Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONCCNP ENCOR 350-401 - part 7

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CCNP ENCOR 350-401 - part 7

Description:
CCNP ENCOR 350-401 - part 7

Author:
AVATAR

Creation Date:
23/04/2024

Category:
Others

Number of questions: 50
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
What is a characteristic of MACsec? A. 802.1AE is built between the host and switch using the MKA protocol, which negotiates encryption keys based on the primary session key from a successful 802.1X session. B. 802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol. C. 802.1AE is built between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode). D. 802.1AE provides encryption and authentication services.
Refer to the exhibit. A network engineer attempts to connect to the Router1 console port. Which configuration is needed to allow Telnet connections? A. Router1(config)# line vty 0 15 Router1(config-line)# transport output telnet B. Router1(config)# telnet client C. Router1(config)# line console 0 Router1(config-line)# transport output telnet D. Router1(config)# access-list 100 permit tcp any any eq telnet Router1(config)# line console 0 Router1(config-line)# access-class 100 out .
A network engineer must configure a password expiry mechanism on the gateway router for all local passwords to expire after 60 days. What is required to complete this task? A. Add the username admin privilege 15 common-criteria-policy Administrators password 0 Cisco13579! command. B. The password expiry mechanism is on the AAA server and must be configured there. C. Add the aaa authentication enable default Administrators command. D. No further action is required. The configuration is complete. .
Which privilege level is assigned to VTY users? A. 1 B. 7 C. 13 D. 15 .
Which statements are used for error handling in Python? A. try/catch B. catch/release C. block/rescue D. try/except .
How do agent-based versus agentless configuration management tools compare? A. Agentless tools use proxy nodes to interface with slave nodes. B. Agentless tools require no messaging systems between master and slaves. C. Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave nodes. D. Agent-based tools do not require installation of additional software packages on the slave nodes. .
Which HTTP JSON response does the Python code output give? A. 7.0(3)|7(4) B. 7.61 C. NameError: name 'json' is not defined D. KeyError: 'kickstart_ver_str' .
A network administrator is preparing a Python script to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running. Which operation of the ncclient manager prevents colleagues from making changes to the devices while the script is running? A. m.lock(config='running') B. m.lock(target='running') C. m.freeze(target='running') D. m.freeze(config='running') .
Which outcome is achieved with this Python code? client.connect (ip, port= 22, username= usr, password= pswd ) stdin, stdout, stderr = client.exec_command ( 'show ip bgp 192.168.101.0 bestpath\n ' ) print (stdout) A. connects to a Cisco device using SSH and exports the BGP table for the prefix B. displays the output of the show command in a formatted way C. connects to a Cisco device using SSH and exports the routing table information D. connects to a Cisco device using Telnet and exports the routing table information .
Refer to the exhibit. Which JSON syntax is derived from this data? A. {[{'First Name': 'Johnny', 'Last Name': 'Table', 'Hobbies': ['Running', 'Video games']}, {'First Name': 'Billy', 'Last Name': 'Smith', 'Hobbies': ['Napping', 'Reading']}]} B. {'Person': [{'First Name': 'Johnny', 'Last Name': 'Table', 'Hobbies': 'Running', 'Video games'}, {'First Name': 'Billy', 'Last Name': 'Smith', 'Hobbies': 'Napping', 'Reading'}]} C. {[{'First Name': 'Johnny', 'Last Name': 'Table', 'Hobbies': 'Running', 'Hobbies': 'Video games'}, {'First Name': 'Billy', 'Last Name': 'Smith', 'Hobbies': 'Napping', 'Reading'}]} D. {'Person': [{'First Name': 'Johnny', 'Last Name': 'Table', 'Hobbies': ['Running', 'Video games']}, {'First Name': 'Billy', 'Last Name': 'Smith', 'Hobbies': ['Napping', 'Reading']}]} .
Which data is properly formatted with JSON? A B C D.
Based on the output below, which Python code shows the value of the "upTime" key? A. json_data = response.json() print(json_data['response'][0]['upTime']) B. json_data = response.json() print(json_data[response][0][upTime]) C. json_data = json.loads(response.text) print(json_data['response']['family']['upTime']) D. json_data = response.json() print(json_data['response'][family]['upTime']) .
Which exhibit displays a valid JSON file? A B C D.
What is the JSON syntax that is formed from the data? A. {Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]} B. {ג€Nameג€: ג€Bob Johnsonג€, ג€Ageג€: 75, ג€Aliveג€: true, ג€Favorite Foodsג€: [ג€Cerealג€, ג€Mustardג€, ג€Onionsג€]} C. {'Name': 'Bob Johnson', 'Age': 75, 'Alive': True, 'Favorite Foods': 'Cereal', 'Mustard', 'Onions'} D. {ג€Nameג€: ג€Bob Johnsonג€, ג€Ageג€: Seventyfive, ג€Aliveג€: true, ג€Favorite Foodsג€: [ג€Cerealג€, ג€Mustardג€, ג€Onionsג€]} .
Which JSON syntax is valid? A. {ג€switchג€: ג€nameג€: ג€dist1ג€, ג€interfacesג€: [ג€gig1ג€, ג€gig2ג€, ג€gig3ג€]} B. {/ג€switch/ג€: {/ג€name/ג€: ג€dist1ג€, /ג€interfaces/ג€: [ג€gig1ג€, ג€gig2ג€, ג€gig3ג€]}} C. {ג€switchג€: {ג€nameג€: ג€dist1ג€, ג€interfacesג€: [ג€gig1ג€, ג€gig2ג€, ג€gig3ג€]}} D. {'switch': ('name': 'dist1', 'interfaces': ['gig1', 'gig2', 'gig3'])} .
What is the structure of a JSON web token? A. three parts separated by dots: header, payload, and signature B. three parts separated by dots: version, header, and signature C. header and payload D. payload and signature .
A response code of 404 is received while using the REST API on Cisco DNA Center to POST to this URI: /dna/intent/api/v1/template-programmer/project What does the code mean? A. The POST/PUT request was fulfilled and a new resource was created. Information about the resource is in the response body. B. The request was accepted for processing, but the processing was not completed. C. The client made a request for a resource that does not exist. D. The server has not implemented the functionality that is needed to fulfill the request. .
Which two operations are valid for RESTCONF? (Choose two.) A. PULL B. PUSH C. PATCH D. REMOVE E. ADD F. HEAD .
Refer to the exhibit. An engineer is using XML in an application to send information to a RESTCONF-enabled device. After sending the request, the engineer gets this response message and an HTTP response code of 400. What do these responses tell the engineer? A. The Accept header sent was application/xml. B. POST was used instead of PUT to update. C. The Content-Type header sent was application/xml. D. A JSON body was used. .
What is used to validate the authenticity of client and is sent in HTTP requests as a JSON object? A. SSH B. HTTPS C. JWT D. TLS .
What is YANG used for? A. scraping data via CLI B. processing SNMP read-only polls C. describing data models D. providing a transport for network configuration data between client and server .
Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session? A. HTTP Status Code: 200 B. HTTP Status Code: 302 C. HTTP Status Code: 401 D. HTTP Status Code: 504 .
Which protocol does REST API rely on to secure the communication channel? A. HTTP B. SSH C. HTTPS D. TCP .
At which layer does Cisco DNA Center support REST controls? A. session layer B. northbound APIs C. EEM applets or scripts D. YAML output from responses to API calls .
Which algorithms are used to secure REST API from brute attacks and minimize the impact? A. SHA-512 and SHA-384 B. MD5 algorithm-128 and SHA-384 C. SHA-1, SHA-256, and SHA-512 D. PBKDF2, BCrypt, and SCrypt .
Which method of account authentication does OAuth 2.0 use within REST APIs? A. username/role combination B. access tokens C. cookie authentication D. basic signature workflow .
Which two protocols are used with YANG data models? (Choose two.) A. TLS B. RESTCONF C. SSH D. NETCONF E. HTTPS .
What is a benefit of data modeling languages like YANG? A. They create more secure and efficient SNMP OIDs. B. They provide a standardized data structure, which results in configuration scalability and consistency. C. They enable programmers to change or write their own applications within the device operating system. D. They make the CLI simpler and more efficient. .
Which protocol infers that a YANG data model is being used? A. SNMP B. RESTCONF C. REST D. NX-API .
Which method displays text directly into the active console with a synchronous EEM applet policy? A. event manager applet boom event syslog pattern 'UP' action 1.0 syslog priority direct msg 'logging directly to console' B. event manager applet boom event syslog pattern 'UP' action 1.0 gets 'logging directly to console' C. event manager applet boom event syslog pattern 'UP' action 1.0 string 'logging directly to console' D. event manager applet boom event syslog pattern 'UP' action 1.0 puts 'logging directly to console' .
Which two steps are required for a complete Cisco DNA Center upgrade? (Choose two.) A. automation backup B. system update C. golden image selection D. proxy configuration E. application updates.
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually? A. event manager applet ondemand event none action 1.0 syslog priority critical msg 'This is a message from ondemand' B. event manager applet ondemand action 1.0 syslog priority critical msg 'This is a message from ondemand' C. event manager applet ondemand event register action 1.0 syslog priority critical msg 'This is a message from ondemand' D. event manager applet ondemand event manual action 1.0 syslog priority critical msg 'This is a message from ondemand' .
What does this EEM applet event accomplish? "event snmp oid 1.3.6.1.3.7.6.5.3.9.3.8.7 get-type next entry-op gt entry-val 75 poll-interval 5" A. Upon the value reaching 75%, a SNMP event is generated and sent to the trap server. B. It reads an SNMP variable, and when the value exceeds 75%, it triggers an action. C. It issues email when the value is greater than 75% for five polling cycles. D. It presents a SNMP variable that can be interrogated. .
What is a requirement for an Ansible-managed node? A. It must have an SSH server running. B. It must be a Linux server or a Cisco device. C. It must support ad hoc commands. D. It must have an Ansible Tower installed. .
Which characteristic distinguishes Ansible from Chef? A. Ansible uses Ruby to manage configurations. Chef uses YAML to manage configurations. B. The Ansible server can run on Linux, Unix or Windows. The Chef server must run on Linux or Unix. C. Ansible pushes the configuration to the client. Chef client pulls the configuration from the server. D. Ansible lacks redundancy support for the primary server. Chef runs two primary servers in active/active mode. .
uses a pull model uses playbooks procedural declarative.
Refer to the exhibit. What does the snippet of code achieve? A. It creates an SSH connection using the SSH key that is stored, and the password is ignored. B. It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls. C. It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context. D. It opens a tunnel and encapsulates the login information, if the host key is correct. .
Which two characteristics define the Intent API provided by Cisco DNA Center? (Choose two.) A. northbound API B. business outcome oriented C. device-oriented D. southbound API E. procedural .
In a Cisco DNA Center Plug and Play environment, why would a device be labeled unclaimed? A. The device has not been assigned a workflow. B. The device could not be added to the fabric. C. The device had an error and could not be provisioned. D. The device is from a third-party vendor. .
What does the Cisco DNA Center use to enable the delivery of applications through a network and to yield analytics for innovation? A. process adapters B. Command Runner C. intent-based APIs D. domain adapters .
Which devices does Cisco DNA Center configure when deploying an IP-based access control policy? A. all devices integrating with ISE B. selected individual devices C. all devices in selected sites D. all wired devices .
Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on devices with similar network settings? A. Command Runner B. Application Policies C. Template Editor D. Authentication Template .
In which part of the HTTP message is the content type specified? A. HTTP method B. body C. header D. URI .
An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use? event manager applet LogMessage event routing network 172.30.197.0/24 type all A. action 1 syslog msg ג€OSPF ROUTING ERRORג€ B. action 1 syslog send ג€OSPF ROUTING ERRORג€ C. action 1 syslog pattern ג€OSPF ROUTING ERRORג€ D. action 1 syslog write ג€OSPF ROUTING ERRORג€ .
An engineer runs the code against an API of Cisco DNA Center, and the platform returns this output. What does the response indicate? A. The authentication credentials are incorrect. B. The URI string is incorrect. C. The Cisco DNA Center API port is incorrect. D. The HTTP method is incorrect.
What are two benefits of YANG? (Choose two.) A. It enforces the use of a specific encoding format for NETCONF. B. It collects statistical constraint analysis information. C. It enables multiple leaf statements to exist within a leaf list. D. It enforces configuration semantics. E. It enforces configuration constraints.
utilizes a pull model utilizes a push model multimaster architecture primary/secondary architecture.
Refer to the exhibit. After running the code in the exhibit, which step reduces the amount of data that the NETCONF server returns to the NETCONF client, to only the interface's configuration? A. Use the Ixml library to parse the data returned by the NETCONF server for the interface's configuration. B. Create an XML filter as a string and pass it to get_config() method as an argument. C. Create a JSON filter as a string and pass it to the get_config() method as an argument. D. Use the JSON library to parse the data returned by the NETCONF server for the interface's configuration. .
Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error? A. from ncclient import B. import manager C. from ncclient import * D. import ncclient manager.
Which line must be added in the Python function to return the JSON object {`cat_9k`: `FXS1932Q2SE`}? A. return (json.dumps({d['hostname']: d['serialNumber'] for d in json.loads(test_json)['response']})) B. return (json.dumps({for d in json.loads(test_json)['response']: d['hostname']: d['serialNumber']})) C. return (json.loads({d['hostname']: d['serialNumber'] for d in json.dumps(test_json)['response'})) D. return (json.loads({for d in json.dumps(test_json)['response']: d['hostname']: d['serialNumber']})) .
Report abuse Consent Terms of use