3 Months Free Update
3 Months Free Update
3 Months Free Update
A custom dashboard of the network health must be created by using Cisco DNA Center APIs An existing dashboard is a RESTful API that receives data from Cisco DNA Center as a new metric every time the network health information is sent from the script to the dashboard Which set of requests creates the custom dashboard?
Drag and drop the code from the bottom onto the box where the code is missing to construct a UCS XML API request to generate two service profiles from the template org-root/is-service-template. Not at options are used
A developer must create VLANs 2-5 on a remote Cisco NX-OS switch by using an Ansible playbook The playbook must meet these requirements
• Configure the VLANs and a name for each VLAN
• Only run against the switches inventory group
• Execute from the local Ansible controller
• Prevent the collection of system information prior to execution
Which playbook must be used?
A)
B)
C)
D)
An architect must optimize traffic that targets a popular API endpoint Currently, the application downloads a large file hourly, but often the file is unchanged and the download causes unnecessary load and delays Which cURL command must be used to determine the last modified date of the file and to optimize the API usage?
Which two gRPC modes of model-driven telemetry are supported on Cisco IOS XE Software? (Choose two.)
Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Python code using the UCS Python SDK is creating a server pool named “devcore_pool” and populating the pool with all servers from chassis 7 and then the server pool is associated to existing service profile template “devcore_template”. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the python exhibit.
Refer to the above and click on the resource labs in the top left corner to view resources to help with this question.
Python code using the UCS Python SDK is creating a server pool named "devcore_pool" and populating the pool with all servers from chassis 7, and then the server pool is associated to existing Service Profile template "devcore_template" Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the Python exhibit.
Refer to the exhibit. The presented application consists of a Nginx container and a load balancer service. Which GitLab CI/CD configuration implements the Kubernetes deployment?
Drag and drop the git commands from the left into the correct order on the right to create a feature branch from the master and then incorporate that feature branch into the master.
Which snippet presents the correct API call to configure, secure, and enable an SSID using the Meraki API?
A)
B)
C)
D)
Which function does Fluentd fulfill for application logging in Kubernetes?
A client is written that uses a REST API to interact with a server. Using HTTPS as the transport, an HTTP request is sent and received an HTTP response. The response contains the HTTP response status code: 503 Service Unavailable.
Which action is the appropriate response?
Refer to the exhibit.
A developer has created a Python script that retrieves information about the deployment of Cisco wireless access points using REST API. Which two code snippets must be added to the blank in the code to print the value of the userid key instead of printing the full JSON response? (Choose two.)
A)
B)
C)
D)
E)
Drag and drop the code from the bottom onto the box where the code is missing to construct a contact tracking application that dynamically returns all the Bluetooth clients on a given Meraki network. Not all options are used.
Drag and drop the code from the bottom onto the where the code is missing to create a host object by using the Cisco Firepower Device Manager API. Not all options are used.
Refer to the exhibit.
Recently, users have reported problems logging into an application with their usernames and passwords. The logs have captured an authentication attempt. Based on the messages and errors contained, what is the cause of the problem?
Refer to the exhibit.
The Python script is supposed to make an API call to Cisco DNA Center querying a wireless profile for the “ChicagoCampus” and then parsing out its enable FlexConnect value. Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit.
Refer to the exhibit.
Drag and drop the steps from the left into the order of operation on the right for a successful OAuth2 three-legged authorization code grant flow,
Drag and drop the code from the bottom onto the box whore the code is missing to retrieve a list of rack units that have more than 16 CPU cores. The filtered list will be used to create a summary on the monitoring dashboard. Not all options are used.
Refer to the exhibit.
Which parameter is missing from the JSON response to confirm the API version that is
used?
A development team is looking for a tool to automate configurations across the infrastructure. The tool must have these characteristics:
•written in Python
•define playbooks (or intent
•stateless
•imperative
Which tool meets these requirements?
Refer to the exhibit. Which URI string retrieves configured static routes in a VRF named CUSTOMER from a RESTCONF-enabled device?
A)
B)
C)
D)
Refer to the exhibit.
The cisco_devnet Docker swarm service runs across five replicas The development team tags and imports a new image named devnet'test 1 1 and requests that the image be upgraded on each container There must be no service outages during the upgrade process Which two design approaches must be used? (Choose two.)
Refer to the exhibit.
What is the missing step in deploying a Docker container to lOx?
A developer has issued git add file1 and file2 test.py command to add the three files for the next commit, but then decides to executed test.py from this command. Which command needs to be used to exclude test.py from this commit but keep the rest of the files?
An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online.
Which configuration management and/or automation tooling is needed for this solution?
AppGigabitEthernet interface is used as data port for a container on a Cisco Catalyst 9000 Series Switch. Which two interface configuration options should be used? (Choose two.)
A development team is working on a bug fix in a remote branch named "UXbug000222134' and the current working primary branch is named ,prod409024967’ A developer who just joined the learn needs to checkout the remote branch Which Git commands must be used?
A)
B)
C)
D)
Refer to the exhibit
An application is developed to perform multiple API calls. The calls will be performed on the infrastructure devices Delays in the information transfer occur when the application is executed What are two reasons for the issue? (Choose two )
Refer to the exhibit.
An application's REST API GET call is tested to the inventory database. Which missing code must be included to limit
the number of values that are returned from the query to 20?
Drag and drop the REST API authentication method from the left to the description on the right
Drag and drop the code snippets from the bottom onto the boxes where the code is missing to complete the API call to implement error handling Not all options are used.
A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority.
Which approach must be taken to secure API keys and passwords?
A developer is designing a modem, distributed microservice enterprise application. The application will be integrating with other systems and focus on a large deployment, so control of API calls is necessary. What is the best practice to reduce application response latency and protect the application from excessive use?
Refer to the exhibit.
A kubeconfig file to manage access to clusters is provided. How many clusters are defined and which of them are accessed using username/password authentication versus certificate?
Refer to the exhibit.
This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type.
Which two words are required to complete the script? (Choose two.)
Refer to the exhibit.
The application follows a containerized microservices architecture that has one container per microservice. The microservices communicate with each other by using REST APIs The double-headed arrows m the diagram display chains of synchronous HTTP calls needed for a single use/request Which action ensures the resilience of the application in the scope of a single user request?
When end-to-end encryption is implemented, which area is most vulnerable to exploitation?
Refer to the exhibit Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow.
Refer to the exhibit.
Which action should be performed to avoid an SQL injection attack?
Drag and drop the code onto the snippet to update a SSID in Meraki using the Dashboard API. Not all options are used.
Refer to the exhibit.
A Docker swarm cluster is configured to load balance services across data centers in three different geographical regions west central and east. The cluster has three manager nodes and three worker nodes Anew service named cisco.devnet is being deployed. The service has these design requirements
• All containers must be hosted only on nodes in the central region
• The service must run only on nodes that are ineligible for the manager role
Which approach fulfills the requirements?
A developer must deploy a containerized application for network device inventory management. The developer sets up a Kubernetes cluster on two separate hypervisors The SLA is not currently meeting a specified maximum value for network latency/jitter. CPU/memory and disk 1,0 are functioning property.
Which two design approaches resolve the issue? (Choose two.)
Which scenario is an example of the pseudonymization of sensitive data that meets GDPR requirements?
Refer to the exhibit.
An Intersight API is being used to query RackUnit resources that have a tag keyword set to “Site”. What is the expected output of this command?
Drag and drop the operations from the left into the order on the right to create a web dashboard that displays Cisco DNA Center data for an organization.
What securely stores and encrypts the API keys and tokens that are used for an application deployment?
What is a benefit of running multiple instances of a back-end service and using load balancing to distribute the communication between the front-end and back-end services?
An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances.
Which two actions can improve the design of the application to identify the faults? (Choose two.)
What is an effective logging strategy according 10 the 12-factor app tenets?
Refer to the exhibit.
An attempt to execute a CI/CD pipeline results m the error shown What is the cause of the error?
How should a web application be designed to work on a platform where up to 1000 requests per second can be served?
Refer of the exhibit.
Click on the resource labs in the top left corner to view resources to help with this question The script uses the Cisco Intersight REST API Drag and drop the code from the bottom of the code snippet to the blanks in the code to construct a Python script to update the firmware on a specific Cisco interaght managed UCS rack server, DMZ-RL3ADJM.
Which type of file is created from issued intermediate, root, and primary certificates for SSL installation on a server?
Refer to the exhibit.
Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content?
Refer to the exhibits. An interface named “GigabitEthernet2” has been configured on a Cisco IOS XE device. Using RESTCONF APIs as defined by the ietf-interfaces@2014-05-08.yang model, which two combinations of “rest_operation” and “payload” must be added to the Python script to set the “description” to “Configured by RESTCONF”? (Choose two.)
How does the use of release packaging allow dependencies to be effectively managed during deployments?
Which database type should be used with highly structured data and provides support for ACID transactions?
Which HTTP status code indicates that a client application is experiencing intentional rate limiting by the server?
Refer to the exhibit.
Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that prints a message if the Cisco DNA Center wireless network health for a site is not greater than 90%. The information is collected from the wireless network devices using GET method of REST API. Not all options are used.
DRAG DROP
Refer to the exhibit. A system administrator has installed a Linux-based alarm system in their home that can execute a Bash shell script when an intruder is detected. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to create a chat-ops script that will notify of alarms via the Webex Teams REST API. Not all code snippets are used.
A bot has been created, called "386231131”, to respond to alarm messages. A developer is now creating a Webhook to allow the bot to respond to messages. Which format allows the Webhook to respond to messages for the bot within Webex Teams?
A)
B)
C)
D)
Drag and drop the code from the bottom onto the box where the code is missing to configure a router that runs Cisco IOS XE by using RESTCONF. The API call is made to the management URL of the IOS XE device and on a registered port number. Errors that are caught during HTTP operation are registered. Not all options are used.
An application is hosted on Google Kubernetes Engine. A new JavaScript module is created to work with the existing application. Which task is mandatory to make the code ready to deploy?
Refer to the exhibit.
Two editors are concurrently updating an article’s headline from their mobile devices. What results from this scenario based on this REST API sequence?
Refer to the exhibit.
Which action will complete the workflow that represents how an API call sends multiple messages?
A network engineer needs to retrieve interface data using the Cisco IOS XE YANG Model. Drag and drop the
components from the bottom onto the box where the code is missing to complete the RESTCONF URI. Not all
options are used.
Drag and drop the steps from the left into the order on the right to build and run a customized Python DocKer image. Not all options are used
Drag and drop the code from the bottom onto the box where the code is missing to enable an SSID by using the Cisco Meraki Dashboard API. Not all options are used.
A web application has those requirements for HTTP cache control:
Which header must the engineer use?
A developer is working in a branch to develop a new feature named ‘newfeat404880077’. A file named ‘devcoreg13642911.jpg’ has accidentally been staged. This needs to be removed so that the commit is performed and branches merged. Which git command must be used to unstage the file?
Refer to the exhibit.
A developer must configure an SSL certificate for an nginx web server Which code must be added on the script to accomplish this configuration?
A)
B)
C)
D)
Refer to the exhibit.
Cisco IOS XE switches are used across the entire network and the description that is filed for all interfaces must be configured. Which code snippet must be placed in the blank in the script to leverage RESTCONF to query all the devices in the device list for the interfaces that are present?
A)
B)
C)
D)
Why is end-to-end encryption deployed when exposing sensitive data through APIs?
Refer to the exhibit.
An engineer needs to change the IP address via RESTCOMF on interface GigabitEthernet2. An error message is received when the script is run. Which amendment to the code will result in a successful RESTCONF action?
Users report that they are no longer able to process transactions with the online ordering application, and the logging dashboard is
displaying these messages:
Fri Jan 10 19:37:31.123 ESI 2020 [FRONTEND] [NFO: Incoming request to add item to cart from user 45834534858
Fri Jan 10 19:37:31.247 EST 2020 [BACKEND] INFO: Attempting to add item to cart
Fri Jan 10 19:37:31.250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused
What is causing the problem seen in these log messages?
A developer in a learn of distributed authors is working on code in an isolated Git branch named 'update4a2f5464771 The developer attempts to merge the new code with a branch named ’dvcapp2a3f1564733' however the merge operation encounters a conflict error during the process. Which Git command must the developer use to exit from the merge process and return the branch to the previous state?
Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Drag and drop the correct code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the cURL script that will use RESTCONF to update an interface on a CISCO IOS XE device.
Refer to the exhibit Pipenv is used to manage dependencies The test funs successfully on a local environment. What is the reason for the error when running the test on a CI'CD pipeline?
Refer to the exhibit , The command docker build -tag=friendlyhello . is run to build a docker image from the given Dockerfile,
requirements,txt, and app.py, Then the command docker run -p 4000:80 friendlyhello is executed to run the application. Which URL is entered in the web browser to see the content served by the application?
Refer to the exhibit.
As part of the Ansible playbook workflow, several new interfaces are being configured using the netconf_config module. The task references the interface variables that are unique per device.
In which directory is the YAML file with these variables found?
Refer to the exhibit.
Many faults have occurred in the ACI environment and a sample of them needs to be examined. Which API call retrieves faults 30 through 45?
Click on the GET Resource button above to view resources that will help with this question. An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB. Which REST API call accomplishes this task?
A developer is working on an enhancement for an application feature and has made changes to a branch called ‘devcor-432436127a-enhance4‘. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?
Which two strategies are used to protect personally identifiable information? (Choose two.)
Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Python code that uses the UCS Python SDK is instantiating a service profile named ''devcore-server-01'' from service profile template ''device-template'' , then associating the service profile instance to blade 3 in chassis 7. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the Python exhibit.
Refer to the exhibit.
Which set of API requests must be executed by a Webex Teams bot after receiving a webhook callback to process messages in a room and reply with a new message back to the same room?
Which OAuth mechanism enables clients to continue to have an active access token without further interaction from the user?
Drag and drop the code from the bottom onto the box where the code is missing in the Ansible script to get the existing firewall rules from Cisco Meraki and store the results to a new variable. Not all options are used.
Which two actions must be taken when an observable microservice application is developed? (Choose two.)
Refer to the exhibit.
An engineer needs to implement REST API error handling when a timeout or rate limit scenario is present. Which code snippet must be placed into the blank in the code to complete the API request?
A)
B)
C)
D)
Refer to the exhibit.
What is the output of this IOS-XE configuration program?
Which command is used 10 enable application hosting on a Cisco IOS XE device?
An enterprise refactors its monolithic application into a modem cloud-native application that is based on microservices. A key requirement of the application design is to ensure that the IT team is aware of performance issues or bottlenecks in the new application Which two approaches must be part of the design considerations'' (Choose two.)
Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?