Which network constraint causes the performance of the application to decrease as the number of users accessing the application increases?
Drag and drop the capabilities from the left onto the Cisco Network Management Platforms that support the capabilities on the right.
Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.
How is a branch called "my-bug-fix" started to develop a fix needed in a product?
Which type of threat occur when an attacker can send hostile data to an interpreter within an application?
Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?
Refer to Exhibit.
Which JSON is equivalent to the XML-encoded data.
A)
B)
C)
D)
Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. Not all options are used.
An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device mut be at fault?
Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose two.)
Which status code is used by a REST API to indicate that the submitted payload is incorrect?
How does requesting a synchronous API operation differ from requesting an asynchronous API operation?
A 401 HTTP response code is returned when calling a REST API. What is the error state identified by this response code?
Refer to the exhibit.
A REST API retune this JSON output for a GET HTTP request, Which has assigned to a variable called “vegetables†Using python, which output is the result of this command?
Package updates from a local server fail to download. However, the same updates work when a much slower external repository is used. Way are local updates failing?
A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing? The data contains sensitive information, so specialist encryption tools must be used to secure the data. Which application deployment model meets the requirements?
Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)
What are the two principles of an infrastructure as code environment? (Choose two)
Refer to the exhibit. A bespoke meeting booking system must be integrated with Cisco Webex so that meetings are created automatically. Drag and drop the code from the bottom onto the box where the code is missing to create a sample meeting. Not all options are used.
A developer completed the creation of a script using Git. Before delivering it to the customer, the developer wants to be sure about all untracked files, without losing any information. Which command gathers this information?
A developer has experienced security issues with a previously developed application. The API offered by that application is open and without any constraints. During a recent attack, the application was overloaded with API requests. To address this issue, an API constraint is implemented to protect the application from future attacks or any sudden throttling. Which API constraint must the application developer implement in this situation?
A developer pushes an application to production. The application receives a webhook over HTTPS without a secret. The webhook information contains credentials to service in cleartext. When the information is received, it is stored in the database with an SHA-256 hash. Credentials to the database are accessed at runtime through the use of a vault service. While troubleshooting, the developer sets the logging to debug to view the message from the webhook. What is the security issue in this scenario?
Drag and drop the code from the bottom onto the box where the code is missing to obtain a list of network devices by using the Cisco Meraki API. Not all options are used.
A file in a local Git repository has been updated and issued the git add . command. The git diff command has been run to compare the changes to the previous commit, but nothing shows. Which action identifies the problem?
Developer is working on a new feature and made changes on a branch named ‘branch-413667549a-new’. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?
A developer is working on a new feature in a branch named 'newfeat123456789' and the current working primary branch is named 'prim987654321'. The developer requires a merge commit during a fast forward merge for record-keeping purposes. Which Git command must be used?
Refer to the exhibit. Drag and drop the Dockerfile contents from the left onto the functions on the right that create a container image to run traceroute to track network path to specific targets. Not all options are used.
Which HTTP method is used by webhooks and notifies a listener about an event change?
Drag and drop characteristics from the left onto the infrastructure management methodologies on the right.
Refer to the exhibit.
Drag and drop the code from the bottom onto the blanks in the code to construct a cURL command using the Cisco DNA Center API. which will provide the details of a WLAN controller with Id af397748444. Not at options are used.
Refer to the exhibit.
Which device limits traffic between server 1 and server 2?
Refer to the exhibit.
A developer wants to create a room named cisco through Webex API. The developer prepares the request by putting an API token inside the authorization header; however, the given HTTP call returns error code 400. How must the call parameters be changed to ensure a valid response?
Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:
• MySQL database that stores data about customers
• HTML5 and JavaScript UI that runs on Apache
• REST API written in Python
What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)
Refer to the exhibit.
An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the 'get_all_interfaces' API call is used?
Before which process is code review performed when version control is used?
Refer to the exhibit.
Which line must be included in the Bash script for the Python code to succeed?
Refer to the exhibit.
The Cisco Meraki API manages two organizations. In each organization, two independent networks are defined. How many calls to the /organizations/(orgid)networks endpoint will be run parallel by the GetAllNetwork function of the API client?
Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request to find the Cisco DNA Center switch count. Not all options are used.
In which two ways is an application characterized when interacting with a webhook? (Choose two.)
A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time.
Which area of the CALMS framework must the company target for improvement?
A local Docker alpine image has been created with an image ID of a391665405fe and tagged as “latestâ€. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?
Refer to the exhibit.
A developer creates a Python script that queries Cisco Webex. When the script is executed, a 401 code is returned. After troubleshooting, the developer discovers that the service is missing privileges. Which change to the header in line 4 of the script results in the code 200?
A)
B)
C)
D)
Refer to the exhibit.
A network engineer must change the configuration on devices daily. The Python script must collect CLI arguments from the user, organize data according to the Cisco-IOS-XE-native YANG model, and utilize Cisco REST APIs to make the configuration. Which workflow is being automated by the Python script?