Network automation Flashcards

(93 cards)

1
Q

What are the three logical planes of network functions?

A

Management plane
Control plane
Data plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tasks involved in forwarding user traffic from one interface to another are part of the […] plane.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Functions that control the actions of the data plane are part of the […] plane.

A

control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Functions that are used to manage devices are part of the […] plane.

A

management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Data plane is also known as the […] plane.

A

Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The MAC address table is also known as the […] table.

A

CAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does SDN stand for?

A

Software-Defined Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does API stand for?

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SDN is an approach to networking that centralizes the […] plane into an application called a controller.

A

control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does SBI stand for?

A

Southbound Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does NBI stand for?

A

Northbound Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The […]bound interface is used for communications between the SDN controller and the network devices it controls.

A

South

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The […]bound interface is used for communications between the SDN controller and applications.

A

North

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

REST APIs are used for […]bound interfaces.

A

North

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CRUD […] = HTTP POST

A

Create

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CRUD […] = HTTP GET

A

Read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CRUD […] = HTTP PUT, PATCH

A

Update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CRUD […] = HTTP DELETE

A

Delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which part of the following URI is the scheme?
https://sandboxdnac.cisco.com/dna/intent/api/v1/network-device

A

https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which part of the following URI is the authority?
https://sandboxdnac.cisco.com/dna/intent/api/v1/network-device

A

sandboxdnac.cisco.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which part of the following URI is the path?
https://sandboxdnac.cisco.com/dna/intent/api/v1/network-device

A

/dna/intent/api/v1/network-device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HTTP Response class […] = informational

A

1xx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

HTTP Response class […] = successful

A

2xx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

HTTP Response class […] = redirection

A

3xx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
HTTP Response class [...] = client error
4xx
26
HTTP Response class [...] = server error
5xx
27
HTTP Response code [...] = OK
200
28
HTTP Response code [...] = Processing
102
29
HTTP Response code [...] = Unauthorized
401
30
HTTP Response code [...] = Created
201
31
HTTP Response code [...] = Moved Permanently
301
32
HTTP Response code [...] = Not Found
404
33
HTTP Response code [...] = Internal Server Error
500
34
REST APIs must be [stateful/stateless].
stateless
35
Which form of REST API authentication uses a username/password combination?
Basic authentication
36
REST API Bearer authentication uses a [...] for authentication.
token (also called a bearer token)
37
In REST API Basic authentication, credentials are encoded in [format].
Base64
38
In REST API Basic authentication, in which part of the message are the credentials included?
In the HTTP Authorization header
39
In REST API Bearer authentication, in which part of the message are the credentials included?
In the HTTP Authorization header
40
In REST API Bearer authentication, are the bearer tokens valid indefinitely?
No; they expire after a set period of time
41
API key authentication uses a [...] key issued by the API provider.
static (non-expiring)
42
In API key authentication, in which part of the message should the client specify the key?
The HTTP Authorization header (recommended). *Other options: URL, cookie
43
REST API [...] authentication provides access delegation.
OAuth 2.0
44
What are the four entities in OAuth 2.0?
Resource owner Client app Auth server Resource server
45
OAuth 2.0: A [...] can be used to renew access tokens without user reauthentication.
refresh token
46
The [...] layer of SDN architecture contains scripts and applications that interact with the SDN controller.
Application
47
The [...] layer of SDN architecture contains the SDN controller.
Control
48
The [...] layer of SDN architecture contains the network devices.
Infrastructure
49
[...] is Cisco's SDN solution for automating campus LANs.
SD-Access
50
[...] is Cisco's SDN solution for automating data center network
ACI
51
In SDN, the [...] is the physical network of devices and connections.
underlay
52
In SDN, the [...] is the virtual network built on top of the physical network.
overlay
53
In SDN, the [...] is the combination of the overlay and underlay.
fabric
54
What does VXLAN stand for?
Virtual Extensible LAN
55
What does LISP stand for?
Locator ID Separation Protocol
56
What are the three switch types in Cisco SD-Access?
-Edge node -Border node -Control node
57
[protocol] provides the control plane of Cisco SD-Access.
LISP
58
[protocol] provides the data plane of Cisco SD-Access.
VXLAN
59
[protocol] provides policy control in Cisco SD-Access.
Cisco TrustSec
60
Which data serialization languages are often used by REST APIs?
JSON, XML
61
In JSON, whitespace [is/isn't] significant.
isn't
62
In XML, whitespace [is/isn't] significant.
isn't
63
In YAML, whitespace [is/isn't] significant.
is
64
What are the four JSON 'primitive' data types?
-string -number -boolean -null
65
What are the two JSON 'structured' data types?
-object -array
66
Ansible is written in [language].
Python
67
Ansible is [agent-based/agentless].
agentless
68
Ansible uses [protocol] to connect to devices.
SSH
69
Ansible uses a [push/pull] model.
push
70
Ansible [...] files define the actions to be taken.
playbook
71
The Ansible server is called the [...].
Control node
72
[Ansible/Puppet/Chef] files are written in YAML.
Ansible *templates use Jinja2
73
What does IaC stand for?
Infrastructure as Code
74
Ansible, Puppet, Chef, and Terraform are examples of [...] tools.
Infrastructure as Code (IaC)
75
Ansible is primarily a [configuration management/provisioning] tool.
configuration management
76
Terraform is primarily a [configuration management/provisioning] tool.
provisioning
77
Configuration management tools typically use a(n) [mutable/immutable] infrastructure approach.
mutable
78
Provisioning tools typically use a(n) [mutable/immutable] infrastructure approach.
immutable
79
A [...] approach defines explicit steps in a specific order to achieve the desired outcome.
procedural
79
Ansible uses a(n) [mutable/immutable] infrastructure approach.
mutable
80
Terraform uses a(n) [mutable/immutable] infrastructure approach.
immutable
81
A [...] approach defines the desired end state, and lets the tool figure out the steps needed to achieve that state.
declarative
82
Ansible uses a [procedural/declarative] approach.
procedual
83
Terraform uses a [procedural/declarative] approach.
decalarative
84
Terraform provisions infrastructure resources on platforms called [...].
providers
85
Terraform uses a [push/pull] model.
push
86
Terraform uses an [agent-based/agentless] architecture.
agentless
87
Terraform [...] is the central Terraform software that analyzes configurations and interacts with providers.
Core
88
Terraform [...] files define the desired end state of the infrastructure
configuration
89
The Terraform [...] file tracks the status of the deployed infrastructure.
state
90
What the the three main steps in the basic Terraform workflow?
Write, Plan, Apply
91
Terraform Core is written in [language].
Go
92
Terraform configuration files are written in [language].
HashiCorp Configuration Language (HCL)