Please enter your email:

1. Refer to the exhibit. 

 

What is the effect of this Ansible playbook on an IOS router?

 
 
 
 

2. Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)

 
 
 
 
 

3. Which detail is included in a routing table?

 
 
 
 

4. Which way should be used to safely the API keys?

 
 
 
 

5. What are two advantages of version control software? (Choose two.)

 
 
 
 
 

6. What is the purpose of the Cisco VIRL software tool?

 
 
 
 

7. Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.)

 
 
 
 
 

8. An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device must be at fault?

 
 
 
 

9. Which action does the Git command git merge allow the development to perform?

 
 
 
 

10. Refer to the exhibit.

 
 
 
 
 

11. On which port does NETCONF operate by default?

 
 
 
 

12. Which description of a default gateway if true?

 
 
 
 

13. Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?

 
 
 
 

14. What is the Git command to delete a local branch named “experiment” without a warning?

 
 
 
 

15. Which is an advantage of using network programmability?

 
 
 
 

16. Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve statement using RESTCONF on a CSR 1000V?

 
 
 
 

17. What is the purpose of a MAC address?

 
 
 
 

18. Refer to the exhibit.

What is the action of the Bash script that is shown?

 
 
 
 

19. Which two concepts describe test-driven development? (Choose two.)

 
 
 
 
 

20. Which status code is used by a REST API to indicate that the submitted payload is incorrect?

 
 
 
 

21. Which platform is run directly using a hypervisor?

 
 
 
 

22. Which description of a default gateway if true?

 
 
 
 

23. Which two items are Cisco DevNet resources? (Choose two.)

 
 
 
 
 

24. Which mechanism is used to consume a RESTful API design when large amounts of data are returned?

 
 
 
 

25. Which type of threat occurs when an attacker can send hostile data to an interpreter within an  application?

 
 
 
 

Question 1 of 25

🔴 Our Live Courses

SDN Orchestration 3-in-1 (Combo)
$350.00

$1,000.00

$200.00

$317.00