Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)

A.

22

B.

23

C.

80

D.

443

E.

880

What are two properties of private IP addresses? (Choose two.)

A.

They can be used to access the Internet directly.

B.

They are more secure than public IP addresses.

C.

They are not globally unique.

D.

They can be repeated within the same local network.

E.

They are controlled globally by an IP address registry.

Refer to the exhibit.

An engineer must configure a load balancer server. The engineer prepares a script to automate workflow by using Bash. The script install the nginx package, moves to the /optAtginx directory, and reads the sites M We (or further processing Based on the script workflow, which process is being automated within the loop by using the information mi sites txt?

A.

creating a new Me Based on template .conf in the /etc/ngin/sites_enabled directory for each lie in the sites txt file. and then changing the file execution permission.

B.

creating a Me per each the in sites txt with the information in template conf. creating a link for the previously created file. and then changing the ownership of the created files

C.

using the content of the file to create the template conf file. creating a Iink from the created file to the /etc/nginx/files.enabled. and then changing the file execution permissions.

D.

using the information in the file to create a set of empty files in the /etchginx/sites_enabled directory and then assigning the owner of the file.

Refer to the exhibit.

A network engineer wants to use an API to update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which line of code needs to be placed in the snippet where the code is missing?

A.

{'Content-Type': 'application/yang.data+xml', 'Accept': 'application/yang.data

+xml'}

B.

{'Content-Type': 'application/yang.data+yaml', 'Accept': 'application/yang.data

+yaml'}

C.

{'Content-Type': 'application/restconf.data+json', 'Accept': 'application/

restconf.data+json'}

D.

{'Content-Type': 'application/yang.data+utf8', 'Accept': 'application/

restconf.data+utf8'}

A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time.

Which area of the CALMS framework must the company target for improvement?

A.

Collaboration

B.

Lean

C.

Sharing

D.

Measurement

A local Docker alpine image has been created with an image ID of a391665405fe and tagged as “latest”. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?

A.

docker build -p 8080:80 alpine:latest

B.

docker exec -p 8080:80 alpine:latest

C.

docker start -p 8080:80 alpine:latest

D.

docker run -p 8080:80 alpine:latest

Which implementation creates a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire?

A.

WLAN

B.

VLAN

C.

IPsec

D.

HSRP

Refer to the exhibit.

A developer must integrate a bot with an internal communication app. The developer wants to replace the webexbot package with the teamsbot package by using Ansible and prepares a playbook In the first two tasks, the playbook stops the webexbot and verifies that the teamsbot is installed. What is accomplished in the last task of the workflow when the developer runs the Ansible playbook?

A.

stops the webexbot service and uninstals it and retains its configuration files

B.

installs the webexbot and retains the configuration files

C.

uninstalls the webexbot package and removes its configuration files

D.

searches whether the purge package is available in the repository and uninstalls the webexbot package

While developing a real-Time VoIP application on a Cisco Webex platform, users report that their voice gets chopped or parts of the conversation drop out. Which network constraint is impacting the application?

A.

latency

B.

jitter

C.

capacity

D.

delay

What is the function of IP address in networking?

A.

specifies the type of traffic that is allowed to roam on a network

B.

represents the unique ID that is assigned to one host on a network

C.

specifies resource's location and the mechanism to retrieve it

D.

represents a network connection on specific devices