Refer to the exhibit.
Which action should be performed to avoid an SQL injection attack?
Meraki Dashboard API Response
Response Status Code200
Response Link Header
<https://n6.meraki.com/api/vO/organizations/681155/devices ?perPage-3&startingAfter-
0000-0000-0000>; rel-first,
<https://n6.meraki .com/api/v0/organizations/681155/devices?perPage -3
&startingAfter-Q2EK-3UBE-RRUY>; rel-next,
<https://n6.meraki.com/api/vO/organizations/681155/devices?endingBefore -zzzz-zzzz
zzzz&perPage-3>; rel-last Response Body
{
' name": \\II '
"serial": "Q2CV-V49B -RCMZ",
"mac": ''0c:8d:db:95:aa:39",
"networkid": "L-566327653141846927",
"model11 : "MV71",
"address": "430 E Cactus Ave .\nLas Vegas, NV 89183",
"lat": 36.00017,
"lng": -115.15302,
"notes": ''",
"tagsn: '",,
"lanip: "192.168.0.25",
' configurationUpdatedAt": "2019-08-08T02:15:36Z", ' firmware11 : "ca.rnera-3-3011
},
{
"ncune": "Alex's MR84 - 1"1
"serial": "Q2EK-2LYB-PCZP",
"mac": 'eO: 55:3d:10:56:8a", "networkid": "L 566327653141846927",
"model": "MR84",
"address": ''11 ,
"lat": 39.9482993357826,
"lng": -82.9895675461739,
"notes": "",
"tags": ' ",
"lanip: null,
"configurationVpdatedAt": "2018-02-03Tll:02:37Z",
"firmware11 : "Not running configured version''
},
{
"na.rne11 : "Vegas Living Room MR84 11 ,
"serial": "Q2EK-3UBE-RRUY",
"mac": "e0:55:3d:10:5a:ca", "networkid": "L_566327653141846927" 1
"model": "MR84",
"address": "430 E Cactus Ave.\nLas vegas, NV 89183", "lat": 36.00015,
"lng": -115.15308,
"notes": ' ",
"tags": "11
1
"lanip: "192.168.0 .20",
"configurationVpdatedAt": "2018-09-29Tl2:23:21Z",
' firmware": "Not running configured version"
Refer to the exhibit.
Which line of code must be added to this code snippet to allow an application to pull the next set of paginated items?
Refer to the exhibit above and click on the IETF Routing tab in the top left corner to help with this question. A developer is trying to update the routing instance by adding a new route to the routes list using the URL in the exhibit. What action must be taken to fix the error being received?
Drag and drop the code from the bottom onto the box where the code is missing to retrieve a summary of physical compute resources. The collected information about the compute resources will be presented in a dashboard to be developed for device monitoring purposes. Not all snippets are used.
Which load balancing algorithm balances load based on the active sessions of a node?
Drag and drop the code from the bottom onto the box where the code is missing to construct a UCS XML API request to generate two service profiles from the template org-root/is-service-template. Not at options are used
Refer to the exhibit.
A developer has created a Python script that retrieves information about the deployment of Cisco wireless access points using REST API. Which two code snippets must be added to the blank in the code to print the value of the userid key instead of printing the full JSON response? (Choose two.)
A)
B)
C)
D)
E)
Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?
Refer to the exhibit.
What is the missing step in deploying a Docker container to lOx?
Refer to the exhibit.
An engineer needs to change the IP address via RESTCOMF on interface GigabitEthernet2. An error message is received when the script is run. Which amendment to the code will result in a successful RESTCONF action?
Refer to the exhibit.
A network engineer must integrate error handling tor time-outs on network devices using the REST interface. Which line of code needs to be placed on the snippet where the code is missing to accomplish this task?
Refer to the exhibit.
An application has been developed to serve the users in an enterprise After HTTP cache controls are implemented m the application users report that they receive state data when they refresh the page Without removing HTTP cache controls, which change ensures that the users get current data when refreshing the page'
Refer to the exhibit.
A developer is creating a Python script by using Cisco DNA Center APIs Drag and drop the code from the bottom onto the box where the code is missing in the Python script to retrieve and display wireless health information for each site Not all options are used.
A developer wants to automate virtual infrastructure to provision and manage it. The system will be implemented m large-scale deployment while offering redundancy and scalability with ease of management The solution must meet these requirements:
• Support the provisioning of up to 500 new virtual machines into private datacenters or the public cloud
• Support the modeling of a complex environment that consists of multiple virtual machines while supporting disaster recovery
• Maintain steady-state environments
Which configuration management solution must the developer use?
A local Docker container with a Container ID of 391441516e7a is running a Python application. Which
command is used to connect to a bash shell in the running container?
Refer to the exhibit. The code fetches the latest order from the purchases table for a specific user. An engineer needs to pass query parameters to the execute function to prevent an SQL injection attack. Which code snippet must be placed in the blank in the code to meet this requirement?
A)
B)
C)
D)
Refer to the exhibit above and click on the resource tabs in the top left corner to view an IETF TANG MODEL and a Python file that changes the configuration via RESTCONF. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the JSON file that changes configuration of interface GigabitEthernet1 to have an IPv4 configuration of 10.10.0.1/24. Not all options are used.
Refer to the exhibit.
Drag and drop the components from the Oauth2 authorization protocol flow on the left onto the letter that matches the location in the exhibit.
{'lat': 37.4180951010362, 'lng': -122.098531723022, 'address': '', 'serial': 'Q2HP-F5K5-F98Q',
'mac': '88:15:44:ea:f5:bf', 'lanIp': '10.10.10.15',
'url': 'https://n149.meraki.com/DevNet-Sandbox/n/EFZDavc/manage/nodes/new_list/78214561218351',
'model': 'MS220-8P', 'switchProfileId': None, 'firmware': 'switch-11-31', 'floorPlanId': None}
Refer to the exhibit. A developer needs to find the geographical coordinates of a device on the network L_397561557481105433 using a Python script to query the Meraki API. After running response = requests.get() against the Meraki API, the value of response.text is shown in the exhibit.
What Python code is needed to retrieve the longitude and latitude coordinates of the device?
What are two advantages of using model-driven telemetry, such as gRPC. instead of traditional telemetry gathering methods? (Choose two.)
Drag and drop the code from the bottom onto the box where the code is missing to configure a router that runs Cisco IOS XE by using RESTCONF. The API call is made to the management URL of the IOS XE device and on a registered port number. Errors that are caught during HTTP operation are registered. Not all options are used.
Refer to the exhibit. Which command resolves the merge conflict by removing the previous commit from the commit history?
An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online.
Which configuration management and/or automation tooling is needed for this solution?
Refer to the exhibit.
An application is created to serve an enterprise Based on use and department requirements, changes are requested quarterly Which application design change improves code maintainability?
Refer to the exhibit.
Which code snippet must be added to the blank in the code to automate the evaluation and handling of errors due to wrong credentials when Basic Authorization is used?
A)
B)
C)
D)
Where should distributed load balancing occur in a horizontally scalable architecture?
When an application is designed that requires high availability, what is a reason to use a cross-region cloud?
Refer to the exhibit.
A Python script must list network clients in the Cisco Meraki API that have used a network with an ID of 2 The number of client entries per returned page is restricted to 1.000 according to the API specification Network 2 has 2.500 clients What must be added where the code is missing to print the content of each response?
A)
B)
C)
D)
Refer to the exhibit. The presented application consists of a Nginx container and a load balancer service. Which GitLab CI/CD configuration implements the Kubernetes deployment?
Refer to the exhibit. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the curl exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used.
FILL BLANK
Fill in the blanks to complete the Python script to enable the SSID with a name of “371767916” in the network resource “11111111” using the Meraki Dashboard API.
Refer to the exhibit.
A developer is creating a Python script to use the Webex Teams REST API to list joined spaces, retry after the server-specified amount of time if a “Too many requests” response is received, and print any other error that is received. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.
Drag and Drop the application requirement on the left onto the database type that should be selected for the requirement on the right.
A developer deploys a web application in a local data center that is now experiencing high traffic load from users accessing data through REST API calls. Which approach enhances the responsiveness and performance of the API?
A developer must deploy a containerized application foe network device inventory management. The developer sets up a Kubernetes duster on two separate hypervisors. The SLA is not currently meeting a specified maximum value for network latencyjitter CPU/memory and disk I/O are functioning property. Which two design approaches resolve the issue'' (Choose two.)
Drag and drop the code from the bottom onto the box where the code is missing in the Python script to execute a REST API call to query all the NTP policy names and print the name of each policy. Not all options are used.
Refer to the exhibit.
Drag and drop the correct parts of the Dockerfile from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the Dockerfile to successfully build and deploy a container running a Python application. Not all parts of the Dockerfile are used.
A developer has built a Docker image named 'devcor73f3e94529V using the Dockerfile named 'devcor42f5e464771‘ and now needs to containerize it. Which command must the developer use?
Refer to the exhibit.
A network engineer writes a script to test authentication workflow using Python and REST API. The engineer wants to ensure that the script handles expected errors by matching output to HTTP status codes The scnpt uses the Python requests module. Which line of code must be added on the snippet where the code is missing?
Refer of the exhibit.
Click on the resource labs in the top left corner to view resources to help with this question The script uses the Cisco Intersight REST API Drag and drop the code from the bottom of the code snippet to the blanks in the code to construct a Python script to update the firmware on a specific Cisco interaght managed UCS rack server, DMZ-RL3ADJM.
A Cisco Catalyst 9000 switch has guest shell enabled. Which Linux command installs a third-party application?
Which database type should be used to store data received from model-driven telemetry?
A developer releases a new application for network automation of Cisco devices deployed m a local data center. The application utilizes complex design patterns such as microservices that host multiple third-party libraries and programming languages. The development must be simplified by implementing an observability-driven development lifecycle. Which two considerations must be taken to meet the requirements? (Choose two.)
A developer in a learn of distributed authors is working on code in an isolated Git branch named 'update4a2f5464771 The developer attempts to merge the new code with a branch named ’dvcapp2a3f1564733' however the merge operation encounters a conflict error during the process. Which Git command must the developer use to exit from the merge process and return the branch to the previous state?
Refer to the exhibit.
An engineer needs to implement REST API error handling when a timeout or rate limit scenario is present. Which code snippet must be placed into the blank in the code to complete the API request?
A)
B)
C)
D)
Click on the Meraki Resources tab in the left corner to view Meraki documentation to help with this question.Drag and drop the parts of the python code from the left onto the item numbers on the right that match the missing sections in the exhibit to enable an SSID. Not all code parts are used.
A developer is working in a branch to develop a new feature named ‘newfeat404880077’. A file named ‘devcoreg13642911.jpg’ has accidentally been staged. This needs to be removed so that the commit is performed and branches merged. Which git command must be used to unstage the file?
Drag and drop the code from the bottom onto the box where the code is missing on the Dockerfile to containerize an application that listens on the specified TCP network port at runtime. Not all options are used.
A team of developers created their own CA and started signing certificates for all of their loT devices, Which action will make the browser
accept these certificates?
Refer to the exhibit Pipenv is used to manage dependencies The test funs successfully on a local environment. What is the reason for the error when running the test on a CI'CD pipeline?
Refer to the exhibit.
One part of an application routinely uses the Cisco Meraki API to collate data about all clients Other parts of the application also use the Meraki API, but a single API key is used within the application The organization has approximately 4.000 clients across 30 networks Some of the application users report poor performance and missing data. Which two changes improve the performance of the application? (Choose two.)
An application has been developed for monitoring rooms in Cisco Webex. An engineer uses the application to
retrieve all the messages from a Cisco Webex room, but the results are slowly presented. Which action
optimizes calls to retrieve the messages from the /v1/messages endpoint?
Refer to the exhibit.
The YAML represented is using the ios_vrf module. As part of the Ansible playbook workflow, what is the result when this task is run?
Refer to the exhibit.
A Python developer is creating a wireless network device inventory application for local deployment of Cisco access points The developer is retrieving an access point ID by using a REST API The output indicates that there was a KeyError when parsing the JSON response. What returns the expected output of 266 at line 14?
A)
B)
C)
D)
An application requires SSL certificates signed by an intermediate CA certificate. The crt files must be available to the application:
• The root CA certificate is root_certrficate.crt.
• The intermediate CA certificate is intermediate_certificate.crt
• The application-specific SSL certificate is crt_certificate.crt.
Which Bash command outputs the certificate bundle as a .pern file?
A)
B)
C)
D)
Click on the GET Resource button above to view resources that will help with this question. An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB. Which REST API call accomplishes this task?
Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?
Which OAuth mechanism enables clients to continue to have an active access token without further interaction from the user?
A developer is designing a modem, distributed microservice enterprise application. The application will be integrating with other systems and focus on a large deployment, so control of API calls is necessary. What is the best practice to reduce application response latency and protect the application from excessive use?
Which Puppet manifest changes the NTP server and generates the traffic from VLAN 15?
A)
B)
C)
D)
Refer to the exhibit.
A Docker swarm cluster is configured to load balance services across data centers in three different geographical regions west central and east. The cluster has three manager nodes and three worker nodes Anew service named cisco.devnet is being deployed. The service has these design requirements
• All containers must be hosted only on nodes in the central region
• The service must run only on nodes that are ineligible for the manager role
Which approach fulfills the requirements?
Refer to the exhibit. A Python API server has been deployed. Based on metrics and logs, increased load has been noticed. Which two approaches must be taken to optimize API usage on the server? (Choose two.)
A developer plans to create a new bugfix branch to fix a bug that was found on the release branch. Which command completes the task?
Refer to the exhibit.
Which AP! call does an engineer use to delete the FQDN object?
A web application has those requirements for HTTP cache control:
Which header must the engineer use?
An application uses OAuth to get access to several API resources on behalf of an end user. What are two valid parameters to send to the authorization server as part of the first step of an authorization code grant flow? (Choose two.)
Refer to the exhibit.
The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file “@token_data” that cURL is handling?
Drag and drop the code from the bottom onto the box where the code is missing to enable an SSID by using the Cisco Meraki Dashboard API. Not all options are used.
Refer to the exhibit.
Which cURL request is included in the presented XML as the body of the response?
A)
B)
C)
D)
A developer is working on a bug fix. The existing branch named ‘bugfix05328’ needs to be merged with the current working primary branch named ‘prim404880077’. All changes must be integrated into a single commit instead of preserving them as individual commits. Which git command must be used?
Refer to the exhibit. Which action resolves the error for the GitLab CI/CD pipeline execution?
An engineer needs to configure an interface named GigabitEthernet3 with an IP address on several RESTCONF-enabled Cisco IOS XE devices. Which code snippet must be placed in the blank in the code to meet this requirement?
Refer to the exhibit.
Which URL retrieves the errors in the GigabitEthernet 1 interface?
A)
B)
C)
D)
Refer to the exhibit.
Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)
How is client code that consumes gRPC telemetry implemented, assuming that the preferred language is able to be chosen?
Drag and drop the git commands from the left into the correct order on the right to create a feature branch from the master and then incorporate that feature branch into the master.
Refer to the exhibit.
An engineer is implementing the response for unrecoverable REST API errors. Which message needs to be placed on the snippet where the code is missing to complete the print statement?
Cisco sensorBase gathers threat information from a variety of cisco products and services and performs analytics on threats. Which term describes this process?
A web application is being developed to provide online sales to a retailer. The customers will need to use their username and passwords to login into then profile and complete their order For this reason the application must store user passwords Which approach ensures that an attacker wifi need to crack the passwords one at a time?
Refer to the exhibit.
A network engineer developed an Ansible playbook and committed it to GitLab. A GitLab CI pipeline is started but immediately fails. What is the issue?
A custom dashboard of the network health must be created by using Cisco DNA Center APIs An existing dashboard is a RESTful API that receives data from Cisco DNA Center as a new metric every time the network health information is sent from the script to the dashboard Which set of requests creates the custom dashboard?
Refer to the exhibit.
Drag and drop the code from the bottom onto the box where the code is missing to complete the API request. An engineer is using this API request to implement Chat-Ops to generate notifications m a Webex space by using webhooks. Not all options are used.
Refer to the exhibit.
Python threading allows a developer to have different parts of a program run concurrently and simplify a design. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to create a thread instance.
A development team is looking for a tool to automate configurations across the infrastructure. The tool must have these characteristics:
•written in Python
•define playbooks (or intent
•stateless
•imperative
Which tool meets these requirements?
What is a consideration for using gRPC as the model-driven telemetry protocol on a Cisco IOS XE device?
There is a requirement to securely store unique usernames and passwords. Given a valid username, it is also required to validate that the password provided is correct. Which action accomplishes this task?
Which two types of storage are supported for app hosting on a Cisco Catalyst 9000 Series Switch? (Choose two.)
A developer is creating a Python script to catch errors using REST API calls and to aid in debugging. Drag and drop the code from the bottom onto the box where the code is missing to implement control flow for REST API errors. Not all options are used.
Click on the GET Resource button above to view resources that will help with this question.
An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB.
Which REST API call accomplishes this task?
Drag and drop the code from the bottom onto the box where the code is missing in the diagram to show how data is processed in Webex Teams. Not all options are used.
How does the use of release packaging allow dependencies to be effectively managed during deployments?