Question 6 of 70Which two statements about the NX-API are true? (Chose two.)
Correct Answer: A, C
Question 7 of 70Which two statements about YANG are true? (Choose two.)
Correct Answer: A, D
Question 8 of 70Which computer security concept is violated when a web server is written that uses the "root" account for all interactions with a Linux system?
Correct Answer: D
Question 9 of 70An organization leverages a multivendor network to sell connectivity services using Layer 3 VPN and VPLS. Where possible, the organization wants to use common APIs across vendors, in order to automate the configuration of network services. Which technology should be organization consider for the southbound interface?
Correct Answer: A, D, E
Question 10 of 70Which statement is used to associate a submodule and a parent module in a YANG data model?