that promote a lower IT headcount by
implementing automation
29. A component was created with the intent of combining the
disciplines and skills of dev and ops . this component created a
new job role and implemented a best practices playbook for doing
ops with software methods . which component matches this
description
a) Shared version control
b) Agile infrastructure and operations
c) Automated infrastructure
d) The SRE approach
30. Which statement describe the term orchestration in IT
automation ?
a) Orchestration is the obtaining and provisioning of computer,
storage, and network infrastructure
b) Orchestration is the process of prearing a server through the
installation of libraries or daemons
c) Orchestration is aimed at managing workload lifecycles and
reacting dynamically to changing conditions in order to
optimize processes
d) Orchestration is the building, arraging, integration , and
preparation of multi component application across multiple
nodes
31. What are two characteristics of stateless applications (choose
two )
a) They can be scaled only by redeploying them and destroying the
data that users or operators previously
b) They can be freely scaled across available capacity without
disrupting ongoing customer connections
c) They can store a user state in an accessible database separate
from application servers and other components
d) They must run on container orchestrators like kubernets
e) They maintain the user state within the local user machine so
that automation can work non destructively
32. Which component in the pyATS ecology handles bunding
and running jobs ?
a) Clover
b) Easypy
c) AEtest
d) Genie
33. Which three statements describe characteristic of a virtual
machine ? (choose three)
a) It includes a guest operating system
b) It shares the operating system of the host computer
c) It requies windows as the host operating system
d) It is created and deployed using the docker format
e) It runs on top of a hypervisor
f) It is completely self contained with its own emulated storage,
memory and network interfaces
34. A student who is interested in network programmability
approaches an instructor for advice on learning more about the
subject. The student is a kinesthetic learner who learns by doing.
Which Devnet resource should the instructor consider telling the
student about
a) Devnet zone
b) Devnet Express
c) Devnet Create
d) Devnet learning labs
35. A developer issues a linux command python3 –m venv
devenv . what is the developer trying to achieve?
a) To install the devnet tool sets in the python 3 virtual
environment named venv
b) To enter the python 3 virtual environment named venu using the
devnet tool sets
c) To create a python 3 vitual environment named devenv
d) To activate the python 3 virtual environment named devenv
36. Which convention is used in python to indicate that methods
and variables in a class are private and not to be used outside of the
class
a) By declaring a private method or variable in the beginning of
the calss definition
b) By using two preceding hyphens (-) for a method or variable
c) By using the command class private classname(): to start the
class definition
d) By using a single preceding underscore (_) for a method or
variable
37. Which docker component defines the steps needed to create
an image that can be deployed in a variety of environments?
a) cross site seript
b) dockerfile
c) unionfs
d) namespaces
38. which communication protocol does ansible use to connect to
remote devices ?
a) secure FTP
b) HTTPS
c) telnet over VPN
d) SSH
39. Refer to the exhibit. A user is working on ansible on the local
NMS to manage remote network devices which file is the user
creating
a) Variable
b) Playbook
c) Service
d) Hosts
40. How can a webex teams administrator retrieve additional
details about a user through an API call ?
a) By using the value of a webex teams registered email address in
the API call
b) By using the value of the person id key in the API call
c) By using the value of orgld in the API call
d) By using the value of the organization name in the API call
41. Which type of request is used to send a message to a webex
teams space using python and the messages API?
a) Post
b) Put
c) Get
d) Patch
42. A network engineer is crating a docker container using the
docker build command. If the engineer does not specify a tag
which tag will be used by default?
a) Tag
b) (a blank space)
c) Default
d) Latest
43. Refer to the exhibit. A network engineer has created a
Jenkins pipeline. Which menu option would the engineer use to
run the pipeline?
a) Build now
b) Configure
c) Change
d) Workspace
44. In which situation would a company implement a reverse
proxy as a security solution?
a) When a hash is created based on the IP address of the request to
a particular protected server
b) When the company wants all responses to clients to look like
they came from the same server instead of individual ones
c) When the company has a database and needs to point to a DNS
server that uses different IP address for development resources
d) When responses from servers need to be sent over different
paths to ensure quality response time to the client devices
making the requests
45. A student is learning network automation by using a REST
API the student sends a request to a network device and revices a
response with the status code of 202 what does this status code
means
a) The request was understood but has been rejected by the server
b) The request has been accepted for processing but the processing
has not been completed
c) The request was successful and typically includes a payload
d) Because of a server error the request cannot be fulfilled
46. A network engineer is configuring a Jenkins job and finishing
with the following script in order to trigger the bulid
What is the purpose of the preparation stage?
a) It places a log of any errors in the SUCCESS file
b) It makes sure that any previous instances of the particular
docker container are stopped and removed
c) It runs the SUCCESS docker container
d) It catches and remove any errors
47. What platforms are provided by Devnet for community
members to share solutions, tool kits and others resources with
each other
a) Exchanges
b) Communities
c) Forums
d) Sandboxes
48. Match the devnet exchange type with the decription
a) Automation exchange
b) Code
49. Which three avenues are available within Devnet for
developers who need help with specific developer scenario
questions concerning cisco products (choose three)
a) Loggong a ticket
b) Posting to a webex teams space
c) Posting to a news group
d) Posting to the Devnet zone
e) Posting on the cisco learning network
f) Posting to a community forum
50. What are tow requirements for an application to
communicate with a webhook provider ? (choose two)
a) The host where the application is running must have an SSH
server running
b) The application must support JSON
c) The host where the application is running must have an SSH
client installed
d) The application must register a URP with the webhook provider
e) The application must always be running
51. Refer to the exhibit match the python coding information in
the authentication request to the cisoc DNA center to the location
in the script
a) 1001001027331
52. A student is learning REST API application . the student
constructs an URI to query the mapquest API for a route from new
york ,NY to Boston, MA what is the valid URI format?
53. Refer to the exhibit match the missing components of the
python script for the APIC EM REST API request for the user
‘secureuser”
54. Refer to the exhibit math the missing components to the
python script for authenticating to the cisco DNA center and
obtaining a token using the username of “secureuser” and
password of “C1$c0”
55. Refer to the exhibit. Match the missing components to the
meraki API script to complete the following tasks
. retrieve the organizations
. retrieve the netowrks and other corresponding id
. retrieve the devices and corresponding device id
56. 57. A packet is received by a server. The packet has a
destination port number of 830 that protocol or service is
requested?
a) NETCONF
b) HTTPS
c) HTTP
d) DHCP
57. 58. A software development company specializes in being
able to sue whatever software development method their customer
wants to use the lean method. What is a characteristic of this
method
a) A software development process that can only go forward
b) A process that eliminates inefficient ways of working like
expecting coders to multitask
c) A software development process that has the results of one
phase feed into the next phase
d) A software development process that focuses on frequent
delivery of working software as well as collaboration between
developers and business employees
58. 59. When thinking about the functional planes of a network
that is nnique about the management plance
a) It forwards data based on STP settings
b) It includes protocols used to monitor network devices
c) It is responsible for the switching for packet in hardware
d) It includes applicakton and protocols used between network
devices such as routers
59. 60. Which two data formats can RESTCONF use when
requesting data or responding with data (choose two)
a) HTML
b) YAML
c) YANG
d) JSON
e) XML