CCNA DEVASC M3 – Cisco Platforms and Development Posted byjay.ocampo11 November 1, 2020 Leave a comment on CCNA DEVASC M3 – Cisco Platforms and Development 1. What are some of the features of a good SDK? (Choose three.)Is easy to useIs well documentedIntegrates well with other SDKsImpacts hardware resources 2. What are the advantages of using an SDK? (Choose two.)Quicker integrationFaster developmentAdvanced customizationError handling 3. What APIs does the Cisco Meraki platform provide to developers? (Choose two.)Captive Portal APIScanning APIAccess Point APIInfrastructure API 4. What is the name of the Cisco Meraki Dashboard API authentication header?X-Cisco-Meraki-API-KeyX-Cisco-Meraki-TokenX-Cisco-Meraki-Session-keyBearer 5. What is the base URL for the Cisco Meraki Dashboard API?https://api.meraki.com/api/v0https://api.meraki.com/v1/apihttps://api.meraki.cisco.com/api/v0https://api.meraki.cisco.com/v1/api 6. What type of authentication do the Cisco DNA Center platform APIs use?No authAPI keyBasic authHash-based message authentication 7. When specifying the timestamp parameter with the Cisco DNA Center APIs, what format should the time be in?UNIX timeOS/2OpenVMSSYSTEMTIME 8. What is the output of the multivendor SDK for Cisco DNA Center platform?Device driverDevice packageSoftware driverSoftware package 9. Which component of the Cisco SD-WAN fabric exposes a public REST API interface?vSmartvBondvManagevEdge 10. When initially authenticating to the Cisco SD-WAN REST API, how are the username and password encoded?application/postscriptapplication/xmlapplication/jsonapplication/x-www-form-urlencoded 11. On what family of switches does Cisco ACI run?Cisco Catalyst 9000Cisco Nexus 9000Cisco Nexus 7000Cisco Catalyst 6800 12. True or false: An ACI bridge domain can be associated with multiple VRF instances.TrueFalse 13. What Cisco ACI REST API endpoint is used for authentication?https://APIC_IP_or_Hostname/api/aaaLogin.jsonhttps://APIC_IP_or_Hostname/api/loginhttps://APIC_IP_or_Hostname/api/v1/aaaLoginhttps://APIC_IP_or_Hostname/api/v1/login.json 14. In Cisco UCS Manager, what is the logical construct that contains the complete configuration of a physical server?Server profileService profileTemplate profileNone of the above 15. What is the Cisco UCS Manager Python SDK library called?ucsmsdkucssdkucsmciscoucsm 16. What is the managed object browser called in Cisco UCS Manager?MobrowserUCSMobrowserVisoreUCSVisore 17. What is a Cisco UCS Director workflow?The atomic unit of work in Cisco UCS DirectorA single action with inputs and outputsA collection of predefined tasksA series of tasks arranged to automate a complex operation 18. What is the name of the header that contains the Cisco UCS Director REST API access key?X-Cloupia-Access-KeyX-Cloupia-Request-KeyX-Cloupia-Secret-KeyX-Cloupia-API-Access 19. How are the managed objects organized in Cisco Intersight?Management information tableHierarchical management information treeManagement Information ModelHierarchical Managed Objects Model 20. What does the Cisco Intersight REST API key contain?keyId and keySecrettokenaccessKey and secretKeycookie 21. Which of the following are part of the Cisco collaboration portfolio? (Choose three.)Video CallingBotsRemote ExpertConnected Mobility Experience 22. How does Webex Teams allow you to access APIs? (Choose three.)IntegrationsBotsDronesPersonal access tokens 23. Guest users of Webex Teams authenticate with guest tokens, which use _____.Base64No tokenJWTSessions 24. Which of the following use webhooks in Webex Teams?BotsGuestsNobodyIntegrations 25. True or false: The Finesse desktop application is completely built using APIs.TrueFalse 26. Finesse implements the XMPP specification. The purpose of this specification is to allow the XMPP server (for Notification Service) to get information published to XMPP topics and then to send XMPP events to entities subscribed to the topic. The Finesse Notification Service then sends XMPP over _______ messages to agents that are subscribed to certain XMPP nodes.MQTTBOSHHTTPNone of the above 27. Which of the following enables hosts/users to update the information for a scheduled meeting that they are able to edit?SetMeetingListMeetingCreateMeetingLayered systems 28. Which of the following is the application programming interface (API) for collaboration endpoint software?MQTTTAPIDevNetxAPI 29. xAPI on a device can be accessed via which of the following protocol methods? (Choose all that apply.)SSHFTPHTTPWebsocket 30. Which of the following provides a mechanism for inserting, retrieving, updating, and removing data from Cisco Unified Communications Manager?Session Initiation ProtocolAdministration XMLSkinnyREST API 31. 1. The Umbrella ________ API provides enrichment of security events with intelligence to SIEM or other security visibility tool.EnforcementInvestigateManagementReporting 32. 2. The Umbrella Enforcement API involves an HTTP ______ request, which internally comprises an _____ API to check whether the domain is safe.POST, ReportingGET, InvestigatePOST, InvestigateGET, Reporting 33. In the Firepower Management Center API, the token is generated and returned via ________. 1. the HTTP header X-auth-access-tokenthe HTTP header X-auth-access-tokenJSON objectXML objectJWT 34. A _______ object is a reusable configuration that associates a name with a value.simplenamedobjectivenetwork 35. Which of the following allows bad actors to gain access to and control endpoint resources over an extended period to steal valuable data without being detected?MalwareMedium persistent threatAdvanced persistent threatRansomware 36. Which of the following enables devices and users to be identified and provisioned and enables policies to be applied?Cisco AMPCisco ISECisco Threat GridCisco Firepower Management Center 37. Which of the following describes Threat Grid?A VPN solution from Cisco unified malware analysis and threat intelligence platformA threat intelligence organizationAn intelligence security framework 38. Which of the following are used to indicate that a system has been affected by some form of malware?IoTsIOCsSnortReports 39. To add HTTP headers to a Python request, you can simply pass them in as which of the following?listdicttupleset 40. Which REST API architectural constraint allows you to download code and execute it?Client/serverStatelessnessCode on demandLayered systems 41. What network protocols support model-driven programmability? (Choose three.)NETCONFRESTCONFSSHgRPC 42. What is the default port on which the NETCONF protocol runs?TCP 22TCP 830UDP 161UDP 69 43. What framework does NETCONF use to exchange messages between the client and the server?RESTgRPCApache AvroRPCs 44. Which data type is not a YANG base data type?BinaryEnumerationPercentEmpty 45. Which component of a YANG module header uniquely identifies a module?PrefixNotificationNamespaceOrganization name 46. Which of the following is a popular Python library used to interact with NETCONF servers?requestsncclientjsonpyang 47. Which of the following are used for data encapsulation in RESTCONF messages? (Choose two.)XMLYANGYAMLJSON 48. What NETCONF operation is the equivalent of the RESTCONF PATCH method? (operation=”merge”) (operation=”create/replace”) (operation=”patch”) 49. What RESTCONF resource allows for automatic discovery of the API root?/discover/restconf/.well-known/restconf/.well-known/host-meta/discover/root 50. What types of subscriptions are supported by model-driven telemetry? (Choose two.)StaticDynamicConfiguredHard-coded Loading...