0% found this document useful (0 votes)
104 views23 pages

6.automation, Virtualization, Cloud, SDN, DNA

The document discusses topology architecture questions and answers related to spine and leaf architecture, controller-based networking, three-tier network topologies, and WAN architectures. Specifically, it addresses how a spine and leaf architecture allows for scalability when additional access ports are needed by allowing leaf switches to connect to every spine switch. It also discusses the benefits of controller-based networking in allowing centralized configuration and monitoring of the network from one port.

Uploaded by

Hoai Duc Hoang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views23 pages

6.automation, Virtualization, Cloud, SDN, DNA

The document discusses topology architecture questions and answers related to spine and leaf architecture, controller-based networking, three-tier network topologies, and WAN architectures. Specifically, it addresses how a spine and leaf architecture allows for scalability when additional access ports are needed by allowing leaf switches to connect to every spine switch. It also discusses the benefits of controller-based networking in allowing centralized configuration and monitoring of the network from one port.

Uploaded by

Hoai Duc Hoang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Topology Architecture Questions

January 24th, 2021Go to comments

Question 5
In which way does a spine and-leaf architecture allow for scalability in a network when additional
access ports are required?
A. A spine switch and a leaf switch can be added with redundant connections between them
B. A spine switch can be added with at least 40 GB uplinks
C. A leaf switch can be added with a single connection to a core spine switch
D. A leaf switch can be added with connections to every spine switch

Answer: D

Explanation

Spine-leaf architecture is typically deployed as two layers: spines (such as an aggregation layer),
and leaves (such as an access layer). Spine-leaf topologies provide high-bandwidth, low-latency,
nonblocking server-to-server connectivity.

Leaf (aggregation) switches are what provide devices access to the fabric (the network of spine
and leaf switches) and are typically deployed at the top of the rack. Generally, devices connect to
the leaf switches. Devices can include servers, Layer 4-7 services (firewalls and load balancers),
and WAN or Internet routers. Leaf switches do not connect to other leaf switches. In spine-and-
leaf architecture, every leaf should connect to every spine in a full mesh.

Spine (aggregation) switches are used to connect to all leaf switches and are typically deployed at
the end or middle of the row. Spine switches do not connect to other spine switches.

Reference: https://www.cisco.com/c/en/us/products/collateral/switches/nexus-9000-series-
switches/guide-c07-733228.html

 
Question 1

What is a characteristic of spine-and-leaf architecture?


A. Each device is separated by the same number of hops
B. It provides variable latency
C. It provides greater predictability on STP blocked ports
D. Each link between leaf switches allows for higher bandwidth

Answer: A

Explanation

Spine-leaf architecture is typically deployed as two layers: spines (such as an aggregation layer),
and leaves (such as an access layer). Spine-leaf topologies provide high-bandwidth, low-
latency (-> Answer B is not correct), nonblocking server-to-server connectivity.

With a spine-and-leaf architecture, no matter which leaf switch to which a server is connected, its
traffic always has to cross the same number of devices to get to another server (unless
the other server is located on the same leaf) (-> Answer A is correct) . This approach keeps
latency at a predictable level because a payload only has to hop to a spine switch and another leaf
switch to reach its destination.

Reference: https://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series-
switches/white-paper-c11-737022.html

With Leaf-Spine, the network uses Layer 3 routing so STP is no longer required. (-> Answer C is
not correct). Spine-leaf architectures rely on protocols such as Equal-Cost Multipath (ECPM)
routing to load balance traffic across all available paths while still preventing network loops. This
allows all connections to be utilized at the same time while still remaining stable and avoiding
loops within the network.

Question 2
What are two descriptions of three-tier network topologies? (Choose two)
A. The core and distribution layers perform the same functions
B. The access layer manages routing between devices in different domains
C. The network core is designed to maintain continuous connectivity when devices fail
D. The core layer maintains wired connections for each host
E. The distribution layer runs Layer 2 and Layer 3 technologies

Answer: C E

Question 3

What benefit does controller-based networking provide versus traditional networking?


A. moves from a two-tier to a three-tier network architecture to provide maximum redundancy
B. provides an added layer of security to protect from DDoS attacks
C. allows configuration and monitoring of the network from one centralized port
D. combines control and data plane functionality on a single device to minimize latency

Answer: C

Question 4

Which purpose does a northbound API serve in a controller-based networking architecture?


A. communicates between the controller and the physical network hardware
B. reports device errors to a controller
C. generates statistics for network hardware and traffic
D. facilitates communication between the controller and the applications

Answer: D

Question 5

What is the name of the layer in the Cisco borderless switched network design that is considered
to be the backbone used for high-speed connectivity and fault isolation?
A. data link
B. access
C. core
D. network
E. network access

Answer: C

Explanation

The key layers are access, distribution, and core. The core layer is the network backbone that
hierarchically connects several layers of the network design, providing for connectivity between
end devices, computing and data storage services located within the data center and other areas,
and services within the network.

Question 6

A company needs to interconnect several branch offices across a metropolitan area. The network
engineer is seeking a solution that provides high-speed converged traffic, including voice, video,
and data on the same network infrastructure. The company also wants easy integration to their
existing LAN infrastructure in their office locations. Which technology should be recommended?
A. VSAT
B. ISDN
C. Frame Relay
D. Ethernet WAN

Answer: D

Explanation

Ethernet WAN offer the ability of using Ethernet over long-distance links.

Question 7

Which two WAN architecture options help a business scalability and reliability for the network?
(Choose two)
A. dynamic routing
B. static routing
C. dual-homed branches
D. single-homed branches
E. asychronous routing

Answer: A C

Explanation

Dual-homed branches (branches connects to two ISPs or one ISP with two connections) increases
reliability for the network.

Dynamic routing automatically use backup routes in the case of main routes fail which increases
reliability. The configuration is remain unchanged or change a little when we expand the network
thus increasing the scalability.

Note: A scalable network can expand quickly to support new users and applications without
impacting the performance of the service being delivered to existing users

Question 8

Which WAN access technology is preferred for a small office / home office architecture?
A. broadband cable access
B. frame-relay packet switching
C. dedicated point-to-point leased line
D. Integrated Services Digital Network switching

Answer: A

Question 9

Which two functions are performed by the core layer in a three-tier architecture? (Choose two)
A. Provide direct connectivity for end user devices
B. Police traffic that is sent to the edge of the network
C. Provide uninterrupted forwarding service
D. Inspect packets for malicious activity
E. Ensure timely data transfer between layers
 

Answer: C E

Explanation

Considerations at the core layer include


+ Providing high-speed switching (i.e., fast transport)
+ Providing reliability and fault tolerance
+ Scaling by using faster, and not more, equipment
+ Avoiding CPU-intensive packet manipulation caused by security, inspection, quality of service
(QoS) classification, or other processes

Reference: https://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4

Question 10

Which function is performed by the collapsed core layer in a two-tier architecture?


A. applying security policies
B. marking interesting traffic for data polices (qoS)
C. enforcing routing policies
D. attaching users to the edge of the network

Answer: C

Explanation

The three-tier hierarchical design maximizes performance, network availability, and the ability to
scale the network design.
However, many small enterprise networks do not grow significantly larger over time. Therefore, a
two-tier hierarchical design where the core and distribution layers are collapsed into one layer is
often more practical. A “collapsed core” is when the distribution layer and core layer
functions are implemented by a single device. The primary motivation for the collapsed core
design is reducing network cost, while maintaining most of the benefits of the three-tier
hierarchical model.

Reference: https://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4

A collapsed core network is shown below. The collapsed core network may be deployed with
redundant core/distribution router, or consolidated core/distribution router.
Deploying a collapsed core network results in the distribution layer and core layer functions being
implemented in a single device. The collapsed core/distribution device must provide the following:
+ High speed physical and logical paths connecting to the network
+ Layer-2 aggregation and demarcation point
+ Define routing and network access policies -> Answer C is correct
+ Intelligent network services—QoS, Network virtualization, etc.

Reference: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Small_Enterprise_Design_
Profile/SEDP/chap2.html

Cloud & Virtualization Questions


January 24th, 2021Go to comments
Premium Member: You can test your knowledge with these questions first via this link (via
HTML).

Cloud Summary
Three cloud supporting services cloud providers provide to customer:
+ SaaS (Software as a Service): SaaS uses the web to deliver applications that are
managed by a third-party vendor and whose interface is accessed on the clients’ side.
Most SaaS applications can be run directly from a web browser without any downloads or
installations required, although some require plugins.
+ PaaS (Platform as a Service): are used for applications, and other development, while
providing cloud components to software. What developers gain with PaaS is a framework
they can build upon to develop or customize applications. PaaS makes the development,
testing, and deployment of applications quick, simple, and cost-effective. With this
technology, enterprise operations, or a third-party provider, can manage OSes,
virtualization, servers, storage, networking, and the PaaS software itself. Developers,
however, manage the applications. PaaS provides everything except applications.
+ IaaS (Infrastructure as a Service): self-service models for accessing, monitoring, and
managing remote datacenter infrastructures, such as compute (virtualized or bare metal),
storage, networking, and networking services (e.g. firewalls). Instead of having to
purchase hardware outright, users can purchase IaaS based on consumption, similar to
electricity or other utility billing.

Virtualization Summary
A major advantage of virtualization is overall reduced cost (less equipment is required,
less energy is consumed, less space is required).
There are two types of hypervisors: type 1 and type 2.
In type 1 hypervisor (or native hypervisor), the hypervisor is installed directly on the
physical server (so it is called “bare metal” approach). Then instances of an operating
system (OS) are installed on the hypervisor. Type 1 hypervisor has direct access to the
hardware resources. Therefore it is more efficient than hosted architectures. Some
examples of type 1 hypervisor are VMware vSphere/ESXi, Oracle VM Server, KVM and
Microsoft Hyper-V. Type 1 hypervior is usually used on enterprise servers and data center
networking devices.
In contrast to type 1 hypervisor, a type 2 hypervisor (or hosted hypervisor) runs on top of
an operating system and not the physical hardware directly. A big advantage of Type 2
hypervisors is that management console software is not required. Examples of type 2
hypervisors are VMware Workstation (which can run on Windows, Mac and Linux) or
Microsoft Virtual PC (only runs on Windows).

Question 1

Which statement identifies the functionality of virtual machines?


A. Virtualized servers run most efficiently when they are physically connected to a switch that is
separate from the hypervisor
B. The hypervisor can virtualize physical components including CPU, memory, and storage
C. Each hypervisor can support a single virtual machine and a single software switch
D. The hypervisor communicates on Layer 3 without the need for additional resources
 

Answer: B

Question 2

An organization has decided to start using cloud-provided services. Which cloud service allows the
organization to install its own operating system on a virtual machine?
A. platform-as-a-service
B. software-as-a-service
C. network-as-a-service
D. infrastructure-as-a-service

Answer: D

Explanation

Below are the 3 cloud supporting services cloud providers provide to customer:

+ SaaS (Software as a Service): SaaS uses the web to deliver applications that are managed by a
third-party vendor and whose interface is accessed on the clients’ side. Most SaaS applications can
be run directly from a web browser without any downloads or installations required, although some
require plugins.
+ PaaS (Platform as a Service): are used for applications, and other development, while providing
cloud components to software. What developers gain with PaaS is a framework they can build
upon to develop or customize applications. PaaS makes the development, testing, and deployment
of applications quick, simple, and cost-effective. With this technology, enterprise operations, or a
third-party provider, can manage OSes, virtualization, servers, storage, networking, and the PaaS
software itself. Developers, however, manage the applications.
+ IaaS (Infrastructure as a Service): self-service models for accessing, monitoring, and managing
remote datacenter infrastructures, such as compute (virtualized or bare metal), storage,
networking, and networking services (e.g. firewalls). Instead of having to purchase hardware
outright, users can purchase IaaS based on consumption, similar to electricity or other utility
billing.

In
general, IaaS provides hardware so that an organization can install their own operating system.

Question 3

Anycompany has decided to reduce its environmental footprint by reducing energy costs, moving
to a smaller facility, and promoting telecommuting. What service or technology would support this
requirement?
A. Cisco ACI
B. cloud services
C. APIC-EM
D. data center

 
Answer: B

Question 4

What are two fundamentals of virtualization? (Choose two)


A. The environment must be configured with one hypervisor that serves solely as a network
manager to monitor SNMP traffic
B. It allows logical network devices to move traffic between virtual machines and the rest of the
physical network
C. It allows multiple operating systems and applications to run independently on one physical
server
D. It allows a physical router to directly connect NICs from each virtual machine into the network
E. It requires that some servers, virtual machines and network gear reside on the Internet

Answer: B C

Question 5

What role does a hypervisor provide for each virtual machine in server virtualization?
A. control and distribution of physical resources
B. software-as-a-service
C. services as a hardware controller
D. infrastructure-as-a-service

Answer: A

Explanation

Each virtual machine has its own set of virtual hardware (RAM, CPU, NIC) upon which an operating
system and fully configured applications are loaded. The operating system sees a consistent,
normalized set of hardware regardless of the actual physical hardware components.

Question 6

Which cloud service model does the engineer recommend?


A. infrastructure-as-a-service
B. platform-as-a-service
C. business process as service to support different types of service
D. software-as-a-service

Answer: D

Explanation

Maybe this question is missing some information but software-as-a-service (SaaS) helps save a lot
of time to install OS, softwares for running a business.

Question 7

A manager asks a network engineer to advise which cloud service models are used so employees
do not have to waste their time installing, managing, and updating software which is only used
occasionally. Which cloud service model does the engineer recommend?
A. infrastructure-as-a-service
B. software-as-a-service
C. platform-as-a-service
D. business process as service to support different types of service

Answer: B

Explanation

Three cloud supporting services cloud providers provide to customer:

+ SaaS (Software as a Service): SaaS uses the web to deliver applications that are managed by a
third-party vendor and whose interface is accessed on the clients’ side. Most SaaS applications can
be run directly from a web browser without any downloads or installations required, although some
require plugins.
+ PaaS (Platform as a Service): are used for applications, and other development, while providing
cloud components to software. What developers gain with PaaS is a framework they can build
upon to develop or customize applications. PaaS makes the development, testing, and deployment
of applications quick, simple, and cost-effective. With this technology, enterprise operations, or a
third-party provider, can manage OSes, virtualization, servers, storage, networking, and the PaaS
software itself. Developers, however, manage the applications. PaaS provides everything except
applications.
+ IaaS (Infrastructure as a Service): self-service models for accessing, monitoring, and managing
remote datacenter infrastructures, such as compute (virtualized or bare metal), storage,
networking, and networking services (e.g. firewalls). Instead of having to purchase hardware
outright, users can purchase IaaS based on consumption, similar to electricity or other utility
billing.

SDN Questions
January 9th, 2021Go to comments
Premium Member: You can test your knowledge with these questions first via this link (via
HTML).

SDN Quick Summary


Everything that networking devices do can be categorized into three planes: Data Plane, Control Plane and
Management Plane.
+ Data Plane: responsible for the switching of packets through the router. In short, it includes any action
after receiving data (processing, encapsulating/decapsulating, matching destination MAC & IP addresses,
forwarding, QoS, filtering with access-list)
+ Control Plane: responsible for maintaining sessions and exchanging protocol information with other
network devices. It consists of dynamic IP routing protocols (OSPF, EIGRP, BGP…), the RIB, routing updates,
in addition to other protocols such as STP, ARP, ICMP, PIM, IGMP, LACP…
+ Management Plane: is used to manage a device through its connection to the network. Examples of
protocols processed in the management plane include Simple Network Management Protocol (SNMP),
Telnet, File Transfer Protocol (FTP), Secure FTP, and Secure Shell (SSH). These management protocols are
used for monitoring and for command-line interface (CLI) access
Most traditional devices use a distributed architecture, in which each control plane is
resided in a networking device. Therefore they need to communicate with each other via
messages to work correctly.
In constrast to distributed architecture, centralized (or controller-based) architectures
centralizes the control of networking devices into one device, called SDN controller.
As we took the control planes off networking devices but not data planes so we need a
way to communicate with them. So we put a southbound interface (SBI) at the bottom of
SDN controller for this task. An SBI communicates with the devices via an application
programming interface (API).

Now, in turn, the networking administrators and SDN applications want to control the
controller! So the controller need a northbound interface (NBI) to communicate with us.
The NBI applications included various network services, including network virtualization,
dynamic virtual network provisioning, firewall monitoring, user identity management and
access policy control.
– REST (Representational State Transfer) describes a type of API that allows applications
to sit on different hosts, using HTTP messages to transfer data over the API.
Three SDN controllers which are mentioned in CCNA:
+ OpenDaylight Controller: an OpenFlow-based SDN
+ Cisco Application Centric Infrastructure (ACI)
+ Cisco APIC Enterprise Module (APIC-EM)

Question 1

Which statement about the Cisco ACI fabric is most accurate?


A. The APIC is able to enforce security by inserting itself into the data path.
B. The fabric header carries the EPG from the egress to the ingress leaf switch.
C. An APIC is a cluster of at least three APIC controllers, providing a single point of management
without a single point of failure.
D. The spine switch rewrites the EPG from ingress to egress when it performs the forwarding proxy
function

Answer: C

Question 2

Which API is used in controller-based architectures to interact with edge devices?


A. overlay
B. northbound
C. underlay
D. southbound

Answer: D

Explanation

The Southbound API is used to communicate with network devices.


Question 3

What are two characteristics of a controller-based network? (Choose two)


A. The administrator can make configuration updates from the CLI
B. It uses northbound and southbound APIs to communicate between architectural layers
C. It moves the control plane to a central point
D. It decentralizes the control plane, which allows each device to make its own forwarding
decisions
E. It uses Telnet to report system issues.

Answer: B C

Question 4

What are two southbound APIs? (Choose two)


A. Thrift
B. NETCONF
C. Open Flow
D. DSC
E. CORBA

Answer: B C

Explanation

OpenFlow is a well-known southbound API. OpenFlow defines the way the SDN Controller should
interact with the forwarding plane to make adjustments to the network, so it can better adapt to
changing business requirements.

The Network Configuration Protocol (NetConf) uses Extensible Markup Language (XML) to install,
manipulate and delete configuration to network devices.

Other southbound APIs are:


+ onePK: a Cisco proprietary SBI to inspect or modify the network element configuration without
hardware upgrades.
+ OpFlex: an open-standard, distributed control system. It send “summary policy” to network
elements.

Question 5

Which statement correctly compares traditional networks and controller-based networks?


A. Only traditional networks offer a centralized control plane
B. Only traditional networks natively support centralized management
C. Traditional and controller-based networks abstract policies from device configurations
D. Only controller-based networks decouple the control plane and the data plane

Answer: D

Explanation

Most traditional devices use a distributed architecture, in which each control plane is resided in a
networking device. Therefore they need to communicate with each other via messages to work
correctly.

In contrast to distributed architecture, centralized (or controller-based) architectures centralizes


the control of networking devices into one device, called SDN controller -> Answer D is correct.

Question 6

What software defined architecture plane assists network devices with making packet forwarding
decisions by providing Layer 2 reachability and Layer 3 routing information?
A. data plane
B. control plane
C. policy plane
D. management plane

Answer: B

Explanation
Control Plane Function
In its simplest form, the control plane provides layer-2 MAC reachability and layer-3 routing
information to network devices that require this information to make packet forwarding decisions.
In the case of firewalls, the control plane would include stateful flow information for inspection.
Control plane functionality can implemented as follows:

+ Distributed – Conventional routers and switches operate using distributed protocols for control,
i.e. where each device makes its own decisions about what to do, and communicate relevant
information to other devices for input into their decision making process. For example, the
Spanning Tree Protocol (STP), Fabric Path, and routing protocols such as IS-IS and BGP provide
distributed control of packet forwarding functionality to networking devices.

+ Centralized – In this case, a centralized controller provides the necessary information for a
network element to make a decision. For example, these controller(s) instruct networking devices
on where to forward packets by explicitly programming their MAC and FIBs.

Reference: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/VMDC/SDN/
SDN.html

Question 7

What are two benefits of controller-based networking compared to traditional networking? (Choose
two)
A. controller-based increases network bandwidth usage, while traditional lightens the load on the
network.
B. controller-based reduces network configuration complexity, while traditional increases the
potential for errors
C. controller-based inflates software costs, while traditional decreases individual licensing costs
D. controller-based allows for fewer network failure, while traditional increases failure rates
E. controller-based provides centralization of key IT functions. While traditional requires distributes
management function

Answer: B E

Question 8

In software defined architectures, which plane is distributed and responsible for traffic forwarding?
A. management plane
B. control plane
C. data plane
D. policy plane

Answer: C

Explanation

The Open Networking Foundation identifies three main parts of the Software-defined networking
(SDN): Application layer; Control layer and Infrastructure layer. SDN separates a router’s control
plane from the data (forwarding) plane. The control plane makes routing decisions. The data plane
forwards data (packets) through the router. With SDN routing, decisions are made remotely
instead of on each individual router.
DNA Center Questions
January 8th, 2021Go to comments
Premium Member: You can test your knowledge with these questions first via this link (via
HTML).

Question 1
Which two capacities of Cisco DNA Center make it more extensible? (Choose two)
A. adapters that support all families of Cisco IOS software
B. SDKs that support interaction with third-party network equipment
C. customized versions for small, medium, and large enterprises
D. REST APIs that allow for external applications to interact natively with Cisco DNA Center
E. modular design that is upgradable as needed

Answer: B D

Explanation

Cisco DNA Center offers 360-degree extensibility through four distinct types of platform
capabilities:

+ Intent-based APIs leverage the controller and enable business and IT applications to deliver
intent to the network and to reap network analytics and insights for IT and business innovation.
+ Process adapters, built on integration APIs, allow integration with other IT and network
systems to streamline IT operations and processes.
+ Domain adapters, built on integration APIs, allow integration with other infrastructure domains
such as data center, WAN, and security to deliver a consistent intent-based infrastructure across
the entire IT environment.
+ SDKs allow management to be extended to third-party vendor’s network devices to offer
support for diverse environments.

Reference: https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/dna-
center/nb-06-dna-cent-platf-aag-cte-en.html
Question 2
What makes Cisco DNA Center different from traditional network management applications and
their management of networks?
A. It only supports auto-discovery of network elements in a green field deployment.
B. It modular design allows someone to implement different versions to meet the specific needs of
an organization
C. It abstracts policy from the actual device configuration
D. It does not support high availability of management functions when operating in cluster mode

Answer: C

Question 3

How does Cisco DNA Center gather data from the network?
A. Network devices use different services like SNMP, syslog, and streaming telemetry to send data
to the controller
B. Devices establish an iPsec tunnel to exchange data with the controller
C. Devices use the call-home protocol to periodically send data to the controller
D. The Cisco CU Analyzer tool gathers data from each licensed network device and streams it to
the controller

Answer: A

Question 4

How do traditional campus device management and Cisco DNA Center device management differ
in regards to deployment?
A. Cisco DNA Center device management can deploy a network more quickly than traditional
campus device management
B. Traditional campus device management allows a network to scale more quickly than with Cisco
DNA Center device management
C. Cisco DNA Center device management can be implemented at a lower cost than most traditional
campus device management options
D. Traditional campus device management schemes can typically deploy patches and updates
more quickly than Cisco DNA Center device management

Answer: A

Question 5

What is an advantage of Cisco DNA Center versus traditional campus device management?
A. It supports numerous extensibility options including cross-domain adapters and third-party
SDKs
B. It supports high availability for management functions when operating in cluster mode
C. It enables easy autodiscovery of network elements m a brownfield deployment
D. It is designed primarily to provide network assurance

Answer: A

VPN Questions
January 7th, 2021Go to comments
Premium Member: You can test your knowledge with these questions first via this link (via
HTML).

Question 1
Which type of VPN uses a hub-and-spoke configuration to establish a full mesh topology?
A. GRE over IPsec
B. dynamic multipoint VPN
C. MPLS VPN
D. IPsec virtual tunnel interface

Answer: B

Explanation

Dynamic Multipoint VPN (DMVPN) is a solution of Cisco. DMVPN provides the following advantages:

+ Provides full meshed connectivity with simple Hub-and-Spoke topology. The spokes can
communicate between each other without going through Hub
+ Only one static public IP address is required on Hub. Spokes can use dynamic (unknown) public
IP addresses
+ The configuration is simple even in large network. No additional configuration is required on Hub
when new Spokes are added.

Question 2
What mechanism carries multicast traffic between remote sites and supports encryption?
A. ISATAP
B. GRE over IPsec
C. IPsec over ISATAP
D. GRE

Answer: B

Question 3
What is a function of a remote access VPN?
A. used cryptographic tunneling to protect the privacy of data for multiple users simultaneously
B. allows the users to access company internal network resources through a secure tunnel
C. used exclusively when a user is connected to a company’s internal network
D. establishes a secure tunnel between two branch sites

Answer: B

Automation Questions
January 7th, 2021Go to comments
Premium Member: You can test your knowledge with these questions first via this link (via
HTML).

Question 1
Which output displays a JSON data representation?
A.
{
“response”,{
“taskId”,{};
“url”,”string”
};
“version”, “string”
}

B.
{
“response”:{
“taskId”,{};
“url”,”string”
};
“version”; “string”
}

C.
{
“response”- {
“taskId”- {};
“url”-“string”
},
“version”-“string”
}

D.
{
“response”:{
“taskId”:{},
“url”:”string”
},
“version”: “string”
}

Answer: D

Explanation
JSON data is written as name/value pairs.
A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a
value:
“name”:”Mark”

JSON can use arrays. Array values must be of type string, number, object, array, boolean or null.
For example:
{
“name”:”John”,
“age”:30,
“cars”:[ “Ford”, “BMW”, “Fiat” ]
}

JSON can have empty object like “taskId”:{}

Question 2
Which option best describes an API?
A. communication often uses either Java scripting, Python, XML, or simple HTTP
B. an architectural style (versus a protocol) for designing applications
C. a stateless client-server model
D. request a certain type of data by specifying the URL path that models the data

Answer: C

Question 3
Which option about JSON is true?
A. uses predefined tags or angle brackets (<>) to delimit markup text
B. used to describe structured data that includes arrays
C. used for storing information
D. similar to HTML, it is more verbose than XML

Answer: B

Explanation

JSON data is written as name/value pairs.


A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a
value:
“name”:”Mark”

JSON can use arrays. Array values must be of type string, number, object, array, boolean or null..
For example:
{
“name”:”John”,
“age”:30,
“cars”:[ “Ford”, “BMW”, “Fiat” ]
}

Question 4
Which of the following is the JSON encoding of a dictionary or hash?
A. {“key”: “value”}
B. [“key”, “value”]
C. {“key”, “value”}
D. (“key”: “value”)

Answer: A

Question 5
Which two encoding methods are supported by REST APIs? (Choose two)
A. YAML
B. JSON
C. EBCDIC
D. SGML
E. XML

Answer: B E

Explanation

The Application Policy Infrastructure Controller (APIC) REST API is a programmatic interface that
uses REST architecture. The API accepts and returns HTTP (not enabled by default) or HTTPS
messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML)
documents.

Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/2-
x/rest_cfg/2_1_x/b_Cisco_APIC_REST_API_Configuration_Guide/b_Cisco_APIC_REST_API_Configu
ration_Guide_chapter_01.html

Question 6
What are two benefits of network automation? (Choose two)
A. reduced operational costs
B. reduced hardware footprint
C. faster changes with more reliable results
D. fewer network failures
E. increased network security

Answer: A C

Question 7
Which type of API would be used to allow authorized salespeople of an organization access to
internal sales data from their mobile devices?
A. partner
B. open
C. public
D. private

Answer: D

Explanation

There are three types of API:


+ Open APIs (Public APIs) – These APIs are publicly available and can be used with no
restrictions. Because these APIs are public, many API providers require the user to get a free key,
or token, prior to using the API. This is to help control the number of API requests they receive
and process.
+ Internal (Private APIs) – These are APIs that are used by an organization or company to
access data and services for internal use only. An example of an internal API is allowing authorized
salespeople access to internal sales data on their mobile devices.
+ Partner APIs – These are APIs that are used between a company and its business partners or
contractors to facilitate business between them. The business partner must have a license or other
form of permission to use the API. A travel service using an airline’s API is an example of a partner
API.

Question 8
What is a characteristic of the REST API?
A. evolved into what became SOAP
B. used for exchanging XML structured information over HTTP or SMTP
C. considered slow, complex, and rigid
D. most widely used API for web services

Answer: D

Explanation

REST API is an API that works on top of the HTTP protocol. It defines a set of functions developers
can use to perform requests and receive responses via
HTTP protocol such as GET and POST. REST APIs are the most popular API used for web services
nowadays.

Question 9
Refer to the exhibit.

cisco_ospf_vrf {"R1 default":


ensure => 'present',
auto_cost => '100',
}

Which type of configuration is represented in the output?

A. Puppet
B. JSON
C. Chef
D. Ansible

Answer: A

Question 10
Which CRUD operation modifies an existing table or view?
A. read
B. replace
C. create
D. update
 

Answer: D

Explanation

CRUD is short for CREATE, READ, UPDATE and DELETE operations. Only UPDATE operation
modifies an existing table or view.

Question 11
Which configuration management mechanism uses TCP port 22 by default when communicating
with managed nodes?
A. Ansible
B. Python
C. Puppet
D. Chef

Answer: A

Explanation

TCP port 22 is SSH, which is used by Ansible when communicating with the managed nodes.

You might also like