Network Automation Flashcards

(120 cards)

1
Q

Basics of Network Automation
What is the primary goal of network automation?
a) Reducing manual configuration errors
b) Increasing hardware costs
c) Slowing down network operations
d) Limiting scalability

A

Answer: a) Reducing manual configuration errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is NOT a benefit of network automation?
a) Faster deployment of network services
b) Increased human errors
c) Improved consistency in configurations
d) Reduced operational costs

A

Answer: b) Increased human errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Infrastructure as Code (IaC) mean in network automation?
a) Manually configuring devices via CLI
b) Managing network configurations using scripts and templates
c) Using physical servers for all configurations
d) Avoiding any form of scripting

A

Answer: b) Managing network configurations using scripts and templates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which protocol is commonly used for automating network device configurations?
a) HTTP
b) SNMP
c) NETCONF
d) FTP

A

Answer: c) NETCONF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the role of YANG in network automation?
a) A data encryption standard
b) A data modeling language for NETCONF
c) A routing protocol
d) A wireless security protocol

A

Answer: b) A data modeling language for NETCONF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APIs in Network Automation
Which API is commonly used for Cisco devices to enable automation?
a) RESTCONF
b) BGP
c) OSPF
d) ICMP

A

Answer: a) RESTCONF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary function of a REST API in network automation?
a) Encrypting all network traffic
b) Enabling programmatic interaction with devices using HTTP methods
c) Replacing all CLI commands
d) Blocking automation scripts

A

Answer: b) Enabling programmatic interaction with devices using HTTP methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which HTTP method is used to retrieve data in a REST API?
a) POST
b) GET
c) PUT
d) DELETE

A

Answer: b) GET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does CRUD stand for in API operations?
a) Create, Read, Update, Delete
b) Configure, Route, Update, Disable
c) Control, Reset, Undo, Deploy
d) Copy, Remove, Upload, Download

A

Answer: a) Create, Read, Update, Delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which format is commonly used for data exchange in REST APIs?
a) Binary
b) XML
c) JSON
d) CSV

A

Answer: c) JSON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which tool is used for push-based configuration automation?
a) Ansible
b) Puppet
c) Chef
d) SaltStack

A

Answer: a) Ansible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Ansible Playbook?
a) A CLI command for Cisco routers
b) A YAML file defining automation tasks
c) A Python script for encryption
d) A network monitoring tool

A

Answer: b) A YAML file defining automation tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which protocol does Ansible primarily use to communicate with network devices?
a) SSH
b) Telnet
c) HTTP
d) SNMP

A

Answer: a) SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of Puppet in network automation?
a) Real-time traffic analysis
b) Enforcing desired state configurations
c) Packet sniffing
d) Dynamic routing

A

Answer: b) Enforcing desired state configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a pull-based configuration management tool?
a) Ansible
b) Chef
c) Netmiko
d) NAPALM

A

Answer: b) Chef

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Python for Network Automation
Which Python library is commonly used for SSH-based network automation?
a) Requests
b) Netmiko
c) Flask
d) Pandas

A

Answer: b) Netmiko

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of the Paramiko library in Python?
a) Web scraping
b) SSH protocol implementation
c) Data visualization
d) Database management

A

Answer: b) SSH protocol implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which Python module is used for working with JSON data?
a) os
b) json
c) sys
d) re

A

Answer: b) json

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does the following Python code do?

python
import requests
response = requests.get(“https://api.example.com/devices”)
a) Sends a POST request
b) Retrieves device data via a REST API
c) Configures a router via CLI
d) Encrypts network traffic

A

Answer: b) Retrieves device data via a REST API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which Python data structure is most suitable for storing device configurations?
a) List
b) Dictionary
c) Tuple
d) Set

A

Answer: b) Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the main concept of Software-Defined Networking (SDN)?
a) Decoupling control plane from data plane
b) Merging control and data planes
c) Eliminating all network controllers
d) Using only hardware-based routing

A

Answer: a) Decoupling control plane from data plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which component in SDN makes centralized decisions?
a) Data Plane
b) Control Plane
c) SDN Controller
d) Router CPU

A

Answer: c) SDN Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What protocol is commonly used between SDN controllers and switches?
a) OSPF
b) OpenFlow
c) BGP
d) EIGRP

A

Answer: b) OpenFlow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which Cisco solution provides SDN capabilities for enterprise networks?
a) Cisco ACI
b) Cisco IOS
c) Cisco Catalyst
d) Cisco IronPort

A

Answer: a) Cisco ACI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the role of Northbound APIs in SDN? a) Communication between controller and applications b) Communication between switches c) Encrypting network traffic d) Blocking unauthorized access
Answer: a) Communication between controller and applications
26
Which protocol uses XML for data encoding? a) NETCONF b) RESTCONF c) gRPC d) SNMP
Answer: a) NETCONF
27
What transport protocol does gRPC use? a) HTTP/1.1 b) HTTP/2 c) FTP d) Telnet
Answer: b) HTTP/2
28
Which protocol is a RESTful version of NETCONF? a) SNMP b) RESTCONF c) SSH d) TFTP
Answer: b) RESTCONF
29
What is the primary advantage of gRPC over RESTCONF? a) Slower performance b) No support for automation c) Faster binary encoding (Protocol Buffers) d) Only works with XML
Answer: c) Faster binary encoding (Protocol Buffers)
30
Which Cisco IOS XE feature enables model-driven programmability? a) NETCONF b) YANG c) Telemetry d) EEM
Answer: b) YANG
31
What is the primary function of the data plane in SDN? a) Making routing decisions b) Forwarding traffic based on flow tables c) Running the control protocol d) Encrypting packets
Answer: b) Forwarding traffic based on flow tables
32
Which Cisco SDN controller is used for wide-area networks (WAN)? a) Cisco ACI b) Cisco DNA Center c) Cisco SD-WAN (vManage) d) Cisco Prime
Answer: c) Cisco SD-WAN (vManage)
33
What does OpenFlow enable in an SDN architecture? a) Direct programming of switch flow tables b) Automatic hardware upgrades c) Legacy CLI-only management d) Physical cable testing
Answer: a) Direct programming of switch flow tables
34
Which term describes SDN’s ability to manage multiple devices centrally? a) Decentralization b) Orchestration c) Fragmentation d) Virtualization
Answer: b) Orchestration
35
In SDN, what is the southbound interface responsible for? a) Communicating between controller and applications b) Communicating between controller and network devices c) User authentication d) Data encryption
Answer: b) Communicating between controller and network devices
36
Which Python library is used to send HTTP requests to APIs? a) Netmiko b) Requests c) Paramiko d) NAPALM
Answer: b) Requests
37
What does the following Python code do? python from netmiko import ConnectHandler device = { "device_type": "cisco_ios", "host": "192.168.1.1", "username": "admin", "password": "cisco123" } connection = ConnectHandler(**device) a) Configures a VLAN on a switch b) Establishes an SSH connection to a Cisco device c) Sends an SNMP trap d) Encrypts a file
Answer: b) Establishes an SSH connection to a Cisco device
38
Which Python data structure is mutable and stores key-value pairs? a) List b) Tuple c) Dictionary d) Set
Answer: c) Dictionary
39
What is the purpose of the json.loads() function in Python? a) Converts a JSON string to a Python dictionary b) Encrypts JSON data c) Sends JSON over HTTP d) Validates YAML files
Answer: a) Converts a JSON string to a Python dictionary
40
Which tool is used to parse and validate YAML files in Python? a) PyYAML b) JSON c) CSV d) XML
Answer: a) PyYAML
41
What is model-driven telemetry used for? a) Real-time monitoring using push-based data b) Manual SNMP polling c) Legacy syslog collection d) Disabling automation
Answer: a) Real-time monitoring using push-based data
42
Which protocol is commonly used for network telemetry in modern networks? a) SNMP b) gRPC c) Telnet d) FTP
Answer: b) gRPC
43
What is the advantage of gRPC telemetry over SNMP? a) Slower data collection b) Higher latency c) Efficient binary encoding (Protocol Buffers) d) No support for automation
Answer: c) Efficient binary encoding (Protocol Buffers)
44
Which Cisco IOS XE feature enables streaming telemetry? a) EEM b) NETCONF c) YANG d) RESTCONF
Answer: c) YANG
45
What does SNMP trap refer to? a) A push-based notification from a device b) A CLI command c) A Python script d) A routing protocol
Answer: a) A push-based notification from a device
46
What is the primary purpose of Git in network automation? a) Tracking configuration changes b) Encrypting traffic c) Forwarding packets d) Blocking SSH access
Answer: a) Tracking configuration changes
47
Which Git command is used to commit changes to a local repository? a) git push b) git commit -m "message" c) git pull d) git clone
Answer: b) git commit -m "message"
48
What is CI/CD in the context of network automation? a) Continuous Integration/Continuous Deployment b) Cable Inspection/Configuration Debugging c) Cisco IOS/Cloud Deployment d) Command Interface/Data Control
Answer: a) Continuous Integration/Continuous Deployment
49
Which tool is used for automated testing in CI/CD pipelines? a) Jenkins b) Ansible c) Wireshark d) Ping
Answer: a) Jenkins
50
What is the purpose of a pipeline in CI/CD? a) Automates build, test, and deployment stages b) Configures VLANs c) Monitors SNMP traps d) Encrypts SSH connections
Answer: a) Automates build, test, and deployment stages
51
Which protocol is used for automated authentication in network devices? a) TACACS+ b) OSPF c) FTP d) HTTP
Answer: a) TACACS+
52
What is the role of RADIUS in network automation? a) Centralized authentication for users/devices b) Dynamic routing c) Packet sniffing d) Configuring VLANs
Answer: a) Centralized authentication for users/devices
53
Which Python library can automate firewall rule management? a) Netmiko b) Requests c) Paramiko d) NAPALM
Answer: d) NAPALM
54
What does AAA stand for in network security? a) Authentication, Authorization, Accounting b) Anycast, Aggregation, Access c) Automation, Analysis, Auditing d) Addressing, Allocation, Arbitration
Answer: a) Authentication, Authorization, Accounting
55
Which tool is used for automated vulnerability scanning? a) Nessus b) Ansible c) Wireshark d) Ping
Answer: a) Nessus
56
Which AWS service is used for automated network provisioning? a) AWS Lambda b) AWS CloudFormation c) Amazon S3 d) EC2
Answer: b) AWS CloudFormation
57
What is Terraform primarily used for? a) Infrastructure as Code (IaC) deployments b) Packet analysis c) Firewall rule management d) SNMP polling
Answer: a) Infrastructure as Code (IaC) deployments
58
Which protocol is used by Kubernetes for container orchestration? a) BGP b) HTTP/2 c) OpenFlow d) Telnet
Answer: b) HTTP/2
59
What is Ansible Tower used for? a) Enterprise-scale automation with a GUI b) Packet capturing c) Dynamic routing d) VLAN configuration
Answer: a) Enterprise-scale automation with a GUI
60
Which tool integrates network automation with DevOps pipelines? a) Jenkins b) Ping c) Traceroute d) Syslog
Answer: a) Jenkins
61
What is ChatOps in network automation? a) Managing networks via chat platforms (e.g., Slack) b) A routing protocol c) A Python library d) A Cisco proprietary tool
Answer: a) Managing networks via chat platforms (e.g., Slack)
62
Which protocol is used for automated IP address management (IPAM)? a) DHCP b) DNS c) SNMP d) BGP
Answer: a) DHCP
63
What is Zero Touch Provisioning (ZTP)? a) Automatically deploying devices without manual setup b) A security protocol c) A Python script d) A Cisco CLI command
Answer: a) Automatically deploying devices without manual setup
64
Which Cisco platform provides AI-driven network analytics? a) Cisco DNA Center b) Cisco IOS c) Cisco Catalyst d) Cisco Meraki
Answer: a) Cisco DNA Center
65
What does EEM (Embedded Event Manager) do in Cisco devices? a) Automates responses to network events b) Configures BGP c) Encrypts traffic d) Blocks SSH
Answer: a) Automates responses to network events
66
Which Python library is used to interact with Cisco DNA Center APIs? a) dnacentersdk b) netaddr c) scapy d) socket
Answer: a) dnacentersdk
67
What does the following Python function do? python def backup_config(device_ip, username, password): connection = ConnectHandler(device_type="cisco_ios", host=device_ip, username=username, password=password) output = connection.send_command("show running-config") with open(f"{device_ip}_config.txt", "w") as file: file.write(output) a) Backs up a device’s running configuration to a file b) Deletes a device’s configuration c) Configures a new VLAN d) Tests network latency
Answer: a) Backs up a device’s running configuration to a file
68
Which Python module is used for working with IP addresses? a) ipaddress b) sys c) os d) re
Answer: a) ipaddress
69
What is the purpose of the paramiko.SSHClient() class in Python? a) Establishes an SSH connection to a device b) Sends HTTP requests c) Parses JSON data d) Encrypts files
Answer: a) Establishes an SSH connection to a device
70
Which Python library is used for network packet manipulation? a) scapy b) requests c) netmiko d) napalm
Answer: a) scapy
71
What is the primary data format used in NETCONF? a) JSON b) XML c) YAML d) CSV
Answer: b) XML
72
Which YANG construct defines a list of network interfaces? a) container b) leaf c) list d) rpc
Answer: c) list
73
What is the default port for RESTCONF? a) 22 (SSH) b) 80 (HTTP) c) 443 (HTTPS) d) 830 (NETCONF)
Answer: c) 443 (HTTPS)
74
Which NETCONF operation retrieves device configuration data? a) b) c) d)
Answer: a)
75
What is the purpose of YANG models in network automation? a) Define the structure of configuration/state data b) Encrypt network traffic c) Replace CLI commands d) Block unauthorized access
Answer: a) Define the structure of configuration/state data
76
What is the primary purpose of Docker containers in networking? a) Isolate and run network services consistently b) Replace physical routers c) Encrypt all network traffic d) Configure VLANs
Answer: a) Isolate and run network services consistently
77
Which Kubernetes object manages scaling of containers? a) Pod b) Deployment c) Service d) ConfigMap
Answer: b) Deployment
78
What is the role of a Kubernetes Ingress Controller? a) Manages external access to services b) Configures BGP routing c) Encrypts SSH connections d) Monitors SNMP traps
Answer: a) Manages external access to services
79
Which command is used to deploy a Docker container? a) docker run b) docker build c) docker ps d) docker exec
Answer: a) docker run
80
What does Kubernetes ConfigMap store? a) Non-sensitive configuration data b) SSH keys c) Routing tables d) SNMP community strings
Answer: a) Non-sensitive configuration data
81
What is the purpose of an API key? a) Authenticate API requests b) Encrypt network traffic c) Configure VLANs d) Monitor CPU usage
Answer: a) Authenticate API requests
82
Which security protocol is used to secure REST APIs? a) HTTPS (TLS/SSL) b) SNMP c) Telnet d) FTP
Answer: a) HTTPS (TLS/SSL)
83
What is a webhook in network automation? a) A real-time HTTP callback for event notifications b) A CLI command c) A Python script d) A routing protocol
Answer: a) A real-time HTTP callback for event notifications
84
Which authentication method uses tokens for API access? a) OAuth 2.0 b) BGP c) EIGRP d) STP
Answer: a) OAuth 2.0
85
What is JWT (JSON Web Token) used for? a) Secure API authentication b) Configuring switches c) Packet sniffing d) Dynamic routing
Answer: a) Secure API authentication
86
Which tool is used for network configuration validation? a) Batfish b) Ping c) Traceroute d) Syslog
Answer: a) Batfish
87
What is Test-Driven Development (TDD) in network automation? a) Writing tests before writing automation scripts b) Manual CLI testing c) SNMP polling d) Packet capturing
Answer: a) Writing tests before writing automation scripts
88
Which Python library is used for unit testing? a) unittest b) requests c) netmiko d) paramiko
Answer: a) unittest
89
What does Pytest provide in automation testing? a) A framework for writing test cases b) A network monitoring tool c) A CLI for Cisco devices d) A YAML parser
Answer: a) A framework for writing test cases
90
Which protocol is used for network device health checks? a) ICMP (Ping) b) BGP c) OSPF d) STP
Answer: a) ICMP (Ping)
91
Which tool supports multi-vendor network automation? a) NAPALM b) Cisco IOS c) BGP d) STP
Answer: a) NAPALM
92
What is Terraform’s primary function in networking? a) Infrastructure as Code (IaC) provisioning b) Packet analysis c) Firewall management d) SNMP polling
Answer: a) Infrastructure as Code (IaC) provisioning
93
Which Ansible module is used for Cisco IOS configurations? a) ios_config b) junos_config c) nxos_config d) vyos_config
Answer: a) ios_config
94
What does idempotency mean in automation? a) Applying the same configuration multiple times without side effects b) Encrypting traffic c) Dynamic routing d) Blocking SSH access
Answer: a) Applying the same configuration multiple times without side effects
95
Which protocol does Ansible use for Windows automation? a) WinRM b) SSH c) Telnet d) FTP
Answer: a) WinRM
96
Which AWS service automates VPC provisioning? a) AWS CloudFormation b) Amazon S3 c) EC2 d) Lambda
Answer: a) AWS CloudFormation
97
What is Azure Resource Manager (ARM) used for? a) Deploying infrastructure as code in Azure b) Packet analysis c) Configuring VLANs d) SNMP polling
Answer: a) Deploying infrastructure as code in Azure
98
Which Google Cloud service is used for network automation? a) Google Cloud Deployment Manager b) BigQuery c) Cloud Storage d) Compute Engine
Answer: a) Google Cloud Deployment Manager
99
What is AWS Lambda used for in automation? a) Running serverless automation scripts b) Configuring physical routers c) Packet sniffing d) Dynamic routing
Answer: a) Running serverless automation scripts
100
Which tool manages multi-cloud automation? a) Terraform b) Ping c) Traceroute d) Syslog
Answer: a) Terraform
101
What is the role of AI in network automation? a) Predictive analytics and anomaly detection b) Replacing all network engineers c) Only used for cable management d) Slows down network performance
Answer: a) Predictive analytics and anomaly detection
102
Which Cisco platform uses machine learning for network insights? a) Cisco DNA Center b) Cisco IOS c) Cisco Catalyst 2960 d) Cisco ASA
Answer: a) Cisco DNA Center
103
What does Intent-Based Networking (IBN) rely on? a) High-level business policies driving network configuration b) Manual CLI configurations only c) SNMP polling d) Disabling all automation
Answer: a) High-level business policies driving network configuration
104
What is the core principle of Zero Trust Networking? a) "Never trust, always verify" b) "Trust all internal traffic by default" c) "Disable all firewalls" d) "Only use VLANs for security"
Answer: a) "Never trust, always verify"
105
Which protocol is key for automated certificate management? a) ACME (Used by Let's Encrypt) b) BGP c) OSPF d) STP
Answer: a) ACME (Used by Let's Encrypt)
106
What does TACACS+ provide over RADIUS? a) Command-level authorization logging b) Only authenticates users (no authorization) c) Slower performance d) No encryption
Answer: a) Command-level authorization logging
107
What is distributed tracing used for? a) Tracking requests across microservices b) Configuring VLANs c) SNMP polling d) Packet encryption
Answer: a) Tracking requests across microservices
108
Which tool is used for log aggregation in automation? a) ELK Stack (Elasticsearch, Logstash, Kibana) b) Ping c) Traceroute d) FTP
Answer: a) ELK Stack (Elasticsearch, Logstash, Kibana)
109
What does Prometheus monitor? a) Time-series metrics (e.g., CPU, bandwidth) b) Only physical cabling c) BGP routes d) SSH connections
Answer: a) Time-series metrics (e.g., CPU, bandwidth)
110
What is GitOps in network automation? a) Using Git as the single source of truth for infrastructure changes b) A Cisco proprietary protocol c) Manual configuration backups d) A Python library
Answer: a) Using Git as the single source of truth for infrastructure changes
111
Which tool enables network simulation for testing? a) GNS3 b) Wireshark c) Ping d) TACACS+
Answer: a) GNS3
112
What is idempotency in Ansible playbooks? a) Running the playbook multiple times without changing the system state b) Encrypting all traffic c) Deleting configurations d) Slowing down networks
Answer: a) Running the playbook multiple times without changing the system state
113
What does Wi-Fi 6 (802.11ax) automate? a) Dynamic frequency allocation b) Cable management c) SNMP traps d) BGP routing
Answer: a) Dynamic frequency allocation
114
Which protocol is used for automated IoT device onboarding? a) DPP (Device Provisioning Protocol) b) OSPF c) EIGRP d) STP
Answer: a) DPP (Device Provisioning Protocol)
115
What is 5G network slicing? a) Creating virtual networks with specific QoS b) A security protocol c) A Python library d) A type of VLAN
Answer: a) Creating virtual networks with specific QoS
116
What is the first step in troubleshooting an automation failure? a) Check logs/error messages b) Reboot all devices c) Disable automation d) Manually reconfigure everything
Answer: a) Check logs/error messages
117
Which tool helps debug API calls? a) Postman b) Ping c) Traceroute d) FTP
Answer: a) Postman
118
What does a 429 HTTP status code indicate? a) Too many requests (rate limiting) b) Authentication failure c) Server error d) Successful API call
Answer: a) Too many requests (rate limiting)
119
What is self-healing networking? a) Automatic detection and resolution of issues b) Manual troubleshooting c) A Cisco CLI command d) A Python script
Answer: a) Automatic detection and resolution of issues
120
Which technology will boost automation with AI? a) Generative AI (e.g., ChatGPT for config generation) b) IPv4 c) Telnet d) NetFlow
Answer: a) Generative AI (e.g., ChatGPT for config generation)