DevNet Associate Version 1 0 DevNet Associate 1 0 Final Exam Answers
DevNet Associate Version 1 0 DevNet Associate 1 0 Final Exam Answers
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers
Recommend
community cloud
public cloud
hybrid cloud
private cloud
Answers Explanation & Hints:
the ability to reduce risk by implementing security policies across the network infrastructure via
automated changes
the ability to use GET and SET requests to retrieve and send data across the network infrastructure
the ability to use an automated request to audit configurations and manually deploy changes in order
to implement compliance
the ability to implement network infrastructure that receives a configuration from a specific centralized
server
3. Data
is being sent from a source PC to a destination server. Which three
statements correctly describe the function of TCP or UDP in this situation?
(Choose three.)
The TCP process running on the PC randomly selects the destination port when establishing a session
with the server.
UDP segments are encapsulated within IP packets for transport across the network
The TCP source port number identifies the sending host on the network
The UDP destination port number idenifies the application or service on the server which will handle the
data.
The source port field identifies the running application or service that will handle data returning to the
PC
TCP is the preferred protocol when a function requires lower network overhead
Answers Explanation & Hints:
4. What type of attack targets an SQL database using the input field of a user?
buffer overflow
SQL injection
Cross site scripting
XML injection
Answers Explanation & Hints:
5. Which
command can be used on Linux and MAC hosts to get IP addressing
information?
ipconfig
ip address
ifconfig
networksetup -getinfo
6. What are two reasons a network administrator would segment a network with a
Layer 2 switch? (Choose two.)
SQL
REST
Docker
Jenkins
8. Apacket is received by a server. The packet has a destination port number of
8008. What protocol or service is requested?
10. Which
piece of software is responsible for creating and managing virtual
machines, including allocating system resources to each virtual machine as
needed?
supervisor
hypervisor
host operating system
hosted operating system
11. How is an Ethernet MAC address constructed?
The first 3 bytes represent the network upon which the host resides, and the last 3 bytes uniquely
identify the host.
The first 3 bytes represent the vendor OUI, and the last 3 bytes are assigned uniquely by the vendor
The first 3 bytes are uniquely assigned by LANA, and the last 3 bytes represent the serial number of the
host
The first 3 byles represent the vendor OUI, and the last 3 byles are assigned randorily by the operating
system.
12. Which Cisco SDK works with ACI?
Cobra
IMC
UCS
Instant Connect
13. Whatplatforms are provided by DevNet for community members to share
solutions, tool kits, and other resources with each other?
communities
forums
sandboxes
exchanges
14. Which
two data formats can RESTCON use when requesting data or responding
with data? (Choose two.)
JSON
XML
YAML
YANG
HTML
15. WhichDevNet resource would a developer use to look for a Python library that
supports APIs for a specific Cisco product?
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 01
code – uses the GitHub API and human moderators to categorize and display related repositories
ecosystem – provides solutions across different technologies, industries, and geographies to jump start
solution design and development
automation exchange – a collection of network automation use cases with different solutions and
toolkits
18. Refer
to the exhibit. A user is working on Ansible on the local NMS to manage
remote network devices. Which file is the user creating?
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 02
playbook
service
variable
hosts
19. WhichDevNet resource would a developer use in order to test custom code in a
production-like environment?
Devlet Support
DevNet Learning Labs
Code Exchange
DevNet Sandbox
20. In
which situation would a company implement a reverse proxy as a security
solution?
when the company has a database and needs to point to a DNS server that uses different IP addresses
for development resources
when the company wants all responses to clients to look like they came from the same server instead of
individual ones
when a hash is created based on the IP address of the request to a particular protected server
when responses frorri servers need to be sent over different paths to ensure quality response time to
the client devices making the requests
21. Asoftware development company specializes in being able to use whatever
software development method their customer wants to use. One customer
company wants to use the Agile method. What is a characteristic of this method?
a software development process that prioritizes responding to change over following a plan
a software development method that tracks closely with the software development life cycle
a process that was developed for manufacturing, but adapted to other industries
a more traditional sollware developical procGSs as they have used this proCESS ini past projects
22. Anetwork engineer is creating a Docker container using the docker build
command. If the engineer does not specify a tag, which tag will be used by
default?
tag
latest
(a blank space)
default
23. Which component in the pyATS ecology handles bundling and running jobs?
AEtest
Clover
Genie
EasyPy
24. Which three avenues are available within DevNet for developers who need help
with specific developer scenario questions concerning Cisco products? (Choose
three.)
logging a ticket
posting to the DevNet zone
posting to a news group
posting to a community forum
posting to a Webex Teams space
posting on the Cisco Learning Network
25. Astudent who is interested in network programmability approaches an
instructor for advice on learning more about the subject. The student is a
kinesthetic learner who learns by doing. Which DevNet resource should the
instructor consider telling the student about?
DevNet Create
DevNet Learning Labs
DevNet Express
DevNet Zone
26. What is the default shell commonly used on macOS and Linux?
tcsh
csh
Bourne
Bash
27. What is immutable infrastructure in DevOps?
infrastructure that is deployed with all component versions locked except for the ability to perform
manual configuration changes
infrastructure that is only deployed and maintained in containers
infrastructure that is entirely maintained and deployed in code and never subjected to manual changes
virtualized infrastructure that is deployed as golden images
28. What is the most common cause of IT outages?
Functions can use global variables whereas methods can only use local variables.
Functions are called by a referencing object whereas methods are called by the names.
Functions can pass arguments whereas methods can pass only predefined keywords.
Functions are standalone code blocks whereas methods are code blocks associated with an object.
31. Which command is used to create a new Git repository?
git init
git add
git commit
git clone
32. Which
stakeholder determines the useful value of software product features in
the Lean process?
the customer
the Scrum master
the reviewer
the programmer
33. Match the SDLC phase with its description. (Not all options are used.)
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 03
requirements & analysis —> code is installed into a testing environment to look for bugs
implementation –> code is developed according to low level and high level design documents
deployment –> software is installed into the production environment
34. What is a principle of the Lean software development model?
adding additional product features that the customer did not ask for so that the customer is getting
more than expected
assigning resources to multiple projects so that effort can be divided on more than one task at a time
making decisions as late as possible in the process so that more facts and details are available
ordering workers to do tasks they may not want to do to ensure they get done
35. What character is used to separate the key and value pairs in YAML?
colon :
semi colon ;
underscore _
forward slash /
36. Which git command is used to compare changes between files?
git diff
git merge
git checkout
git status
37. Refer
to the exhibit. Match the missing components of the Python script for
authenticating to the Cisco Network Services Orchestrator and obtaining a list of
network devices using the username of “superadmin” and password of
“soverysecure!”. (Not all options are used.)
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 04
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 05
38. What is an example of a use supported by Cisco UCS Director and UCS Manager?
posix
pyclient
ncclient
pypi
41. Refer
to the exhibit. Match the missing components of the Python script for
authenticating to the Cisco DNA Center and obtaining an authentication token
using the username of “adminuser” and password of “Sup3rC1$c0”. (Not all
options are used.)
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 08
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 07
42. ?????a token using the username of “secureuser” and password of “C1$c0”. (Not
all options are used.)
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 08
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 09
43. Refer
to the exhibit. Match the missing components of the Python script for the
following tasks. (Not all options are used.)
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 10
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 11
44. Which two APIs allow for Cisco Meraki device provisioning and real-time
notifications? (Choose two.)
Webhook API
Investigation API
Dashboard API
Enforcement API
Reporting API
45. Apacket is received by a server. The packet has a destination port number of
443. What protocol or service is requested?
HTTP
NTP
DHCP
HTTPS
46. When thinking about the functional planes of a network, what is unique about
the data plane?
Code changes are continually merged with the main branch of the application, so change sets are small.
Code changes are tested and integrated with the main branch then tested again before they are
deployed into production.
Code is constantly deployed into production where users serve as the final testers.
Application development is performed in short sprints so that enough code is always in a deployable
state.
49. Which
Docker component defines the steps needed to create an image that can
be deployed in a variety of environments?
UnionFS
Dockerfile
cross-site script
namespaces
50. Which three statements describe characteristics of a virtual machine? (Choose
three.)
sends traffic to a new environment, but keeps the old environment ready in case of issues
diverts a small amount of traffic to a new production environment that is changed
sends requests to the next server on diverts a small amount of traffic to a new production environment that
is changed
sends requests to the next server on the list
sends requests to the server that is least busy
52. What
are two characteristics of the staging environment of the four-tier
deployment environment structure? (Choose two.)
It is the point where code has been tested multiple times and is error free.
It is structured as close as possible to the actual production environment.
It is where the code undergoes final acceptance testing in a realistic environment.
It is where end users will interact with the code.
It often includes automated testing tools such as Jenkins, CircleCl, or Travis Cl.
53. Refer
to the exhibit. A network engineer has created a Jenkins pipeline. Which
menu option would the engineer use to run the pipeline?
Configure
Changes
Build Now
Workspace
54. Anetwork engineer is configuring a Jenkins job and finishing with the following
script in order to trigger the build:
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers
14
It makes sure that any previous instances of a particular Docker container are stopped and removed.
It catches and removes any errors.
It runs the SUCCESS Docker container.
It places a log of any errors in the SUCCESS file.
55. Which
technique is used to make the output of password hashing
nondeterministic?
Orchestration is aimed at managing workload lifecycles and reacting dynamically to changing conditions
in order to optimize processes.
Orchestration is the process of preparing a server through the installation of libraries or daemons.
Orchestration is the building, arranging, integration, and preparation of multi-component applications
across multiple nodes.
Orchestration is the obtaining and provisioning of compute, storage, and network infrastructure.
58. What is an example of a read-only automation solution?
The SSL/TLS certificate uses a public key size of less than 1024 bits.
The SSL/TLS certificate is self-signed by the router.
The CA for the SSL/TLS certificate cannot be reached.
The traffic to the VM is not encrypted.
60. How do APIs affect traditional IT tasks?
They are used to replace network infrastructure and implement network virtualization.
They are used to eliminate repetitive manual tasks and replace them with automation.
They are used to increase computer processing speed and lower power consumption.
They are used to increase hardware speed and lower power consumption.
61. Referto the exhibit. PC1 needs to resolve the host name of the web server into
an IP address by using DNS. What destination IP address and destination port
number will PC1 assign to the DNS query packet?
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 15
192.168.20.2 port 80
192.168.20.3 port 53
192.168.20.3 port 80
192.168.10.1 port 53
62. Which
two statements are true about NTP servers in an enterprise network?
(Choose two.)
63. Match
the steps with the actions that are involved when an internal host with IP
address 192.168.10.10 attempts to send a packet to an external server at the IP
address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all
options are used.)
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 16
64. Anetwork administrator can successfully ping the server at www.cisco.com, but
cannot ping the company web server located at an ISP in another city. Which tool
or command would help identify the specific router where the packet was lost or
delayed?
traceroute
ipconfig
telnet
netstat
Answers Explanation & Hints:
65. Which two HTTP functions correspond to the UPDATE function in CRUD? (Choose
two.)
POST
DELETE
PATCH
PUT
GET
Answers Explanation & Hints:
66. Match
the term to the RESTAPI request http://example.com/update/person?
id=42&email=person%40example.com. (Not all options are used.)
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 17
67. WhichHTTP status code category is used in the response to indicate that a REST
API request contains an error on the client side?
1xx
2xx
3xx
4xx
5xx
68. Refer
to the exhibit. A network administrator is using a Python script to test a
REST API request. The traceback message indicates that there is an error in the
URI. What is the error?
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 18
The protocol is wrong.
The resource path is wrong.
The SSL certificate is invalid.
The destination web host address is invalid.
69. Whatare two requirements for an application to communicate with a webhook
provider? (Choose two.)
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 19
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 20
71. Astudent is learning REST API application. The student constructs an URI to
query the MapQuest API for a route from New York, NY to Boston, MA. What is
the valid URI format?
https://www.mapquestapi.com/directions/v2/route?key== ke
y&from==New+York%2C+NY&to==Boston%2C+MA
https://www.mapquestapi.com/directions/v2/route?key=key
&from=New+York%2C+NY&to=Boston%2C+MA
https://www.mapquestapi.com/directions/v2/route?key: key
&from:New+York%2C+NY&to:Boston%2C+MA
https://www.mapquestapi.com/directions/v2/route?key=key &from=New+York+NY&to=Boston+MA
72. Referto the exhibit. A student constructs a URI to query the MapQuest API for a
route from New Orleans, LA to New York, NY. Match the components to the
MapQuest URL. (Not all options are used.)
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 21
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 22
73. Referto the exhibit. Match the Python code components to the function. (Not all
options are used.)
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 23
DevNet Associate (Version 1.0) – DevNet Associate 1.0 Final Exam Answers 24
a software development process where the highest priority is to satisfy the customer through early and
continuous delivery of valuable software
a software development process that can only go forward
a process that amplifies learning as well as delivers as quickly as possible
a more traditional software development process as they have used this process in past projects
75. Asoftware development company specializes in being able to use whatever
software development method their customer wants to use. One customer
company wants to use the Lean method. What is a characteristic of this method?
a process that eliminates inefficient ways of working like expecting coders to multitask
a software development process that focuses on frequent delivery of working software as well as
collaboration between developers and business employees
a software development process that has the results of one phase feed into the next phase
a software development process that can only go forward
76. Which scenario exhibits the “social proof” principle of human influence?
A user receives a phone call from someone claiming to be from the IT department who needs to verify
user credentials.
A user visits a web site offering a free gift if the user provides contact information.
A user opens an email advertising a free trial on a website that is only available for a few hours.
A user completes a survey requesting personal information after seeing co-workers completing the
survey.
77. Which SQL injection defense method should be used only as a last resort?
A software development process that prioritizes responding to change over following a plan
A process that eliminates inefficient ways of working like expecting coders to multitask
A software development process that focuses on frequent delivery of working software as well as
collaboration between developers and business employees
A software devilment process that can only go forward.
79. Astudent is learning network automation by using a REST API. The student sends
a request to a network device and receives a response with the status code of
202. What does this status code mean?
The request was understood but has been rejected by the server.
The request was successful and typically includes a payload.
The request has been accepted for processing, but the processing has not been completed.
Because of a server error, the request cannot be fulfilled.
80. What are two characteristics of stateless applications? (Choose two.)
implementation
deployment
design
testing
82. Which convention is used in Python to indicate that methods and variables in a
class are private and not to be used outside of the class?
DHCP
Telnet over SSH
HTTP
RESTCONF
84. Anetwork administrator is developing an application to control a Webex device
through xAPI. Which three protocols can be used to access xAPI? (Choose three.)
Telnet
HTTP
XML
RS-232
FTP
JSON
85. Whichtype of request is used to send a message to a Webex Teams space using
Python and the Messages API?
PUT
POST
GET
PATCH
86. Anetwork administrator is assigned the 172.16.0.0/24 block of addresses to use
in designing an IP addressing scheme. The administrator submits this design for
approval:
172.16.0.0/26
172.16.0.64/27
172.16.0.96/26
172.16.0.128/27
87. What
should be the response from the senior network engineer regarding this
design?
It can filter packets based on information at Layers 3, 4, 5 and 7 of the OSI reference model.
It can determine if the connection is in the initiation, data transfer, or termination phase.
It can only filter packets based on limited Layer 3 and 4 information.
It can expand the number of IP addresses available and can hide network addressing design.
89. Whichtype of ISE node provides network access, posturing, guest access, client
provisioning, and profiling services?
monitoring
administration
pxGrid
policy service
Answers Explanation & Hints:
90. Which communication protocol does Ansible use to connect to remote devices?
91. Refer
to the exhibit. Router R2 is configured with static NAT. Place in order the
steps that occur when the client accesses the web server through the router.
(Not all options are used.)
Step 1 – The client uses the inside global…
Step 2 – R2 receives the packet on its outside interface…
Step 3 – R2 replaces the inside global address with the inside local address of the web…
Step 4 – The web server uses the outside global address of the client as the dest…
Step 5 – R2 receives the packet from the web server. R2 checks the NAT table, then translates the
source…
92. Refer to the exhibit. What is the function of the identified missing information in
regards to the parameter and method contained in the request?
The exhibit contains the following Python code:import requests access_token =
‘your_token_here’url = ‘https://webexapis.com/v1/rooms’headers = {
‘Authorization’: ‘Bearer {}’.format(access_token), ‘Content-Type’:
‘application/json’}params={‘title’: ‘___?____’}res = requests.post(url,
headers=headers, json=params)print(res.json())
A Webex Teams space will be identified by using a specified title, and additional details will be retrieved.
It provides the name for a Webex teams space to be deleted.
A Webex Teams space will be identified and a message will be posted with the title specified.
It provides the name for a new Webex teams space.
93. Astudent is learning network automation by using a REST API. The student sends
a request to a network device and receives a response with the status code of
202. What does this status code mean?
The request was understood but has been rejected by the server.
The request was successful and typically includes a payload.
The request has been accepted for processing, but the processing has not been completed.
Because of a server error, the request cannot be fulfilled.
94. Whatis an architectural constraint to which a true RESTful API web service must
adhere?
DNS
NetBIOS (NetBT)
POP3
IMAP
96. Whatis an architectural constraint to which a true RESTful API web service must
adhere?
Recommend