350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR) Part 5
Question #: 281
Topic #: 1
DRAG DROP –
Drag and drop the solutions that compromise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.
Select and Place:
Suggestion Answer:
Question #: 282
Topic #: 1
DRAG DROP –
An engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used.
R1#sh run | i aaa –
aaa new-model
aaa authentication login default group ACE group AAA_RADIUS local-case aaa session-id common
R1#
Select and Place:
Suggestion Answer:
Question #: 283
Topic #: 1
What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?
A. real-time threat management to stop DDoS attacks to the core and access networks
B. real-time awareness of users, devices, and traffic on the network
C. malware control
D. dynamic threat control for web traffic
Selected Answer: B
Question #: 284
Topic #: 1
An engineer must configure an ACL that permits packets which include an ACK in the TCP header. Which entry must be included in the ACL?
A. access-list 110 permit tcp any any eq 21 tcp-ack
B. access-list 10 permit tcp any any eq 21 established
C. access-list 110 permit tcp any any eq 21 established
D. access-list 10 permit ip any any eq 21 tcp-ack
Selected Answer: C
Question #: 285
Topic #: 1
A client with IP address 209.165.201.25 must access a web server on port 80 at 209.165.200.225. To allow this traffic, an engineer must add a statement to an access control list that is applied in the inbound direction on the port connecting to the web server.
Which statement allows this traffic?
A. permit tcp host 209.165.200.225 lt 80 host 209.165.201.25
B. permit tcp host 209.165.201.25 host 209.165.200.225 eq 80
C. permit tcp host 209.165.200.225 eq 80 host 209.165.201.25
D. permit tcp host 209.165.200.225 host 209.165.201.25 eq 80
Selected Answer: C
Question #: 286
Topic #: 1
Which standard access control entry permits traffic from odd-numbered hosts in the 10.0.0.0/24 subnet?
A. permit 10.0.0.0 0.0.0.1
B. permit 10.0.0.1 0.0.0.254
C. permit 10.0.0.1 0.0.0.0
D. permit 10.0.0.0 255.255.255.254
Selected Answer: B
Question #: 287
Topic #: 1
Refer to the exhibit. What step resolves the authentication issue?
A. use basic authentication
B. change the port to 12446
C. target 192.168.100.82 in the URI
D. restart the vsmart host
Selected Answer: C
Question #: 288
Topic #: 1
Refer to the exhibit.
Security policy requires all idle exec sessions to be terminated in 600 seconds.
Which configuration achieves this goal?
A. line vty 0 15 absolute-timeout 600
B. line vty 0 15 no exec-timeout
C. line vty 0 15 exec-timeout 10 0
D. line vty 0 4 exec-timeout 600
Selected Answer: C
Question #: 289
Topic #: 1
Refer to the exhibit.
An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router. However, the router can still ping hosts on the 209.165.200.0/24 subnet.
What explains this behavior?
A. Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.
B. After an access control list is applied to an interface, that interface must be shut and no shut for the access control list to take effect.
C. Only standard access control lists can block traffic from a source IP address.
D. The access control list must contain an explicit deny to block traffic from the router.
Selected Answer: A
Question #: 290
Topic #: 1
What is a characteristic of a next-generation firewall?
A. only required at the network perimeter
B. required in each layer of the network
C. filters traffic using Layer 3 and Layer 4 information only
D. provides intrusion prevention
Selected Answer: D
Question #: 291
Topic #: 1
Refer to the exhibit. An engineer is investigating why guest users are able to access other guest user devices when the users are connected to the customer guest
WLAN. What action resolves this issue?
A. implement P2P blocking
B. implement MFP client protection
C. implement Wi-Fi direct policy
D. implement split tunneling
Selected Answer: A
Question #: 292
Topic #: 1
Refer to the exhibit. An engineer has configured Cisco ISE to assign VLANs to clients based on their method of authentication, but this is not working as expected.
Which action will resolve this issue?
A. enable AAA override
B. set a NAC state
C. utilize RADIUS profiling
D. require a DHCP address assignment
Selected Answer: A
Question #: 293
Topic #: 1
Refer to the exhibit. Which single security feature is recommended to provide Network Access Control in the enterprise?
A. MAB
B. 802.1X
C. WebAuth
D. port security sticky MAC
Selected Answer: B
Question #: 294
Topic #: 1
Refer to the exhibit. After configuring an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?
A. VPN peers agreed on parameters for the ISAKMP SA.
B. Peers have exchanged keys, but ISAKMP SA remains unauthenticated.
C. ISAKMP SA is authenticated and can be used for Quick Mode.
D. ISAKMP SA has been created, but it has not continued to form.
Selected Answer: C
Question #: 295
Topic #: 1
Which two threats does AMP4E have the ability to block? (Choose two.)
A. email phishing
B. DDoS
C. Microsoft Word macro attack
D. SQL injection
E. ransomware
Selected Answer: CE
Question #: 296
Topic #: 1
Refer to the exhibit. An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts. Drag and drop the commands into the configuration to achieve these results. Some commands may be used more than once. Not all commands are used.
Select and Place:
Suggestion Answer:
Question #: 297
Topic #: 1
An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?
A. username netadmin secret 5 $1$b1Ju$kZbBS1Pyh4QzwXyZ1kSZ2
B. username netadmin secret 9 $9$vFpMf8elb4RVV8$seZ/bDAx1uV
C. username netadmin secret $1$b1Ju$k406689705QzwXyZ1kSZ2
D. line Console 0 password $1$b1Ju$
Selected Answer: B
Question #: 298
Topic #: 1
What is a characteristic of MACsec?
A. 802.1AE is built between the host and switch using the MKA protocol, which negotiates encryption keys based on the primary session key from a successful 802.1X session.
B. 802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol.
C. 802.1AE is built between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode).
D. 802.1AE provides encryption and authentication services.
Selected Answer: A
Question #: 299
Topic #: 1
Refer to the exhibit. A network engineer attempts to connect to the Router1 console port.
Which configuration is needed to allow Telnet connections?
A. Router1(config)# line vty 0 15 Router1(config-line)# transport output telnet
B. Router1(config)# telnet client
C. Router1(config)# line console 0 Router1(config-line)# transport output telnet
D. Router1(config)# access-list 100 permit tcp any any eq telnet Router1(config)# line console 0 Router1(config-line)# access-class 100 out
Selected Answer: C
Question #: 300
Topic #: 1
Refer to the exhibit.
A network engineer must configure a password expiry mechanism on the gateway router for all local passwords to expire after 60 days. What is required to complete this task?
A. Add the username admin privilege 15 common-criteria-policy Administrators password 0 Cisco13579! command.
B. The password expiry mechanism is on the AAA server and must be configured there.
C. Add the aaa authentication enable default Administrators command.
D. No further action is required. The configuration is complete.
Selected Answer: A
Question #: 301
Topic #: 1
Refer to the exhibit.
Which privilege level is assigned to VTY users?
A. 1
B. 7
C. 13
D. 15
Selected Answer: A
Question #: 302
Topic #: 1
Which statements are used for error handling in Python?
A. try/catch
B. catch/release
C. block/rescue
D. try/except
Selected Answer: D
Question #: 303
Topic #: 1
How do agent-based versus agentless configuration management tools compare?
A. Agentless tools use proxy nodes to interface with slave nodes.
B. Agentless tools require no messaging systems between master and slaves.
C. Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave nodes.
D. Agent-based tools do not require installation of additional software packages on the slave nodes.
Selected Answer: B
Question #: 304
Topic #: 1
Refer to the exhibit.
Which HTTP JSON response does the Python code output give?
A. 7.0(3)|7(4)
B. 7.61
C. NameError: name ‘json’ is not defined
D. KeyError: ‘kickstart_ver_str’
Selected Answer: A
Question #: 305
Topic #: 1
A network administrator is preparing a Python script to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running.
Which operation of the ncclient manager prevents colleagues from making changes to the devices while the script is running?
A. m.lock(config=’running’)
B. m.lock(target=’running’)
C. m.freeze(target=’running’)
D. m.freeze(config=’running’)
Selected Answer: B
Question #: 306
Topic #: 1
Which outcome is achieved with this Python code?
client.connect (ip, port= 22, username= usr, password= pswd ) stdin, stdout, stderr = client.exec_command ( ‘show ip bgp 192.168.101.0 bestpath\n ‘ ) print (stdout)
A. connects to a Cisco device using SSH and exports the BGP table for the prefix
B. displays the output of the show command in a formatted way
C. connects to a Cisco device using SSH and exports the routing table information
D. connects to a Cisco device using Telnet and exports the routing table information
Selected Answer: A
Question #: 307
Topic #: 1
Refer to the exhibit. Which JSON syntax is derived from this data?
A. {[{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video games’]}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’, ‘Reading’]}]}
B. {‘Person’: [{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: ‘Running’, ‘Video games’}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: ‘Napping’, ‘Reading’}]}
C. {[{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: ‘Running’, ‘Hobbies’: ‘Video games’}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: ‘Napping’, ‘Reading’}]}
D. {‘Person’: [{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video games’]}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’, ‘Reading’]}]}
Selected Answer: D
Question #: 308
Topic #: 1
Based on the output below, which Python code shows the value of the “upTime” key?
A. json_data = response.json() print(json_data[‘response’][0][‘upTime’])
B. json_data = response.json() print(json_data[response][0][upTime])
C. json_data = json.loads(response.text) print(json_data[‘response’][‘family’][‘upTime’])
D. json_data = response.json() print(json_data[‘response’][family][‘upTime’])
Selected Answer: A
Question #: 309
Topic #: 1
Refer to the exhibit.
What is the JSON syntax that is formed from the data?
A. {Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]}
B. {ג€Nameג€: ג€Bob Johnsonג€, ג€Ageג€: 75, ג€Aliveג€: true, ג€Favorite Foodsג€: [ג€Cerealג€, ג€Mustardג€, ג€Onionsג€]}
C. {‘Name’: ‘Bob Johnson’, ‘Age’: 75, ‘Alive’: True, ‘Favorite Foods’: ‘Cereal’, ‘Mustard’, ‘Onions’}
D. {ג€Nameג€: ג€Bob Johnsonג€, ג€Ageג€: Seventyfive, ג€Aliveג€: true, ג€Favorite Foodsג€: [ג€Cerealג€, ג€Mustardג€, ג€Onionsג€]}
Selected Answer: B
Question #: 310
Topic #: 1
Which JSON syntax is valid?
A. {ג€switchג€: ג€nameג€: ג€dist1ג€, ג€interfacesג€: [ג€gig1ג€, ג€gig2ג€, ג€gig3ג€]}
B. {/ג€switch/ג€: {/ג€name/ג€: ג€dist1ג€, /ג€interfaces/ג€: [ג€gig1ג€, ג€gig2ג€, ג€gig3ג€]}}
C. {ג€switchג€: {ג€nameג€: ג€dist1ג€, ג€interfacesג€: [ג€gig1ג€, ג€gig2ג€, ג€gig3ג€]}}
D. {‘switch’: (‘name’: ‘dist1’, ‘interfaces’: [‘gig1’, ‘gig2’, ‘gig3’])}
Selected Answer: C
Question #: 311
Topic #: 1
What is the structure of a JSON web token?
A. three parts separated by dots: header, payload, and signature
B. three parts separated by dots: version, header, and signature
C. header and payload
D. payload and signature
Selected Answer: A
Question #: 312
Topic #: 1
A response code of 404 is received while using the REST API on Cisco DNA Center to POST to this URI:
/dna/intent/api/v1/template-programmer/project
What does the code mean?
A. The POST/PUT request was fulfilled and a new resource was created. Information about the resource is in the response body.
B. The request was accepted for processing, but the processing was not completed.
C. The client made a request for a resource that does not exist.
D. The server has not implemented the functionality that is needed to fulfill the request.
Selected Answer: C
Question #: 313
Topic #: 1
Which two operations are valid for RESTCONF? (Choose two.)
A. PULL
B. PUSH
C. PATCH
D. REMOVE
E. ADD
F. HEAD
Selected Answer: CF
Question #: 314
Topic #: 1
Refer to the exhibit. An engineer is using XML in an application to send information to a RESTCONF-enabled device. After sending the request, the engineer gets this response message and an HTTP response code of 400. What do these responses tell the engineer?
A. The Accept header sent was application/xml.
B. POST was used instead of PUT to update.
C. The Content-Type header sent was application/xml.
D. A JSON body was used.
Selected Answer: A
Question #: 315
Topic #: 1
What is used to validate the authenticity of client and is sent in HTTP requests as a JSON object?
A. SSH
B. HTTPS
C. JWT
D. TLS
Selected Answer: C
Question #: 316
Topic #: 1
What is YANG used for?
A. scraping data via CLI
B. processing SNMP read-only polls
C. describing data models
D. providing a transport for network configuration data between client and server
Selected Answer: C
Question #: 317
Topic #: 1
Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session?
A. HTTP Status Code: 200
B. HTTP Status Code: 302
C. HTTP Status Code: 401
D. HTTP Status Code: 504
Selected Answer: C
Question #: 318
Topic #: 1
Which protocol does REST API rely on to secure the communication channel?
A. HTTP
B. SSH
C. HTTPS
D. TCP
Selected Answer: C
Question #: 319
Topic #: 1
At which layer does Cisco DNA Center support REST controls?
A. session layer
B. northbound APIs
C. EEM applets or scripts
D. YAML output from responses to API calls
Selected Answer: B
Question #: 320
Topic #: 1
Which algorithms are used to secure REST API from brute attacks and minimize the impact?
A. SHA-512 and SHA-384
B. MD5 algorithm-128 and SHA-384
C. SHA-1, SHA-256, and SHA-512
D. PBKDF2, BCrypt, and SCrypt
Selected Answer: D
Question #: 321
Topic #: 1
Which method of account authentication does OAuth 2.0 use within REST APIs?
A. username/role combination
B. access tokens
C. cookie authentication
D. basic signature workflow
Selected Answer: B
Question #: 322
Topic #: 1
Which two protocols are used with YANG data models? (Choose two.)
A. TLS
B. RESTCONF
C. SSH
D. NETCONF
E. HTTPS
Selected Answer: BD
Question #: 323
Topic #: 1
What is a benefit of data modeling languages like YANG?
A. They create more secure and efficient SNMP OIDs.
B. They provide a standardized data structure, which results in configuration scalability and consistency.
C. They enable programmers to change or write their own applications within the device operating system.
D. They make the CLI simpler and more efficient.
Selected Answer: B
Question #: 324
Topic #: 1
Which protocol infers that a YANG data model is being used?
A. SNMP
B. RESTCONF
C. REST
D. NX-API
Selected Answer: B
Question #: 325
Topic #: 1
Which method displays text directly into the active console with a synchronous EEM applet policy?
A. event manager applet boom event syslog pattern ‘UP’ action 1.0 syslog priority direct msg ‘logging directly to console’
B. event manager applet boom event syslog pattern ‘UP’ action 1.0 gets ‘logging directly to console’
C. event manager applet boom event syslog pattern ‘UP’ action 1.0 string ‘logging directly to console’
D. event manager applet boom event syslog pattern ‘UP’ action 1.0 puts ‘logging directly to console’
Selected Answer: D
Question #: 326
Topic #: 1
Which two steps are required for a complete Cisco DNA Center upgrade? (Choose two.)
A. automation backup
B. system update
C. golden image selection
D. proxy configuration
E. application updates
Selected Answer: BE
Question #: 327
Topic #: 1
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?
A. event manager applet ondemand event none action 1.0 syslog priority critical msg ‘This is a message from ondemand’
B. event manager applet ondemand action 1.0 syslog priority critical msg ‘This is a message from ondemand’
C. event manager applet ondemand event register action 1.0 syslog priority critical msg ‘This is a message from ondemand’
D. event manager applet ondemand event manual action 1.0 syslog priority critical msg ‘This is a message from ondemand’
Selected Answer: A
Question #: 328
Topic #: 1
What does this EEM applet event accomplish?
“event snmp oid 1.3.6.1.3.7.6.5.3.9.3.8.7 get-type next entry-op gt entry-val 75 poll-interval 5”
A. Upon the value reaching 75%, a SNMP event is generated and sent to the trap server.
B. It reads an SNMP variable, and when the value exceeds 75%, it triggers an action.
C. It issues email when the value is greater than 75% for five polling cycles.
D. It presents a SNMP variable that can be interrogated.
Selected Answer: B
Question #: 329
Topic #: 1
What is a requirement for an Ansible-managed node?
A. It must have an SSH server running.
B. It must be a Linux server or a Cisco device.
C. It must support ad hoc commands.
D. It must have an Ansible Tower installed.
Selected Answer: A
Question #: 330
Topic #: 1
Which characteristic distinguishes Ansible from Chef?
A. Ansible uses Ruby to manage configurations. Chef uses YAML to manage configurations.
B. The Ansible server can run on Linux, Unix or Windows. The Chef server must run on Linux or Unix.
C. Ansible pushes the configuration to the client. Chef client pulls the configuration from the server.
D. Ansible lacks redundancy support for the primary server. Chef runs two primary servers in active/active mode.
Selected Answer: C
Question #: 331
Topic #: 1
DRAG DROP –
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
Select and Place:
Suggestion Answer:
Question #: 332
Topic #: 1
Refer to the exhibit. What does the snippet of code achieve?
A. It creates an SSH connection using the SSH key that is stored, and the password is ignored.
B. It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.
C. It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.
D. It opens a tunnel and encapsulates the login information, if the host key is correct.
Selected Answer: C
Question #: 333
Topic #: 1
Which two characteristics define the Intent API provided by Cisco DNA Center? (Choose two.)
A. northbound API
B. business outcome oriented
C. device-oriented
D. southbound API
E. procedural
Selected Answer: AB
Question #: 334
Topic #: 1
In a Cisco DNA Center Plug and Play environment, why would a device be labeled unclaimed?
A. The device has not been assigned a workflow.
B. The device could not be added to the fabric.
C. The device had an error and could not be provisioned.
D. The device is from a third-party vendor.
Selected Answer: A
Question #: 335
Topic #: 1
What does the Cisco DNA Center use to enable the delivery of applications through a network and to yield analytics for innovation?
A. process adapters
B. Command Runner
C. intent-based APIs
D. domain adapters
Selected Answer: C
Question #: 336
Topic #: 1
Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?
A. all devices integrating with ISE
B. selected individual devices
C. all devices in selected sites
D. all wired devices
Selected Answer: C
Question #: 337
Topic #: 1
Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on devices with similar network settings?
A. Command Runner
B. Application Policies
C. Template Editor
D. Authentication Template
Selected Answer: C
Question #: 338
Topic #: 1
In which part of the HTTP message is the content type specified?
A. HTTP method
B. body
C. header
D. URI
Selected Answer: C
Question #: 339
Topic #: 1
An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use? event manager applet LogMessage event routing network 172.30.197.0/24 type all
A. action 1 syslog msg ג€OSPF ROUTING ERRORג€
B. action 1 syslog send ג€OSPF ROUTING ERRORג€
C. action 1 syslog pattern ג€OSPF ROUTING ERRORג€
D. action 1 syslog write ג€OSPF ROUTING ERRORג€
Selected Answer: A
Question #: 340
Topic #: 1
An engineer runs the code against an API of Cisco DNA Center, and the platform returns this output. What does the response indicate?
A. The authentication credentials are incorrect.
B. The URI string is incorrect.
C. The Cisco DNA Center API port is incorrect.
D. The HTTP method is incorrect.
Selected Answer: D
Question #: 341
Topic #: 1
What are two benefits of YANG? (Choose two.)
A. It enforces the use of a specific encoding format for NETCONF.
B. It collects statistical constraint analysis information.
C. It enables multiple leaf statements to exist within a leaf list.
D. It enforces configuration semantics.
E. It enforces configuration constraints.
Selected Answer: DE
Question #: 342
Topic #: 1
DRAG DROP –
Drag and drop the characteristics from the left onto the orchestration tools they describe on the right.
Select and Place:
Suggestion Answer:
Question #: 343
Topic #: 1
Refer to the exhibit. After running the code in the exhibit, which step reduces the amount of data that the NETCONF server returns to the NETCONF client, to only the interface’s configuration?
A. Use the Ixml library to parse the data returned by the NETCONF server for the interface’s configuration.
B. Create an XML filter as a string and pass it to get_config() method as an argument.
C. Create a JSON filter as a string and pass it to the get_config() method as an argument.
D. Use the JSON library to parse the data returned by the NETCONF server for the interface’s configuration.
Selected Answer: B
Question #: 344
Topic #: 1
Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?
A. from ncclient import
B. import manager
C. from ncclient import *
D. import ncclient manager
Selected Answer: D
Question #: 345
Topic #: 1
Which line must be added in the Python function to return the JSON object {`cat_9k`: `FXS1932Q2SE`}?
A. return (json.dumps({d[‘hostname’]: d[‘serialNumber’] for d in json.loads(test_json)[‘response’]}))
B. return (json.dumps({for d in json.loads(test_json)[‘response’]: d[‘hostname’]: d[‘serialNumber’]}))
C. return (json.loads({d[‘hostname’]: d[‘serialNumber’] for d in json.dumps(test_json)[‘response’}))
D. return (json.loads({for d in json.dumps(test_json)[‘response’]: d[‘hostname’]: d[‘serialNumber’]}))
Selected Answer: A
Question #: 346
Topic #: 1
Refer to the exhibit. Which code results in the working Python script displaying a list of network devices from the Cisco DNA Center?
A. network_device_list(dnac[ג€hostג€], dnac[ג€usernameג€],dnac[ג€passwordג€]) login = dnac_login(dnac) print(dnac_devices)
B. login = dnac_login(dnac[ג€hostג€], dnac[ג€usernameג€], dnac[ג€passwordג€]) network_device_list(dnac, login) print(dnac_devices)
C. login = dnac_login(dnac[ג€hostג€], dnac[ג€usernameג€], dnac[ג€passwordג€]) network_device_list(dnac, login) for item in dnac_devices: print(dnac_devices.item)
D. network_device_list(dnac[ג€hostג€], dnac[ג€usernameג€], dnac[ג€passwordג€]) login = dnac_login(dnac) for item in dnac_devices: print(dnac_devices.item)
Selected Answer: B
Question #: 347
Topic #: 1
What does the Cisco DNA REST response indicate?
A. Cisco DNA Center has the incorrect credentials for cat3850-1
B. Cisco DNA Center is unable to communicate with cat9000-1
C. Cisco DNA Center has the incorrect credentials for cat9000-1
D. Cisco DNA Center has the incorrect credentials for RouterASR-1
Selected Answer: C
Question #: 348
Topic #: 1
What is a characteristic of YANG?
A. It is a Cisco proprietary language that models NETCONF data.
B. It allows model developers to create custom data types.
C. It structures data in an object-oriented fashion to promote model reuse.
D. It provides loops and conditionals to control flow within models.
Selected Answer: C
Question #: 349
Topic #: 1
DRAG DROP –
Drag and drop the snippets onto the blanks within the code to construct a script that changes the routing from gateway 1 to gateway 2 from 11:00 p.m. to 12:00 a.m. (2300 to 2400) only, daily. Not all options are used, and some options may be used twice.
Select and Place:
Suggestion Answer:
Question #: 350
Topic #: 1
Refer to the exhibit. The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?
A. event manager applet EEM_IP_SLA event track 10 state down
B. event manager applet EEM_IP_SLA event track 10 state unreachable
C. event manager applet EEM_IP_SLA event sla 10 state unreachable
D. event manager applet EEM_IP_SLA event sla 10 state down
Selected Answer: A