Limited Time Discount Offer
30% Off - Ends in 02:00:00

X

Cisco 600-501 Dumps

Cisco
Integrating Business Applications with Network Programmability (NPIBA)
Cisco
Integrating Business Applications with Network Programmability (NPIBA)

Questions & Answers for Cisco 600-501

Showing 1-15 of 66 Questions

Question #1

What are two data structure formats of the Cisco APIC REST API that are supported within
the request URI of an API request or response? (Choose two.)

A. MIME

B. SOAP

C. JSON

D. YAML

E. XML

Question #2

Which two IP addresses can be used to reach multiple hosts simultaneously? (Choose
two.)

A. 10.10.10.10

B. 172.18.217.44

C. 255.255.255.255

D. 192.168.14.0

E. 224.1.1.1

Question #3

Before you install new flows on the Cisco XNC, which API call lists all existing flows?

A. GET http://10.10.10.10:8080/controller/nb/v2/flowprogrammer/default

B. GET http://10.10.10.10:8080/controller/nb/v2/flows/default

C. GET http://10.10.10.10:8080/controller/nb/v2/flowprogrammer/default/node/OF/node

D. PUT http://10.10.10.10:8080/controller/nb/v2/flowprogrammer/default/node/OF/node

Question #4

Which REST call updates the port type on the Cisco XNC monitor configuration?

A. UPDATE http://10.10.10.10:8080/controller/nb/v2/monitor/port/add

B. PUT http://10.10.10.10:8080/controller/nb/v2/monitor/port

C. POST http://10.10.10.10:8080/controller/nb/v2/monitor/add

D. POST http://10.10.10.10:8080/controller/nb/v2/monitor/port/add

E. PUT http://10.10.10.10:8080/controller/nb/v2/monitor/port/add

Question #5

What are three benefits to applications that use Cisco onePK to extract information from
network elements? (Choose three.)

A. improved analytics

B. application service level monitoring

C. simplified applications

D. enhanced customization

E. unified operational model

Question #6

What is a reason that Layer 2 switches are used to build networks in a virtualized data
center rather than Layer 3 switches?

A. Layer 2 switches are less expensive than Layer 3 switches.

B. The convergence time of a Layer 2 network is faster than that of a Layer 3 network.

C. A virtual machine can move from one physical server to another in a Layer 2 network without needing a different IP address.

D. A virtual machine can move from one physical server to another in a Layer 2 network without needing different TCP port numbers.

Question #7

Refer to the exhibit.

What is the correct way to summarize these different routes into a single route?

A. 10.0.0.0/8

B. 10.10.0.0/16

C. 10.10.0.0/22

D. 10.10.3.0/22

E. 10.10.1.0/22

Question #8

Which command on a Cisco IOS device ensures that the communication between the
device and the Cisco onePK application is encrypted and secure?

A. enable ssl

B. feature rsa

C. transport type tcp

D. transport type tls

E. transport type rsa 128 validate-cert

F. enable link secure

Question #9

Which two functions in the TLS protocol allow client/server applications to communicate?
(Choose two.)

A. It supports NAT traversal at the protocol layer.

B. It uses a substitution cipher for encoding and a symmetric key for confidentiality.

C. It prevents eavesdropping, tampering, and message forgery, and a PKI provides user authentication.

D. It provides data-origin authentication instead of user-origin authentication.

Question #10

Which factor limits the maximum number of IEEE 802.1Q VLANs to 4096?

A. the length of the VLAN ID field of the 802.1Q frame

B. the length of the Tag Protocol ID field of the 802.1Q frame

C. the size of the TCAM memory of the Layer 2 switch

D. the size of the VLAN table of the Layer 2 switch

Question #11

The security team is evaluating a custom encryption engine application for the network.
They currently use a proprietary solution to encrypt all traffic between two applications and
would like to replace that with routers using a Cisco onePK application to apply encryption
on dedicated interfaces. What are three challenges that the security team will encounter?
(Choose three.)

A. Lack of visibility to packets in the path because of improper or irreversible encryption.

B. Proprietary encryption algorithms are not tested for vulnerabilities.

C. It may interfere with forwarding because of MAC address alteration.

D. Application location and application calls require more security.

E. Router interface errors are no longer accurate.

Question #12

Refer to the exhibit.

What is the cause of the end station not being able to ping fttp.cisco.com?

A. The default gateway that is configured on the workstation is incorrect.

B. The end station does not have the ARP entry for the default gateway.

C. The end station does not have the static route to reach the destination host.

D. The DNS server did not provide the IP address that is assigned to fttp.cisco.com.

Question #13

To log in to the Cisco APIC REST API, what information and method is required?

A. SSL key sent to the authLogin class

B. session token sent to the aaaRefresh API method

C. username and password sent to the aaaLogin API method

D. username sent to the aaa:User class

Question #14

Which statement best describes priority flow control?

A. PFC sends a pause frame that indicates which CoS value must be paused.

B. A flap occurs when both PFC and LFC are enabled, and PFC is disabled before LFC is configured.

C. Link-level flow control is very similar to PFC.

D. PFC asks the peer to stop sending frames of a particular CoS value by sending a pause frame to a well-known multicast address.

Question #15

What are two technology requirements for evolving networks for intelligent SDN? (Choose
two.)

A. network aware applications

B. application aware networks

C. configurable networks

D. managed networks

E. orchestrated networks

×