A developer must test the performance and reliability of an application. After functional and load tests are run, the application crashes due to traffic spikes from users. Which type of API constraint must be implemented to maintain reliability?
A company wants to automate the orders processed on its website using API. The network device that supports the solution must:
support XML encoding
support distributed transactions
support YANG data models
be support software redundancy
Which requirement prevents the use of RESTCONF for the solution?
A developer writes an application that refines data in temporary secure file storage hosted on the public cloud. Data will be deleted after processing and does not contain any private information. What is the advantage that a public cloud deployment provides to the developer?
Which Cisco platform is used to manage data center infrastructure through third-party tools and system integrations?
Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.
A developer has experienced security issues with a previously developed application. The API offered by that application is open and without any constraints. During a recent attack, the application was overloaded with API requests. To address this issue, an API constraint is implemented to protect the application from future attacks or any sudden throttling. Which API constraint must the application developer implement in this situation?
Drag and drop characteristics from the left onto the infrastructure management methodologies on the right.
Which solution reduces costs from MPLS, improves application performance, and simplifies operations?
A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?
Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python script to retrieve a list of hosts using the Cisco DNA Center API. Not all options …used.
Which RFC 1918 address space includes a subnet of 172.16.0.0 that uses a mask of 255.255.0.0?
Refer to the exhibit. A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?
Drag and drop the code from the bottom onto the box where the code is missing to present GigabilEthernet2 details in the XML format. Not all options are used.
Which standard supported by Cisco IOS XE and Cisco NX-OS is used for automating the configuration of multiple devices across a network?
Drag and drop the code snippets from the bottom onto the blanks in the code to complete the happy path scenario. Not all options are used.
Which two situations align with infrastructure as code principles? (Choose two.)
A developer checks the performance of a web application. The application is in the local data center and uses a REST-based API. Based on the API logs, it is discovered that many its abandon API requests. Also, the response is taking too long to get back. What is the reason for this issue?
A developer plans to deploy a new application that will use an API to implement automated data collection from Webex with these requirements:
The application was created by using the request library.
Requires HTTP basic authentication.
Provides data in JSON or XML formats.
Which Cisco DevNet resource helps the developer with how to use the API?
A developer creates a new application, but the application must be tested before being released to a customer. When a mobile phone that uses 4G is used to access the application, the request fails. Why does the connection to the application fail?
Refer to the exhibit.
What are two results of running the RESTCONF query? (Choose two.)
Which Python function is used to parse a string that contains JSON data into a Python dictionary?
Drag and drop the characteristics from the left onto the software development methodologies on the right.
A developer is working on a new feature in a branch named 'newfeat123456789' and the current working primary branch is named 'prim987654321'. The developer requires a merge commit during a fast forward merge for record-keeping purposes. Which Git command must be used?
Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer's account?
Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.
Refer to the exhibit.
An engineer is comparing two tiles by using the unified cliff format What is determined by the content in the file2.py file?
Refer to the exhibit. An engineer is comparing two files by using the unified diff format. Which cade snippet belongs to the new.py file?
Which command reverses the last commit without changing the index file or the working tree position?
Refer to the exhibit.
A collaboration engineer has developed a script to automate the gathering of information by providing the email address of the individual. When the engineer tests the script, a 401 error is received. Which command fixes the script?
A developer is running an application that connects to the Cisco website and collects data. The application will be hosted in a local data center and the data will need to be collected on a frequent basis. The application client requires certain environmental variables to be set before the run. Which Bash command sets the environmental variables for a Linux system?
Which Cisco compute management platform controls server, network, storage, and virtual resources with policy-driven management for up to 10000 physical Cisco servers?
A lead engineer is managing the development of a web application with a team of remote developers using Git as the version control system. What is the advantage of a version Control system that allows developers to pick code from any part of the project and perform updates on it?
Drag and drop the code from the bottom onto the box where the code is missing to obtain a list of network devices by using the Cisco Meraki API. Not all options are used.
Drag and drop the capabilities from the left onto the Cisco Network Management Platforms that support the capabilities on the right.
Refer to the exhibit.
The JSON data in the exhibit has been parsed and stored in a variable, “data”. What returns the value “172.16.0.11” ?
What is used in Layer 2 switches to direct packet transmission to the intended recipient?
Drag and drop the capability on the left onto the Cisco compute management platform that supports the capability on the right.
Drag and drop the functionalities from the left onto correct networking devices on the right.
When using the Bash shell, how it the output of the devnet command saved to a tile named “output.txt”?
Which two protocols are used to apply a configuration change on a Cisco IOS XE device? (Choose two)
Which model-driven programmability protocol does Cisco IOS XE Software support?
Drag and drop the element of the Finesse API on the left onto the description of its functionally on the right.
Which network device monitors incoming and outgoing traffic and decides whether to allow or block specific traffic based on a defined set of rules?
Drag and Drop the Bash commands from the left onto the correct actions on the right.
Fill in the blanks to complete the statement.
Given a username of “devnet” And a password “Cisco123”, applications must create a base64 encoding of the string” ____________ ” when sanding HTTP requests to an API that uses _______________ authentication.
Which two statements describe the advantages of using a version control system? (Choose two.)
Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.
Which CI/CD tool is an automation tool used to build, test, and deploy software?
A developer is writing an application that a REST API and the application requires a valid from the API which element of the response is used in the conditional check?
Refer to the exhibit.
The python interpreter and the Cisco python SDK are available by default in the Cisco NX-OS software. The SDK documentation shows how the cild() API can be used when working with working with JSON and XML. What are two effect of running the script? (Choose two.)
A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without error and the bundles are produced. However, when the script is run during business hours, report poor voice quality of phones calls. What explains this behavior?
What are two roles of an artifact repository in a CI/CD pipeline? (Choose two.)
What are the two principles of an infrastructure as code environment? (Choose two)
In python, which expression checks whether the script returns a success status code when the Requests library is used?
A developer is reviewing a code that was written by a colleague. It runs fine, but there are many lines of code to do a seemingly simple task repeatedly. Which action organizes the code?
Refer to the exhibit.
Given the API documentation for the UCS SDK python class, UcsHandle, which code snippet creates a handle instance?
A Company is looking for cloud deployment which will use the on-premise infrastructure, is user self-service, and easy to scale. Which cloud solution should be selected for these requirements?
Users cannot access a webserver and after the traffic is captured. the capture tool shows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?
What are two advantages of YANG-based approaches for infrastructure automation? (Choose two.)
Which type of HTTP method is used by the Meraki nad webex teams APIs to send webhook notifications?
Drag and drop elements of the RESTCONF protocol stack from the left onto the correct description on the right. Not all elements on the left are used.
Which device is used to transport traffic from one broadcast domain to another broadcast domain?
What is the Git command to delete a local branch named “experiment” without a warning?
What are two advantages of the Model-view-controller software design pattern? (Choose two.)
Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose two.)
Refer to the exhibit.
Drag and Drop the code from the bottom onto the box where the code is missing on the Meraki Python script to create a new network
Refer to the exhibit.
Which command, including arguments, is executed when the container starts?
In test-driven development, what are two of the green bar patterns? (Choose two.)
Refer to the exhibit.
A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?
A new application is being developed with specific platform requirements. The platform and application deployment and the ongoing platform management must be fully automated. The application includes a large database component that has significant disk I/O requirements. Which application deployment type meets the requirements?
A local Docker alpine image has been created with an image ID of a391665405fe and tagged as “latest”. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?
Refer to the exhibit.
What do all the calls shown in the sequence diagram have in common?
Refer to the exhibit.
A network engineer must manage the network devices. The engineer prepares a Python scripts to authenticate to the Cisco to DNA Center API and request a device list. The device request fails and returns errors code 401. Which action solves the problem?
Refer to the exhibit.
A developer creates a Python script that queries Cisco Webex. When the script is executed, a 401 code is returned. After troubleshooting, the developer discovers that the service is missing privileges. Which change to the header in line 4 of the script results in the code 200?
A)
B)
C)
D)
Refer to the exhibit.
The Cisco Meraki API manages two organizations. In each organization, two independent networks are defined. How many calls to the /organizations/(orgid)networks endpoint will be run parallel by the GetAllNetwork function of the API client?
Refer to the exhibit.
Which two files are being edited in the unified diff? (Choose two.)
In which two ways is an application characterized when interacting with a webhook? (Choose two.)
Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?
Refer to the exhibit.
Drag and drop the code from the bottom onto the blanks in the code to construct a cURL command using the Cisco DNA Center API. which will provide the details of a WLAN controller with Id af397748444. Not at options are used.
Refer to the exhibit.
The output of the diff-u README.md-repo README.md command is shown. The original file was 165 lines long How many lines are in the edited copy of the file?
Which advantage does the agile process offer compared to waterfall software development?
How does a developer create and switch to a new branch called "my-bug-fix" to develop a product fix?
Refer to the exhibit.
A developer must integrate a bot with an internal communication app. The developer wants to replace the webexbot package with the teamsbot package by using Ansible and prepares a playbook In the first two tasks, the playbook stops the webexbot and verifies that the teamsbot is installed. What is accomplished in the last task of the workflow when the developer runs the Ansible playbook?
Refer to the exhibit.
An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the 'get_all_interfaces' API call is used?
A developer created a new secure API and is testing the functionality locally. The API was added to a container for further testing, and other team members and applications need to connect to the API. Which command exposes the API in the container as port 8443 and allows connections external to the host?
A developer needs a list of clients connected to a specific device in a Meraki network. After making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet resource should be used to identify the meaning of the response code?
Drag and drop the code from the bottom onto the box where the code is missing in the Python script to complete a function to return all the clients on a network by using the Cisco Meraki Dashboard API. Not all options are used.
A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?
Refer to the exhibit.
A Python script must delete all Cisco Catayst 9300 Series switches that have an uptime that is greater than 90 days The script must also query for the status of all the other devices Drag and drop the code from the bottom onto the bottom box the code is missing to complete the script Not at options are used
Which Cisco platform provides organization-wide automation, security, policy enforcement, any agility across wired and wireless networks?
Refer to the exhibit.
A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?
Refer to the exhibit.
An engineer must configure a load balancer server. The engineer prepares a script to automate workflow by using Bash. The script install the nginx package, moves to the /optAtginx directory, and reads the sites M We (or further processing Based on the script workflow, which process is being automated within the loop by using the information mi sites txt?
What is a functionality of the Waterfall method as compared to the Agile method for software development?
Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:
• MySQL database that stores data about customers
• HTML5 and JavaScript UI that runs on Apache
• REST API written in Python
What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)
Drag and drop the types of management from the left onto the levels at which they are performed on the right.
Refer to the exhibit.
A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?
A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:
$ docker tag 84fe411926287 local/app:0.4
Which command must be executed next to build the Docker image using the tag?
Drag and drop the code snippets from the bottom to the blanks in the code to test the API response through the Python unittest library. Not all options are used.