Posted on June 13, 2021 Cisco Devnet Please enter your email: 1. Refer to the exhibit. What is the action of the Bash script that is shown? A. The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory. B. The script goes into the directory called “$ndir” and makes a new directory called “$ndir” C. The script waits unit input is entered, then it goes into the directory entered and creates a new directory with the same name. D. For all directories in the current folder. The script goes into directory and makes a new directory. 2. Which platform is run directly using a hypervisor? A. Virtual B. Bare metal systems C. Containers D. Applications 3. Which way should be used to safely the API keys? A. In an environment variable unique to the system database B. Encrypted in a configuration file that is separate from the code C. Encrypted in the code in a function D. Plain text in the code as a constan 4. What is the purpose of a MAC address? A. To uniquely identify a router in a LAN B. To uniquely identify a network interface in a LAN C. To uniquely identify a device on the internet D. To uniquely identify a switch in a LAN 5. Which detail is included in a routing table? A. IP protocol B. Broadcast address C. TCP or UDP port number D. Destination next hop or outgoing interface 6. Which two concepts describe test-driven development? (Choose two.) A. It enables code refactoring. B. Write a test before writing code. C. Implementation is driven by incremental testing of release candidates. D. User acceptance testers development the test requirements. E. Tests are created when code is ready for release. 7. Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true? A. OAuth must be used. B. A token must be retrieved and the associated string must be embedded in the X-Auth-Token header. C. Basic authentication must be used. D. No authentication is required. 8. Which is an advantage of using network programmability? A. It removes CLI access for devices. B. It provides for more scalable and replicable network provisioning. C. Manual configuration is faster D. No cloud abstraction occurs. 9. What is the purpose of the Cisco VIRL software tool? A. To verify configurations against compliance standards B. To simulate and model networks C. To automate API workflows D. To test performance of an application 10. Which action does the Git command git merge allow the development to perform? A. Combine multiple sequence of commits into one unified history. B. Push changes to the remote repository C. Switch between branches D. Create, list, rename, and delete branches 11. Which type of threat occurs when an attacker can send hostile data to an interpreter within an application? A. Cross-site scripting B. Sensitive data exposure C. Broken authentication D. Injection 12. What are two advantages of version control software? (Choose two.) A. It supports tracking and comparison of changes in binary format files B. It allows old versions of packaged applications to be hosted on the Internet C. It provides wiki collaboration software for documentation. D. It supports comparisons between revisions of source code files E. It allows new team members to access the current code and history 13. Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.) A. An artifact repository allows to compare and merge changes in the source code of files involved in a build process B. An artifact repository is needed only for CI/CD pipeline executed on a public cloud infrastructure. C. An artifact repository provides traceability, search, and management of binary files. D. An artifact repository is needed only for managing open source software. E. An artifact repository stores files needed and generated during the build process. 14. On which port does NETCONF operate by default? A. 23 B. 443 C. 822 D. 830 15. Refer to the exhibit. A. Count and print the total number of available devices B. Iterate over a list of network devices and write all device names and management IP addresses to an output file. C. Iterate over a list of network devices and write all device type and associated management IP address. D. For each device that is returned, display the device and, for each device, print the device name and management IP address. E. Loop through the returned list of network devices and, for each device, print the device name management IP address. 16. Which status code is used by a REST API to indicate that the submitted payload is incorrect? A. 400 B. 403 C. 405 D. 429 17. An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device must be at fault? A. Laptop on which the script is running B. Router C. Switch D. Load balancer 18. Refer to the exhibit. What is the effect of this Ansible playbook on an IOS router? A. A new running configuration is pushed to the IOS router. B. The current running configuration of the IOS router is backed up. C. The start-up configuration of the IOS router is copied to a local folder. D. A new start-up configuration is copied to the IOS router. 19. Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve statement using RESTCONF on a CSR 1000V? A. Change the HTTP method to PUT. B. Change the transport protocol to HTTPS. C. Check the MIMF types in the HTTP headers. D. Check the authentication credentials. 20. Which two items are Cisco DevNet resources? (Choose two.) A. TAC support B. Bitbucket C. Sandbox D. Software research E. API Documentation 21. Which mechanism is used to consume a RESTful API design when large amounts of data are returned? A. Data sets B. Scrolling C. Blobs D. Pagination 22. Which description of a default gateway if true? A. It is a device that receives IP packets that have no explicit next-hop in the routing table. B. It is a feature that translates between public and private addresses. C. It is a security feature that denies certain traffic. D. It is a device that receives Layer 2 frames with an unknown destination address. 23. Which description of a default gateway if true? A. It is a device that receives IP packets that have no explicit next-hop in the routing table. B. It is a feature that translates between public and private addresses. C. It is a security feature that denies certain traffic. D. It is a device that receives Layer 2 frames with an unknown destination address. 24. Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.) A. Processor B. Codec C. Listener D. Receiver E. Transaction monitor 25. What is the Git command to delete a local branch named “experiment” without a warning? A. git branch –n experiment B. git branch –rm experiment C. git branch –f experiment D. git branch –D experiment Loading … Question 1 of 25 🔴 Our Live Courses