Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Refer to the exhibits. An interface named “GigabitEthernet2” has been configured on a Cisco IOS XE device. Using RESTCONF APIs as defined by the ietf-interfaces@2014-05-08.yang model, which two combinations of “rest_operation” and “payload” must be added to the Python script to set the “description” to “Configured by RESTCONF”? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 5

Refer to the exhibit.

Many faults have occurred in the ACI environment and a sample of them needs to be examined. Which API call retrieves faults 30 through 45?

Full Access
Question # 6

Refer to the exhibit.

This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type.

Which two words are required to complete the script? (Choose two.)

A.

ensure

B.

commit

C.

false

D.

replace

E.

none

Full Access
Question # 7

Refer to the exhibit above and click on the tab in the top left corner to view a diagram that describes the typical flow of requests involved when a webhook is created for a booking service. Drag and drop the requests from the left onto the item numbers on the right that match the missing sections in the sequence diagram to design the complete flow of requests involved as a booking is updated from a web application.

Full Access
Question # 8

Refer to the exhibit.

The YAML represented is using the ios_vrf module. As part of the Ansible playbook workflow, what is the result when this task is run?

A.

VRFs not defined in the host_vars file are removed from the device.

B.

VRFs not defined in the host_vars file are added to the device, and any other VRFs on the device remain.

C.

VRFs defined in the host_vars file are removed from the device.

D.

VRFs are added to the device from the host_vars file, and any other VRFs on the device are removed.

Full Access
Question # 9

Refer to the exhibit.

Which action should be performed to avoid an SQL injection attack?

A.

Encrypt the password that is used to connect to the database

B.

Develop a denial of service response plan

C.

Vacate the input on the platform variable

D.

Compile the Python file instead of allowing live interpretation

Full Access
Question # 10

Refer to the exhibit.

A developer created a Python script to retrieve information about Meraki devices in a local network deployment After requesting a security review of the code the security analyst has observed poor secret storage practices What is the appropriate secret storage approach''

A.

Set the Base64 encoded version of the API key as MER_API_KEY m the code and Base64 decode before using m the header

B.

Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code

C.

Leverage an external secret vault to retrieve MER_APl_KEY and set the vault key as an OS environment variable before running the code

D.

Set an OS environment variable for MER_API_KEY to the API key before running the code and no longer set MER_API_KEY within the code

Full Access
Question # 11

Refer to the exhibit.

Which command results in a detached HEAD scenario?

A.

git checkout 5af25b

B.

git checkout Branch-5

C.

git checkout master

D.

git checkout log -2

Full Access
Question # 12

Drag and drop the code from the bottom onto the box where the code is missing the snippet to complete this Ansible Playbook. Not all options are used.

Full Access
Question # 13

Drag and drop the code from the bottom onto the box where the code is missing in the diagram to show how data is processed in Webex Teams. Not all options are used.

Full Access
Question # 14

What is a well-defined concept for GDPR compliance?

A.

Records that are relevant to an existing contract agreement can be retained as long as the contract is in effect.

B.

Data controllers must confirm to data subjects as to whether where, and why personal data is being processed.

C.

Personal data that was collected before the compliance standards were set do not need to be protected.

D.

Compliance standards apply to organizations that have a physical presence in Europe.

Full Access
Question # 15

Which two gRPC modes of model-driven telemetry are supported on Cisco IOS XE Software? (Choose two.)

A.

dial-in

B.

dial-out

C.

call-in

D.

call-out

E.

passive

Full Access
Question # 16

Which two strategies are used to protect personally identifiable information? (Choose two.)

A.

Encrypt data in transit.

B.

Encrypt hash values of data.

C.

Encrypt data at rest.

D.

Only hash usernames and passwords for efficient lookup.

E.

Only encrypt usernames and passwords for efficient lookup.

Full Access
Question # 17

What is a benefit of running multiple instances of a back-end service and using load balancing to distribute the communication between the front-end and back-end services?

A.

The consistency of data for stateful services increases.

B.

High availability is provided for the back-end services.

C.

Scaling horizontally is automated out of the box.

D.

The total load on the database servers decreases.

Full Access
Question # 18

Which HTTP status code indicates that a client application is experiencing intentional rate limiting by the server?

A.

202

B.

401

C.

429

D.

503

Full Access
Question # 19

Refer to the exhibit.

An application uses an API to periodically sync a large data set. Based on the HTTP message sequence provided, which statements are true about the caching behavior seen in the scenario? (Choose two.)

A.

The full dataset was transmitted to the client twice.

B.

The dataset changed sometime between message #4 and #5.

C.

A partial dataset was transmitted to the client in message #4.

D.

The dataset did not change during the scenario.

E.

Messages #3 and #5 are equivalent.

Full Access
Question # 20

Which scenario is an example of the pseudonymization of sensitive data that meets GDPR requirements?

A.

encrypting sensitive data at rest by using native cloud services and data in transit by using SSL/TLS transport

B.

implementing XFowarded For at the frontend of a web app to enable the source IP addresses of headers to change

C.

leveraging an application load balancer at the frontend of a web app for SSL/TLS decryption to inspect data in transit

D.

separating the sensitive data into its own dedicated secured data store and using tokens in its place

Full Access
Question # 21

Drag and drop the steps from the left into the sequence on the fight to implement an OAuth2 three-legged authorization code flow grant type in an application Not all options are used.

Full Access
Question # 22

Refer to the exhibit.

Interface Lookback 1 must be created with IP address 10.30.0.1/24 in a Cisco IOS XE device using RESTCONF. The schema that is defined by the exhibit must be used. Which body and URI should be used for this operation?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 23

A heterogeneous network of vendors and device types needs automating for better efficiency and to enable future automated testing. The network consists of switches, routers, firewalls and load balancers from different vendors, however they all support the NETCONF/RESTCONF configuration standards and the YAML models with every feature the business requires. The business is looking for a buy versus build solution because they

cannot dedicate engineering resources, and they need configuration diff and rollback functionality from day 1.

Which configuration management for automation tooling is needed for this solution?

A.

Ansible

B.

Ansible and Terraform

C.

NSO

D.

Terraform

E.

Ansible and NSO

Full Access
Question # 24

Refer to the exhibit.

Which parameter is missing from the JSON response to confirm the API version that is

used?

A.

version 4

B.

v 10

C.

2

D.

version 2

Full Access
Question # 25

Refer to the exhibit. Which snippet creates a Webex Teams space and adds the users in the variable user list to that space?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 26

What is the gRPC Network Management Interface protocol?

A.

a unified management protocol for streaming telemetry and database logging

B.

a configuration management protocol for monitoring

C.

a protocol for configuration management and streaming telemetry

D.

a logging protocol used across database servers

Full Access
Question # 27

An enterprise refactors its monolithic application into a modem cloud-native application that is based on microservices. A key requirement of the application design is to ensure that the IT team is aware of performance issues or bottlenecks in the new application Which two approaches must be part of the design considerations'' (Choose two.)

A.

Periodically scale up the resources of the host machines when the application starts to experience high loads

B.

Instrument the application code to gather telemetry data from logs, metrics or tracing

C.

Adopt a service-oriented architecture to handle communication between the services that make up the application

D.

Deploy infrastructure monitoring agents into the operating system of the host machines

E.

Implement infrastructure monitoring to ensure that pipeline components interoperate smoothly and reliably

Full Access
Question # 28

A user is receiving a 429 Too Many Requests error. Which scheme is the server employing that causes this error?

A.

rate limiting

B.

time outs

C.

caching

D.

redirection

Full Access
Question # 29

Which action enhances end-user privacy when an application is built that collects and processes the location data from devices?

A.

Pepper the MAC address for each device.

B.

Salt the MAC address for each device.

C.

Implement an algorithmic information theoretic loss to the MAC address for each device.

D.

Use the network device serial number to encrypt the MAC address for each device.

Full Access
Question # 30

Refer to the exhibits which show the documentation associated with the create port object API cafl in Cisco Firepower Threat Defense, and a cURL command. Which data payload completes the cURL command to run the APi call?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 31

Refer to the exhibit.

One part of an application routinely uses the Cisco Meraki API to collate data about all clients Other parts of the application also use the Meraki API, but a single API key is used within the application The organization has approximately 4.000 clients across 30 networks Some of the application users report poor performance and missing data. Which two changes improve the performance of the application? (Choose two.)

A.

Check for HTTP code 429 and wait until Retry-After time before further calls are made

B.

Configure multiple API keys in the application and rotate usage of each one.

C.

Use random values in the User-Agent header when HTTP calls are made.

D.

Use fewer API calls to create a more efficient endpoint.

E.

Check API response payloads for later reuse in real time during code execution.

Full Access
Question # 32

An application has these characteristics

• provide one service or function

• distributed database

• API gateway

• central repository for code

• configuration database

• uses session management

Which two design approaches contribute to the scalability of the application? (Choose two.)

A.

built to scale based on a star topology

B.

modular design iteration

C.

session management in a stateless architecture

D.

planned before the first device is deployed

E.

distributed computing with tightly coupled components

Full Access
Question # 33

What are two principles according to the build, release, run principle of the twelve-factor app methodology?

(Choose two.)

A.

Code changes are able to be made at runtime.

B.

Separation between the build, release, and run phases.

C.

Releases should have a unique identifier.

D.

Existing releases are able to be mutated after creation.

E.

Release stage is responsible for compilation of assets and binaries.

Full Access
Question # 34

A developer is building an application to access a website. When running the application, an HTTP 403 error

code has been received. How should the application be modified to handle this code?

A.

Create a loop on cancel the operation and run a new one after the code is received.

B.

Use exponential backoff when retrying distributed services and other remote endpoints.

C.

Build a try/except around the urlopen to find errors occurring in the request.

D.

Redirect the request to an internal web server and make a new request from the internal resource.

Full Access
Question # 35

A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority.

Which approach must be taken to secure API keys and passwords?

A.

Embed them directly in the code.

B.

Store them in a hidden file.

C.

Store them inside the source tree of the application.

D.

Change them periodically.

Full Access
Question # 36

Drag and drop the code from the bottom onto the box where the code is missing to create a new IKEv2 policy Not all options are used

Full Access
Question # 37

Refer to the exhibit.

Two editors are concurrently updating an article’s headline from their mobile devices. What results from this scenario based on this REST API sequence?

A.

The article is marked as “Conflicted”

B.

The article headline is “Monday Headlines”

C.

The article headline is “Today Headlines”

D.

The article headline is “Top Headlines”

Full Access
Question # 38

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Python code that uses the UCS Python SDK is instantiating a service profile named ''devcore-server-01'' from service profile template ''device-template'' , then associating the service profile instance to blade 3 in chassis 7. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the Python exhibit.

Full Access
Question # 39

Which security approach should be used for developing a REST API?

A.

Use custom security relevant HTTP response codes

B.

Utilise TLS for end to end encryption

C.

Add an API key to each URL string

D.

Utilize CORS headers

Full Access
Question # 40

Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits.

Full Access
Question # 41

An engineer has created an NGINX web server. The server will be accessible from outside the organization. A public-key certificate must be installed before external access is allowed Drag and drop the steps from the left into the order on the right to configure the certificate. Not all options are used

Full Access
Question # 42

Drag and drop the code from the bottom onto the box where the code is missing to retrieve a summary of physical compute resources. The collected information about the compute resources will be presented in a dashboard to be developed for device monitoring purposes. Not all snippets are used.

Full Access
Question # 43

What is a risk to data privacy during the storage and transmission of data?

A.

The risk of exposure is increased when data is shared between applications.

B.

The transfer of unencrypted data between storage devices increases the risk of exposure.

C.

Data breaches cause ongoing exposure of personal information.

D.

The transfer of unencrypted personally identifiable financial information from a storage device increases the risk of a data broach.

Full Access
Question # 44

Refer to the exhibit.

A kubeconfig file to manage access to clusters is provided. How many clusters are defined and which of them are accessed using username/password authentication versus certificate?

A.

two clusters; scratch

B.

three clusters; scratch

C.

three clusters; development

D.

two clusters; development

Full Access
Question # 45

Refer to the exhibit.

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 46

What securely stores and encrypts the API keys and tokens that are used for an application deployment?

A.

ITSM

B.

Artifactory

C.

GitHub

D.

Vault

Full Access
Question # 47

Refer to the exhibit.

Drag and drop the correct parts of the Dockerfile from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the Dockerfile to successfully build and deploy a container running a Python application. Not all parts of the Dockerfile are used.

Full Access
Question # 48

Refer to the exhibit.

A network engineer writes a script to test authentication workflow using Python and REST API. The engineer wants to ensure that the script handles expected errors by matching output to HTTP status codes The scnpt uses the Python requests module. Which line of code must be added on the snippet where the code is missing?

A.

requests.error_code

B.

response.sutus_code

C.

response

D.

requests.post

Full Access
Question # 49

What is a characteristic of a monolithic architecture?

A.

It is an application with multiple independent parts.

B.

New capabilities are deployed by restarting a component of the application.

C.

A service failure can bring down the whole application.

D.

The components are platform-agnostic.

Full Access
Question # 50

Which Puppet manifest needs to be used to configure an interface GigabitEthernet 0/1 on a Cisco IOS switch?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 51

An engineer must enable an SSID in a Meraki network. Which request accomplishes this task?

A.

PUT /networks/{networkld}/ssids/{number} {"enable": true)

B.

POST /networks/{networkid}/ssids/{number) {"enable": true)

C.

PUT /networks/{networkld}/ssids/{number}?enabled=true

D.

POST /networks/{networkid}/sslds/{number}?enabled=true

Full Access
Question # 52

How does the use of release packaging allow dependencies to be effectively managed during deployments?

A.

dependencies are staggered between multiple releases

B.

designed to prevent any dependencies between release units

C.

dependencies are tested after the release is deployed

D.

removal of release units if they have issues in testing

Full Access
Question # 53

Refer to the exhibit.

Which key value pair from the ios_ntp Ansible module creates an NTP server peer?

A.

state: present

B.

state: True

C.

config: present

D.

config: True

Full Access
Question # 54

Drag and drop the code from the bottom onto the where the code is missing to create a host object by using the Cisco Firepower Device Manager API. Not all options are used.

Full Access