Please enter your email:

1. What is the purpose of a MAC address?

 
 
 
 

2. Which detail is included in a routing table?

 
 
 
 

3. Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.)

 
 
 
 
 

4. Which two items are Cisco DevNet resources? (Choose two.)

 
 
 
 
 

5. Which status code is used by a REST API to indicate that the submitted payload is incorrect?

 
 
 
 

6. Which description of a default gateway if true?

 
 
 
 

7. What is the Git command to delete a local branch named “experiment” without a warning?

 
 
 
 

8. Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)

 
 
 
 
 

9. Which action does the Git command git merge allow the development to perform?

 
 
 
 

10. Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?

 
 
 
 

11. Which two concepts describe test-driven development? (Choose two.)

 
 
 
 
 

12. Which description of a default gateway if true?

 
 
 
 

13. Which is an advantage of using network programmability?

 
 
 
 

14. Refer to the exhibit.

 
 
 
 
 

15. Refer to the exhibit. 

 

What is the effect of this Ansible playbook on an IOS router?

 
 
 
 

16. Which mechanism is used to consume a RESTful API design when large amounts of data are returned?

 
 
 
 

17. Which way should be used to safely the API keys?

 
 
 
 

18. Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve statement using RESTCONF on a CSR 1000V?

 
 
 
 

19. What are two advantages of version control software? (Choose two.)

 
 
 
 
 

20. An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device must be at fault?

 
 
 
 

21. Refer to the exhibit.

What is the action of the Bash script that is shown?

 
 
 
 

22. What is the purpose of the Cisco VIRL software tool?

 
 
 
 

23. Which platform is run directly using a hypervisor?

 
 
 
 

24. Which type of threat occurs when an attacker can send hostile data to an interpreter within an  application?

 
 
 
 

25. On which port does NETCONF operate by default?

 
 
 
 

Question 1 of 25

🔴 Our Live Courses