Using RESTCONF APIs as defined by the [email protected] model, which two combinations of “rest_operation” and “payload” must be added to the Python script to set the “description” to “Configured by RESTCONF”?

Refer to the exhibits. An interface named “GigabitEthernet2” has been configured on a Cisco IOS XE device. Using RESTCONF APIs as defined by the [email protected] model, which two combinations of “rest_operation” and “payload” must be added to the Python script to set the “description” to “Configured by RESTCONF”? (Choose two.)...

March 10, 2022 1 Comment READ MORE +

What should be configured in ansible.cfg as the connection type?

Refer to the exhibit. An engineer is configuring Ansible to run playbooks against Cisco IOS XE Software . What should be configured in ansible.cfg as the connection type?A . network_cliB . sshC . shellD . commandView AnswerAnswer: B Explanation: Reference: https://docs.ansible.com/ansible/latest/user_guide/intro_inventory.html

March 10, 2022 1 Comment READ MORE +

Which configuration management for automation tooling is needed for this solution?

A heterogeneous network of vendors and device types needs automating for better efficiency and to enable future automated testing. The network consists of switches, routers, firewalls and load balancers from different vendors, however they all support the NETCONF/RESTCONF configuration standards and the YAML models with every feature the business requires....

March 10, 2022 No Comments READ MORE +

Which two data encoding techniques are supported by gRPC? (Choose two.)

Which two data encoding techniques are supported by gRPC? (Choose two.)A . XMLB . JSONC . ASCIID . ProtoBufE . YAMLView AnswerAnswer: B,D

March 10, 2022 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT FILL BLANK Fill in the blanks to complete the Python script to enable the SSID with a name of “371767916” in the network resource “11111111” using the Meraki Dashboard API. View AnswerAnswer:

March 10, 2022 1 Comment READ MORE +

When end-to-end encryption is implemented, which area is most vulnerable to exploitation?

When end-to-end encryption is implemented, which area is most vulnerable to exploitation?A . cryptographic key exchangeB . endpoint securityC . cryptographic key generationD . security of data in transitView AnswerAnswer: B

March 9, 2022 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT FILL BLANK Fill in the blanks to complete the Python script to enable the SSID with a name of “371767916” in the network resource “11111111” using the Meraki Dashboard API. View AnswerAnswer:

March 9, 2022 No Comments READ MORE +

Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)

Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)A . publicly disclosed vulnerabilities related to the included dependenciesB . mismatches in coding styles and conventions in the included dependenciesC . incompatible licenses in the included dependenciesD . test...

March 9, 2022 No Comments READ MORE +

What is a benefit of implementing a Cl pipeline?

What is a benefit of implementing a Cl pipeline?A . enforces version controlB . enables a faster feedback loopC . ensures that tests are written before code is writtenD . decreases external dependenciesView AnswerAnswer: C

March 9, 2022 No Comments READ MORE +

What is the missing step in deploying a Docker container to lOx?

Refer to the exhibit. What is the missing step in deploying a Docker container to lOx?A . Pull/push the image to the Docker registry,B . Build the package.yaml file.C . Build the package.cert file to sign the app ,D . Log in to Device Manager.View AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/routers/1101-industrial-integrated-services-router/214383-build-and-deploy-a-docker-iox-package-fo.html...

March 9, 2022 No Comments READ MORE +