Deployment QUESTIONS AND
ANSWERS WITH RATIONALES/
GRADED A+/2026 UPDATE
/100%CORRECT
Module 1: Foundations of Network Automation
1. A network engineer is tasked with automating the configuration of 50 new
switches. Which technology allows these devices to be deployed with minimal
manual intervention by having them download configuration files from a central
server upon boot-up?
A) Chef
B) Puppet
C) Zero-Touch Provisioning (ZTP)
D) Ansible Playbook
Rationale: ZTP automates the initial setup and configuration of network devices.
When a new switch boots and gets an IP address via DHCP, it can be directed to a
central server to download its startup configuration or software image, eliminating
the need for a console cable and manual configuration for each device .
2. What is the primary goal of the "Zero-Ops" model in network management for
2026?
A) To eliminate all network hardware
B) To create networks that are self-healing, self-monitoring, and require minimal
human intervention
C) To reduce the number of network vendors to zero
D) To move all operations to a public cloud
Rationale: Zero-Ops goes beyond automation to create "self-driving" networks.
The goal is for the network to manage its own daily operations, including
,troubleshooting, optimization, and healing, with human involvement only for high-
level strategy and exceptions .
3. Which programming language is most commonly used in the WGU D417 course
for scripting network interactions with libraries like Netmiko?
A) Java
B) C++
C) Python
D) Ruby
Rationale: Python is the industry standard for network automation. In the D417
assessment, students are required to write Python scripts to identify existing
VLANs and add new VLAN configurations using libraries such as Netmiko .
4. Which protocol is essential for a Python script using Netmiko to securely
connect to an EXOS switch for configuration changes?
A) Telnet
B) HTTP
C) SSH (Secure Shell)
D) SNMP
Rationale: Netmiko is a multi-vendor library that simplifies SSH connections to
network devices. For secure remote management and automation, SSH is the
standard protocol, especially when setting up passwordless key-based
authentication for scripts .
5. In the context of the D417 assessment, what is the purpose of setting up a
passwordless SSH connection from the Ansible control node to the managed
switches?
A) To allow the switches to connect to the internet
B) To enable secure, automated playbook execution without manual password
prompts
C) To encrypt the VLAN data on the switches
D) To comply with PCI-DSS standards
Rationale: Passwordless SSH using key-based authentication is a prerequisite for
automation. It allows tools like Ansible to run playbooks against multiple devices
without interruption, ensuring smooth and secure configuration management .
6. According to industry forecasts for 2026, what is the expected role of AI in Tier
1 and Tier 2 infrastructure operations?
, A) AI will still require a "human in the loop" for all decisions.
B) AI will be used only for generating network diagrams.
C) AI will handle incident response and remediation autonomously with no
human in the loop.
D) AI will replace all network hardware.
Rationale: Analyst predictions indicate that by 2026, AI-driven systems will
manage routine operational tasks like incident response and software updates. This
"agentic" approach frees up human experts to focus on strategy and complex
problem-solving .
7. A student is writing a Python script to generate an Ansible inventory file. Which
file format, besides YAML, is commonly used for its simplicity?
A) JSON
B) XML
C) INI
D) CSV
Rationale: While YAML is popular for Ansible playbooks, the .ini format is often
used for simple inventory files because it is straightforward to generate with a
Python script. It organizes hosts into groups like [switches] or [windows] .
8. In an autonomous network architecture, what is the function of a "closed control
loop"?
A) To prevent any changes to the network configuration
B) To continuously monitor, analyze, and automatically correct network states
to meet intent expectations
C) To encrypt all traffic passing through the network
D) To provide a manual override for automated systems
Rationale: A closed control loop is a fundamental component of autonomous
networks. It constantly observes the network's current state, compares it to the
desired state (defined by intent), and takes automated actions to correct any
deviations without human intervention .
9. Which of the following is a key advantage of using Infrastructure as Code (IaC)
for network deployment?
A) It makes network configurations less secure.
B) It ensures that configuration changes are always made manually.
C) It allows for version control, consistency, and repeatability in network