FINAL EXAM Flashcards
(104 cards)
A pharmaceutical company wants to contract the services of a cloud provider to store employee data and company-specific applications with strict access security. Which type of cloud would be the most appropriate for this scenario?
> community cloud
> public cloud
> hybrid cloud
> private cloud
private cloud
What is a function provided by an implementation of a read-only automation solution?
> the ability to reduce risk by implementing security policies across the network infrastructure via automated changes
> the ability to use GET and SET requests to retrieve and send data across the network infrastructure
> the ability to use an automated request to audit configurations and manually deploy changes in order to implement compliance
> the ability to implement network infrastructure that receives a configuration from a specific centralized server
the ability to use an automated request to audit configurations and manually deploy changes in order to implement compliance
Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)
> The TCP process running on the PC randomly selects the destination port when establishing a session with the server.
> UDP segments are encapsulated within IP packets for transport across the network
> The TCP source port number identifies the sending host on the network
> The UDP destination port number identifies the application or service on the server which will handle the data.
> The source port field identifies the running application or service that will handle data returning to the PC
> TCP is the preferred protocol when a function requires lower network overhead
UDP segments are encapsulated within IP packets for transport across the network
The UDP destination port number identifies the application or service on the server which will handle the data
The source port field identifies the running application or service that will handle data returning to the PC
What type of attack targets an SQL database using the input field of a user?
> buffer overflow
> SQL injection
> Cross site scripting
> XML injection
SQL injection
Which command can be used on Linux and MAC hosts to get IP addressing information?
> ipconfig
> ip address
> ifconfig
> networksetup -getinfo
ifconfig
What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)
> to create fewer collision domains
> to create more broadcast domains
> to enhance user bandwidth
> to insolate ARP request messages from the rest of the network
> to eliminate virtual circuits
> to isolate traffic between segments
to enhance user bandwidth
to isolate traffic between segments
Which tool might a developer use as part of a Continuous Integration pipeline in order to build and test source code?
> SQL
> REST
> Docker
> Jenkins
Jenkins
A packet is received by a server. The packet has destination port number of 8008. What protocol or service is requested?
> Telnet over SSH
> RESTCONF
> HTTP
> NETCONF
RESTCONF
A network contains multiple VLANs spanning multiple switches. What happens when a device in VLAN 20 sends a broadcast Ethernet frame?
> Devices in VLAN 20 and the management VLAN see the frame
> All devices in all VLANs see the frame
> Only devices that are connected to the local switch see the frame
> Only devices in VLAN 20 see the frame
Only devices in VLAN 20 see the frame
Which piece of software is responsible for creating and managing virtual machines, including allocating system resources to each virtual machine as needed?
> supervisor
> hypervisor
> host operating system
> hosted operating system
hypervisor
How is an Ethernet MAC address constructed?
> The first 3 bytes represent the network upon which the host resides, and the last 3 bytes uniquely identify the host
> The first 3 bytes represent the vendor OUI, and the last 3 bytes are assigned uniquely by the vendor
> The first 3 bytes are uniquely assigned by LANA, and the last 3 bytes represent the serial number of the host
> The first 3 bytes represent the vendor OUI, and the last 3 bytes are assigned randomly by the operating system
The first 3 bytes represent the vendor OUI, and the last 3 bytes are assigned uniquely by the vendor
Which Cisco SDK works with ACI?
> Cobra
> IMC
> UCS
> Instant Connect
Cobra
What platforms are provided by DevNet for community members to share solutions, tool kits, and other resources with each other?
> communities
> forums
> sandboxes
> exchanges
exchanges
Which two data formats can RESTCON use when requesting data or responding with data? (Choose two.)
> JSON
> XML
> YAML
> YANG
> HTML
JSON
XML
Which DevNet resource would a developer use to look for a Python library that supports APIs for a specific Cisco product?
> DevNet Learning Labs
> Devlet Support
> Code Exchange
> DevNet Sandbox
Code Exchange
A component was created with the intent of combining the disciplines and skills of Dev and Ops. This component created a new job role and implemented a best-practices playbook for doing Ops with software methods. Which component matches this description?
> Agile Infrastructure and Operations
> the SRE approach
> automated infrastructure
> shared Version control
the SRE approach
Math the DevNet exchange type with the description
_________ : uses GitHub API and human moderators to categorize and display related repositories
_________ : a collection of network automation use cases with different solutions and toolkits
_________ : provides solutions across different technologies, industries, and geographies to jump start solution design and development
> code
> ecosystem
> automation exchange
code
automation exchange
ecosystem
A user is working on Ansible on the local NMS to manage remote network devices. Which file is the user creating?
#Enter the devices for Ansible playbooks
Main-RT ansible_user=classuser ansible_passwork=class123! ansible_host=172.20.20.250
———————————
> service
> playbook
> variable
> hosts
hosts
Which DevNet resource would a developer use in order to test custom code in a production-like environment?
> Devlet Support
> DevNet Learning Labs
> Code Exchange
> DevNet Sandbox
DevNet Sandbox
In which situation would a company implement a reverse proxy as a security solution?
> when the company has a database and needs to point to a DNS server that uses different IP addresses for development resources
> when the company wants all responses to clients to look like they came from the same server instead of individual ones
> when a hash is created based on the IP address of the request to a particular protected server
> when responses from servers need to be sent over different paths to ensure quality response time to the client devices making the requests
when the company wants all responses to clients to look like they came from the same server instead of individual ones
A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Agile method. What is a characteristic of this method?
> a software development process where the highest priority is to satisfy the customer through early and continuous delivery of valuable software
> a process that eliminates anything that does not add value to the project including meetings and documentation
> a software development process that has the results of one phase feed into the next phase
> a more traditional software development process as the have used this process in past projects
a software development process that has the results of one phase feed into the next phase
A software development company specializes in being able to use whatever software development method their customer wants to use. One customer company wants to use the Agile method. What is a characteristic of this method?
> a software development process that prioritizes responding to change over following a plan
> a software development method that tracks closely with the software development life cycle
> a process that was developed for manufacturing, but adapted to other industries
> a more traditional software development process as they have used this process in past projects
a software development method that tracks closely with the software development life cycle
A network engineer is creating a Docker container using the docker build command. If the engineer does not specify a tag, which tag will be used by default?
> tag
> latest
> (a black space)
> default
latest
Which component in the pyATS ecology handles bundling and running jobs?
> AEtest
> Clover
> Genie
> EasyPy
EasyPy