Home > Articles > Using Data from Your Network

Using Data from Your Network

Chapter Description

In this sample chapter from Network Automation Made Easy, you will learn data preparation and visualization techniques to derive value from data collected on enterprise networks.

From the Book

Network Automation Made Easy

Network Automation Made Easy

$47.99 (Save 20%)

Review Questions

You can find answers to these questions in Appendix A, “Answers to Review Questions.”

  1. If you need to parse log data by using regex, which symbol should you use to match any characters containing the digits 0 through 9?

    1. \d

    2. \D

    3. \s

    4. \W

  2. If you need to parse log data by using regex, which symbol should you use to match any whitespace characters?

    1. \d

    2. \D

    3. \s

    4. \W

  3. Which of the IP-like strings match the following regex? (Choose two.) \d+\.\d+\.\d+\.\d+

    1. 255.257.255.255

    2. 10.00.0.1

    3. 10.0.0.1/24

    4. 8.8,8.8

  4. You work for a company that has very few network devices but that has grown substantially lately in terms of users. Due to this growth, your network has run at nearly its maximum capacity. A new project is being implemented to monitor your devices and applications. Which technique can you use to reduce the impact of this new project in your infrastructure?

    1. Data parsing

    2. Data aggregation

    3. Data visualization

  5. You are building a new Grafana dashboard. Which of the following is the most suitable method for representing a single device’s CPU utilization?

    1. Bar chart

    2. Line chart

    3. Gauge

    4. Pie chart

  6. You are building a new Grafana dashboard. Which of the following is the most suitable method for representing the memory utilization of all components in a system?

    1. Bar chart

    2. Line chart

    3. Gauge

    4. Pie chart

  7. True or false: With automated systems, alarms can only trigger human intervention.

    1. True

    2. False

  8. Your company asks you to train a machine learning model to identify unexpected logs, because it has been storing logs for the past years. However, you lack machine learning expertise. Which of the following is the most suitable method to achieve a working model?

    1. Use AutoML

    2. Use a pretrained model that you find online

    3. Use an in-house trained model

  9. In the context of regex, what does the symbol + mean?

    1. One or more occurrences

    2. Zero or more occurrences

    3. Ends with

    4. Starts with

  10. In the context of machine learning, your company wants to identify how many virtual machines it needs to have available at a specific time of day to process transactions. What type of problem is this?

    1. Regression

    2. Classification

    3. Clustering

    4. Sentiment analysis

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.