Question 6 of 70
Which two statements about the NX-API are true? (Chose two.)
Correct Answer: A, C

Question 7 of 70
Which two statements about YANG are true? (Choose two.)
Correct Answer: A, D

Question 8 of 70
Which computer security concept is violated when a web server is written that uses the "root" account for all interactions with a Linux system?
Correct Answer: D

Question 9 of 70
An organization leverages a multivendor network to sell connectivity services using Layer 3 VPN and VPLS. Where possible, the organization wants to use common APIs across vendors, in order to automate the configuration of network services. Which technology should be organization consider for the southbound interface?
Correct Answer: A, D, E

Question 10 of 70
Which statement is used to associate a submodule and a parent module in a YANG data model?
Correct Answer: C