Time limit: 0
Quiz Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.π
Practice makes you perfect! π -
Congratulations! π₯³
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.βοΈ
Good luck with the exam! Stay strong.π
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
A Layer 2 switch examines a frameβs destination MAC address and forwards that frame out of the port G0/2. That action occurs as part of which plane of the switch?
CorrectIncorrect -
Question 2 of 10
2. Question
The _________ plane includes protocols that allow network engineers to manage the devices.
CorrectIncorrect -
Question 3 of 10
3. Question
One of the benefits of controller-based networks over traditional networks is that the configuration on the devices have fewer errors, and you spent less time troubleshooting the network.
CorrectIncorrect -
Question 4 of 10
4. Question
Match the features of Cisco DNA Center with their purpose.
Sort elements
- Encrypted traffic analysis
- Device 360 and Client 360
- Network time travel
- Path trace
-
Enables Cisco DNA to use algorithms to recognize security threats even in encrypted traffic
-
Gives a comprehensive view of the health of the device
-
Shows past client performance in a timeline for comparison to current behavior
-
Discovers the actual path packets would take from source to destination based on current forwarding tables
CorrectIncorrect -
Question 5 of 10
5. Question
Which answer correctly describes the format of the JSON text below? (Choose two answers)
{
“variable1”: { “var” :”1″}
}CorrectIncorrect -
Question 6 of 10
6. Question
How many object keys can be found in the JSON object sample below?
{
“response”: {
“id”: “3”,
“name”: “Cisco Catalyst”,
“ipAddress”: {
“private”: “192.168.1.1”,
“public” : “156.157.1.1”
}
}
}CorrectIncorrect -
Question 7 of 10
7. Question
CRUD is the acronym of the four primary actions performed by an application. What does CRUD stand for?Β (Type only the remaining words)
-
C
R
U
D
CorrectIncorrect -
-
Question 8 of 10
8. Question
Identify the hostname part from the given URI:
https://cluster.cisco.com/dna/intent/api/v1/business/sda/fabric?ipaddress=10.1.2.3
CorrectIncorrect -
Question 9 of 10
9. Question
Which of the following configuration management tools uses agentless architecture for managing network devices?
CorrectIncorrect -
Question 10 of 10
10. Question
Your company decides to move away from manual configuration methods, to start making changes by editing centralized configuration files. The issues you are facing with non-centralized configuration files are:
1) You don’t know who engineer made the changes in the configuration file.
2) You don’t know the changes in the configuration file over time.Which of the following tools should your company use to solve these issues?
CorrectIncorrect