How is a branch called "my-bug-fix" started to develop a fix needed in a product?
Drag and drop the characteristics from the left onto the corresponding software development methodologies on the right?
Refer to the exhibit.
The output of a unified diff when comparing two versions of a python script is shown. Which two “single_request _timeout ()”
Fill in the blanks to complete the Bash script in which each file in a directory is renamed to Its SHA256 hash?
Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.)
In which situation would an edge computing solution be used?
Which two protocols are used to apply a configuration change on a Cisco IOS XE device? (Choose two)
Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?
Drag and drop the Python code from the left onto the correct step on the right to call a REST API.
Which device is a system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device mut be at fault?
Fill in the blanks to complete the Python script to update the Webex Teams membership of a room using the Python requests library import requests
What are two advantages of version control software? (Choose two.)
On which port does NETCONF operate by default?
Drag and drop the HTTP methods from the left onto their generally accepted corresponding create, read, update, and delete operations on the right.
Which type of threat occur when an attacker can send hostile data to an interpreter within an application?
Which two statements about JSON and XML are true? (Choose two.)
Refer to the exhibit.
Fill in the blanks to complete the cURL command to the list of networks in the Meraki organization with an id of 384279060
Refer to the exhibit.
Which JSON is equivalent to the XML –encoded data?
Drag and drop the function on the left onto the type of plane that handles the function on the right.
What is a benefit of model-driven programmability?
Drag and drop the types of management from the left onto the levels at which they are performed on the right.
A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?
Refer to the exhibit.
A developer needs to upload a local file by using the REST API. The developer gathers information according to the documentation and sends the request by using the cURL command in the exhibit but gets an error code. Which action should be followed to get valid response?
Drag and drop the code from the bottom onto the box where the code is missing in the Bash script to complete the missing assignment.
Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?
What is a benefit of a model-driven approach for infrastructure automation?
Refer to the exhibit.
A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?
Refer to the exhibit.
OWASP threat does this example demonstrate?
A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time.
Which area of the CALMS framework must the company target for improvement?
Which protocol runs over TCP port 22?
Refer to the exhibit.
A developer wants to create a room named cisco through Webex API. The developer prepares the request by putting an API token inside the authorization header; however, the given HTTP call returns error code 400. How must the call parameters be changed to ensure a valid response?
Which HTTP response status code means “Forbidden”?
A new application is being developed that must be hardware independent. The application includes an administrative component which is accessed using a Windows desktop GUI. Installation and management of the environment must be fully automated. Which application deployment type meets the requirements?
Refer to the exhibit.
A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?
A company wants to accelerate the adoption of technologies that will simplify its operations. Staff have different skill levels and are looking for a single site to find easy-to-consume beginner, intermediate, and advanced multidomain use cases. Which site should be used?
Refer to the exhibit.
A network engineer wants to use an API to update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which line of code needs to be placed in the snippet where the code is missing?
A developer is working on a feature for a new application. The changes in the existing branch named 'feat00304' must be integrated into a single commit with the current working primary branch named 'prodapp411926287'. Which git command must be used?
Refer to the exhibit.
A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?
What are two functions of a routing table on a network device? (Choose two.)
Drag and drop the code from the bottom onto the box where the code is missing to enable ports on a switch by using RESTCONF. Not all options are used.
What is a benefit of a CI/CD pipeline for infrastructure?
A developer creates a new application, but the application must be tested before being released to a customer. When a mobile phone that uses 4G is used to access the application, the request fails. Why does the connection to the application fail?
Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a request that generates a security token and gets a list of network devices. Not all options are used.
Which HTTP method is used by webhooks and notifies a listener about an event change?
What is a feature of XML compared to other data formats?
Which action do webhooks enable an application to perform?
Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer's account?
What is the function of an Ethernet switch in a networking environment?
An engineer needs to retrieve a list of locally available Firepower Threat Defense upgrade packages by using the Firepower Management Center REST API. The engineer uses a GET request with the URL:
/api/fmc_platform/v1/updates/upgradepackages/f413afeb-e6f6-75f4-9169-6d9bd49s625e
What does “f413afeb-e6f6-75f4-9169-6d9bd49s625e” represent?
Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script by using the Cisco SDK. Not all options are used.
An engineer prepares a set of Python scripts to interact with network devices. To avoid network performance issues, the engineer wants to run them in a test environment. Which resource must be used to monitor the
live execution of code in an always-available environment?
Which command reverses the last commit without changing the index file or the working tree position?
An engineer must make changes on a network device through the management platform API. The engineer prepares a script to send the request and analyze the response, check headers, and read the body according to information inside response headers. Drag and drop the HTTP header values from the left onto the elements of an HTTP response on the right.
What is the meaning of the HTTP status code 204?
An engineer deploys a Cisco CSR 1000 V instance to a virtual machine. The engineer must output the device configuration in JSON format. Which protocol is used for this task?
Refer to the exhibit. Drag and drop the Dockerfile contents from the left onto the functions on the right that create a container image to run traceroute to track network path to specific targets. Not all options are used.
What is a characteristic of the Cisco Finesse platform?
How does edge computing analyze sensitive data in the context of privacy control?
An engineer needs to collect information about 20,000 Bluetooth clients using the Cisco Meraki API. The API returns only 1,000 results. One of the HTTP response headers has the data:
Link: https://api.meraki.com.info/api/v0/networks/ABC/bluetoothClients?perPage=1000 &startingAfter=1000>;rel=“next”
Which RFC is implemented by the API to apply the restriction?