DevNet Associate Back to exams page. Take our Cisco Certified DevNet Associate course here. 1. The MVC Architecture is composed of 3 parts. What are those?ModelViewControllerVariableQuestion 1 of 50 2. In an MVC architecture, the VIEW component cannot talk directly to the MODEL component.TrueFalseQuestion 2 of 50 3. The Observer defines a _____________ relationship so that when one object changes state, the others are notified and updated automatically.One to OneOne to ManyMany to ManyMany to OneQuestion 3 of 50 4. It refers to a system that handles and tracks changes made to files, set of files and directoriesRepositoryGitGithubVersion ControlQuestion 4 of 50 5. In Central version control system, local revision copies can be kept manually. (True / False)TrueFalseQuestion 5 of 50 6. The ______________ control systems rely upon a peer-to-peer approach as opposed to a client to server model.Centralized Version Control Distribution Version Control Commit version controlUpdate version controlQuestion 6 of 50 7. Git is considered as a centralized version control system. (True / False)TrueFalseQuestion 7 of 50 8. In Git Architecture, it is where all the changes you actually want to make are placed.Local RepoRemote RepoStage AreaWorking DirectoryQuestion 8 of 50 9. In the Working Directory, Git will track the differences between your working directory and your local repository, and between your local repository and the remote repository. (True/False)TrueFalseQuestion 9 of 50 10. In git, this is the command used to create a new local repositorygit close username@cisco.com:/path/to/repositorygit add *git initializegit initQuestion 10 of 50 11. The design of this API needs the designers to be strict to achieve a consistent API as you do not really have constraints.RPCRESTRSTPRFCQuestion 11 of 50 12. Which API style does this syntax represent?GET (or POST) /deleteItem?itemId=456RPCRESTRSTPRFCQuestion 12 of 50 13. Which API style does this syntax represent?DELETE /users/1234RPCRESTRSTPRFCQuestion 13 of 50 14. These calls do not block (or wait) for the API call to return from the server.Execution continues on your program, and when the call returns from the server, a 'callback' function is executedSymmetricAssymetricSynchronousAsynchronousQuestion 14 of 50 15. These calls do not block (or wait) for the API call to return from the server. Execution continues on in your program, and when the call returns from the server, a 'callback' function is executedSymmetricAssymetricSynchronousAsynchronousQuestion 15 of 50 16. Typically, the very first character in a JSON file is a ___________ that defines a new object structureCurly brace {Square Bracket [Quote " 0 0.00 None of the Above"Question 16 of 50 17. Which of these options are popular library names used by XML? (Choose the answers that apply).PyYAMLxmltodictruamel.yamluntangleQuestion 17 of 50 18. In JSON, we use this method to derialize the data back to JSON file.yaml.safe_load() json.load(f) json.dump(), None of the above.Question 18 of 50 19. in XML, you could use the ___________ library to convert an XML document to a python dictionary .xmltodictuntangleminidomElementTreeQuestion 19 of 50 20. On this iteration step of TDD, you 're going to write code and run tests, maybe a lot of times, until all the tests have passed.Write TestsReview tests that failedDevelop CodeRefactor codeQuestion 20 of 50 21. Which of the following allows bad actors to gainaccess to and control endpoint resources over anextended period to steal valuable data without beingdetected?MalwareMedium persistent threatAdvanced persistent threatRansomwareQuestion 21 of 50 22. Which of the following describes Threat Grid?A VPN solution from Cisco unified malware analysis and threat intelligence platformA threat intelligence organizationAn intelligence security frameworkQuestion 22 of 50 23. Which of the following are used to indicate that asystem has been affected by some form of malware?IoTsIOCsSnortReportsQuestion 23 of 50 24. Which REST API architectural constraint allowsyou to download code and execute it?Client/serverStatelessnessCode on demandLayered systemsQuestion 24 of 50 25. What framework does NETCONF use to exchangemessages between the client and the server?RESTgRPCApache AvroRPCsQuestion 25 of 50 26. Which data type is not a YANG base data type?BinaryEnumerationPercentEmptyQuestion 26 of 50 27. Which of the following is a popular Python libraryused to interact with NETCONF servers?requestsncclientjsonpyangQuestion 27 of 50 28. Which of the following are used for dataencapsulation in RESTCONF messages? (Choose two.)XMLYANGYAMLJSONQuestion 28 of 50 29. What RESTCONF resource allows for automaticdiscovery of the API root?/discover/restconf/.well-known/restconf/.well-known/host-meta/discover/rootQuestion 29 of 50 30. What types of subscriptions are supported bymodel-driven telemetry? (Choose two.)StaticDynamicConfiguredHard-codedQuestion 30 of 50 31. ______________ is a distributed network architecture that moves your compute, storage, communication, control, and decision making closer to the network edge or where the data is being produced to mitigate the limitations in the current infrastructure.Private CloudPublic CloudEdge ComputingCloud ComputingQuestion 31 of 50 32. It refers to a DevOps principle where the DevOps process needs to be treated as a whole process, rather than just a couple of smaller tasks.IterativeContinuousSelf-ServiceHolisticQuestion 32 of 50 33. It is an open source automation server with many plug-ins for the CI/CD pipeline.It is written in a programming language called Apache GroovyPuppetJenkinsGitlabChefQuestion 33 of 50 34. Which tools are being used in Continuous Development in DevOps? (Choose 2)GitSeleniumJiraJenkingsQuestion 34 of 50 35. Which tool is used in Continuous Integration in Devops?SeleniumPuppetJenkinsJUnitQuestion 35 of 50 36. Which tools are used in Continuous Monitoring in Devops? (Choose all that apply)ChefSplunkSaltstackELK stackQuestion 36 of 50 37. Which of these options are types of SQL Injection attacks?In-Band SQLBlind SQLOut-of-Band SQLNone of the above.Question 37 of 50 38. ________ attack occurs when an attacker forces a victim to issue undesirable actions on the victim-authenticated web application. The attack is not executed to collect any data but to target state-changing requests (such as money transfer), because the attacker cannot see the return of the forged requestSSRFSQL InjectionCSRFXSSQuestion 38 of 50 39. _______________ vulnerabilities allow the attacker to send a forged request from a web server on the behalf of the attacker. In this type of attack, the targets usually are internal systems behind some firewalls.XSSSQL InjectionCSRFSSRFQuestion 39 of 50 40. _______________ attacks occur when the injected malicious code is reflected with any response from the web server that consists of the input sent to the web server. The attack is distributed to the victim in a different way, usually in an email message. Once the victim clicks the link, the malicious code navigates to the web page. This action reflects the attack back to the victim web browser, which then executes the malicious script, because the script came from an already trusted web server.Reflected XSS AttackCSRF AttackStored XSS Attack SSRF VulnerabilitiesQuestion 40 of 50 41. It allows you to identify the state or outcome, produce instructions to accomplish the desired state, and then reuse, repeat, and evolve to meet new needs as your environment grows.Network AutomationSecurity AutomationInfrastructure as a CodeApplication AutomationQuestion 41 of 50 42. These are tools used in infrastructure provisioning . (Choose all that apply)Text EditorsVersion Control SystemsScriptsVirtual MachineQuestion 42 of 50 43. Which of these options are the benefits of Infrastructure as a code? (Choose all that apply)It allows the developers within your team to create a copy of the existing repository or an entirely new fork.""Life-cycle management helps you with evolution of your code from concept to creation to collaboration and use.The declarative model allows you to focus on the state instead of which actions are needed to get there.Capturing your actions as code" allows you to capture the result or desired state configuration."Question 43 of 50 44. These are types of continuous integration tools. (Choose 2)Travis CIJenkinsSaltstackPythonQuestion 44 of 50 45. It refers to common version control systems used in IaC. (Choose 2)BitLabGithubGitlabGitbucketQuestion 45 of 50 46. Which three options best describe IaC?uses a declarative model to capture a desired state or resultfers a single copy; not to be changed by others within your groupa broad definition under which is network as code is executed using the DevOps modeltakes a device-by-device approach to CLI and GUI administrationbrings with it the benefits of centralized storage, collaboration, and evolution of the codeQuestion 46 of 50 47. It is a web-based service helping developers centrally manage, store, collaborate on, and control versions of code. You have the options of performing all management functions via the web interface or downloading and installing a client on your computer.GithubAnsibleTerraformChefQuestion 47 of 50 48. It uses a model-based approach to your infrastructure by describing how the components and systems are related to one another. It is agentless and uses playbooks to define the declared changes and final state.GithubAnsibleTerraformChefQuestion 48 of 50 49. It is an enterprise- and service provider-level software automation platform that operates across physical and virtual devices. Operations can be accomplished through automation, a self-service portal, and manual provisioningCisco NSOAnsibleTerraformChefQuestion 49 of 50 50. It is a phase in the software development process that helps identify bugs and poor code practices, as well as improve design and overall readability of the code.StagingCode ReviewAnalysisDeployQuestion 50 of 50 Loading...