DevNet Associate (Version 1.0) – DevNet Associate 1.01 Module 7 Exam Answers Full 100% 2023 2024
This is a collection of Cisco NetAcad DevNet Associate (Version 1.0), DevNet Associate 1.01, and DEVASC 1.01 for Module 7 Exam Answers Full 100% in 2023 2024. Our team expert has made this series for putting all on one page to be easy to navigate and learn. This DevNet Associate module 7 exam answer is for the Cisco Netacad learning platform. Review all questions and answers before you take the exam to get a full mark of 100%.
DevNet Associate 1.01 – Module 7: Infrastructure and Automation Exam Answers Full 100% 2023 2024
-
What is the most common cause of IT outages?
- an engineer misconfiguring a device or network with manual changes
- a threat actor targeting the enterprise equipment
- an experienced engineer implementing a configuration using automation
- an experienced engineer using an open source product
Answers Explanation & Hint:
Most outages are caused by systems being misconfigured, commonly due to human error as manual changes are being made.
-
What is an unopinionated component in a software ecosystem?
- a component that requires a specific companion component in order to provide full stack implementation
- a component that is classified as open source and does not require the implementation of specific vendor products
- a component that does not show an increased preference for specific companion components or architectures unless those components or architectures are necessary
- a component that may function in a limited ability in order to compensate for the selection of companion components or architectures
Answers Explanation & Hint:
An unopinionated component is a component that does not show a higher increased preference for specific companion components or architectures unless those components or architectures are necessary.
-
In the use of container technologies, what is a function of platform abstraction when considering the deployment of a product in a cloud environment?
- A containerized app can run on a generically-specified host environment.
- Applications are aware of underlying hardware configurations and are customized to provide increased functionality.
- Applications require re-engineering in order to implement scalability and consolidation.
- Traditional complementary software components such as a database server and web server would be implemented as a single containerized application.
Answers Explanation & Hint:
Platform abstraction is a benefit of cloud computing and uses container technologies to abstract apps and platforms away from one another, while operating on a generically-specified host environment.
-
A student is setting up the DEVASC-LAB VM and CSR1000v VM in VirtualBox that is installed on the local computer. Both VMs are imported to the VirtualBox successfully. The student starts both VMs and tries to verify communications to the CSR1000v VM by opening a web browser on the local computer and enters the URL https://192.168.56.101. After a few seconds, an error message displays that “The connection has timed out”. How can the student verify the IP address assigned by DHCP to the CSR1000v virtual router?
- Issue the ifconfig command in the CSR1000v VM.
- Issue the ping 192.168.56.101 command on the local computer.
- Issue the show running-config command in the CSR1000v VM.
- Issue the show ip interface brief command in the CSR1000v VM.
Answers Explanation & Hint:
The error message indicates that the destination host cannot be reached. There are a few possible causes, such as a misconfigured IP address on the destination host or a network connection issue. The show ip interface brief command can be used to verify the IP address configured on the CSR1000v virtual router. The show running-config command can be used to see how IP addresses are assigned to the interfaces; however, if an interface obtains the IP address from the DHCP server, the running-config will not show the actual IP address assigned. A ping command can be used to verify connectivity, but it cannot verify the IP address assigned within the CSR1000v VM if the ping fails.
-
What is the historical correlation between software developers and IT operations?
- Developers had the job of testing applications. Operations had the job of implementing these applications for clients.
- Operations had the job of testing applications. Developers had the job of implementing these applications for clients.
- Developers had the job of creating applications. Operations had the job of verifying that these applications work for users.
- Operations had the job of brainstorming applications. Developers had the job of testing that these applications work for users and the business.
Answers Explanation & Hint:
Historically, software developers had the job of creating applications, whereas IT operations had the job of ensuring that these applications work for users and the business.
-
How is an error budget calculated in the DevOps/SRE culture?
- An error budget is the difference between the SLO and the SLA.
- An error budget is the difference between the SLA and 100% availability.
- An error budget is the difference between the SLO and the SLI.
- An error budget is the difference between the SLO and 100% availability.
Answers Explanation & Hint:
An error budget is the difference between the Service Level Objective (SLO) and the expectation of 100% availability.
-
In reviewing a formalized agreement between an organization and a customer, what is the purpose of an SLI?
- An SLI is an agreed-upon number of errors per unit time.
- An SLI is a specific set of steps for slowing releases as errors occur.
- An SLI is a benchmark metric used to determine and describe SLOs.
- An SLI is an easy to complete, external agreement that is set between the organization and the customer.
Answers Explanation & Hint:
A Service Level Indicator or SLI is a real-world benchmark metric used to determine Service-Level Objectives (SLOs).
-
What is the default shell commonly used on macOS and Linux?
- Bash
- Bourne
- csh
- tcsh
Answers Explanation & Hint:
The default Unix shell found on most Linux distributions and on macOS is BASH.
-
Which type of automation includes scripting that may be dangerous if the starting state is not completely known and controlled?
- declarative
- procedural
- stateless
- stateful
Answers Explanation & Hint:
Procedural automation is a type of scripting that tends to be dangerous if a starting state is not completely known and controlled. If the script is run multiple times, the act of applying the same changes again to a correctly configured system may break it.
-
What is an imperative procedure?
- A set of commands that examines a target and only performs the tasks needed to achieve the desired state.
- An ordered sequence of commands that is used to reach a specific end state.
- A set of commands that is piped to a remote host and immediately executed.
- A set of commands that require administrator privileges and can only be executed on a local system.
Answers Explanation & Hint:
An imperative procedure is an ordered sequence of commands aimed at achieving a specific goal.
-
Which statement describes the declarative static model?
- A declarative model will subdivide code into top-down sections and condition-driven handlers.
- A declarative model will follow a specific order of sequential steps in order to effect changes on a target system.
- A declarative model will examine present circumstances and bring real infrastructure into alignment in order to reach a desired state.
- A declarative model will execute code that is sequentially task-driven instead of focusing on deployment-specific details.
Answers Explanation & Hint:
The declarative model is used by middleware and incorporates deployment-specific details, examines present circumstances, and brings real infrastructure into alignment with the model in order to create a desired end product.
-
While working in the Ansible code structure, which type of file contains a sequence of tasks, executed in top-down order?
- .virl
- .py
- .txt
- .yml
Answers Explanation & Hint:
In the Ansible code structure, work is separated into YAML (.yml) files that contain a sequence of tasks, executed in top-down order.
-
Refer to the exhibit. A user is working on Ansible on the local NMS to manage remote network devices. The user issues the ansible webservers -m ping command to test the communication. However, an error message returns. What are two possible causes for the error? (Choose two.)
- The switch -m should be -M .
- The SSH credential is wrong.
- The SSH client is not installed.
- The SSH service does not start on the host.
- The destination host alias is wrong.
- The destination host IP address is wrong.
Answers Explanation & Hint:
Ansible uses an inventory file called hosts that contains device information used by Ansible playbooks. The hosts file begins with an alias for the remote. After the alias, the hosts file specifies three variables that will be used by the Ansible playbook to access the device. These are the SSH credentials Ansible needs to securely access the remote host. The error message indicates that the SSH server on the destination host cannot be reached. The possible issue is either the SSH server is not running or the IP address configured in the hosts file is wrong.
-
What is a standard command to create a Python virtual environment?
- source bin/activate
- python3 -m venv /path/to/new/virtual/environment
- pip install [options] [package-index-options] …
- sudo apt-get install python3-pip
Answers Explanation & Hint:
The venv command is executed to create lightweight virtual environments.
-
Which component in the pyATS ecology handles bundling and running jobs?
- EasyPy
- AEtest
- Genie
- Clover
Answers Explanation & Hint:
EasyPy is a runtime engine that can take one or more pyATS scripts and compile them into a job and run them together as a batch.
-
An engineer has just created a backup file of a Cisco VIRL network simulation. Which command should be used to compare the most recent .virl file with the previous backup file?
- knife
- list
- diff
- pyats
- source
Answers Explanation & Hint:
Cisco VIRL saves a topology in a file that can then be opened in an editor for review. The .virl file also provides a method for determining if configuration drift has occurred on the simulation by using the diff command to compare a newly-extracted .virl file with the original .virl file used to launch the simulation.