0% found this document useful (0 votes)
133 views44 pages

Cuestionario 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
133 views44 pages

Cuestionario 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 44

1. Which SNMP version authenticates the source of management messages?

Version 2

Version 3

Both
2. Which SNMP version provides services for security models?

Version 2

Version 3

Both
3. Which SNMP version does not provide encrypted management messages?

Version 2

Version 3

Both
4. Which SNMP version is supported by Cisco IOS software?

Version 2

Version 3

Both
5. Which SNMP version includes expanded error codes with types?

Version 2

Version 3

Both
6. Which SNMP version uses community-based forms of security?

Version 2
Version 3

Both
7. Which SNMP version is used for interoperability and includes message integrity reporting?

Version 2

Version 3

Both

1. Refer to the syslog output. What security level generated the message?

Error

Informational

Warning

Debugging
2. Refer to the syslog output. What is the mnemonic for this syslog message?

IFMGR

Unable to open nvram

NO_IFINDEX_FILE

ifIndex-table
3. Refer to the syslog output. What is the syslog reporting facility?

IFMGR
NO_IFINDEX_FILE

IFMGR-7

ifIndex-table

1. What are two reasons for an administrator to issue the copy running-config tftp command
on a switch or router? (Choose two.)

to have a backup of the running configuration file in the router

to overwrite the current configuration

to save the running configuration file to a remote location

to force an automatic reload of the device

to transfer the current configuration file to a server


2. What information can be gathered about a neighbor device from the show cdp neighbors
detail command that cannot be found with the show cdp neighbors command?

the platform that is used by the neighbor

the hostname of the neighbor

the capabilities of the neighbor

the IP address of the neighbor


3. When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB
objects?

community strings

source validation

packet encryption

message integrity
4. What command must be issued on a Cisco router that will serve as an authoritative NTP
server?

ntp master 1

ntp broadcast client

ntp server 172.16.0.1

clock set 11:00:00 DEC 20 2010


5. Which protocol or service can be configured to send unsolicited messages to alert the
network administrator about a network event such as an extremely high CPU utilization on a router?

NetFlow

SNMP

NTP

syslog
6. Which statement describes a syslog message severity level?

A syslog alarm at the severity level 4 and higher is sent to an external syslog server by default.

A syslog alarm with a severity level of 7 indicates an emergency situation that can render the
system unusable.

Severity level 0 is the most critical severity level.

A severity level 7 message is only accessible through the terminal line.


7. What is an SNMP management agent?

a computer loaded with management software and used by an administrator to monitor a network

software that is installed on devices managed by SNMP

a database that a device keeps about network performance

a communication protocol that is used by SNMP


8. What are two characteristics of SNMP community strings? (Choose two.)
If the manager sends one of the correct read-only community strings, it can get information and set
information in an agent.

Commonly known community strings should be used when configuring secure SNMP.

A vulnerability of SNMPv1, SNMPv2, and SNMPv3 is that they send the community strings in
plaintext.

SNMP read-only community strings can be used to get information from an SNMP-enabled device.

SNMP read-write community strings can be used to set information on an SNMP-enabled device.
9. A network administrator issues the copy tftp running-config command on a router. What is
the administrator trying to achieve?

copy the configuration file from the RAM of the router to the TFTP server

copy the configuration file from the TFTP server to the NVRAM of the router

copy the configuration file from the TFTP server to the RAM of the router

copy the configuration file from the NVRAM of the router to the TFTP server
10. What is a characteristic of the MIB?

Information is organized in a flat manner so that SNMP can access it quickly.

A separate MIB tree exists for any given device in the network.

The OIDs are organized in a hierarchical structure.

Information in the MIB cannot be changed.


11. What data would be saved and where would the data be placed if a network administrator
issued the following command? (Choose two.)

R1# copy startup-config tftp

The data will be saved in RAM.

The data to be saved is the configuration that is stored in NVRAM.

The data will be saved in NVRAM.


The data will be saved to a TFTP server.

The data to be saved is the configuration that is stored on a TFTP server.

The data to be saved is the configuration that is being modified in RAM.


12. Which command would a network engineer use to restore the IOS image c1900-universalk9-
mz.SPA.152-4.M3.bin to a router?

copy flash0: tftp:

copy c1900-universalk9-mz.SPA.152-4.M3.bin tftp:

copy tftp: flash0:

copy flash0: c1900-universalk9-mz.SPA.152-4.M3.bin


13. Why would a network administrator issue the show cdp neigbors command on a router?

to display line status and other information about directly connected Cisco devices

to display device ID and other information about directly connected Cisco devices

to display router ID and other information about OSPF neighbors

to display routing table and other information about directly connected Cisco devices
14. What are SNMP trap messages?

messages that are used by the NMS to change configuration variables in the agent device

unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the
network

messages that are sent periodically by the NMS to the SNMP agents that reside on managed
devices to query the device for data

messages that are used by the NMS to query the device for data

1. Which term is used to describe a network that is always accessible?

Hierarchical

Modular
Resilient

Flexible
2. Which characteristic of a network allows it to expand and provide on-demand services?

Hierarchical

Modularity

Resilient

Flexible
3. Which term describes the ability of a network to use all available network resources and to
provide data load sharing?

Hierarchical

Modular

Resilient

Flexible
4. Which network layer provides fault isolation and high-speed backbone switch connectivity?

Core

Distribution

Access
5. Which network layer provides direct, switched network connectivity to the user?

Core

Distribution

Access
6. Which network layer integrates with the backbone and users to provide intelligent switching,
routing, and security?
Core

Distribution

Access

1. Which three recommendations may be included in a network design strategy that is focused
on scalability? (Choose three.)

Design a hierarchical network.

Use Layer 2 devices to filter and reduce network traffic in the core.

Choose routers or multilayer switches to limit broadcasts and filter other undesirable traffic from the
network.

Use expandable, modular equipment, or clustered devices that can be easily upgraded to increase
capabilities.

Combine the access and distribution layer for easier access and limit the size of the failure domain.
2. True or false? OSPF is well-suited for larger networks because it can be deployed using a
hierarchical design.

True

False
3. What are three important features that should be considered for implementation in a well-
designed, scalable network? (Choose three.)

static routes

redundant links

multiple links

access layer with only wired devices

expandable, modular equipment

1. Which category of switch is used to aggregate traffic at the edge of the network?
campus LAN switches

cloud-managed switches

service provider switches

data center switches


2. Field replaceable line cards are a feature found on which type of switch?

modular

fixed configuration

virtual

stackable
3. This is the term used to describe switches that can be interconnected and managed as one
larger single switch.

modular

stackable

cloud-managed

multilayer
4. This is the term used to describe the number of ports available on a single switch.

speed

scalability

density

modularity
5. This is the term used to describe how much data a switch can process per second.

forwarding rate

power
reliability

wire speed
6. Which type of switch supports routing protocols and can forward IP packets at close to Layer
2 forwarding rates?

modular

stackable

cloud-managed

Multilayer

1. This type of router provides fast performance with high security for data centers, campus,
and branch networks.

branch routers

network edge routers

service provider routers

industrial routers
2. This type of router provides end-to-end delivery of subscriber services.

branch routers

network edge routers

service provider routers

industrial routers
3. This type of router provides simple network configuration and management for LANs and
WANs.

branch routers

network edge routers


service provider routers

industrial routers
4. This type of router is designed to provide enterprise-class features in rugged and harsh
environments.

branch routers

network edge routers

service provider routers

industrial routers
5. This type of router delivers next-generation internet experience across all devices and
locations.

branch routers

network edge routers

service provider routers

industrial routers

1. Which cost-effective physical network topology design is recommended when building a


three-tier campus network that connects three buildings?

extended star

dual ring

mesh

bus
2. How much traffic is a 48-port gigabit switch capable of switching when operating at full wire
speed?  

44 Gb/s, due to overhead requirements

1 Gb/s, because data can only be forwarded from one port at a time
48 Gb/s, by providing full bandwidth to each port

24 Gb/s, because this is the maximum forwarding rate on Cisco switches


3. What is the term that is used for the area of a network that is affected when a device or
network service experiences problems?

user domain

failure domain

collision domain

broadcast domain
4. Which type of router would an enterprise use to allow customers to access content anytime
and anyplace, regardless of whether they are at home or work?

branch routers

network edge routers

service provider routers

modular routers
5. Which design feature will limit the size of a failure domain in an enterprise network?

the use of a collapsed core design

the purchase of enterprise equipment that is designed for large traffic volume

the installation of redundant power supplies

the use of the building switch block approach


6. What is a function of the distribution layer?

high-speed backbone connectivity

interconnection of large-scale networks in wiring closets

fault isolation
network access to the user
7. What is the function of PoE pass-through?

allows switches, phones, and wireless access points to receive power over existing Ethernet cables
from an upstream switch

allows a switch to disable redundant Layer 2 paths in the topology to prevent Layer 2 loops

allows multiple physical switch ports to be aggregated together and act as a single logical link to
increase bandwidth on trunk links

allows a multilayer switch to forward IP packets at a rate close to that of Layer 2 switching by
bypassing the CPU
8. Which function is supplied by the access layer in a three-layer network design?

high-speed connectivity

routing

backbone connectivity

network access

application of policies
9. Which action should be taken when planning for redundancy on a hierarchical network
design?

Immediately replace a nonfunctioning module, service ,or device on a network.

Add alternate physical paths for data to traverse the network.

Implement STP PortFast between the switches on the network.

Purchase backup equipment for every network device at the distribution layer.
10. What is a collapsed core in a network design?

a combination of the functionality of the access and distribution layers

a combination of the functionality of the access and core layers


a combination of the functionality of the distribution and core layers

a combination of the functionality of the access, distribution, and core layers


11. What is the name of the layer in the Cisco borderless switched network design that is
considered to be the backbone used for high-speed connectivity and fault isolation?

data link

network access

network

access

core
12. Which technology is required when switched networks are designed to include redundant
links?

virtual private networks

link aggregation

virtual LANs

Spanning Tree Protocol


13. Which feature could be used in a network design to increase the bandwidth by combining
multiple physical links into a single logical link?  

EtherChannel

VLANs

subinterfaces

trunk ports
14. Which statement describes a characteristic of Cisco Catalyst 2960 switches?

New Cisco Catalyst 2960-C switches support PoE pass-through.

They are best used as distribution layer switches.


They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.

They are modular switches.


15. Which network design solution will best extend access layer connectivity to host devices?

implementing redundancy

implementing wireless connectivity

implementing EtherChannel

implementing routing protocols

1. Which topology diagram displays IP addresses?

ip topology

logical topology

physical topology

port topology
2. Which document could be referenced to identify the OS on a server?

End-system Documentation

LAN Switch Device Documentation

Router Device Documentation


3. Which three statements will a network baseline answer? (Choose three.)

How does the network perform during a normal or average day?

How much did the network cost?

What are the network policies?

What part of the network is least used?

What part of the network is most heavily used?


Who is responsible for managing the network?
4. True or False? A network baseline never ends and continually gathers information on a
yearly basis.

True

False
5. Which command could be used to get detailed information about directly connected Cisco
neighbor devices?

show cdp neighbor

show ip interface

show ip route

show version

1. Which option lists the three troubleshooting stages in the correct order?

Gather symptoms, implement corrective action, and isolate the problem.

Gather symptoms, isolate the problem, and implement corrective action.

Implement corrective action, gather symptoms, and isolate the problem.

Implement corrective action, isolate the problem, and gather symptoms.

Isolate the problem, gather symptoms, and implement corrective action.

Isolate the problem, implement corrective action, and gather symptoms.


2. In which step of the seven-step troubleshooting process, would you create a rollback plan
identifying how to quickly reverse a solution?

Analyze information

Define the problem

Eliminate possible causes


Gather information

Propose Hypothesis

Solve the problem and document solution

Test hypothesis
3. Which are recommendations to be used when communicate with a user?

Always be considerate and empathize with users.

Always listen or carefully read what the user is saying.

Speak at a technical level they can understand.

All the above


4. During the gathering information step, which command would display the configured
protocols and the global and interface-specific status of any configured Layer 3 protocol?

show interface

show ip interface brief

show ip protocols

show protocols

show version
5. What is the highest OSI layer that should be considered when troubleshooting routers and
Layer 3 switches?

Layer 1

Layer 2

Layer 3

Layer 4

Layer 7
6. Which structured troubleshooting method should be used when a cabling problem is
suspected?

Bottom-up Troubleshooting Method

Comparison Troubleshooting Method

Divide-and-conquer Troubleshooting Method

Educated Guess Troubleshooting Method

Follow-the-Path Troubleshooting Method

Top-down Troubleshooting Method


7. Which structured troubleshooting method should be used when a software orientated
problem occurs?

Bottom-up Troubleshooting Method

Comparison Troubleshooting Method

Divide-and-conquer Troubleshooting Method

Educated Guess Troubleshooting Method

Follow-the-Path Troubleshooting Method

Top-down Troubleshooting Method

1. Which of these is an on-line network device vendor resource that can be used as a source of
information?

Baselining tool

Knowledge base

Network Management System (NMS)

Protocol analyzer
2. Which tool is useful to investigate packet content while flowing through the network?
Baselining tool

Knowledge base

Network Management System (NMS)

Protocol analyzer
3. Which hardware troubleshooting tool is a multifunctional handheld device used to test and
certify copper and fiber cables for different services and standards?

Cable Analyzer

Cable Tester

Digital Multimeters

Network Analysis Module

Portable Network Analyzers


4. Cisco IOS log messages fall into one of eight levels. Which syslog logging level is used to
log the highest severity level?

1. Which OSI layer are you troubleshooting when the cause of network transmission errors is
due to late collisions, short frames, and jabber?

Application

Data link

Network

Physical
Transport
2. Which OSI layer are you troubleshooting when investigating a spanning-tree loop?

Application

Data link

Network

Physical

Transport
3. Which OSI layer are you troubleshooting when investigating a routing protocol loop?

Application

Data link

Network

Physical

Transport
4. Which OSI layer are you troubleshooting when investigating an extended ACL related
problem?

Application

Data link

Network

Physical

Transport
5. Which OSI layer are you troubleshooting when investigating a DNS related problem?

Application
Data link

Network

Physical

Transport
6. Which IOS command can be used to test if other network protocols are working?

ping

ssh

telnet

Traceroute

1. Which statement describes the physical topology for a LAN?

It depicts the addressing scheme that is employed in the LAN.

It defines how hosts and network devices connect to the LAN.

It shows the order in which hosts access the network.

It describes whether the LAN is a broadcast or token-passing network.


2. A network engineer is troubleshooting a network problem where users cannot access the
FTP server at the same IP address where a website can be successfully accessed. Which
troubleshooting method would be the best to apply in this case?

top-down

comparing IP settings on user workstations

divide-and-conquer

bottom-up
3. A computer technician performed a number of actions to correct a problem. Some actions
did not solve the problem, but eventually a solution was found. What should be documented?

everything that was done to try to solve the problem


a description of the problem and solution

only the solution, because this solved the problem

only the failed attempts, so that future technicians will know what not to try
4. A network engineer is troubleshooting a network problem and can successfully ping between
two devices. However, Telnet between the same two devices does not work. Which OSI layers
should the administrator investigate next?

only the network layer

from the network layer to the application layer

from the network layer to the physical layer

all of the layers


5. While designing changes to a data center because of a new IoE implementation, a network
administrator has the job of diagramming the new physical topology of the area. What should be
included in the physical topology diagram?

the service level agreement from the ISP

the IP addressing scheme for all workstations in the company

technical specifications of firewalls

cable locations and lengths between servers and switches


6. A network technician is troubleshooting an email connection problem. Which question to the
end-user will provide clear information to better define the problem?

What kind of equipment are you using to send emails?

Is your email working now?

When did you first notice your email problem?

How big are the emails you tried to send?


7. Which troubleshooting tool can be used to pinpoint the distance to a break in a network
cable?
network analyzer

network analysis module

digital multimeter

cable tester
8. Which troubleshooting software is an example of a network management system tool?

WhatsUp Gold

CyberGauge

LANsurveyor

Wireshark
9. What is the purpose of establishing a network baseline?

to provide an inventory of network devices

to verify the configuration of routers and switches on the network

to help monitor and troubleshoot network performance

to document and analyze the network traffic


10. After which step in the network troubleshooting process would one of the layered
troubleshooting methods be used?

documenting symptoms

narrowing the scope

gathering symptoms from suspect devices

determining ownership
11. A company is setting up a web site with SSL technology to protect the authentication
credentials required to access the web site. A network engineer needs to verify that the setup is
correct and that the authentication is indeed encrypted. Which tool should be used?

protocol analyzer
cable analyzer

fault-management tool

baselining tool
12. When should a network performance baseline be measured?

immediately after the main network devices restarted

during normal work hours of an organization

when a denial of service attack to the network is detected and blocked

after normal work hours to reduce possible interruptions


13. A networked PC is having trouble accessing the Internet, but can print to a local printer and
ping other computers in the area. Other computers on the same network are not having any issues.
What is the problem?

The PC has a missing or incorrect default gateway.

The default gateway router does not have a default route.

The link between the switch to which the PC connects and the default gateway router is down.

The switch port to which the PC connects has an incorrect VLAN configured.
14. A technician installed a network adapter in a computer and wants to test network
connectivity. The ping command can receive responses from workstations on the same subnet but
not from remote workstations. What could be causing the problem?

The default gateway is incorrect.

The NIC driver is out of date.

The TCP/IP protocol stack is not loaded.

The operating system is not compatible with the remote sites.


15. What network troubleshooting capability is provided by a cable analyzer?

discovering VLAN configuration and viewing switch interface details

testing and certifying of copper and fiber cables


measuring electrical values of voltage, current, and resistance

generating reports on traffic that is consuming critical network resources

1. Which cloud service provides programmers access to the development tool and services
used to deliver applications?

SaaS

PaaS

IaaS
2. Which cloud service provides users with access to services such as email, communications,
and Office 365 delivered over the internet?

SaaS

PaaS

IaaS
3. Which cloud service provides IT managers with access to network equipment, virtualized
services, and a supporting network infrastructure?

SaaS

PaaS

IaaS
4. Which cloud model represents two or more clouds where each part remains a distinctive
object, but both are connected using a single architecture?

public cloud

private cloud

hybrid cloud

community cloud
5. Which cloud model is used to meet the needs of a specific industry, such as healthcare or
media?

public cloud

private cloud

hybrid cloud

community cloud

1. What technology separates the OS from the hardware?

web application

virtualization

dedicate servers

firmware
2. What device uses all the RAM, processing power, and hard drive space devoted to one
service?

virtual machine

Type 1 hypervisor

dedicated server

virtualized server
3. Which technology is a program, firmware, or hardware that adds an abstraction layer on top
of the physical hardware?

web application

virtualization

dedicated Server

hypervisor
4. What are the major advantages of virtualization? (Choose three)
requires less equipment

less abstraction

fewer operating systems

faster provisioning

increased server uptime


5. Which technology is installed on top of the existing OS to create and run VM instances?

Type 2 Hypervisor

web applications

virtualization

dedicated servers
1. True or False. A Type 1 hypervisor is installed on top of the existing OS and is called the
hosted approach.

True

False
2. True of False. A Type 1 hypervisor requires a management console to manage the
hypervisor.

True

False
3. True or False. Management consoles prevent server over allocation.

True

False
4. True of False. East-West traffic is exchanged between virtual servers in the same data
center.

True
False

1. Which characteristic best describes the control plane of a networking device? (Choose
three.)

Information sent to this plane is processed by the CPU.

This plane is also called the forwarding plane.

This plane makes forwarding decisions.

This plane contains router protocol neighbor and topology tables.

This plane is responsible for switching frames out the interfaces.


2. Which characteristics best describe the data plane of a networking device? (Choose three.)

This plane is the brains of the device.

This plane is used to forward traffic flows.

Information in this plane is typically processed by a special processor.

This plane contains IPv4 and IPv6 routing tables.

This plane is typically made up of a switch fabric connecting the various ports on a device.
3. True of False. A network administrator accesses the control plane to configure a device.

True

False
4. This network architecture offers a new approach to network administration and management
that seeks to simplify and streamline the administration process.

network virtualization

SDN

Cisco ACI

centralized controller
5. This is a logical entity that enables network administrators to manage and dictate how the
data plane of switches and routers should handle network traffic.

control plane

data plane

VM

SDN controller
6. This is a standardized request from the SDN controller to define the behavior of the data
plane.

North-South traffic

Northbound APIs

East-West traffic

Southbound APIs

1. This is a table that matches incoming packets to a particular flow and specifies the functions
that are to be performed on the packet.

neighbor table

routing table

flow table

ARP table

meter table
2. This is a table that triggers a variety of performance-related actions on a flow including the
ability to rate-limit the traffic.

neighbor table

routing table

flow table
ARP table

meter table
3. This type of SDN, a centralized location is responsible for managing devices throughout the
network.

device-based SDN

controller-based SDN

policy-based SDN
4. In this type of SDN, the devices are programmable by applications running on the device
itself or on a server in the network.

device-based SDN

controller-based SDN

Policy-based SDN
5. This type of SDN uses built-in applications that automate advanced configuration tasks via a
guided workflow and user-friendly GUI. No programming skills are required.

device-based SDN

controller-based SDN

policy-based SDN

1. A company uses a cloud-based payroll system. Which cloud computing technology is this
company using?

browser as a service (BaaS)

infrastructure as a service (IaaS)

software as a service (SaaS)

wireless as a service (WaaS)


2. For a data center, what is the difference in the server virtualization data traffic compared with
the traditional client-server model?
More network control traffic is generated between virtual servers and clients.

Data traffic from clients will be routed to multiple virtual servers.

There are significant data exchanges between virtual servers.

There is more data traffic flowing from virtual servers to clients.


3. Which component in a traditional infrastructure device provides Layer 2 and Layer 3
functions to create data paths within a network?

control plane

data plane

adjacency table

forwarding information base


4. Which network traffic management technology is a basic element in SDN implementations?

IEEE 802.1aq

OpenStack

Interface to the Routing System

OpenFlow
5. Which two technologies are core components of Cisco ACI architecture? (Choose two.)

OpenFlow enabled switches

Application Network Profile

Interface to the Routing System

Application Policy Infrastructure Controller

Transparent Interconnection of Lots of Links


6. Which Cloud computing service would be best for a new organization that cannot afford
physical servers and networking equipment and must purchase network services on-demand?
ITaaS

IaaS

PaaS

SaaS
7. Which services are provided by a private cloud?

encrypted data storage in cloud computing

secure communications between sensors and actuators

multiple internal IT services in an enterprise

online services to trusted vendors


8. What are two reasons an organization might use cloud computing? (Choose two.)

reduces the time needed for maintenance windows

increases corporate use of technology resources

enables global access to corporate data

enables connectivity between disparate networks

provides power and physical plants capable of meeting increased requirements


9. What is a characteristic of data flow processing in SDN?

Each data flow through the network must be approved by the SDN controller first.

OpenStack is used to construct the entry in switches to facilitate data forwarding.

The SDN controller routes a data flow first and the data plane will use policies to permit or deny the
flow.

The SDN controller attaches an entry to each packet to identify the flow.
10. What are three abstraction layers of a computer system? (Choose three.)
network

services

security

hardware

firmware

data
11. In software defined network architecture, what function is removed from network devices and
performed by an SDN controller?

control plane

data plane

application policies

security
12. Which term describes the data exchanges between virtual servers in a data center?

east-west traffic

north-south traffic

vertical traffic

backbone traffic
13. How is the control plane modified to operate with network virtualization?

Control plane redundancy is added to each network device.

The control plane on each device is interconnected to a dedicated high-speed network.

A hypervisor is installed in each device to allow multiple instances of the control plane.

The control plane function is consolidated into a centralized controller.


14. Which Cloud computing service would be best for an organization that needs to
collaboratively create applications and deliver them over the web?
SaaS

ITaaS

IaaS

PaaS

1. You use online banking to pay a bill.

Automation

Not automation
2. Production levels are automatically tied to demand, eliminating unneeded product and
reducing the impact on the environment.

Automation

Not automation
3. Your GPS recalculates the best route to a destination based on current traffic congestion.

Automation

Not automation
4. The temperature and lighting in your home is adjusted based on your daily routine.

Automation

Not automation
5. A refrigerator senses that you are out of milk and places an order for more.

Automation

Not automation
6. You adjust the volume on the television set with a remote control.

Automation
Not automation
7. Robots are used in dangerous conditions to reduce safety risks to humans.

Automation

Not automation
8. You open your car door with a remote control.

Automation

Not automation

1. Which of the following data formats is typically used to display web pages?

HTML

XML

JSON

YAML
2. Which of the following describes a key/value pair?

A key is a string and a value is a list

A key/value pair is another name for an array.

A key describes the data and the value is the data itself.

A key/value pair is only used in JSON.


3. TRUE or FALSE: White space in JSON format is significant and must be correctly formatted.

True

False
4. This data format is a minimalist format that is very easy to read and is considered a superset
of another data format.
HTML

XML

JSON

YAML
5. This data format is self-descriptive through the use of the <tag>data</tag> structure.

HTML

XML

JSON

YAML
1. True or False: An API is a set of rules describing how one application can interact with
another, and the instructions to allow the interaction to occur.

True

False
2. Which of the following APIs would be used exclusively between Google and Cisco?

Open or Public API

Internal or Private API

Partner API
3. Which of the following APIs is used by Cisco to provide access to students to complete labs?

Open or Public API

Internal or Private API

Partner API
4. Which of the following APIs would be used exclusively between computing devices within
Cisco?

Open or Public API


Internal or Private API

Partner API
5. Which of the following APIs provides flexible formatting and is the most widely used?

SOAP

REST

XML-RPC

JSON-RPC

1. An API in considered RESTful if it has which of the following features? (Choose three.)

Stateful

Stateless

Cacheable

Cacheless

Client-Server

Server-Server
2. Which of the following is a URL?

https://www.cisco.com/c/en/us/solutions/design-zone.html#~all-guides

https://www.cisco.com/c/en/us/solutions/design-zone.html

www.cisco.com/c/en/us/solutions/design-zone.html

#~all-guides
3. Which of the following is a URN?

https://www.cisco.com/c/en/us/solutions/design-zone.html#~all-guides
https://www.cisco.com/c/en/us/solutions/design-zone.html

www.cisco.com/c/en/us/solutions/design-zone.html

#~all-guides
4. Which of the following is a URI?

https://www.cisco.com/c/en/us/solutions/design-zone.html#~all-guides

https://www.cisco.com/c/en/us/solutions/design-zone.html

www.cisco.com/c/en/us/solutions/design-zone.html

#~all-guides
5. Which of the following make up the query portion of a RESTful request? (Choose three.)

Key

Format

Parameters

Resources

API server

1. Which of the following are not typically used as configuration tools? (Choose two.)

API

Ansible

Chef

Puppet

SaltStack

SNMP
2. Identify the term for the following definition in relationship to configuration management tools:
Programmatically performing a task on a system such as configuring an interface or deploying a
VLAN.
Version control

Automation

Orchestration

Network management
3. Identify the term for the following definition in relationship to configuration management tools:
The process of how all automated activities need to happen, such as the order they must be done
and what must be completed before another task is begun.

Version control

Automation

Orchestration

Network management
4. True or False: Agentless means that the controller or master pushes the configuration to the
controlled device.

True

False
5. Which of the following configuration management tools use Python? (Choose all that apply.)

Ansible

Chef

Puppet

SaltStack

1. Which IBN feature is responsible for continuous validation and verification that the network is
meeting the expressed intent?

Translation

Activation
Assurance

Network Infrastructure
2. Which IBN feature enables the network administrator to express the expected networking
behavior that will best support the business intent?

Translation

Activation

Assurance

Network Infrastructure
3. Which IBN feature installs policies that capture intent into the physical and virtual network
infrastructure using networkwide automation?

Translation

Activation

Assurance

Network Infrastructure
4. True or False: The underlay limits the number of devices the network administrator must
program. It also provides services and alternative forwarding methods not controlled by the
underlying physical devices.

True

False

1. What is JSON?

It is a data format for storing and transporting data.

It is a compiled programming language.

It is a database.

It is a scripting language.
2. What is an architectural constraint to which a true RESTful API web service must adhere?

It operates as a cloud service.

It runs as client/server model.

It uses HTTPS to transport data.

It must support the XML data format.


3. In the RESTful API request example, http://www.mapquestapi.com/directions/v2/route?
outFormat=json&key=KEY&from=San+Jose,Ca&to=Monterey,Ca, which term describes the
component directions/v2/route?

parameters

API server

query

resources
4. Which statement describes an API?

It is a set of functions and subroutines to be used in a comprehensive application.

It is a set of rules that filter network traffic for web-based applications.

It is a set of functions and procedures that allows a client application to access the data of the
service application.

It is a programming language for creating a web-based application.


5. Which term describes the process of managing configuration changes of network devices in
an orderly fashion?

automation

orchestration

provisioning

version control
6. Which web service API can use multiple data formats including JSON, XML, and YAML?
SOAP

JSON-RPC

XML-RPC

REST
7. What are two reasons that most RESTful APIs require a key in the request? (Choose two.)

to encrypt the query message in the API request

to authenticate the requesting source

to gather information on the people using the API

to specify the data format expected from the response

to make sure that the query matches the service offered by the web application
8. What is a difference between the XML and HTML data formats?

XML requires indentation for each key/value pair whereas HTML does not require indentation.

XML uses a self-descriptive data structure but HTML uses a standard document structure.

XML formats data in hexadecimal whereas HTML formats data in binary.

XML encloses data within a pair of tags whereas HTML uses a pair of quotation marks to enclose
data.
9. A programmer is using Ansible as the configuration management tool. Which term is used to
describe a set of instructions for execution?

Cookbook

Pillar

Playbook

Manifest
10. Which term is used to describe a set of instructions for execution by the configuration
management tool Chef?
Pillar

Manifest

Playbook

Cookbook
11. Which two configuration management tools are developed using Python? (Choose two.)

Ansible

Chef

SaltStack

NETCONF

Puppet
12. Which function of the Cisco intent-based networking system (IBNS) enables network
operators to express the expected networking behavior that will best support the business intent?

translation

assurance

ACL analysis

activation
13. Which types of APIs are suitable for the data communication between a travel website and a
hotel chain inquiring about room availability data?

internal APIs

open APIs

public APIs

partner APIs
14. Which characters are used to enclose a JSON key?
commas

quotation marks

colons

square brackets
15. Which character is used to separate JSON key/value pairs?

(comma) ,

(dash) -

(semi colon) ;

(forward slash) /

You might also like