Question #320
Which port does HTTPS use by default?
- A. 433
- B. 443
- C. 803
- D. 883
Correct Answer: B
Question #321
Which HTTP method is used by webhooks and notifies a listener about an event change?
- A. PUT
- B. POST
- C. PATCH
- D. GET
Correct Answer: B
Question #322
A developer completed the creation of a script using Git. Before delivering it to the customer, the developer wants to be sure about all untracked files, without losing any information. Which command gathers this information?
- A. git clean –n
- B. git rm –f
- C. git clean –r
- D. git rm *
Correct Answer: A
Question #323
A company deploys an application via containers in its local data center. As soon as the application goes into production, it starts to crash at specific hours of the day. After investigation, it is concluded that the crashes are due to too many users accessing the application simultaneously. The spikes must be addressed and allow for future growth without discarding the investment already made. Which deployment model must be used?
- A. hybrid cloud
- B. edge
- C. private cloud
- D. public cloud
Correct Answer: A
Question #324
Which TCP port is used to connect to a network device by using Telnet?
- A. 23
- B. 69
- C. 400
- D. 830
Correct Answer: A
Question #325
Refer to the exhibit. Which action does the script perform?
- A. It queries user credentials from Cisco IOS XE devices.
- B. It retrieves device identification from Cisco DNA Center.
- C. It exports SSID information from Meraki dashboard.
- D. It collects group information from ACI.
Correct Answer: D
Question #326
What is the purpose of grouping devices in a VLAN?
- A. Devices communicate as if they are connected on the same wire.
- B. Multicast network traffic is limited to the VLAN connected devices.
- C. Unicast messages are limited to the clients connected on the same VLAN.
- D. Network traffic is load balanced between the devices connected to the VLAN.
Correct Answer: B
Question #327
Refer to the exhibit. The YAML shown contains an object “param0” that is equal to “Workflow1”, a second object “param1” that contains an object called “list” which contains an array of two objects, “name” (equal to “VLAN_ID”) and “value” (equal to a text value “198”), and finally a third object “param2” that is equal to “0”. What is the equivalent message in JSON data format?
- A.
- B.
- C.
- D.
Correct Answer: D
Question #328
An engineer prepares a set of Python scripts to interact with network devices. To avoid network performance issues, the engineer wants to run them in a test environment. Which resource must be used to monitor the live execution of code in an always-available environment?
- A. packet tracer
- B. learning labs
- C. sandbox
- D. code exchange
Correct Answer: C
Question #329
When a Cisco IOS XE networking device is configured by using RESTCONF, what is the default data encoding method?
- A. application/yaml-data+json
- B. application/yang-data+json
- C. application/xml-data+json
- D. application/json-data+xml
Correct Answer: D
Question #330
Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer’s account?
- A. The encoded credentials were available in the source code.
- B. The application was not encrypting the communication with the server.
- C. The credentials were encrypted in the source code.
- D. An SSL certificate was used instead of the TLS protocol to authenticate.
Correct Answer: A
Question #331
Which technology is responsible for matching a name to an IP address of an application running on a host?
- A. firewall
- B. proxy
- C. load balancer
- D. DNS
Correct Answer: D
Question #332
Which network constraint causes the performance of the application to decrease as the number of users accessing the application increases?
- A. latency
- B. loss
- C. bandwidth
- D. jitter
Correct Answer: C
Question #333
DRAG DROP
–
Refer to the exhibit. A bespoke meeting booking system must be integrated with Cisco Webex so that meetings are created automatically. Drag and drop the code from the bottom onto the box where the code is missing to create a sample meeting. Not all options are used.
Correct Answer:
Question #334
What is a characteristic of Waterfall compared to Agile software development method?
- A. Waterfall focuses on continuous improvement, and Agile focuses on the design phase.
- B. Waterfall separates the project development lifecycle into sprints, and Agile does not use cycles.
- C. Waterfall specifies requirements before development begins, and Agile responds flexibly to changes in requirements.
- D. Waterfall uses reviews with step by step approach, and Agile uses a serially phased approach.
Correct Answer: C
Question #335
Users cannot access a webserver and after the traffic is captured, the capture tool snows an ICMP packet that reports “time exceeded in-transit”. What is the cause of this webserver access issue?
- A. The large distance between the server and the users means that the packets require too much time to reach the destination.
- B. A router along the path is misrouting the packets in a wrong direction.
- C. A router along the path has the wrong time.
- D. The server is overloaded and the connection was not able to be processed in time.
Correct Answer: B
Question #336
Refer to the exhibit. An engineer is comparing two files by using the unified diff format. Which cade snippet belongs to the new.py file?
- A.
- B.
- C.
- D.
Correct Answer: A
Question #337
DRAG DROP
–
Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a request that generates a security token and gets a list of network devices. Not all options are used.
Correct Answer:
Question #338
Refer to the exhibit. A network engineer executes the bash script shown. Which two things are achieved by running the script? (Choose two.)
- A. A directory called PRODUCTION is created.
- B. The engineer changes to the parent directory.
- C. A YAML file is created.
- D. A YAML file is removed.
- E. A directory called state.yml is created.
Correct Answer: AC
Question #339
DRAG DROP
–
Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. The Python script retrieves a list of tasks from a to-do list for effective project management purposes. Not all options are used.
Correct Answer:
Question #340
Refer to the exhibit. Which code snippet represents the sequence.
- A.
- B.
- C.
- D.
Correct Answer: C
Question #341
A developer attempts to refactor and improve the application code. It is noticed that the code contains several pieces of key information that could be a security threat if this code is accessible by those who are not authorized to this data. Which approach addresses the security concerns noticed by the developer?
- A. Host the application code on a machine located in a secure data center.
- B. Utilize environment variables for username and password details.
- C. Rely on the security teams’ goodwill to not give access to those who do not need it.
- D. Move the hardware that the application is deployed on to a secure location.
Correct Answer: B
Question #342
DRAG DROP
–
Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.
Correct Answer:
Question #343
Which tool provides a testing environment to run tests on network devices and perform network automation scenarios?
- A. Visual Studio Code
- B. Cisco VIRL
- C. pyATS
- D. Cisco Packet Tracer
Correct Answer: B
Question #344
A developer writes an application that refines data in temporary secure file storage hosted on the public cloud. Data will be deleted after processing and does not contain any private information. What is the advantage that a public cloud deployment provides to the developer?
- A. high security with encryption
- B. ease in infrastructure management
- C. flexible development
- D. bespoke services
Correct Answer: B
Question #345
DRAG DROP
–
Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to add a subnet to each bridge domain in the Ten1 tenant. Not all options are used.
Correct Answer:
Question #346
Refer to the exhibit. A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?
- A. cp ./PROD/current.txt ./TEST/config.txt
- B. cp ./TESTi/current.txt ./PROD/config.txt
- C. cp ./PROD/config.txt ./TEST/current.txt
- D. cp ./TEST/config.txt ./PROD/current.txt
Correct Answer: D
Question #347
What is a benefit of using model-driven programmability for infrastructure automation?
- A. connected user tracking
- B. infrastructure resource optimization
- C. multiple device control protocols
- D. device performance monitoring
Correct Answer: C
Question #348
What is the function of an Ethernet switch in a networking environment?
- A. to switch a frame from one port to another port based on IP address
- B. to switch a frame from one port to another port based on MAC address
- C. to provide IP addressing to connected hosts
- D. to block unwanted traffic
Correct Answer: B
Question #349
DRAG DROP
–
Drag and drop characteristics from the left onto the infrastructure management methodologies on the right.
Correct Answer:
Question #350
Refer to the exhibit. An engineer runs a network that consists of Cisco Nexus devices. The network is distributed between data centers in different locations. The switches are configured using standalone connections and a single point of failure. Which process is being automated by the Ansible playbook?
- A. enabling HSRP on the nxos_rtr inventory host
- B. enabling HSRP on the rtr-1a inventory host
- C. executing HSRP configuration from the Ansible controller node
- D. executing HSRP configuration from the srv-1a inventory host
Correct Answer: B
Question #351
Refer to the exhibit. A developer must use a token to collect data from Cisco DNA Center API and prepares a Python script to send requests. Which line of code needs to be placed on the snippet where the code is missing to obtain a token from the Cisco DNA Center API?
- A. token=BasicAuth(‘user’,‘password’))
- B. auth=BasicAuth(‘user’,‘password’))
- C. auth=HTTPBasicAuth(user,password))
- D. token=HTTPBasicAuth(user,password))
Correct Answer: C
Question #352
To which stage of development do Infrastructure as Code principles relate?
- A. manual configuration
- B. service provisioning
- C. physical deployment
- D. requirement collection
Correct Answer: B
Question #353
Refer to the exhibit. An engineer must authorize a REST API call. The API password is “Cisco123!”. Which Bash command must be placed in the code to authorize the call?
- A. mkdir API_PASSWORD=Cisco123!
- B. set API_PASSWORD=Cisco123!
- C. cp API_PASSWORD=Cisco123!
- D. export API_PASSWORD=Cisco123!
Correct Answer: D
Question #354
DRAG DROP
–
Refer to the exhibit. Drag and drop the Dockerfile contents from the left onto the functions on the right that create a container image to run traceroute to track network path to specific targets. Not all options are used.
Correct Answer:
Question #355
Which function does a router provide to a network?
- A. broadcast domain segmentation
- B. unique host on a Layer 3 network
- C. unique hardware address for every node on a LAN
- D. broadcast domain extension
Correct Answer: B
Question #356
DRAG DROP
–
Drag and drop the code from the bottom onto the box where the code is missing to enable ports on a switch by using RESTCONF. Not all options are used.
Correct Answer:
Question #357
Which IP service is used to monitor the performance of network devices?
- A. SNMP
- B. DHCP
- C. DNS
- D. NTP
Correct Answer: A
Question #358
Which IP service synchronizes the time across devices?
- A. DNS
- B. NTP
- C. SNMP
- D. NAT
Correct Answer: B
Question #359
An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer will use an Ansible playbook to configure devices through Cisco NX REST API. Before the code is run, which resource must be used to verify that the REST API requests work as expected?
- A. Cisco Open NX-OS
- B. Cisco NX-OS SDK
- C. Cisco Learning Labs
- D. Cisco Code Exchange for Nexus
Correct Answer: C