Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

DevNet Mod7-8

TermDefinition
What is the most common cause of IT outages? an engineer misconfiguring a device or network with manual changes
What is an unopinionated component in a software ecosystem? a component that does not show an increased preference for specific companion components or architectures unless those components or architectures are necessary
In the use of container technologies, what is a function of platform abstraction when considering the deployment of a product in a cloud environment? A containerized app can run on a generically-specified host environment.
A student is setting up the DEVASC-LAB VM and CSR1000v VM in VirtualBox that is installed on the local computer. Both VMs are imported to the VirtualBox successfully. The student starts -- Issue the show ip interface brief command in the CSR1000v VM.
What is the historical correlation between software developers and IT operations? Developers had the job of creating applications. Operations had the job of verifying that these applications work for users.
How is an error budget calculated in the DevOps/SRE culture? An error budget is the difference between the SLO and 100% availability.
In reviewing a formalized agreement between an organization and a customer, what is the purpose of an SLI? An SLI is a benchmark metric used to determine and describe SLOs.
What is the default shell commonly used on macOS and Linux? Bash
Which type of automation includes scripting that may be dangerous if the starting state is not completely known and controlled? procedural
What is an imperative procedure? An ordered sequence of commands that is used to reach a specific end state.
Which statement describes the declarative static model? A declarative model will examine present circumstances and bring real infrastructure into alignment in order to reach a desired state.
Refer to the exhibit. A user is working on Ansible on the local NMS to manage remote network devices. The user issues the ansible webservers -m ping command to test the communication. However, -- What are two possible causes for the error? (Choose two.) The destination host IP address is wrong.; The SSH service does not start on the host.
Which component in the pyATS ecology handles bundling and running jobs? EasyPy
An engineer has just created a backup file of a Cisco VIRL network simulation. Which command should be used to compare the most recent .virl file with the previous backup file? diff
While working in the Ansible code structure, which type of file contains a sequence of tasks, executed in top-down order? .yml
What is a standard command to create a Python virtual environment? python3 -m venv /path/to/new/virtual/environment
Which underlying technology makes it possible for Cisco Umbrella to prevent a user from accessing a blocked site? DNS
Which language is used by the NETCONF protocol to encode both the configuration data and protocol messages? XML
What are the three main capabilities provided by Cisco AMP? (Choose three.) detection ; responded and automation ; prevention
Which three functions are provided by Cisco Finesse REST APIS? (Choose three.) They can be used to integrate into existing applications to add contact center functionality. ; They can be used to build a fully functioning agent desktop. ; They can be used to build a script to automate tasks.
Which two benefits are provided by the Python-based WebEx Teams SDK? (Choose two.) It provides error reporting. ; It manages requests with pagination.
Refer to the exhibit. Which data format is used to describe the list of interfaces? YANG
Which two statements describe the usage of Cisco Finesse JavaScript APIs? (Choose two.) They can be used to embed existing web pages into a custom gadget. ; They can be used to build a custom gadget for the agent state workflow.
Why does the Meraki dashboard API return a 404 rather than a 403 code in response to a request with an invalid API key? The 404 return code prevents the system from indicating the existence of resources to unauthorized users.
What does Cisco ISE do when it identifies a user or device accessing the network? It automatically and securely places the device and user into the right part of the network.
How are service profiles used by Cisco UCS Manager? Cisco UCS Manager uses service profiles to assign a unique identity to the server associated with each profile.
Which function does the AXL interface provide for users? provisions and manages objects in the Unified Communication Management Administration Console
What are three primary YANG sources in Cisco NSO? (Choose three.) data models from devices ; NSO data model ; YANG service models
What are two tasks a network administrator can perform with Cisco UCS Director? (Choose two.) Deploy and add capacity to converged infrastructures in a consistent and repeatable manner. ; Create, clone, and deploy service profiles and templates for all Cisco UCS servers and compute applications.
What are two actions taken by Firepower for traffic control? (Choose two.) using security intelligence data to filter traffic, including IP addresses, address blocks, domain names, and URLs ; controlling which websites are available to the users on the network
What are two types of YANG models? (Choose two.) native model ; open model
What is a characteristic of the Yet Another Next Generation (YANG) data model? It uses a tree structure.
Which two application-specific media types can be used for RESTCONF to identify a YANG construct? (Choose two.) application/yang-data+xml ; application/yang-data+json
What is the name of the Cisco SD-WAN dashboard? vManage
What is Cisco Finesse? a browser-based contact center agent and supervisor desktop
Which Software as a Service (SaaS) management platform offers API keys for remote or service access? Cisco Intersight
Which Cisco SDK is primarily a call widget that is embedded in an iframe within another web page for Cisco UCS application? Jabber Guest SDK for Web
A developer is using a REST API to develop an application to communicate with a Webex Teams server. What is the default maximum number of items that can be returned by the Webex Teams API prior to using pagination? 100
Refer to the exhibit. A network administrator is developing an application that communicates with Cisco AMP using an AMP API. A response from an AMP service shows the API rate limits -. What is the unit of value indicated under the item x-ratelimit-limit? requests
What is the default TCP port assigned for NETCONF over SSH? 830
Where can a corporate developer access the API Explorer with the Firepower Threat Defense API? the URL address of the device itself
What is the average cost per hour of an enterprise outage for the largest enterprises? $300,000.00 per hour
What is idempotency in IT automation? the quality of software
A student is creating an Ansible playbook to practice management automation of a Cisco router. Which command should the student add to the playbook to find the interface names, assigned IP addresses, and status of interfaces on the router? show ip interface brief
When following the best practices and core principles of DevOps, how is failure considered? Failure is normal.
What is a canary deployment? the switchover of selected users to a new release deployment
What are two challenges of cloud computing technologies? (Choose two.) maintaining access control ; managing costs
Which technology can run on bare metal or on large virtual machines to simulate Cisco networks and utilities? VIRL
An analyst is using Ansible to perform remote management tasks on network devices. Which file type is in the Ansible file structure that describes the devices under management? inventory file
What is an error budget in the DevOps/SRE culture? It is a method for measuring allowable errors as a gate on release speed.
Which programming language is used by Chef to execute the recipes? Ruby
A developer issues a Linux command python3 -m venv devenv. What is the developer trying to achieve? to create a Python 3 virtual environment named devenv
Created by: user-1902021
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards