Using RESTCONF APIs as defined by the [email protected] model, which two combinations of “rest_operation” and “payload” must be added to the Python script to set the “description” to “Configured by RESTCONF”?
Refer to the exhibits. An interface named “GigabitEthernet2” has been configured on a Cisco IOS XE device. Using RESTCONF APIs as defined by the [email protected] model, which two combinations of “rest_operation” and “payload” must be added to the Python script to set the “description” to “Configured by RESTCONF”? (Choose two.)...
What should be configured in ansible.cfg as the connection type?
Refer to the exhibit. An engineer is configuring Ansible to run playbooks against Cisco IOS XE Software . What should be configured in ansible.cfg as the connection type?A . network_cliB . sshC . shellD . commandView AnswerAnswer: B Explanation: Reference: https://docs.ansible.com/ansible/latest/user_guide/intro_inventory.html
Which configuration management for automation tooling is needed for this solution?
A heterogeneous network of vendors and device types needs automating for better efficiency and to enable future automated testing. The network consists of switches, routers, firewalls and load balancers from different vendors, however they all support the NETCONF/RESTCONF configuration standards and the YAML models with every feature the business requires....
Which two data encoding techniques are supported by gRPC? (Choose two.)
Which two data encoding techniques are supported by gRPC? (Choose two.)A . XMLB . JSONC . ASCIID . ProtoBufE . YAMLView AnswerAnswer: B,D
CORRECT TEXT
CORRECT TEXT FILL BLANK Fill in the blanks to complete the Python script to enable the SSID with a name of “371767916” in the network resource “11111111” using the Meraki Dashboard API. View AnswerAnswer:
When end-to-end encryption is implemented, which area is most vulnerable to exploitation?
When end-to-end encryption is implemented, which area is most vulnerable to exploitation?A . cryptographic key exchangeB . endpoint securityC . cryptographic key generationD . security of data in transitView AnswerAnswer: B
CORRECT TEXT
CORRECT TEXT FILL BLANK Fill in the blanks to complete the Python script to enable the SSID with a name of “371767916” in the network resource “11111111” using the Meraki Dashboard API. View AnswerAnswer:
Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)
Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)A . publicly disclosed vulnerabilities related to the included dependenciesB . mismatches in coding styles and conventions in the included dependenciesC . incompatible licenses in the included dependenciesD . test...
What is a benefit of implementing a Cl pipeline?
What is a benefit of implementing a Cl pipeline?A . enforces version controlB . enables a faster feedback loopC . ensures that tests are written before code is writtenD . decreases external dependenciesView AnswerAnswer: C
What is the missing step in deploying a Docker container to lOx?
Refer to the exhibit. What is the missing step in deploying a Docker container to lOx?A . Pull/push the image to the Docker registry,B . Build the package.yaml file.C . Build the package.cert file to sign the app ,D . Log in to Device Manager.View AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/routers/1101-industrial-integrated-services-router/214383-build-and-deploy-a-docker-iox-package-fo.html...