Cisco® 300-550 Exam Practice Questions (P. 2)
- Full Access (70 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
Which two statements about the NX-API are true? (Chose two.)
- ANX-API supports XML-RPC
- BNX-API is enabled by default
- CNX-API supports JSON-RPC
- DThe nxapi_auth cookie expires in 30 minutes.
- ENX-API maps to NX-OS NETCONF.
Correct Answer:
AC
NX-API supports JSON-RPC, JSON, and XML formats.
Reference:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus7000/sw/programmability/guide/b_Cisco_Nexus_7000_Series_NX-
OS_Programmability_Guide/b_Cisco_Nexus_7000_Series_NX-OS_Programmability_Guide_chapter_0101.html
AC
NX-API supports JSON-RPC, JSON, and XML formats.
Reference:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus7000/sw/programmability/guide/b_Cisco_Nexus_7000_Series_NX-
OS_Programmability_Guide/b_Cisco_Nexus_7000_Series_NX-OS_Programmability_Guide_chapter_0101.html
send
light_mode
delete
Question #7
Which two statements about YANG are true? (Choose two.)
- AYANG was conceptualized by Jerry Yang, former CEO of Yahoo
- BYANG provides security beyond SSL 3.0.
- CYANG can be executed similarly to a Python script.
- DYANG is used by NETCONF to define objects and data in requests and replies
- EYANG represents configuration? Operational, and RPC data.
Correct Answer:
AD
Reference:
https://www.coursehero.com/file/7374202/1B-Case-Yahoo-Caroll-Bartz-Abridged/ http://www.cisco.com/c/dam/global/cs_cz/assets/ciscoconnect/2014/assets/tech_sdn10_sp_netconf_yang_restconf_martinkramolis.pdf
AD
Reference:
https://www.coursehero.com/file/7374202/1B-Case-Yahoo-Caroll-Bartz-Abridged/ http://www.cisco.com/c/dam/global/cs_cz/assets/ciscoconnect/2014/assets/tech_sdn10_sp_netconf_yang_restconf_martinkramolis.pdf
send
light_mode
delete
Question #8
Which computer security concept is violated when a web server is written that uses the "root" account for all interactions with a Linux system?
- ARBAC
- BPermitRootLogin
- Ccertificate-based authentication
- Dprinciple of least privilege
Correct Answer:
D
Least privilege: This principle applies a need-to-know approach to trust relationships between security domains. The idea, which originated in military and intelligence operations, is that if fewer people know about certain information, the risk of unauthorized access is diminished. In network security, this results in restrictive policies, where access to and from a security domain is allowed only for the required users, application, or network traffic. Everything else is denied by default.
D
Least privilege: This principle applies a need-to-know approach to trust relationships between security domains. The idea, which originated in military and intelligence operations, is that if fewer people know about certain information, the risk of unauthorized access is diminished. In network security, this results in restrictive policies, where access to and from a security domain is allowed only for the required users, application, or network traffic. Everything else is denied by default.
send
light_mode
delete
Question #9
An organization leverages a multivendor network to sell connectivity services using Layer 3 VPN and VPLS. Where possible, the organization wants to use common APIs across vendors, in order to automate the configuration of network services. Which technology should be organization consider for the southbound interface?
- ABGP-LS
- BOpFlex
- COpenFlow
- DNETCONF
- EPCEP
Correct Answer:
ADE
Other technologies for southbound interfaces, such as NETCONF, YANG, PCEP, and BGP-LS, also allow controllers to centrally control networks.
Reference:
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwiw1-vLu7nOAhXBAxoKHZUrCp4QFggcMAA&url=http%3A%2F%2Fwww- file.huawei.com%2F~%2Fmedia%2FCNBG%2FDownloads%2FTechnical%2520Topics%2FFixed%2520Network%2FWP-SDN%2520WAN%2520V12-
EN&usg=AFQjCNHnjUfA7rYGbt2g4W5Kni1gJDyNnw&sig2=h9HG66D_RfmkWb0zw_7uZQ&bvm=bv.129422649,d.bGs&cad=rja
ADE
Other technologies for southbound interfaces, such as NETCONF, YANG, PCEP, and BGP-LS, also allow controllers to centrally control networks.
Reference:
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwiw1-vLu7nOAhXBAxoKHZUrCp4QFggcMAA&url=http%3A%2F%2Fwww- file.huawei.com%2F~%2Fmedia%2FCNBG%2FDownloads%2FTechnical%2520Topics%2FFixed%2520Network%2FWP-SDN%2520WAN%2520V12-
EN&usg=AFQjCNHnjUfA7rYGbt2g4W5Kni1gJDyNnw&sig2=h9HG66D_RfmkWb0zw_7uZQ&bvm=bv.129422649,d.bGs&cad=rja
send
light_mode
delete
Question #10
Which statement is used to associate a submodule and a parent module in a YANG data model?
- Aimport
- Bnamespace
- Cinclude
- Dbelongs-to
Correct Answer:
C
The "include" statement is used to make content from a submodule available to that submodule's parent module, or to another submodule of that parent module.
Reference:
https://tools.ietf.org/html/rfc6020
C
The "include" statement is used to make content from a submodule available to that submodule's parent module, or to another submodule of that parent module.
Reference:
https://tools.ietf.org/html/rfc6020
send
light_mode
delete
All Pages