DevNet Associate (Version 1.0) - Final Exam Answers
DevNet Associate (Version 1.0) - Final Exam Answers
0 Final exam
Answers
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question
to find that question/answer. If the question is not here, find it in Questions Bank.
NOTE: If you have the new question on this test, please comment Question and
Multiple-Choice list in form below this article. We will update answers for you in the
shortest time. Thank you! We truly value your contribution to the website.
Explanation: Layer 4 port numbers identify the application or service which will handle the
data. The source port number is added by the sending device and will be the destination
port number when the requested information is returned. Layer 4 segments are
encapsulated within IP packets. UDP, not TCP, is used when low overhead is needed. A
source IP address, not a TCP source port number, identifies the sending host on the
network. Destination port numbers are specific ports that a server application or service
monitors for requests.
4. What type of attack targets an SQL database using the input field of a user?
buffer overflow
SQL injection
Cross site scripting
XML injection
Explanation: A criminal can insert a malicious SQL statement in an entry field on a website
where the system does not filter the user input correctly.
5. Which command can be used on Linux and MAC hosts to get IP addressing
information?
ipconfig
ip address
ifconfig
networksetup -getinfo
6. What are two reasons a network administrator would segment a network with a Layer 2
switch? (Choose two.)
to create fewer collision domains
to create more broadcast domains
to enhance user bandwidth
to isolale ARP request messages from the rest of the network
to eliminate virtual circuits
to isolate traffic between segments
Explanation: VLANs create logical broadcast domains that can span multiple VLAN
segments. Ethernet frames that are sent by a device on a specific VLAN can only be seen
by other devices in the same VLAN.
10. Which piece of software is responsible for creating and managing virtual machines,
including allocating system resources to each virtual machine as needed?
supervisor
hypervisor
host operating system
hosted operating system
11. How is an Ethernet MAC address constructed?
The first 3 bytes represent the network upon which the host resides, and the last 3 bytes
uniquely identify the host.
The first 3 bytes represent the vendor OUI, and the last 3 bytes are assigned
uniquely by the vendor
The first 3 bytes are uniquely assigned by LANA, and the last 3 bytes represent the serial
number of the host
The first 3 byles represent the vendor OUI, and the last 3 byles are assigned randorily by
the operating system.
12. Which Cisco SDK works with ACI?
Cobra
IMC
UCS
Instant Connect
13. What platforms are provided by DevNet for community members to share solutions,
tool kits, and other resources with each other?
communities
forums
sandboxes
exchanges
14. Which two data formats can RESTCON use when requesting data or responding with
data? (Choose two.)
JSON
XML
YAML
YANG
HTML
15. Which DevNet resource would a developer use to look for a Python library that
supports APIs for a specific Cisco product?
DevNet Learning Labs
Devlet Support
Code Exchange
DevNet Sandbox
16. A component was created with the intent of combining the disciplines and skills of
Dev and Ops. This component created a new job role and implemented a best practices
playbook for doing Ops with software methods. Which component matches this
description?
Agile Infrastructure and Operations
the SRE approach
automated infrastructure
shared Version control
17. Match the DevNet exhange type with the decription.
code – uses the GitHub API and human moderators to categorize and display related
repositories
ecosystem – provides solutions across different technologies, industries, and geographies
to jump start solution design and development
automation exchange – a collection of network automation use cases with different
solutions and toolkits
18. Refer to the exhibit. A user is working on Ansible on the local NMS to manage remote
network devices. Which file is the user creating?
service
playbook
variable
hosts
19. Which DevNet resource would a developer use in order to test custom code in a
production-like environment?
Devlet Support
DevNet Learning Labs
Code Exchange
DevNet Sandbox
20. In which situation would a company implement a reverse proxy as a security
solution?
when the company has a database and needs to point to a DNS server that uses different
IP addresses for development resources
when the company wants all responses to clients to look like they came from the
same server instead of individual ones
when a hash is created based on the IP address of the request to a particular protected
server
when responses frorri servers need to be sent over different paths to ensure quality
response time to the client devices making the requests
21. A software development company specializes in being able to use whatever software
development method their customer wants to use. One customer company wants to use
the Agile method. What is a characteristic of this method?
a software development process that prioritizes responding to change over
following a plan
a software development method that tracks closely with the software development life
cycle
a process that was developed for manufacturing, but adapted to other industries
a more traditional sollware developical procGSs as they have used this proCESS ini past
projects
22. A network engineer is creating a Docker container using the docker build command.
If the engineer does not specify a tag, which tag will be used by default?
tag
latest
(a blank space)
default
23. Which component in the pyATS ecology handles bundling and running jobs?
AEtest
Clover
Genie
EasyPy
24. Which three avenues are available within DevNet for developers who need help with
specific developer scenario questions concerning Cisco products? (Choose three.)
logging a ticket
posting to the DevNet zone
posting to a news group
posting to a community forum
posting to a Webex Teams space
posting on the Cisco Learning Network
25. A student who is interested in network programmability approaches an instructor for
advice on learning more about the subject. The student is a kinesthetic learner who
learns by doing. Which DevNet resource should the instructor consider telling the
student about?
DevNet Create
DevNet Learning Labs
DevNet Express
DevNet Zone
26. What is the default shell commonly used on macOS and Linux?
tcsh
csh
Bourne
Bash
27. What is immutable infrastructure in DevOps?
infrastructure that is deployed with all component versions locked except for the ability to
perform manual configuration changes
infrastructure that is only deployed and maintained in containers
infrastructure that is entirely maintained and deployed in code and never subjected
to manual changes
virtualized infrastructure that is deployed as golden images
28. What is the most common cause of IT outages?
an engineer misconfiguring a device or network with manual changes
an experienced engineer using an open source product
an experienced engineer implementing a configuration using automation
a threat actor largeting the enterprise equipment
29. Which string of characters is used to identify the beginning of a new separate
document when multiple documents are in a single YAML file?
three slashes “///”
three dots “…”
three pound signs “###”
three dashes “—“
30. What is the difference between functions and methods in the Python programming
structure?
Functions can use global variables whereas methods can only use local variables.
Functions are called by a referencing object whereas methods are called by the names.
Functions can pass arguments whereas methods can pass only predefined keywords.
Functions are standalone code blocks whereas methods are code blocks associated
with an object.
31. Which command is used to create a new Git repository?
git init
git add
git commit
git clone
32. Which stakeholder determines the useful value of software product features in the
Lean process?
the customer
the Scrum master
the reviewer
the programmer
33. Match the SDLC phase with its description. (Not all options are used.)
q33.PNG
requirements & analysis —> code is installed into a testing environment to look for bugs
implementation –> code is developed according to low level and high level design documents
deployment –> software is installed into the production environment
34. What is a principle of the Lean software development model?
adding additional product features that the customer did not ask for so that the customer is
getting more than expected
assigning resources to multiple projects so that effort can be divided on more than one
task at a time
making decisions as late as possible in the process so that more facts and details
are available
ordering workers to do tasks they may not want to do to ensure they get done
35. What character is used to separate the key and value pairs in YAML?
colon :
semi colon ;
underscore _
forward slash /
36. Which git command is used to compare changes between files?
git diff
git merge
git checkout
git status
37. Refer to the exhibit. Match the missing components of the Python script for
authenticating to the Cisco Network Services Orchestrator and obtaining a list of network
devices using the username of “superadmin” and password of “soverysecure!”. (Not all
options are used.)
38. What is an example of a use supported by Cisco UCS Director and UCS Manager?
bare metal server provisioning and monitoring of virtual environments
call center and call management over IP networks
underlying central system workflow management and migration
telemetry data collection and analysis
39. How can a Webex Teams administrator retrieve additional details about a user
through an API call?
by using the value of the organization name in the API call
by using the value of a Webex Teams registered email address in the API call
by using the value of the person id key in the API call
by using the value of orgld in the API call
40. Which library is the most commonly used Python library for connecting NETCONF
clients with a NETCONF server?
posix
pyclient
ncclient
pypi
41. Refer to the exhibit. Match the missing components of the Python script for
authenticating to the Cisco DNA Center and obtaining an authentication token using the
username of “adminuser” and password of “Sup3rC1$c0”. (Not all options are used.)
q41.PNG
42. Refer to the exhibit. Match the missing components to the Python script for
authenticating to the Cisco DNA Center and obtaining a token using the username of
“secureuser” and password of “C1$c0”. (Not all options are used.)
Component1 = C1$c0
Component2 = password
Component3 = token
43. Refer to the exhibit. Match the missing components of the Python script for the
following tasks. (Not all options are used.)
Component 1 – delete
Component 2 – create
Component 3 – groups
Component 4 – text
44. Which two APIs allow for Cisco Meraki device provisioning and real-time
notifications? (Choose two.)
Webhook API
Investigation API
Dashboard API
Enforcement API
Reporting API
45. A packet is received by a server. The packet has a destination port number of 443.
What protocol or service is requested?
HTTP
NTP
DHCP
HTTPS
46. When thinking about the functional planes of a network, what is unique about the
data plane?
It includes protocols used to remotely access network devices.
It includes the SSH protocol.
It manipulates data and outputs it in the XML format.
It is responsible for the switching of packets in hardware.
47. What is a characteristic of the continuous integration component of the CI/CD
philosophy for software development?
Code changes are continually merged with the main branch of the application, so
change sets are small.
Code changes are tested and integrated with the main branch then tested again before
they are deployed into production.
Code is constantly deployed into production where users serve as the final testers.
Application development is performed in short sprints so that enough code is always in a
deployable state.
48. Which Docker component defines the steps needed to create an image that can be
deployed in a variety of environments?
UnionFS
Dockerfile
cross-site script
namespaces
49. Which three statements describe characteristics of a virtual machine? (Choose three.)
It is created and deployed using the Docker format.
It includes a guest operating system.
It runs on top of a hypervisor
It shares the operating system of the host computer.
It is completely self contained with its own emulated storage, memory, and network
interfaces.
It requires Windows as the host operating system.
50. Match the use cases of a load balancer to the description. (Not all options are used.)
round robin – sends requests to the next server on the list
blue-green – sends traffic to a new environment, but keeps the old environment ready in case of
issues
canary – diverts a small amount of traffic to a new production environment that is changed
(Empty) – sends requests to the next server on diverts a small amount of traffic to a new
production environment that is changed
(Empty) – sends requests to the server that is least busy
51. What are two characteristics of the staging environment of the four-tier deployment
environment structure? (Choose two.)
It is the point where code has been tested multiple times and is error free.
It is structured as close as possible to the actual production environment.
It is where the code undergoes final acceptance testing in a realistic environment.
It is where end users will interact with the code.
It often includes automated testing tools such as Jenkins, CircleCl, or Travis Cl.
52. Refer to the exhibit. A network engineer has created a Jenkins pipeline. Which menu
option would the engineer use to run the pipeline?
Configure
Changes
Build Now
Workspace
53. A network engineer is configuring a Jenkins job and finishing with the following
script in order to trigger the build:
What is the purpose of the preparation stage?
It makes sure that any previous instances of a particular Docker container are
stopped and removed.
It catches and removes any errors.
It runs the SUCCESS Docker container.
It places a log of any errors in the SUCCESS file.
54. Which technique is used to make the output of password hashing nondeterministic?
password length and complexity
multifactor authentication
password salting
password strength validation tools
55. What does self-service refer to in the context of enterprise IT?
imaging frequently used server configurations for rapid deployment
distributing and implementing broad access to public cloud infrastructure-as-a-
service services
mainstreamed processes that promote a lower IT headcount by implementing automation
automated tools and methods that deliver preconfigured developer platforms on demand
56. Which statement describes the term orchestration in IT automation?
Orchestration is aimed at managing workload lifecycles and reacting dynamically to
changing conditions in order to optimize processes.
Orchestration is the process of preparing a server through the installation of libraries or
daemons.
Orchestration is the building, arranging, integration, and preparation of multi-component
applications across multiple nodes.
Orchestration is the obtaining and provisioning of compute, storage, and network
infrastructure.
57. What is an example of a read-only automation solution?
streamlining the management of L3 firewall rules in Cisco Meraki networks
gathering SD-WAN inventory data using Python and recording the values in a database
simplifying the automation of network device authentication, configuration, and
consistency
gathering the current list of ACL entries on an IOS XE router and enforcing consistency
58. A student is setting up the CSR1000v VM in VirtualBox that is already installed on the
local computer. The VM is imported to the VirtualBox and starts successfully. The student
tries to verify communications to the CSR1000v VM by opening the Firefox web browser
on the local computer and enters the URL https://192.168.56.101 . A security message
“Warning: Potential Security Risk Ahead” appears. What is the security issue that results
in this message?
The SSL/TLS certificate uses a public key size of less than 1024 bits.
The SSL/TLS certificate is self-signed by the router.
The CA for the SSL/TLS certificate cannot be reached.
The traffic to the VM is not encrypted.
59. How do APIs affect traditional IT tasks?
They are used to replace network infrastructure and implement network virtualization.
They are used to eliminate repetitive manual tasks and replace them with
automation.
They are used to increase computer processing speed and lower power consumption.
They are used to increase hardware speed and lower power consumption.
60. Refer to the exhibit. PC1 needs to resolve the host name of the web server into an IP
address by using DNS. What destination IP address and destination port number will PC1
assign to the DNS query packet?
192.168.20.2 port 80
192.168.20.3 port 53
192.168.20.3 port 80
192.168.10.1 port 53
61. Which two statements are true about NTP servers in an enterprise network? (Choose
two.)
There can only be one NTP server on an enterprise network
All NTP servers synchronize directly to a stratum 1 time source.
NTP servers at stratum 1 are directly connected to an authoritative time source.
NTP servers ensure an accurate time stamp on logging and debugging information.
NTP servers control the mean time between failures (MTBF) for key network devices.
Explanation: Network Time Protocol (NTP) is used to synchronize the time across all
devices on the network to make sure accurate timestamping on devices for managing,
securing and troubleshooting. NTP networks use a hierarchical system of time sources.
Each level in this hierarchical system is called a stratum. The stratum 1 devices are directly
connected to the authoritative time sources.
62. Match the steps with the actions that are involved when an internal host with IP
address 192.168.10.10 attempts to send a packet to an external server at the IP address
209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are
used.)
Explanation: The translation of the IP addresses from 209.65.200.254 to 192.168.10.10
will take place when the reply comes back from the server.
63. A network administrator can successfully ping the server at www.cisco.com, but
cannot ping the company web server located at an ISP in another city. Which tool or
command would help identify the specific router where the packet was lost or delayed?
traceroute
ipconfig
telnet
netstat
Explanation: The traceroute command provides connectivity information about the path a
packet takes to reach the destination and about every router (hop) along the way. It also
indicates how long a packet takes to get from the source to each hop and back.
64. Which two HTTP functions correspond to the UPDATE function in CRUD? (Choose
two.)
POST
DELETE
PATCH
PUT
GET
Explanation: CRUD is an acronym that stands for CREATE, READ, UPDATE, and
DELETE. The HTTP functions that correspond to CRUD functions are as follows:
GET -> READ
POST -> CREATE
PUT/PATCH -> UPDATE
DELETE -> DELETE
Explanation: Check the Enable Session Services check box to enable network access,
posture, guest, and client provisioning services.
89. Which communication protocol does Ansible use to connect to remote devices?
Telnet over VPN
HTTPS
Secure FTP
SSH
Explanation: Ansible communicates with remote machines over the SSH protocol. By
default, Ansible uses native OpenSSH and connects to remote machines using your
current user name, just as SSH does.
90. Refer to the exhibit. Router R2 is configured with static NAT. Place in order the steps
that occur when the client accesses the web server through the router. (Not all options
are used.)
Step 1 – The client uses the inside global…
Step 2 – R2 receives the packet on its outside interface…
Step 3 – R2 replaces the inside global address with the inside local address of the web…
Step 4 – The web server uses the outside global address of the client as the dest…
Step 5 – R2 receives the packet from the web server. R2 checks the NAT table, then
translates the source…
91. Refer to the exhibit. What is the function of the identified missing information in
regards to the parameter and method contained in the request?
The exhibit contains the following Python code:import requests access_token =
‘your_token_here’url = ‘https://webexapis.com/v1/rooms’headers = { ‘Authorization’: ‘Bearer
{}’.format(access_token), ‘Content-Type’: ‘application/json’}params={‘title’: ‘___?____’}res =
requests.post(url, headers=headers, json=params)print(res.json())
A Webex Teams space will be identified by using a specified title, and additional details will
be retrieved.
It provides the name for a Webex teams space to be deleted.
A Webex Teams space will be identified and a message will be posted with the title
specified.
It provides the name for a new Webex teams space.
92. A student is learning network automation by using a REST API. The student sends a
request to a network device and receives a response with the status code of 202. What
does this status code mean?
93. What is an architectural constraint to which a true RESTful API web service must
adhere?
It must support XML-RPC and JSON-RPC.
It allows resource caching.
It should be behind a firewall.
It operates as a cloud service.
Case 2:
It operates in a stateless way.
It uses HTTPS to transport data.
It must operate along with a DNS server.
It operates as a cloud service.
94. A packet is received by a server. The packet has a destination port number of 53.
What protocol or service is requested?
DNS
NetBIOS (NetBT)
POP3
IMAP
95. Which statement accurately describes dynamic NAT?
It always maps a private IP address to a public IP address.
It provides an automated mapping of inside local to inside global IP addresses.
It provides a mapping of internal host names to IP addresses.
It dynamically provides IP addressing to internal hosts.
Explanation: Dynamic NAT provides a dynamic mapping of inside local to inside global IP
addresses. NAT is merely the one-to-one mapping of one address to another address
without taking into account whether the address is public or private. DHCP is automatic
assignment of IP addresses to hosts. DNS is mapping host names to IP addresses.
96. A packet is received by a server. The packet has a destination port number of 830.
What protocol or service is requested?
NTP
DHCP
NETCONF
HTTPS
Explanation: By default, the NETCONF server on the device runs on TCP port 830 and
uses the SSH process for transport. A NETCONF session can be established by using an
SSH client and specifying port 830 when connecting to the device
97. Which programming language is supported by the Webex xAPI to develop macros for
on-device customization?
Java
Python
JavaScript
C++
98. Which Cisco management system is designed as the solution for Software-Defined
Networking and runs on Nexus 9000 hardware?
Application Centric Infrastructure platform (ACI)
IOS XE
Nexus Operating System (NX-OS)
DNA Center
99. A developer issues a Linux command python3 -m venv devenv . What is the
developer trying to achieve?
to install the devnet tool sets in the Python 3 virtual environment named venv
to create a Python 3 virtual environment named devenv
to activate the Python 3 virtual environment named devenv
to enter the Python 3 virtual environment named venv using the devnet tool sets
100. Refer to the exhibit. Match the missing components of the Python script for the
APIC-EM REST API request for the user “secureuser”. (Not all options are used.)
Answers:
101. Two network engineers are discussing the methods used to forward frames through
a switch. What is an important concept related to the cut-through method of switching?
The fragment-free switching offers the lowest level of latency.
Fast-forward switching can be viewed as a compromise between store-and-forward
switching and fragment-free switching.
Fragment-free switching is the typical cut-through method of switching.
Packets can be relayed with errors when fast-forward switching is used.
Explanation: Fast-forward switching offers the lowest level of latency and it is the typical
cut-through method of switching. Fragment-free switching can be viewed as a compromise
between store-and-forward switching and fast-forward switching. Because fast-forward
switching starts forwarding before the entire packet has been received, there may be times
when packets are relayed with errors.
102. When thinking about the functional planes of a network, what is unique about the
control plane?
It forwards data through a network device.
It manipulates data and outputs it in the XML format.
It includes the SNMP protocol.
It includes network traffic being processed by EIGRP or OSPF.
103. Refer to the exhibit. If PC1 is communicating with a web server on the Internet,
which two TCP/IP layers are responsible for encapsulating the message that requests
data from that particular server and assigning a source port number? (Choose two.)
session
network
transport
physical
application
104. A network security administrator is evaluating products that automate threat
containment through APIs when a threat is detected. Which Cisco product with the
desired capability provides a rule-based engine for enabling policy-based network
access to users and devices?
Identity Services Engine