Rabu, 20 Maret 2024

DevNet Associate (Version 1.0) - DevNet Associate Module 4 Exam

 


1.       In the REST API request URI example http://example.com/update/person?id=42&email=person%40example.com , which term describes the component example.com ?

Query

Path

authority (True)

scheme

 

2.        

 

Refer to the exhibit. A network administrator is using a Python script to send a REST API request. What is the purpose of the line of code resp = requests.get(url, verify = False) ?

 It omits the sending URL in the response.

 It tests the function of the Python requests library.

 It bypasses the certificate validation check. (True)

 It skips the URL verification step and tests the resource path

 

3.       3Which characteristic of the SOAP architecture specifies communication between all similar and dissimilar application types?

Independence (True)

 extensibility

 neutrality

 interface uniformity

 

4.       What is the meaning of the term flow as it relates to the OAuth 2.0 authorization framework?

 

It is a process for an API user to obtain an access token from the authorization server. (True)

It is the number of requests contained in the token bucket.

It is a process for an API request to send authentication credentials to a web service.

It is the sequence of data exchanged between a REST API request and a response.

 

5.       Which type of credential information is used for the bearer authentication in REST APIs?

 a string generated by an authentication server (True)

 a username and password set by the client

 an MD5 hash string generated by the client application

 a password encoded using Base64

 

 

 

6.       Which API architectural style uses an XML-based messaging protocol to communicate between applications?

SOAP (True)

XML-RPC

NFS

REST

 

7.       Which SOAP message root element defines the XML document as a SOAP message?

 Meta tag

 Body

 Envelope (True)

 Header

 

8.        


Refer to the exhibit. A network administrator is using a Python script to test a REST API request. The traceback message indicates that there is an error in the URI. What is a possible issue?

 

The query component is missing.

The destination host address is wrong. (True)

The protocol is wrong.

The SSL certificate is invalid.

 

9.       Which HTTP response status code indicates that the user is not authenticated to access the site?

 201

 400

 401 (True)

 403

 404

 

10.   In which situation would a synchronous API be used?

 

when the client is not required to take action

when data is being retrieved from a database (True)

when a server is not part of the process

when the original API request or data from the request is delayed

 

11.   What are two purposes for using rate limits on public and unrestricted APIs? (Choose two.)

to provide better service and response time to all users (True)

to limit the number of passwords that a client can have in making API requests

 to avoid a server overloading from too many requests at the same time (True)

 to ensure a client uses a multifactor authentication mechanism

 to limit the number of authorization requests per API call

 

12.    



13.   A network engineer is learning about Rest APIs. When executing a particular API, the server responds with curl. How is this information useful?

 

Curl shows the URL used in the API request.

Curl shows the information the API returned from the server.

Curl shows the retrieved information in JSON format.

Curl shows how to access the content displayed in the response body using curl (True)

 

14.   What is an architectural constraint to which a true RESTful API web service must adhere?

It operates as a cloud service.

It must operate along with a DNS server.

It operates in a stateless way. (True)

It uses HTTPS to transport data.

 

15.   What is a characteristic of a RESTful API?

It uses HTTP methods to gather and manipulate data. (True)

It is a southbound API.

It supports a secure data transmission between a remote user and an enterprise network.

It facilitates the configuration changes from a network controller to end devices.

 

16.   A client is sending a REST API request to a web server. The request includes the need for data compression. Which three values are acceptable for the Accept-Encoding request header? (Choose three.)

Br (True)

xz

zip

gzip (true)

tar

*(True)

 

 

 

 

 

 

Jumat, 15 Maret 2024

Kuis Software Development and Design

 

1.       Which software development methodology prescribes that developers follow a strict process order by completing one step in the SDLC process before proceeding to the next step.

a.       Lean

b.       Scrum

c.       Agile

d.       Waterfall (True)

The Waterfall model is the earliest SDLC approach. The phases follow a linear sequential flow. Where each phase begins only when the previous phase is complete.

 

2. Which SDLC development methodology employs many quick iterations known as sprints?

a.       Agile (True).

In the agile software development model the SDLC process is conducted in many quick iterations called sprints.

b.       Waterfall.

c.       Extreme Programming.

d.       Lean

 

3. Which two programming components are defined as blocks of code that perform tasks when executed? (Choose two.)

a.       Parameter.

b.       Arguments.

c.       Methods (True).

d.       Objects.

e.       Functions (True).

Methods and functions are both blocks of code that perform tasks when executed. Functions are stand alone code blocks whereas methods are code blocks associated with an object

 

4. A developer wants to find the location of the Python 3 executable file. Which command should the developer use ?

a.       Which python3 (True).

The linux command which application is used to find a specific application (in specific directories as defined by the PATH environment variable).

b.       Find python3.

c.       Locate python3.

d.       Where python3

 

5.  Which SDLC phase concludes with functional code that satisfies customer requirements and is ready to be tested?

a.       Maintenance.

b.       Implementation (True).

There are six phases in the SDLC process:

1.       Requirements & Analysis: The product owner and qualified team members gather the requirements for the software to be built.

2.       Design: Software architects and developers design the software based on the provided software request specification.

3.       Implementation: developers take the design documentation and develop the code according to that design. At the conclusion of this phase, functional code that implements customer requirements is ready to be tested.

4.       Testing: Test engineers take the code and install it into the testing environment  so they can follow the test plan.

5.       Deployment: the software is installed into the production environment.

6.       Maintenance: the development team provides support for customers and works on software improvements.

c.        Deployment.

d.       Testing

 

6. what are the three states of a Git file? (Choose three)

a.       deleted

b.       modified (True) = The file has changed but has not been committed to the repository.

c.       staged (True) = The modified file is ready to be committed to the repository.

d.       locked

e.       secured

f.        commited (True) = The version of the file saved in the .git directory

 

7. which term is used to describe the first line of an XML document?

a.       preamble

b.       introduction

c.       prologue (True)

the XML prologue, which is the first line in an XML document, has a special format represented by a bracketed <? And ?>.

d.       opening.

 

8. how does an application use a module in Python?

a.       through the include statement

b.       by using an assignment statement with a variable

c.       by calling the module name

d.       through the import statement (True)

A module, in Python, is a Python file with packaged functions. When functions contained in a module are needed in an application in Python, the application uses the import statement to include these functions in the application.

 

9. what is the role of the controller component in the Model-View-Controller (MVC) flow?

a.       it takes in user input and manipulates it to fit the format for the model or view.

b.       it provides visual representations and presentations of the data.

c.       It accepts selected data and display it to the user.

d.       it takes user input and manipulates it to the proper format for the model. (True)

The Model-View-Controller (MVC) design pattern abstracts code and responsibility into three distinct components: model, view, and controller. The controller accepts the input, manipulates the data , and sends the manipulated data to the model.

 

10. which code review method involves the developer going through the code line-by-line with the reviewer, allowing the developer to make changes on the spot?

a.       email pass-around

b.       formal

c.       change-based

d.       over-the-shoulder (True)

In a over-the-shoulder code review the developer who wrote the code goes through the code changes line by line with a reviewer who provides feedback. In this type of review the code can be changed on the spot so that the reviewer can re-review it on the spot

Kuis Cisco Packet Tracer

 

 

1.       From the PC or Laptop, open a web browser and navigate to cisco.srv. Open the link titled A small page. What is the message displayed on the page?

a.       Enjoy our website!

b.       Welcome to Cisco!

c.       Hello, world! (TRUE)

d.       This is a small page

 

2.       Which device connects to the Wireless Router wirelessly?

a.       Laptop (TRUE)

b.       Server

c.       PC

d.       Cable modem

 

3.       Refer to the exhibit. What description matches the function of the Packet Tracer devices shown?



a.       Security devices

b.       Cabling components

c.       Networking devices

d.       IoT devices (TRUE)

 

4.       A network administrator is using Packet Tracer to mock up a network that Includes IoT devices. What can the administrator do from the Physical tab of any IoT device?

a.       Change pin connections

b.       Change the power supply

c.       Turn the device on or off (TRUE)

d.       Increase of decrease wattage

 

5.       What must be done to activate the Registration Server?

a.       Under the Services tab you need to turn the IoT Registration Server (True)

b.       Sign in to the server web browser and activate the server.

c.       Click on the Registration tab and then look for IoT button.

d.       Nothing it is activated by default

 

6.       Which two steps must be followed in order to view a working graph or chart of environmental changes (Choose two.)

a.       Select an environment element. (True)

b.       Select the InterCity container.

c.       Pause the current time.

d.       Choose the Always on Top box

e.       Be in View Mode (True)

 

7.       How will a Packer Tracer environment be affected if a heater is added to a container named Branch Office and turned on ?

a.       The temperature inside Branch Office will increase, and child containers within it will not be affected.

b.       The temperature inside the Branch Office will increase along with any child containers that exist within Branch Office (True).

c.       The temperature inside the Branch Office container will increase along with the parent container.

d.       The temperature inside Branch Office will increase along with all containers in Packet Tracer



8.       Refer to the exhibit. A user is building a home wireless network within Packer Tracer. The user adds 2 PCs and 2 laptops. Which device would be needed to create the network?

a.       The device labeled D

b.       The device labeled B

c.       The device labeled A (True)

d.       The device labeled C

 



9.       Refer to the exhibit. A user is creating a wired and wireless network using Packet Tracer. The user has added a home wireless router, a PC, and a laptop. The user configures the home wireless router. Which icon represent the tool that can be used on the laptop to view the SSID and connect to the wireless router?

a.    Command Prompt.

b.    IP Configuration

c.     PC Wireless (True).

d.    Web Browser

 

10.   What device, available in Packet Tracer, provides a centralized way to monitor and configure multiple compatible network devices from a single graphical user interface (GUI)?

a.    A cluster.

b.    A firewall.

c.     A network controller (True).

d.    A home gteway

 

11. A Packet Tracer exercise requires you to use wall mounts, color-coded cables, and bendpoints to organize your network cabling in a realistic way. What term relates to what you are doing?

 a. clustering.

b. structured cabling (True).

c. logical mode cabling.

d. tethering.