Please enter your email:

1. Which status code is used by a REST API to indicate that the submitted payload is incorrect?

 
 
 
 

2. Which is an advantage of using network programmability?

 
 
 
 

3. Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)

 
 
 
 
 

4. Which description of a default gateway if true?

 
 
 
 

5. Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.)

 
 
 
 
 

6. What is the purpose of the Cisco VIRL software tool?

 
 
 
 

7. Which way should be used to safely the API keys?

 
 
 
 

8. Which mechanism is used to consume a RESTful API design when large amounts of data are returned?

 
 
 
 

9. What is the purpose of a MAC address?

 
 
 
 

10. What are two advantages of version control software? (Choose two.)

 
 
 
 
 

11. Which two concepts describe test-driven development? (Choose two.)

 
 
 
 
 

12. On which port does NETCONF operate by default?

 
 
 
 

13. Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?

 
 
 
 

14. Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve statement using RESTCONF on a CSR 1000V?

 
 
 
 

15. Refer to the exhibit.

What is the action of the Bash script that is shown?

 
 
 
 

16. Which two items are Cisco DevNet resources? (Choose two.)

 
 
 
 
 

17. An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device must be at fault?

 
 
 
 

18. Which detail is included in a routing table?

 
 
 
 

19. Refer to the exhibit.

 
 
 
 
 

20. Refer to the exhibit. 

 

What is the effect of this Ansible playbook on an IOS router?

 
 
 
 

21. Which description of a default gateway if true?

 
 
 
 

22. What is the Git command to delete a local branch named “experiment” without a warning?

 
 
 
 

23. Which type of threat occurs when an attacker can send hostile data to an interpreter within an  application?

 
 
 
 

24. Which platform is run directly using a hypervisor?

 
 
 
 

25. Which action does the Git command git merge allow the development to perform?

 
 
 
 

Question 1 of 25

🔴 Our Live Courses