- Views: 29
- Report Article
- Articles
- Computers
- Information Technology
300-550 Free Demo Questions and Answers

Posted: Dec 21, 2016
Question: 1
How are authentication credentials sent in a Cisco APIC REST API authorization request?
A. by using OAuth
B. in a token in the header
C. by using Basic Auth
D. in JSON in the payload
Answer: D
Explanation:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/1-x/api/rest/b_APIC_RESTful_API_User_Guide/b_IFC_RESTful_API_User_Guide_chapter_0100.html
Question: 2
Which two statements about OpenFlow are true? (Choose two.)
A. The OpenFlow flow table contains header fields, counters, and actions.
B. OpenFlow automatically determines network forwarding rules.
C. OpenFlow interfaces with the management plane.
D. OpenFlow is a southbound protocol.
E. OpenFlow is an agentless technology, like Ansible.
F. OpenFlow is a northbound protocol.
Answer: BC
Question: 3
Where is the node-ui.log stored on the Cisco APIC-EM appliance?
A. in the /var/Iog/grapevine/services/node-ui directory within the container that is running the node-ui instance
B. in the Cassandra database instance that is running within the container that is running the node-ui instance
C. in the /opt/CSCOapicem/logs/node-ui directory within the Cisco APIC-EM appliance root
D. in the /var/log/grapevine/services/node-ui directory within the Cisco APIC-EM appliance root
E. in the Cisco APIC-EM Cassandra database instance
Answer: D
Question: 4
Drag and drop the technology on the left to its appropriate use case on the right.
Answer:
Question: 5
Which network configuration protocol uses JSON as a data representation format?
A. NETCONE
B. SOAP
C. RESTCONF
D. HTML
Answer: B
Question: 6
Which two statements about the NX-API are true? (Choose two.)
A. NX-API supports XML-RPC
B. NX-API is enabled by default
C. NX-API supports JSON-RPC.
D. The nxapi_auth cookie expires in 30 minutes.
E. NX-API maps to NX-OS NETCONF.
Answer: CD
Question: 7
Which two statements about YANG are true? (Choose two.)
A. YANC3 was conceptualized by Jerry Yang, former CEO of Yahoo.
B. YANG provides security beyond SSL 3.0.
C. YANG can be executed similarly to a Python script.
D. YANG is used by NETCONF to define objects and data in requests and replies.
E. YANG represents configuration, operational, and RPC data.
Answer: BC
Question: 8
Which computer security concept is violated when a web server is written that uses the "root" account for all Interactions with a Linux system?
A. RBAC
B. PermitRootLogin
C. certificate-based authentication
D. principle of least privilege
Answer: A
About the Author
Whether you are already an HP employee or want to further your career or you are just starting out with the desire for an IT career, you have found the right resources to help you succeed. With the HPE IT Business Conversations HPE2-E67 test, you wil
Rate this Article
Leave a Comment
