Welcome to your ENCOR-AUTOMATION 1. Which two HTTP functions correspond to the UPDATE function in CRUD? (Choose two.) A. PUT B. DELETE C. PATCH D. GET E. POST 2. What are two syntax rules for writing a JSON array? (Choose two.) A. A semicolon separates the key and list of values. B. A space must separate each value in the array. C. The array can include only one value D. Values are enclosed in square brackets. E. Each value in the array is separated by a comma. None 3. Which API does the Cisco DNA Center controller use for user authentication? A. Fabric Device B. Network Device C. Authentication D. Token None 4. Which statement describes the function of GitHub? A. It is an online game site. B. It is a service provider for virtualized servers and applications. C. It is a hosted web-based repository for code. D. It is an online storage service for personal files. None 5. Which type of API is used to carry configuration changes from a network controller to individual network devices in network automation applications? A. lower layer B. southbound C. eastbound D. northbound None 6. A network administrator is checking and making configuration changes on a network device from home. What are two ways to secure the connection between the command-line interface (CLI) of the network device and the remote workstation used by the administrator? (Choose two.) A. through a Telnet connection B. through an SSH connection C. through a virtual terminal application D. through an HTTP interface E. through a VPN connection 7. What is the characteristic of the Postman application that relates to using APIs? It provides a GUI to interact with remote workstations. B. It is a web-based application to connect to various network devices. C. It is a web-based email client. D. It uses a console-based approach to interact with APIs. None 8. Why does the program result in an error? . The following program was created in Python. user_input = int( input(" What is 3 * 2? "))Â if (user_input = 6):Â print (" Correct!")Â else: print (" Incorrect...") A. There should be double equal signs when checking conditional equality. B. The quotation mark is not needed in the print function. C. 3 * 2 does not equal 6. D. The user_input variable was not defined. None 9. In a hosted Chef type of deployment, where is the Chef server located? A. on a LAN located near to the other chef components B. in the cloud C. on a workstation D. in the enterprise core None 10. Which term is used to describe a set of instructions for execution by the configuration management tool Puppet? A. Manifest B. Playbook C. Cookbook D. Pillar None 11. What is the SaltStack agent called that runs on nodes? A. station B. reactor C. minion D. chef None 12. . A student is studying in preparation for an interview for a job in programming and network automation. What is a characteristic of Ansible ? A. It is an agentless automation tool. B. It is a programming interface that communicates from a network controller to its management software. C. It is a hosted web-based repository that uses version control for storing and sharing code D. It is a free online tool that can check the format of programmed files to verify that they have valid syntax. None 13. Which statement describes the Cisco Embedded Event Manager? A. It is a security policy management platform that provides highly secure network access control (NAC) to users and devices. B. It is a centralized management platform that aggregates and correlates threat events. C. It is a collector and aggregator of network telemetry data that performs network security analysis and monitoring. D. It is a Cisco IOS tool that allows engineers to build task automation software applets. None 14. Which configuration management tool uses an agentless approach? A. Ansible B. Chef C. SaltStack D. Puppet None 15. In which type of deployment is the Chef server hosted in the cloud? A. private Chef B. hosted Chef C. Chef Solo D. Chef Client and Server None 16. . What is a characteristic of the Cisco Embedded Event Manager? A. It uses playbooks written in YAML to deploy configuration changes. B. It is a software component of the Cisco IOS. C. It is built on Python and has a Python programming interface. D. It is an open source tool based on the Ruby language. None 17. Which language is used to write Ansible playbooks? A. YANG B. YAML C. Python D. JSON None 18. A student is studying in preparation for an interview for a job in programming and network automation. What is a characteristic of Chef? A. It is a free online tool that can check the format of programmed files to verify that they have valid syntax. B. It is a hosted web-based repository that uses version control for storing and sharing code. C. It is an open source configuration management tool that is designed to automate configurations and operations of a network and server environment. D. It is a markup programming language. None 19. A student is studying in preparation for an interview for a job in programming and network automation. What is a characteristic of GitHub ? A. It is an application that can interact with APIs using a console-based approach and allows various data types and formats to interact with REST-based APIs. B. It is a hosted web-based repository that uses version control for storing and sharing code. C. It is an acronym that describes functions that most applications or databases use to store or alter data. D. It is a data format that stores all of its information in key/value pairs and surrounds each object with curly braces. None 20. A student is studying in preparation for an interview for a job in programming and network automation. What is a characteristic of CRUD ? A. It is a data model that describes what can be configured, monitored, executed, and reset on a device. B. It is a markup programming language. C. It is a free online tool that can check the format of programmed files to verify that they have valid syntax. D. It is an acronym that describes functions that most applications or databases use to store or alter data. None 21. What is JSON? A. It is a database. B. It is a compiled programming language. C. It is a data format for storing and transporting data. D. It is a scripting language. None 22. A student is studying in preparation for an interview for a job in programming and network automation. What is a characteristic of SaltStack SSH ? A. It is a programming interface that takes changes made to the management software and pushes the changes down to the individual devices. B. It is an acronym that describes functions that most applications or databases use to store or alter data. C. It is a programming interface that communicates from a network controller to its management software. D. It is an agentless option of a configuration management tool that allows users to run commands without having to install an agent on the remote device or node. None 23. A student is studying in preparation for an interview for a job in programming and network automation. What is a characteristic of Puppet ? A. It is a free online tool that can check the format of programmed files to verify that they have valid syntax. B. It is a configuration management and automation tool with a downloadable Cisco module to support Cisco devices. C. It is a hosted web-based repository that uses version control for storing and sharing code. D. It is a markup programming language. None 24. A company recently decided to use RESTCONF instead of NETCONF and many of their NETCONF scripts contain the operation(operation="create"). Which RESTCONF operation must be used to replace these statements? A. POST B. GET C. PUT D. CREATE None 25. What are two benefits of YANG? (Choose two.) A. It enables multiple leaf statements to exist within a leaf list B. It collects statistical constraint analysis information. C. It enforces configuration constraints. D. It enforces configuration semantics. E. It enforces the use of a specific encoding format for NETCONF None 26. Refer to the exhibit. POSTMAN is showing an attempt to retrieve network device information from Cisco DNA Center API. What is the issue? A. The URI string is incorrect B. The token has expired. C. Authentication has failed. D. The JSON payload contains the incorrect UUID None 27. What is one difference between SaltStack and Ansible? A. SaltStack uses the Ansible agent on the box, whereas Ansible uses a Telnet server on the box. B. SaltStack uses an API proxy agent to program Cisco boxes in agent mode, whereas Ansible uses a Telnet connection C. SaltStack uses SSH to interact with Cisco devices, whereas Ansible uses an event bus. D. SaltStack is constructed with minion, whereas Ansible is constructed with YAML. None 28. What is a characteristic of YANG? A. It is a Cisco proprietary language that models NETCONF data B. It allows model developers to create custom data types C. It structures data in an object-oriented fashion to promote model reuse D. It provides loops and conditionals to control now within models None 29. At which Layer does Cisco DNA Center support REST controls? A. EEM applets or scripts B. Session layer C. YMAL output from responses to API calls D. Northbound APIs None 30. Which line must be added in the Python function to return the JSON object {"cat_9k": "FXS193202SE")? A. return (json.dumps({d['hostname']: d['serialNumber'] for d in json.loads(test_json)['response']})) B. return (json.dumps({for d in json.loads(test_json)['response']: d['hostname']: d['serialNumber']})) C. return (json.loads({d['hostname']: d['serialNumber'] for d in json.dumps(test_json)['response'})) D. return (json.loads({for d in json.dumps(test_json)['response']: d['hostname']: d['serialNumber']})) None 31. Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually? A. event manager applet ondemand event register action 1.0 syslog priority critical msg 'This is a message from ondemand' B. event manager applet ondemand event manual action 1.0 syslog priority critical msg 'This is a message from ondemand' C. event manager applet ondemand event none action 1.0 syslog priority critical msg 'This is a message from ondemand' D. event manager applet ondemand action 1.0 syslog priority critical msg 'This is a message from ondemand' None 32. Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error? A. from ncclient import manager B. import manager C. from ncclient import * D. ncclient manager import None 33. What does the Cisco DNA REST response Indicate? A. Cisco DNA Center has the incorrect credentials for cat3850-1 B. Cisco DNA Center Is unable to communicate with cat9000-1 C. Cisco DNA Center has the incorrect credentials for cat9000-1 D. Cisco DNA Center has the Incorrect credentials for RouterASR-1 None 34. "HTTP/1.1 204 No Content" is returned when the curl -i -X DELETE command is issued. Which situation has occurred? A. The object could not be located at the URI path. B. The command succeeded in deleting the object. C. The object was located at the URI, but it could not be deleted. D. The URI was invalid. None 35. What is the output of this code? A. username: cisco B. get_credentials C. username D. cisco None 36. Which characteristic distinguishes Ansible from Chef? A. Ansible lacs redundancy support for the master server. Chef runs two masters in an active/active mode. B. Ansible uses Ruby to manage configurations. Chef uses YAML to manage configurations. C. Ansible pushes the configuration to the client. Chef client pulls the configuration from the server. D. The Ansible server can run on Linux, Unix or Windows. The Chef server must run on Linux or Unix. None 37. Refer to the exhibit. The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use? A. event manager applet EEM_IP_SLA event track 10 state down B. event manager applet EEM_IP_SLA event track 10 state unreachable C. event manager applet EEM_IP_SLA event sla 10 state unreachable D. event manager applet EEM_IP_SLA event sla 10 state down None 38. Which HTTP code must be returned to prevent the script form exiting? A. 200 B. 201 C. 300 D. 301 None 39. Which protocol does REST API rely on to secure the communication channel? A. TCP B. HTTPS C. SSH D. HTTP None 40. Refer to the exhibit. What does the snippet of code achieve? A. It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls. B. It opens a tunnel and encapsulates the login information, if the host key is correct. C. It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context. D. It creates an SSH connection using the SSH key that is stored, and the password is ignored None 41. Refer to the exhibit. What is the JSON syntax that is formed from the data? A. Name: Bob, Johson, Age: 75, Alive: true, Favourite Foods. [Cereal, ''Mustard'', ''Onions}} B. Name'', ''Bob'' Johson'', ''Age'', 75, ''Alive'', true, ''favourite Foods'', [''Cereal, ''Mustard'', Onions''}} C. {"Name": "Bob Johnson", "Age": 75, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]} D. Name''. ''Bob Johson'', ''Age'': Seventyfive, ''Alive'' true, ''favourite Foods'' ,[Cereal'' ''Mustard'' ''Onions''}} None 42. An engineer runs the code against an API of Cisco DMA Center, and the platform returns this output What does the response indicate? A. The authentication credentials are incorrect. B. The URl string is incorrect. C. The Cisco DNA Center API port is incorrect. D. The HTTP method is incorrect. None 43. Which JSON syntax is valid? A. {"switch": "name": "dist1", "interfaces": ["gig1", "gig2", "gig3"]} B. {/"switch/": {/"name/": "dist1", /"interfaces/": ["gig1", "gig2", "gig3"]}} C. {"switch": {"name": "dist1", "interfaces": ["gig1", "gig2", "gig3"]}} D. {`switch': (`name': `dist1', `interfaces': [`gig1', `gig2', `gig3'])} None 44. What is a benefit of data modeling languages like YANG? A. They enable programmers to change or write their own application within the device operating system. B. They create more secure and efficient SNMP OIDs. C. They make the CLI simpler and more efficient. D. They provide a standardized data structure, which results in configuration scalability and consistency. None 45. Which two items are found in YANG data models? (Choose two.) A. HTTP return codes B. rpc statements C. JSON schema D. container statements E. XML schema 46. Refer to the exhibit. Which JSON syntax is derived from this data? A. {[{'First Name': 'Johnny', 'Last Name': 'Table', 'Hobbies': ['Running', 'Video games']}, {'First Name': 'Billy','Last Name': 'Smith', 'Hobbies': ['Napping', 'Reading']}]} B. {'Person': [{'First Name': 'Johnny', 'Last Name': 'Table', 'Hobbies': 'Running', 'Video games'}, {'First Name': 'Billy', 'Last Name': 'Smith', 'Hobbies': 'Napping', 'Reading'}]} C. {[{'First Name': 'Johnny', 'Last Name': 'Table', 'Hobbies': 'Running', 'Hobbies': 'Video games'}, {'First Name': 'Billy', 'Last Name': 'Smith', 'Hobbies': 'Napping', 'Reading'}]} D. {'Person': [{'First Name': 'Johnny', 'Last Name': 'Table', 'Hobbies': ['Running', 'Video games']}, {'First Name': 'Billy', 'Last Name': 'Smith', 'Hobbies': ['Napping', 'Reading']}]} None 47. What is the result of this Python code? >>> (3 * 5) % 2 A. 1 B. 0 C. 7 D. 7.5 None 48. An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use? A. action 1 syslog msg "OSPF ROUTING ERROR" B. action 1 syslog send "OSPF ROUTING ERROR" C. action 1 syslog pattern "OSPF ROUTING ERROR" D. action 1syslog write "OSPF ROUTING ERROR" None 49. Which protocol infers that a YANG data model is being used? A. SNMP B. NX-API C. REST D. RESTCONF None 50. What is the structure of a JSON web token? A. three parts separated by dots: header payload, and signature B. header and payload C. three parts separated by dots: version header and signature D. payload and signature None 51. Refer to the exhibit. After running the code in the exhibit. Which step reduces the amount of data that NETCONF server returns to the NETCONF client, to only the interface's configuration? A. Use the txml library to parse the data returned by the NETCONF server for the interface's configuration. B. Create an XML filter as a string and pass it to get_config() method as an argument. C. Create a JSON filter as a string and pass it to the get_config() method as an argument. D. Use the JSON library to parse the data returned by the NFTCONF server for the interface's configuration. None 52. Which outcome is achieved with this Python code? client.connect (ip, port= 22, username= usr, password= pswd ) stdin, stdout, stderr = client.exec_command ( 'show ip bgp 192.168.101.0 bestpath\n ' ) print (stdout) A. connects to a Cisco device using SSH and exports the routing table information B. displays the output of the show command in a formatted way C. connects to a Cisco device using SSH and exports the BGP table for the prefix D. connects to a Cisco device using Telnet and exports the routing table information None 53. What does a northbound API accomplish? A. programmatic control of abstracted network resources through a centralized controller B. access to controlled network resources from a centralized node C. communication between SDN controllers and physical switches D. controlled access to switches from automated security applications None 54. How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API? A. Add a timestamp to the request In the API header. B. Use a password hash C. Add OAuth to the request in the API header. D. UseHTTPS None 55. An engineer must export the contents of the devices object in JSON format. Which statement must be used? A. json.repr(Devices) B. json.dumps(Devices) C. json.prints(Devices) D. json.loads(Devices) None 56. Which Python code snippet must be added to the script to save the returned configuration as a JSONformatted file? A. with open("ifaces.json", "w") as OutFile: OutFile.write(Response.text) B. with open("ifaces.json", "w") as OutFile: OutFile.write(Response.json()) C. with open("ifaces.json", "w") as OutFile: JSONResponse = json.loads(Response.text) OutFile.write(JSONResponse) D. with open("ifaces.json", "w") as OutFile: OutFile.write(Response) None 57. What is YANG used for? A. scraping data via CLI B. processing SNMP read-only polls C. describing data models D. providing a transport for network configuration data between client and server None 58. Why would an engineer use YANG? A. to transport data between a controller and a network device B. to access data using SNMP C. to model data for NETCONF D. to translate JSON into an equivalent XML syntax None 59. Refer to the exhibit. Running the script causes the output in the exhibit. What should be the first line of the script? A. from ncclient import manager B. import manager C. from ncclient import * D. ncclient manager import None 60. Refer to the exhibit. Which result does the python code achieve? A. The code encrypts a base64 decrypted password. B. The code converts time to the "year/month/day" time format. C. The code converts time to the yyyymmdd representation D. The code converts time to the Epoch LINUX time format. None 61. Which two characteristics define the Intent API provided by Cisco DNA Center? (Choose two.) A. northbound API B. business outcome oriented C. device-oriented D. southbound API E. procedural 62. Refer to the exhibit. Which code results in the working python script displaying a list of network devices from the Cisco DNA center? A. network_device_list(dnac["host"], dnac["username"],dnac["password"]) login = dnac_login(dnac) print(dnac_devices) B. login = dnac_login(dnac["host"], dnac["username"], dnac["password"]) network_device_list(dnac, login) print(dnac_devices) C. login = dnac_login(dnac["host"], dnac["username"], dnac["password"]) network_device_list(dnac, login) for item in dnac_devices: print(dnac_devices.item) D. network_device_list(dnac["host"], dnac["username"], dnac["password"]) login = dnac_login(dnac) for item in dnac_devices: print(dnac_devices.item) None 63. Refer to the exhibit. What is the result of the API request? A. The "params" variable sends data fields to the network appliance. B. The native interface information is read from the network appliance. C. The Information for all interfaces is read from the network appliance. D. The "params" variable reads data fields from the network appliance None 64. Which definition describes JWT in regard to REST API security? A. an encrypted JSON token that is used for authentication B. an encrypted JSON token that is used for authorization C. an encoded JSON token that is used to securely exchange information D. an encoded JSON token that is used for authentication None 65. What is one benefit of adopting a data modeling language? A. augmenting management process using vendor centric actions around models B. refactoring vendor and platform specific configurations with widely compatible configurations C. augmenting the use of management protocols like SNMP for status subscriptions D. deploying machine-friendly codes to manage a high number of devices None 66. Refer to the exhibit. After the code is run on a Cisco IOS-XE router, the response code is 204. What is the result of the script? A. The configuration fails because another interface is already configured with IP address 10.10.10.1/24. B. The configuration fails because interface GigabitEthernet2 is missing on the target device. C. The configuration is successfully sent to the device in cleartext. D. Interface GigabitEthernet2 is configured with IP address 10.10.10.1/24 None 67. Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session? A. HTTP Status Code 200 B. HTTP Status Code 302 C. HTTP Status Code 401 D. HTTP Status Code: 504 None 68. What do Cisco DNA southbound APIs provide? A. Interface between the controller and the network devices B. NETCONF API interface for orchestration communication C. RESful API interface for orchestrator communication D. Interface between the controller and the consumer None 69. What is a characteristic of Cisco DNA Northbound APIs? A. They simplify the management of network infrastructure devices. B. They enable automation of network infrastructure based on intent. C. They utilize RESTCONF D. They utilize multivendor support APIs. None 70. How does NETCONF YANG represent data structures? A. as strict data structures denned by RFC 6020 B. in an XML tree format C. in an HTML format D. as modules within a tree None 71. A Cisco DNA Center REST API sends a PUT to the /dna/intent/api/v1/network-device endpoint A response code of 504 is received What does the code indicate? A. The response timed out based on a configured interval B. The user does not have authorization to access this endpoint. C. The username and password are not correct D. The web server is not available None 72. What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object? A. SSH B. HTTPS C. JWT D. TLS None 73. An administrator is configuring NETCONF using the following XML string. What must the administrator end the request with? A. ]]>]]> B. C. D. None 74. What is a command-line tool for consuming REST APIs? A. Python requests B. Postman C. cURL D. Firefox None 75. Which free application has the ability to make REST calls against Cisco DNA Center? A. API Explorer B. REST Explorer C. Postman D. Mozilla None 76. A company recently decided to use RESTCONF instead of NETCONF and many of their NETCONF scripts contain the operation (operation="create"). Which RESTCONF operation must be used to replace these statements? A. POST B. GET C. PUT D. CREATE None 77. A network administrator is preparing a Python scrip to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running. Which operation of he in client manager prevent colleague making changes to the device while the scrip is running? A. m.lock(config='running') B. m.lock(target='running') C. m.freeze(target='running') D. m.freeze(config='running') None 78. Which JSON script is properly formatted? A. Option A B. Option B C. Option C D. Option D None 79. Which language defines the structure or modelling of data for NETCONF and RESTCONF? A. YAM B. YANG C. JSON D. XML None 80. What does a YANG model provide? A. standardized data structure independent of the transport protocols B. creation of transport protocols and their interaction with the OS C. user access to interact directly with the CLI of the device to receive or modify network configurations D. standardized data structure that can be used only with NETCONF or RESTCONF transport protocols None 81. What does the Cisco DNA Center Authentication API provide? A. list of global issues that are logged in Cisco DNA Center B. access token to make calls to Cisco DNA Center C. list of VLAN names D. dent health status None 82. Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on device with similar network settings? A. Command Runner B. Template Editor C. Application Policies D. Authentication Template None 83. Refer to the exhibit. Which action results from executing the Python script? A. display the output of a command that is entered on that device in a single line B. SSH to the IP address that is manually entered on that device C. display the output of a command that is entered on that device D. display the unformatted output of a command that is entered on that device None 84. Refer to the exhibit. What is achieved by the XML code? A. It reads the access list sequence numbers from the output of the show ip access-list extended flp command into a dictionary list. B. It displays the output of the show ip access-list extended flp command on the terminal screen C. It displays the access list sequence numbers from the output of the show Ip access-list extended flp command on the terminal screen D. It reads the output of the show ip access-list extended flp command into a dictionary list. None 85. In Cisco DNA Center, what is the integration API? A. southbound consumer-facing RESTful API. which enables network discovery and configuration management B. westbound interface, which allows the exchange of data to be used by ITSM. IPAM and reporting C. an interface between the controller and the network devices, which enables network discovery and configuration management D. northbound consumer-facing RESTful API, which enables network discovery and configuration management None 86. Refer to the exhibit. Why was the response code generated? A. The resource was unreachable. B. Access was denied based on the user permissions. C. Access was denied based on the credentials. D. The resource is no longer available on the server. None 87. What is one method for achieving REST API security? A. using a combination of XML encryption and XML signatures B. using HTTPS and TLS encryption C. using a MDS hash to verify the integrity D. using built-in protocols known as Web Services Security None 88. A script contains the statement "while loop != 999:". Which value terminates the loop? A. A value less then or equal to 999 B. A value greater then or equal to 999 C. A value not equal to 999 D. A value equal to 999 None 89. Refer to me exhibit. The NETCONF object is sent to a Cisco IOS XE switch. What is me purpose of the object? A. View the configuration of all GigabitEthernet interfaces B. Discover the IP address of interface GigabitEthernet1 C. Set the description of interface GigabitEthernet1 to "1" D. Remove the IP address from interface GigabitEthernet1 None 90. Refer to the exhibit. What is achieved by this Python script? A. It counts JSON data from a website. B. It loads JSON data into an HTTP request C. It reads JSON data into a formatted list. D. It converts JSON data to an HTML document. None 91. What do Chef and Ansible have in common? A. They rely on a declarative approach. B. They rely on a procedural approach. C. They use YAML as their primary configuration syntax. D. They are clientless architectures. None 92. Which there application has the ability to make REST calls against Cisco DNA Center? A. API Explorer B. REST Explorer C. Postman D. Mozilla None 93. What is one characteristic of Cisco DNA Center and vManage northbound APIs? A. They push configuration changes down to devices. B. They implement the RESTCONF protocol. C. They exchange XML-formatted content. D. They implement the NETCONF protocol. None 94. Where in Cisco DNA Center is documentation of each API call, organized by its functional area? A. Developer Toolkit B. platform management C. platform bundles D. Runtime Dashboard None 95. What is the purpose of a data modeling language? A. to describe the structure and meaning of exchanged data B. to standardize the procedures that are executed when parsing sent and received data C. to establish a framework to process data by using an object-oriented programming approach D. to specify the rules for transcoding between text and binary data encodings None 96. Which Python library is used to work with YANG data models via NETCONF? A. Postman B. requests C. nccllent D. cURL None 97. Which security measure mitigates a man-in-the-middle attack of a REST API? A. SSL certificates B. biometric authentication C. password hash D. non repudiotion feature None 98. Refer to the exhibit. Which statement is needed to complete the EEM applet and use the Tel script to store the backup file? A. action 2.0 cli command "write_backup.tcl tcl" B. action 2.0 cli command "flash:write_backup.tcl" C. action 2.0 cli command "write_backup.tcl" D. action 2.0 cli command "telsh flash:write_backup.tcl" None 99. Which method ensures the confidentiality of data exchanged over a REST API? A. Use the POST method instead of URL-encoded GET to pass parameters. B. Encode sensitive data using Base64 encoding. C. Deploy digest-based authentication to protect the access to the API. D. Use TLS to secure the underlying HTTP session. None 100. What is a benefit of YANG modules? A. tightly coupled models with encoding to improve performance B. easier multivendor interoperability provided by common or industry models C. avoidance of ecosystem fragmentation by having fixed that cannot be changed D. single protocol and model couple to simplify maintenance and supported None 101. What are two characteristics of vManage APIs? (Choose two.) A. Southbound API is based on OMP and DTLS. B. Northbound API is RESTful, using JSON. C. Northbound API is based on RESTCONF and JSON. D. Southbound API is based on NETCONF and XML E. Southbound API is based on RESTCONF and JSON. 102. Refer to the exhibit. An engineer deploys a script to retrieve the running configuration from a NETCONF- capable Cisco IOS XE device that is configured with default settings. The script fails. Which configuration must be applied to retrieve the configuration using NETCONF? A. Print (netconf_host.get_config('show running'!) B. hostkey_verify=True, C. device_params={name':'ios-xe'}) D. port=830 None 103. To which category does a REST API that has been developed for IP address management integration belong? A. southbound B. eastbound C. northbound D. westbound None 104. Why are stateless calls executed by REST API useful in cloud applications? A. They control URL decoding. B. They rely on data stored on the server for calls C. They use HTTPS to implement all calls. D. They are easy to redeploy and to scale None 105. Refer to the exhibit. What is achieved when this Python script is executed? A. Each device that is looped through in the devices.txt file is put into its own list that is appended to the parent dictionary. B. Each device that is looped through in the devices.txt file is put into its own dictionary that is appended to the parent list. C. All devices that are looped through in the devices.txt file are put into a list that is appended to the parent dictionary. D. All devices that are looped through in the devices.txt file are put into a single dictionary that is appended to the parent list. None 106. What is a common trait between Ansible and Chef? A. Both are used for mutable infrastructure B. Both rely on a declarative approach. C. Both rely on NETCONF. D. Both require a client to be installed on hosts. None 107. Which security feature does stateless authentication and authorization use for REST API calls? A. OAuth 2 token B. API keys C. SSL/TLS certificate encryption D. Cookie-based session authentication None 108. Refer to the exhibit. What is achieved by this Python script? A. It reads access list statements into a dictionary list. B. It displays access list statements on a terminal screen. C. It configures access list statements. D. It converts access list statements to a human-readable format. None 109. Which requirement for an Ansible-managed node is true? A. It must be a Linux server or a Cisco device. B. It must have an SSH server running. C. It must support ad hoc commands. D. It must have an Ansible Tower installed. None 110. A response code of 404 is received while using the REST API on Cisco UNA Center to POST to this URI. /dna/intent/api/v1 /template-programmer/project. What does the code mean? A. The client made a request a resource that does not exist B. The server has not implemented the functionality that is needed to fulfill the request. C. The request accepted for processing, but the processing was not completed. D. The POST/PUT request was fulfilled and a new resource was created, Information about the resource is in the response body. None 111. What is the structure of a JSON web token? A. three parts separated by dots header payload, and signature B. header and payload C. three parts separated by dots version header and signature D. payload and signature None 112. Which statement about agent-based versus agentless configuration management tools is true? A. Agentless tools require no messaging systems between master and slaves. B. Agentless tools use proxy nodes to interface with slave nodes. C. Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave nodes. D. Agent-based tools do not require installation of additional software packages on the slave nodes. None 113. What does this EEM applet event accomplish? "event snmp oid 1.3.6.1.3.7.1.5.1.2.4.2.9 get-type next entry-op g entry-val 75 poll-interval 5" A. It issues email when the value is greater than 75% for five polling cycles. B. It reads an SNMP variable, and when the value exceeds 75%, it triggers an action C. It presents a SNMP variable that can be interrogated. D. Upon the value reaching 75%, a SNMP event is generated and sent to the trap server. None 114. Which two protocols are used with YANG data models? (Choose two.) A. HTTPS B. SSH C. RESTCONF D. TLS E. NFTCONF 115. Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session? A. HTTP Status Code: 200 B. HTTP Status Code: 302 C. HTTP Status Code: 401 D. HTTP Status Code: 504 None 116. Refer to the exhibit. An engineer is using XML in an application to send information to a RESTCONF-enabled device. After sending the request, the engineer gets this response message and an HTTP response code of 400. What do these responses tell the engineer? A. The Accept header sent was application/xml B. POST was used instead of PUT to update C. The Content-Type header sent was application/xml. D. JSON body was used None 117. What is a difference between Chef and other automation tools? A. Chef is an agentless tool that uses playbooks, and Ansible is an agent-based tool that uses cookbooks. B. Chef is an agentless tool that uses a primary/minion architecture, and SaltStack is an agent-based tool that uses a primary/secondary architecture C. Chef is an agent-based tool that uses cookbooks, and Ansible is an agentless tool that uses playbooks. D. Chef uses Domain Specific Language, and Puppet uses Ruby. None 118. How is OAuth framework used in REST API? A. as a framework to hash the security information in the REST URL B. by providing the external application a token that authorizes access to the account C. as a framework to hide the security information in the REST URL D. by providing the user credentials to the external application None 119. What is a characteristic of Cisco DNA southbound APIs? A. implements monitoring by using the SOAP protocol B. enables orchestration and automation of network devices based on intent C. utilizes REST API D. simplifies management of network devices None 120. Refer to the exhibit. What does the Python code accomplish? A. It configures interface e1/32 to be in an admin down state B. It generates a status code of 403 because the type is incorrect. C. It configures interface e1/32 to be in an err-disable state. D. It returns data in JSON-RPC format. None 121. Refer to the exhibit. Which action must be performed to allow RESTCONF access to the device? A. Enable the NETCONF service. B. Enable the SSH service. C. Enable the IOX service. D. Enable the HTTPS service. None 122. Refer to the exhibit. Which network script automation option or tool is used in the exhibit? A. EEM B. Bash script C. REST correct D. NETCONF E. Python None 123. Which data modeling language is commonly used by NETCONF? A. REST B. YANG C. HTML D. XML None 124. What are two characteristics of vManage APIs? (Choose two.) A. Southbound API is based on OMP and DTLS. B. Northbound API is RESTful, using JSON C. Northbound API is based on RESTCONF and JSON. D. Southbound API is based on NETCONF and XML. E. Southbound API is based on RESTCONF and JSON. 1 out of 124 Time's up