Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.

Full Access
Question # 5

What is the meaning of the HTTP status code 204?

A.

request completed; new resource created

B.

server successfully processed request; no content returned

C.

standard response for successful requests

D.

invalid query parameters

Full Access
Question # 6

Drag and drop the element of the Finesse API on the left onto the description of its functionally on the right.

Full Access
Question # 7

Refer to the exhibit. A script must output details of all the Cisco Meraki MS220-BP switches across all organizations and networks. Drag and drop the code snippets from the bottom onto the boxes in the code to complete the script. Not all options are used.

Full Access
Question # 8

During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?

A.

integration

B.

deployment

C.

development

D.

testing

Full Access
Question # 9

A developer creates a new application, but the application must be tested before being released to a customer. When a mobile phone that uses 4G is used to access the application, the request fails. Why does the connection to the application fail?

A.

The application is hosted on premises and VPN connectivity is required

B.

The application must be added to the production server before testing.

C.

The application must be moved to the cloud before testing is possible.

D.

The application connectivity is limited to HTTPS protocol.

Full Access
Question # 10

Which two commands download and execute an Apache web server container in Docker with a port binding 8080 in the container to 80 on the host? (Choose two.)

A.

docker pull apache

B.

docker run -p 8080:80 httpd

C.

docker run -p 80:8080 httpd

D.

docker pull httpd

E.

docker pull https

Full Access
Question # 11

A development team is creating an application used for contactless payments. The application must:

Be web-based

Capture and process the credit card information for a purchase.

Which security action must the web application use to gather and process the private customer data?

A.

Enable RATs to monitor the web application remotely.

B.

Disable botnets to eliminate risks.

C.

Disable TLS to increase the connection speed.

D.

Enable the encryption of network traffic.

Full Access
Question # 12

Drag and drop elements of the RESTCONF protocol stack from the left onto the correct description on the right. Not all elements on the left are used.

Full Access
Question # 13

What is the purpose of running tests before writing code in test-driven development?

A.

to find unexpected failures in the tests

B.

to demonstrate that the tests fail for expected reasons

C.

to ensure that the tests pass

D.

to provide proof of the work carried out

Full Access
Question # 14

A team of developers is responsible for a network orchestration application in the company. The responsibilities also include:

developing and improving the application in a continuous manner

deployment of the application and management of CI/CD frameworks

monitoring the usage and problems and managing the performance improvements

Which principle best describes this DevOps practice?

A.

responsible for IT operations

B.

automation of processes

C.

end-to-end responsibility

D.

quality assurance checks

Full Access
Question # 15

Fill in the blanks to complete the Bash script in which each file in a directory is renamed to Its SHA256 hash?

Full Access
Question # 16

Which platform is run directly using a hypervisor?

A.

Virtual

B.

Bare metal systems

C.

Containers

D.

Applications

Full Access
Question # 17

Which line is an example of the start of a chunk from a unified diff?

A.

@@ -90,88 +20191008T1349@@

B.

@@ -20191007T1200 +88,90 @@

C.

@@ -20191007T1200 +20191008T1349@@

D.

@@ -88,10 +88,6 @@

Full Access
Question # 18

Refer to the exhibit.

Which workflow does the script automate?

A.

retrieves a media server that is being monitored

B.

updates a media server that is being monitored

C.

adds a media server to be monitored

D.

deletes a media server that is being monitored

Full Access
Question # 19

What is a procedural component of CI/CD pipelines?

A.

Bundled artifacts must be generated.

B.

Every test must pass for the pipeline to continue its execution.

C.

Some tests fall without stopping the pipeline execution.

D.

The release label that identifies the build is optional.

Full Access
Question # 20

Refer to the exhibit.

Drag and drop the code from the left onto the item numbers on the right to complete to Meraki python script shown in the exhibit.

Full Access
Question # 21

Which model-driven programmability protocol does Cisco IOS XE Software support?

A.

CORBA

B.

SSH

C.

gNMI

D.

SOAP

Full Access
Question # 22

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. (Not all Options are used)

Full Access
Question # 23

Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve statement using RESTCONF on a CSR 1000V?

A.

Change the HTTP method to PUT.

B.

Change the transport protocol to HTTPS.

C.

Check the MIMF types in the HTTP headers.

D.

Check the authentication credentials.

Full Access
Question # 24

Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.

Full Access
Question # 25

Which two concepts describe test-driven development? (Choose two.)

A.

It enables code refactoring.

B.

Write a test before writing code.

C.

Implementation is driven by incremental testing of release candidates.

D.

User acceptance testers development the test requirements.

E.

Tests are created when code is ready for release.

Full Access
Question # 26

Drag and drop the requests from the left into the correct order on the right to create and check the path trace between two devices using Cisco DNA center API.

Full Access
Question # 27

Fill in the blanks to complete the Python script to update the Webex Teams membership of a room using the Python requests library import requests

Full Access
Question # 28

Which API is used to obtain data voicemail ports?

A.

Finesse gadgets

B.

Cisco Unified Communications manager

C.

Webex devices

D.

Webex teams

Full Access
Question # 29

What is a benefit of using functions in the code for the development process?

A.

better user experience in the end product

B.

improves code performance

C.

easier to compile the code

D.

fester code development

Full Access
Question # 30

Refer to the exhibit.

A network engineer uses model-driven programmability to monitor and perform changes on the network. The network engineer decides to use the NETCONF RPC message to complete one of their tasks. What is accomplished by sending the RPC message?

A.

The running-config of the device is returned.

B.

The name of each interface is reset to a default name.

C.

All the YANG capabilities supported by the device are returned.

D.

A list of interface names is returned.

Full Access
Question # 31

Which HTTP response status code means “Forbidden”?

A.

500

B.

401

C.

403

D.

502

Full Access
Question # 32

Refer to the exhibit.

An engineer must check the admin rights of users on a database regularly and prepares

the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?

A.

They must be stored in configuration files if there is a possibility of leakage.

B.

They must be Base64-encoded if stored in the user database.

C.

They must be encrypted if stored in the user database.

D.

They must be stored in configuration files if no authentication will be used.

Full Access
Question # 33

Refer to the exhibit.

A developer must integrate a bot with an internal communication app. The developer wants to replace the webexbot package with the teamsbot package by using Ansible and prepares a playbook In the first two tasks, the playbook stops the webexbot and verifies that the teamsbot is installed. What is accomplished in the last task of the workflow when the developer runs the Ansible playbook?

A.

stops the webexbot service and uninstals it and retains its configuration files

B.

installs the webexbot and retains the configuration files

C.

uninstalls the webexbot package and removes its configuration files

D.

searches whether the purge package is available in the repository and uninstalls the webexbot package

Full Access
Question # 34

Fill in the blanks to complete the python script to request a service ticket using the APIC-EM rest API for the user “devnetuser”.

Full Access
Question # 35

Which Cisco platform provides organization-wide automation, security, policy enforcement, any agility across wired and wireless networks?

A.

Cisco ACI

B.

Cisco DNA Center

C.

Cisco Umbrella

D.

Cisco SD-WAN

Full Access
Question # 36

Refer to the exhibit.

A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?

A.

compilation and configuration of the Cisco DevNet application so that it must be started manually

B.

compilation, installation, and configuration of the Cisco DevNet application so that it starts automatically

C.

compilation and installation of the Cisco DevNet application for an autonomous deployment model

D.

installation and configuration of the Cisco DevNet application so that it starts manually

Full Access
Question # 37

Refer to the exhibit.

What do all the calls shown in the sequence diagram have in common?

A.

All the calls are optional.

B.

All the calls are asynchronous.

C.

All the calls are synchronous.

D.

All the calls depend on the catalog.

Full Access
Question # 38

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code,

which resource must be used to verify that the code works correctly?

A.

Cisco NX-OS SDK

B.

Cisco Learning Labs

C.

Cisco Code Exchange

D.

Cisco Modeling Labs

Full Access
Question # 39

A developer is creating a script to interact with a REST API service which requires basic authentication. The credentials are "devnet:391665405" and the Base64 encoding of the credentials is "GV2bmV0dXNlcjpDaXNj=". Which payload and header combination must be used for authentication?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 40

A developer needs a list of clients connected to a specific device in a Meraki network. After making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet resource should be used to identify the meaning of the response code?

A.

API documentation

B.

Sandbox

C.

Learning Labs

D.

Code Exchange

Full Access
Question # 41

Refer to the exhibit.

Which device limits traffic between server 1 and server 2?

A.

Device B

B.

Device C

C.

Device D

D.

Device E

Full Access
Question # 42

A developer created a new secure API and is testing the functionality locally. The API was added to a container for further testing, and other team members and applications need to connect to the API. Which command exposes the API in the container as port 8443 and allows connections external to the host?

A.

docker run -p 127.0.0.1:80:8443/tcp myapiservice

B.

docker run -p 0.0.0.0:443:8443/tcp myapiservice

C.

docker run -p 0.0.0.0:8443:443/tcp myapiservice

D.

docker run -p 127.0.0.1:443:8443/tcp myapiservice

Full Access
Question # 43

Which data is specified in the response header?

A.

{

"id": "y123987jdkl". HTTP/1.1 200 OK

"status: "online",

"type": "switch"

}

B.

HTTP/1.1 200 OK

C.

''type'', ''switch''

D.

Content-Type

Full Access
Question # 44

What is a benefit of using edge computing in an IoT implementation?

A.

low cost in network design

B.

low network design complexity

C.

high availability for network components

D.

high speed in data processing

Full Access
Question # 45

What are two considerations when selecting the "best route" for a network device to reach its destination? (Choose two.)

A.

MAC address

B.

metrics

C.

administrative distance

D.

IP address

E.

subnet mask

Full Access
Question # 46

Which Cisco product provides malware and content filtering through DNS?

A.

Cisco ASA Firepower module

B.

Cisco AMP

C.

Cisco ISE

D.

Cisco Umbrella

Full Access
Question # 47

Refer to the exhibit.

Which line must be included in the Bash script for the Python code to succeed?

A.

define WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

B.

export WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

C.

set WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

D.

WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

Full Access
Question # 48

What is a functionality of the Waterfall method as compared to the Agile method for software development?

A.

Waterfall increases agility to implement faster while Agile promotes reliability.

B.

A phase begins after the previous phase has ended in Waterfall while Agile phases run in parallel.

C.

Customers get feedback during the process in Waterfall while they can see the result at the end in Agile.

D.

Requirements can be updated in Waterfall while in Agile it should be gathered in the beginning.

Full Access
Question # 49

While developing a real-Time VoIP application on a Cisco Webex platform, users report that their voice gets chopped or parts of the conversation drop out. Which network constraint is impacting the application?

A.

latency

B.

jitter

C.

capacity

D.

delay

Full Access
Question # 50

Which standard supported by Cisco IOS XE and Cisco NX-OS is used for automating the configuration of multiple devices across a network?

A.

SNMP – YANG

B.

SYSLOG – YANG

C.

CLI – YANG

D.

NETCONF – YANG

Full Access
Question # 51

Refer to the exhibit. Which code snippet represents the sequence.

A.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

B.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

C.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

D.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

Full Access
Question # 52

Refer to the exhibit. Which RESTCONF request results in this response?

A.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

B.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

C.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

D.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

Full Access
Question # 53

Which is an advantage of using network programmability?

A.

It removes CLI access for devices.

B.

It provides for more scalable and replicable network provisioning.

C.

Manual configuration is faster.

D.

No cloud abstraction occurs.

Full Access
Question # 54

Which service provides a directory lookup for IP addresses and host names?

A.

DNS

B.

DHCP

C.

SNMP

D.

NAT

Full Access
Question # 55

A function my_func() returns True when it executes normally. Which python snippet tests my_func()?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 56

Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?

A.

OAuth must be used.

B.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

C.

Basic authentication must be used.

D.

No authentication is required.

Full Access
Question # 57

Refer to the exhibit. A network engineer executes the bash script shown. Which two things are achieved by running the script? (Choose two.)

A.

A directory called PRODUCTION is created.

B.

The engineer changes to the parent directory.

C.

A YAML file is created.

D.

A YAML file is removed.

E.

A directory called state.yml is created.

Full Access
Question # 58

What is a capability of the AXL API?

A.

It signs a user in to a phone that is configured for extension mobility.

B.

It pulls logs for the Cisco Tomcat service.

C.

It authenticates users who exist in Cisco Unified Communications Manager.

D.

It provides support for HTTP and HTTPS communications.

Full Access
Question # 59

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.

Full Access
Question # 60

Which Python function is used to parse a string that contains JSON data into a Python dictionary?

A.

json.dumps()

B.

json.to_json()

C.

json.parse()

D.

json.loads()

Full Access