Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

200-901 Sample Questions Answers

Questions 4

Refer to the exhibit.

Given the API documentation for the UCS SDK python class, UcsHandle, which code snippet creates a handle instance?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 5

Which service provides a directory lookup for IP addresses and host names?

Options:

A.

DNS

B.

DHCP

C.

SNMP

D.

NAT

Buy Now
Questions 6

When a Cisco IOS XE networking device is configured using RESTCONF, what is the default data-encoding method?

Options:

A.

XML

B.

x-form-encoding

C.

YANG

D.

YAML

Buy Now
Questions 7

Refer to the exhibit.

What is the value of the node defined by this YANG structure?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 8

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right.

Options:

Buy Now
Questions 9

Which two use cases are supported by Meraki APIs? (Choose two.)

Options:

A.

Retrieve live streams from a Meraki Camera.

B.

Build a custom Captive Portal for Mobile Apps.

C.

Configure network devices via the Dashboard API.

D.

Build location-aware apps from Wi-Fi and LoRaWAN devices.

E.

Deploy applications onto the devices.

Buy Now
Questions 10

A function my_func() returns True when it executes normally. Which python snippet tests my_func()?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 11

Refer to the exhibit.

A REST API retune this JSON output for a GET HTTP request, Which has assigned to a variable called “vegetables” Using python, which output is the result of this command?

Options:

A.

Lettuce

B.

Kiwi

C.

[‘kiwi’, ‘grape’]

D.

{‘color’: ‘green’, ‘items’: [‘kiwi’, ‘grape’]

Buy Now
Questions 12

Drag and Drop the Bash commands from the left onto the correct actions on the right.

Options:

Buy Now
Questions 13

Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.

Options:

Buy Now
Questions 14

What are the two principles of an infrastructure as code environment? (Choose two)

Options:

A.

Complete complex systems must be able to be built from reusable infrastructure definitions.

B.

Environments must be provisioned consistently using the same inputs.

C.

Redeployments cause varying environment definitions.

D.

Service overlap is encouraged to cater for unique environment needs.

E.

Components are coupled, and definitions must be deployed for the environment to function.

Buy Now
Questions 15

An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device mut be at fault?

Options:

A.

Laptop on which the script is running

B.

Router

C.

Switch

D.

Load balancer

Buy Now
Questions 16

A developer is writing an application that a REST API and the application requires a valid from the API which element of the response is used in the conditional check?

Options:

A.

URL

B.

Status code

C.

Link

D.

Body

E.

Headers

Buy Now
Questions 17

Users cannot access a webserver and after the traffic is captured, the capture too* shows an ICMP packet that reports "communication administratively prohibited" What Is the cause of this webserver access Issue?

Options:

A.

An access list along the path is blocking the traffic

B.

The traffic is not allowed to be translated with NAT and dropped.

C.

Users must authenticate on the webserver to access It

D.

A router along the path is overloaded and thus dropping traffic

Buy Now
Questions 18

What is a function of the default gateway in a network?

Options:

A.

to drop traffic that is destined to the default gateway

B.

to drop traffic that is not destined to the default gateway

C.

to forward traffic to the same subnet

D.

to forward traffic to different subnets

Buy Now
Questions 19

Refer to the exhibit.

Which two statement describe the configuration of the Ansible script is run? (Choose two.)

Options:

A.

Traffic on port 0/2 and 0/3 is connected to port 0/6.

B.

Traffic from ports 0/2 to 0/5 can flow on port 0/1 due to the trunk.

C.

Traffic can flow between ports 0/2 to 0/5 due to the trunk on port 0/1.

D.

GigabitEthernet0/2 and GigabitEthernet0/3 are access ports for VLAN 6.

E.

GiabitEthernet0/1 is left unconfigured.

Buy Now
Questions 20

Refer to the exhibit.

Drag and Drop the code from the bottom onto the box where the code is missing on the Meraki Python script to create a new network

Options:

Buy Now
Questions 21

Which protocol runs over TCP port 22?

Options:

A.

SSH

B.

HTTP

C.

Telnet

D.

NETCONF

Buy Now
Questions 22

What is a functionality of the Waterfall method as compared to the Agile method for software development?

Options:

A.

Waterfall increases agility to implement faster while Agile promotes reliability.

B.

A phase begins after the previous phase has ended in Waterfall while Agile phases run in parallel.

C.

Customers get feedback during the process in Waterfall while they can see the result at the end in Agile.

D.

Requirements can be updated in Waterfall while in Agile it should be gathered in the beginning.

Buy Now
Questions 23

Refer to the exhibit.

Which JSON is equivalent to the XML –encoded data?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 24

Refer to the exhibit.

A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?

Options:

A.

results gathering of the show version and show ip int brief commands

B.

output of show ip int brief command on devices of type C9500-40X

C.

execution information of the show version and show ip int brief commands

D.

list of executed commands on C9500-40X and the information of show ip int brief command

Buy Now
Questions 25

Refer to the exhibit.

Which two files are being edited in the unified diff? (Choose two.)

Options:

A.

README.md

B.

setup.py

C.

axl.py

D.

ciscoaxl.py

E.

index.py

Buy Now
Questions 26

Refer to the exhibit.

An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the 'get_all_interfaces' API call is used?

Options:

A.

times out

B.

rate limit

C.

pagination

D.

invalid password

Buy Now
Questions 27

What is the purpose of a MAC address on a network device?

Options:

A.

unique network address that identifies the network interface of a device

B.

unique network interlace address that is provided by the DHCP server

C.

unique hardware address that identifies the network interface of a device

D.

unique hardware interface address that is provided by the central switch

Buy Now
Questions 28

Refer to the exhibit.

Which command needs to be placed on the box where the code is missing to output the value of page_jd in the Python 3.7 script?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 29

Refer to the exhibit.

A developer creates a Python script that queries Cisco Webex. When the script is executed, a 401 code is returned. After troubleshooting, the developer discovers that the service is missing privileges. Which change to the header in line 4 of the script results in the code 200?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 30

Which API must an engineer use to change a netmask on a Cisco IOS XE device?

Options:

A.

Meraki

B.

RESTCONF/YANG

C.

SD-WAN

D.

DNAC

Buy Now
Questions 31

Refer to the exhibit.

A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?

Options:

A.

enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

B.

enable_function(‘iana-if-type:softwareLoopback’, Loopback1, true,)

C.

def enable_function(‘iana-if-type:softwareLoopback’, Loopback1, false,)

D.

def enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

Buy Now
Questions 32

Drag and drop the code from the bottom onto the box where the code is missing in the Python script to complete a function to return all the clients on a network by using the Cisco Meraki Dashboard API. Not all options are used.

Options:

Buy Now
Questions 33

Which protocol runs over TCP port 23?

Options:

A.

SSH

B.

NETCONF

C.

HTTP

D.

Telnet

Buy Now
Questions 34

Refer to the exhibit.

A developer must integrate a bot with an internal communication app. The developer wants to replace the webexbot package with the teamsbot package by using Ansible and prepares a playbook In the first two tasks, the playbook stops the webexbot and verifies that the teamsbot is installed. What is accomplished in the last task of the workflow when the developer runs the Ansible playbook?

Options:

A.

stops the webexbot service and uninstals it and retains its configuration files

B.

installs the webexbot and retains the configuration files

C.

uninstalls the webexbot package and removes its configuration files

D.

searches whether the purge package is available in the repository and uninstalls the webexbot package

Buy Now
Questions 35

What are two benefits of model-driven programmability?

Options:

A.

model-driven APIs for abstraction and simplification

B.

single choice of transport, protocol, and encoding

C.

model-based, structured, and human friendly

D.

easier to design, deploy, and manage APIs

E.

models decoupled from transport, protocol, and encoding

Buy Now
Questions 36

A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:

$ docker tag 84fe411926287 local/app:0.4

Which command must be executed next to build the Docker image using the tag?

Options:

A.

$ docker build -p local/app:0.4

B.

$ docker run -t local/app:0.4

C.

$ docker run -p local/app:0.4

D.

$ docker build -t local/app:0.4

Buy Now
Questions 37

A new application is being developed that must be hardware independent. The application includes an administrative component which is accessed using a Windows desktop GUI. Installation and management of the environment must be fully automated. Which application deployment type meets the requirements?

Options:

A.

bare metal

B.

virtual Python environment

C.

container

D.

virtual machine

Buy Now
Questions 38

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code,

which resource must be used to verify that the code works correctly?

Options:

A.

Cisco NX-OS SDK

B.

Cisco Learning Labs

C.

Cisco Code Exchange

D.

Cisco Modeling Labs

Buy Now
Questions 39

What is a difference between a synchronous API and an asynchronous API?

Options:

A.

An asynchronous API can make offline calls while synchronous APIs do not have this capability.

B.

Synchronous API calls are returned immediately while asynchronous calls do not guarantee an immediate response.

C.

Synchronous API calls require an authentication header to be sent while asynchronous calls do not require authentication.

D.

An asynchronous API can make a larger number of calls in a specified time period than a synchronous API.

Buy Now
Questions 40

What are two benefits of using VLANs? (Choose two.)

Options:

A.

limits the devices that can join the network

B.

segments the broadcast domain

C.

extends the broadcast domain

D.

allows all network devices to be accessible from any host on the network

E.

enables the logical grouping of devices that belong to different Layer 2 devices

Buy Now
Questions 41

Drag and drop the code snippets from the bottom to the blanks in the code to complete the HTTP response. Not all options are used.

Options:

Buy Now
Questions 42

Which Cisco platform provides organization-wide automation, security, policy enforcement, any agility across wired and wireless networks?

Options:

A.

Cisco ACI

B.

Cisco DNA Center

C.

Cisco Umbrella

D.

Cisco SD-WAN

Buy Now
Questions 43

Refer to the exhibit.

The script returns an output of 401. To use the supplied URL. an HTTP GET request must Be sent with an Authorization header. The header value is a BaseG4 encoded concatenation of the username and password. Which action must be taken to return an output of 200?

Options:

A.

Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication

B.

Modify the method from LOGIN to GET and supply the username ;password value as JSON payload

C.

Verify that the username and password values imported from the configuration file ate still valid.

D.

Insert an Authorization header with the values username password from the supplied configuration file.

Buy Now
Questions 44

Refer to the exhibit.

The documentation outlines how to use credentials for the AMP API Which script successfully performs an API call using basic authentication?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 45

Refer to the exhibit.

Which command, including arguments, is executed when the container starts?

Options:

A.

/bin/sh -c "/bin/sleep 30 && nginx -g 'daemon off;'"

B.

/bin/sh -c "/bin/sleep 10 && nginx -g 'daemon off;'"

C.

/bin/bash -c "/bin/sleep 30 && nginx -g 'daemon off;'"

D.

/bin/sh -c "/bin/sleep 30" && nginx -g 'daemon off;'

Buy Now
Questions 46

Which HTTP response status code means “Forbidden”?

Options:

A.

500

B.

401

C.

403

D.

502

Buy Now
Questions 47

A local Docker alpine image has been created with an image ID of a391665405fe and tagged as “latest”. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?

Options:

A.

docker build -p 8080:80 alpine:latest

B.

docker exec -p 8080:80 alpine:latest

C.

docker start -p 8080:80 alpine:latest

D.

docker run -p 8080:80 alpine:latest

Buy Now
Questions 48

Refer to the exhibit.

A network engineer wants to use an API to update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which line of code needs to be placed in the snippet where the code is missing?

Options:

A.

{'Content-Type': 'application/yang.data+xml', 'Accept': 'application/yang.data

+xml'}

B.

{'Content-Type': 'application/yang.data+yaml', 'Accept': 'application/yang.data

+yaml'}

C.

{'Content-Type': 'application/restconf.data+json', 'Accept': 'application/

restconf.data+json'}

D.

{'Content-Type': 'application/yang.data+utf8', 'Accept': 'application/

restconf.data+utf8'}

Buy Now
Questions 49

What is a capability of the NETCONF protocol?

Options:

A.

allows Python scripts to be executed externally from a network device

B.

uses JSON to encode data in its content layer

C.

allows XML messages to be exchanged via the SSH protocol

D.

exposes a web-based interface

Buy Now
Questions 50

Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:

• MySQL database that stores data about customers

• HTML5 and JavaScript UI that runs on Apache

• REST API written in Python

What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)

Options:

A.

to enable multiple views of the same data to be presented to different groups of users

B.

to provide separation between the view and the model by ensuring that all logic is separated out into the controller

C.

to ensure data consistency, which requires that changes to the view are also made to the model

D.

to ensure that only one instance of the data model can be created

E.

to provide only a single view of the data to ensure consistency

Buy Now
Questions 51

Refer to the exhibit.

A network engineer must manage the network devices. The engineer prepares a Python scripts to authenticate to the Cisco to DNA Center API and request a device list. The device request fails and returns errors code 401. Which action solves the problem?

Options:

A.

Update the API URL. which matched the API endpoint for device list.

B.

Send the request to another network in case there are reachability Issues.

C.

Send the Authentication header In the request with a valid configuration.

D.

Update the credentials that are already supplied and retry the request

Buy Now
Questions 52

How does a synchronous API request differ from an asynchronous API request?

Options:

A.

clients receive responses with a task id for further processing

B.

clients subscribe to a webhook for operation results

C.

clients are able to access the results immediately

D.

clients poll for the status of the execution of operations

Buy Now
Questions 53

Refer to the exhibit.

Which function does the EXPOSE line perform when building an image from this Dockerfile?

Options:

A.

Local port 8080 of the container that launched with this docker image is accessible from co-hosted containers and external clients.

B.

Local port 8080 is not reachable at all because no IP address is specified along with the EXPOSE command of the Dockerfile.

C.

Local port 8080 is accessible from other containers running on the same docker host as the container that launched with this docker image.

D.

Local port 8080 of the container that launched with this docker image is accessible to external clients.

Buy Now
Questions 54

Which tool allows changes to the configuration management toolset to be tested?

Options:

A.

Cisco VIRL

B.

NAPALM

C.

Ansible

D.

pyATS

Buy Now
Questions 55

Drag and drop the code from the bottom onto the box where the code is missing in the Bash script to complete the missing assignment.

Options:

Buy Now
Questions 56

What is a benefit of organizing into modules?

Options:

A.

improves collaboration of the development team

B.

makes it easier to deal with large and complex systems

C.

enables the code to be broken down into layers

D.

enables the inclusion of more programming languages in the code

Buy Now
Questions 57

Refer to the exhibit.

A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?

Options:

A.

compilation and configuration of the Cisco DevNet application so that it must be started manually

B.

compilation, installation, and configuration of the Cisco DevNet application so that it starts automatically

C.

compilation and installation of the Cisco DevNet application for an autonomous deployment model

D.

installation and configuration of the Cisco DevNet application so that it starts manually

Buy Now
Questions 58

A company wants to accelerate the adoption of technologies that will simplify its operations. Staff have different skill levels and are looking for a single site to find easy-to-consume beginner, intermediate, and advanced multidomain use cases. Which site should be used?

Options:

A.

DevNet Ecosystem Exchange

B.

DevNet Automation Exchange

C.

DevNet Creations

D.

DevNet Support Forum

Buy Now
Questions 59

Why is refactoring done during test-driven development?

Options:

A.

to enable larger objects and longer methods

B.

to improve maintainability and readability

C.

to ensure that the previous uses of the objects are explained

D.

to ensure the duplication of essential code

Buy Now
Questions 60

Refer to the exhibit.

The Cisco Meraki API manages two organizations. In each organization, two independent networks are defined. How many calls to the /organizations/(orgid)networks endpoint will be run parallel by the GetAllNetwork function of the API client?

Options:

A.

0

B.

1

C.

2

D.

4

Buy Now
Questions 61

What is the main purpose of a code review?

Options:

A.

To provide the technical lead visibility into all code

B.

To identify and review errors with the team

C.

To ensure that all code is checked in simultaneously

D.

To detect logical errors

Buy Now
Questions 62

Refer to the exhibit.

A Python code has been written to query a device. The executed code results in the error shown. Which action resolves the problem?

Options:

A.

import json

B.

requests("GET", base_url + request_url, cookles=cookies)

C.

pip install requests

D.

import requests

Buy Now
Questions 63

Which advantage does the agile process offer compared to waterfall software development?

Options:

A.

to view the full scope of end-to-end work

B.

to have each phase end before the next begins

C.

to fix any issues at the end of the development cycle

D.

to add or update features with incremental delivery

Buy Now
Questions 64

How do XML and JSON compare regarding functionality?

Options:

A.

JSON natively supports arrays and XML does not natively support arrays.

B.

XML provides support for mapping data structures into host languages than JSON.

C.

XML provides more human readability than JSON.

D.

JSON provides support for data types than XML.

Buy Now
Questions 65

What is the difference between YAML and JSON data structure?

Options:

A.

YAML uses spaces; JSON uses parentheses

B.

YAML uses indentation; JSON uses brackets and braces

C.

YAML uses brackets and braces; JSON uses indentation

D.

YAML uses parentheses; JSON uses spaces

Buy Now
Questions 66

A developer is creating a script to interact with a REST API service which requires basic authentication. The credentials are "devnet:391665405" and the Base64 encoding of the credentials is "GV2bmV0dXNlcjpDaXNj=". Which payload and header combination must be used for authentication?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 67

Which configuration management tool has an agentless capability?

Options:

A.

Chef

B.

Puppet

C.

Ansible

D.

CFEngine

Buy Now
Questions 68

Refer to the exhibit.

An API call is constructed to retrieve the inventory in XML format by using the API. The response to the call is 401 Unauthorized. Which two headers must be added to the API call? (Choose two.)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 69

Which two NETCONF operations cover the RESTCONF GET operation? (Choose two.)

Options:

A.

B.

C.

D.

E.

Buy Now
Questions 70

What is the outcome of executing this command?

git clone ssh://john@exmaple.com/path/to/my-project_git

Options:

A.

Creates a local copy of a repository called “my project”

B.

Creates a copy of a branch called “my project”

C.

Initiates a new Git repository called “my project”

D.

Creates a new branch called “my project”

Buy Now
Questions 71

Refer to the exhibit.

What does the python function do?

Options:

A.

It returns DNAC user and password.

B.

It returns HTTP Basic Authentication.

C.

It returns an authorization token.

D.

It reads a token from a local JSON file and posts the token to the DNAC URL.

Buy Now
Questions 72

Refer to the exhibit.

OR

An administrator attempts to perform a GET using the Cisco IOS XE RESTOCNF API to return the hostname of a device. The sequence diagram illustrated the HTTP message observed. Which change to the API request resolves the issue?

Options:

A.

Add Content-Type HTTP header with 'application/yang-data+json' using –H ‘Content-Type: application/yang-data+json’.

B.

Use -u cisco: cisco instead of -u ‘cisco: cisco'.

C.

Change the request method from -X "GET” to- X’ POST”.

D.

Remove the -H ’Accept: application/yang-data^/son’ HTTP header because it is not required.

Buy Now
Questions 73

: 19 DRAG DROP

Drag and drop the HTTP methods from the left onto their generally accepted corresponding create, read, update, and delete operations on the right.

Options:

Buy Now
Questions 74

Refer to the exhibit.

The JSON data in the exhibit has been parsed and stored in a variable, “data”. What returns the value “172.16.0.11” ?

Options:

A.

data['items'][0]['host']['value']

B.

data['items']['1']['host']['value']

C.

data['items']['host'][1]

D.

data['items']['host']['value']

Buy Now
Questions 75

Which platform is run directly using a hypervisor?

Options:

A.

bare metal systems

B.

containers

C.

virtual machines

D.

applications

Buy Now
Questions 76

Which description of a default gateway if true?

Options:

A.

It is a device that receives IP packets that have no explicit next-hop in the routing table.

B.

It is a feature that translates between public and private addresses.

C.

It is a security feature that denies certain traffic.

D.

It is a device that receives Layer 2 frames with an unknown destination address.

Buy Now
Questions 77

In DNS, which record specifies an alias that refers to another name that ultimately resolves to an IP address?

Options:

A.

AAA

B.

SOA

C.

NS

D.

CNAME

Buy Now
Questions 78

What are two advantages of the Model-view-controller software design pattern? (Choose two.)

Options:

A.

simplifies network automation

B.

allows for multiple views of the same model

C.

makes code easier to deploy using Cl/CD pipelines

D.

reduces need for error handling

E.

separates responsibilities of the code, which makes future modifications easier

Buy Now
Questions 79

Refer to the exhibit.

Drag and drop the code from the left code from the left onto the item number on the right to complete the Meraki code to obtain a list of client which have used this network.

Options:

Buy Now
Questions 80

What are two advantages of YANG-based approaches for infrastructure automation? (Choose two.)

Options:

A.

directly maps to JavaScript

B.

multi-platform vendor abstraction

C.

designed to reflect networking concepts

D.

compiles to executables that run on network devices

E.

command line driven interface

Buy Now
Questions 81

Which two types of NAT are used in a network? (Choose two.)

Options:

A.

Static NAT

B.

Normal NAT

C.

Multicast NAT

D.

Dynamic NAT

E.

Router NAT

Buy Now
Questions 82

How is a branch called "my-bug-fix" started to develop a fix needed in a product?

Options:

A.

git branch -b my-bug-fix

B.

git checkout -b my-bug-fix

C.

git checkout my-bug-fix

D.

git branch my-bug-fix

Buy Now
Questions 83

Refer to the exhibit.

What is the function of the python script?

Options:

A.

Count and print the total number of available devices.

B.

Iterate over a list of network devices and write all device names and management IP addresses to an output file.

C.

Iterate over a list of network devices and write all device type and associated management IP address.

D.

For each device that is returned, display the device and, for each device, print the device name and management IP address.

E.

Loop through the returned list of network devices and, for each device, print the device name management IP address.

Buy Now
Questions 84

Refer to the exhibit.

Fill in the blanks to complete the cURL command to the list of networks in the Meraki organization with an id of 384279060

Options:

Buy Now
Questions 85

Which REST architectural constraint indicates that no client context should be stored on the server between requests?

Options:

A.

stateless

B.

uniform interface

C.

cacheable

D.

client-server

Buy Now
Questions 86

Drag and drop elements of the RESTCONF protocol stack from the left onto the correct description on the right. Not all elements on the left are used.

Options:

Buy Now
Questions 87

Refer to the exhibit.

Drag and drop the descriptors from the left onto the correct parts of the API request and response on the right.

Options:

Buy Now
Questions 88

Refer to the exhibit.

What is the effect of this Ansible playbook on an IOS router?

Options:

A.

A new running configuration is pushed to the IOS router.

B.

The current running configuration of the IOS router is backed up.

C.

The start-up configuration of the IOS router is copied to a local folder.

D.

A new start-up configuration is copied to the IOS router.

Buy Now
Questions 89

Which device is used to transport traffic from one broadcast domain to another broadcast domain?

Options:

A.

load balancer

B.

layer 2 switch

C.

router

D.

proxy server

Buy Now
Questions 90

Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?

Options:

A.

OAuth must be used.

B.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

C.

Basic authentication must be used.

D.

No authentication is required.

Buy Now
Questions 91

Which CI/CD tool is an automation tool used to build, test, and deploy software?

Options:

A.

Nagios

B.

Gradle

C.

Jenkins

D.

Git

Buy Now
Questions 92

Drag and drop the capability on the left onto the Cisco compute management platform that supports the capability on the right.

Options:

Buy Now
Questions 93

Which status code is used by a REST API to indicate that the submitted payload is incorrect?

Options:

A.

400

B.

403

C.

405

D.

429

Buy Now
Questions 94

Refer to the exhibit.

The output of a unified diff when comparing two versions of a python script is shown. Which two “single_request _timeout ()”

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 95

A developer is attempting to retrieve all the messages from a Cisco Webex space. The server responds by sending the first 1,000 messages. The developer must make additional requests to retrieve the rest of the messages. Which API constraint is described in this scenario?

Options:

A.

payload limiting

B.

throttling

C.

pagination

D.

rate limiting

Buy Now
Questions 96

Refer to the exhibit. Which action does the script perform?

Options:

A.

It queries user credentials from Cisco IOS XE devices.

B.

It retrieves device identification from Cisco DNA Center.

C.

It exports SSID information from Meraki dashboard.

D.

It collects group information from ACI.

Buy Now
Questions 97

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. The Python script retrieves a list of tasks from a to-do list for effective project management purposes. Not all options are used.

Options:

Buy Now
Questions 98

An engineer must review and clean up a code repository. During the review, the engineer finds a file named config.json that contains API URLs, shared keys, and other application configurations. Which two methods, according to best practice, must be used to protect secrets? (Choose two.)

Options:

A.

Store in plaintext if they are not stored in a code repository.

B.

Store as plaintext when the server is secured physically.

C.

Never appear in plaintext at rest or in transit.

D.

Make them long, secure strings that include numbers with special characters.

E.

Always store in a secure vault.

Buy Now
Questions 99

A developer writes an application that refines data in temporary secure file storage hosted on the public cloud. Data will be deleted after processing and does not contain any private information. What is the advantage that a public cloud deployment provides to the developer?

Options:

A.

high security with encryption

B.

ease in infrastructure management

C.

flexible development

D.

bespoke services

Buy Now
Questions 100

Which IP service is responsible for automatically assigning an IP address to a device?

Options:

A.

DNS

B.

DHCP

C.

SNMP

D.

NAT

Buy Now
Questions 101

Refer to the exhibit.

A collaboration engineer has developed a script to automate the gathering of information by providing the email address of the individual. When the engineer tests the script, a 401 error is received. Which command fixes the script?

Options:

A.

Add "Authorization": "Bearer <WEBEX_TOKEN>" to the headers

B.

Add "Authentication": "Basic <WEBEX_TOKEN>" in the base_url after "https://".

C.

Add "<Authorization>:<password>@" in the base_url after "https://".

D.

Add "Authentication": "Bearer <WEBEX TOKEN>" to the headers

Buy Now
Questions 102

Refer to the exhibit.

The server.js Node.js script runs after the Dockerfile creates its container. What is the working directory of the application inside the container?

Options:

A.

/source

B.

/app

C.

/app/source

D.

/app/produclion

Buy Now
Questions 103

Which two commands download and execute an Apache web server container in Docker with a port binding 8080 in the container to 80 on the host? (Choose two.)

Options:

A.

docker pull apache

B.

docker run -p 8080:80 httpd

C.

docker run -p 80:8080 httpd

D.

docker pull httpd

E.

docker pull https

Buy Now
Questions 104

Refer to the exhibit.

What are two characteristics of the NETCONF response? (Choose two.)

Options:

A.

ospf is defined by the ietf-ospf module.

B.

ietf-ospf imports ietf-routing.

C.

redistribution is a module of type cisco-ospf.

D.

routing protocols is a list.

E.

The main module is routing.

Buy Now
Questions 105

Refer to the exhibit. An engineer must authorize a REST API call. The API password is "Cisco123!". Which Bash command must be placed in the code to authorize the call?

Options:

A.

mkdir API_PASSWORD=Cisco123!

B.

set API_PASSWORD=Cisco123!

C.

cp API_PASSWORD=Cisco123!

D.

export API_PASSWORD=Cisco123!

Buy Now
Questions 106

How are operations on REST APIs performed as compared to RPC APIs?

Options:

A.

In a REST API, operations are performed on an object (node) that is identified by a URL, but RPC APIs are operation-oriented.

B.

In a REST API, operations are performed on an external resource that is defined on the API, but the RCP APIs are resource-oriented.

C.

In a REST API, operations are performed on a platform that is identified by the URL, but RPC APIs are platform-oriented.

D.

In a REST API, operations are performed on an internal resource that is defined on the API, but RPC APIs are resource-oriented.

Buy Now
Questions 107

A development team is creating an application used for contactless payments. The application must:

Be web-based

Capture and process the credit card information for a purchase.

Which security action must the web application use to gather and process the private customer data?

Options:

A.

Enable RATs to monitor the web application remotely.

B.

Disable botnets to eliminate risks.

C.

Disable TLS to increase the connection speed.

D.

Enable the encryption of network traffic.

Buy Now
Questions 108

What are two benefits of using classes over functions when writing applications? (Choose two.)

Options:

A.

improved readability

B.

increased compatibility

C.

variable reusability

D.

increased performance

E.

code organization

Buy Now
Questions 109

Refer to the exhibit.

An engineer is comparing two tiles by using the unified cliff format What is determined by the content in the file2.py file?

Options:

A.

Line 16 of file2.py is auth=HTTPBasicAuth(USERNAME. PASSWORD).

B.

Line 17 of file2.py is auth = HTTPBasicAuth{USERNAME. PASSWORD).

C.

Line 93 of file2.py is 'DEVICE-STATS'.

D.

Line 92 of file2.py is 'DEVICE-STATS'.

Buy Now
Questions 110

A company wants to automate the orders processed on its website using API. The network device that supports the solution must:

    support XML encoding

    support distributed transactions

    support YANG data models

    be support software redundancy

Which requirement prevents the use of RESTCONF for the solution?

Options:

A.

software redundancy

B.

YANG data models

C.

distributed transactions

D.

XML encoding

Buy Now
Questions 111

Which technology is responsible for resolving a host name to an IP address?

Options:

A.

DNS

B.

SNMP

C.

DHCP

D.

NTP

Buy Now
Questions 112

Refer to the exhibit.

An engineer must add new users and set privileges for executing a few Python scripts. The engineer prepares a Bash script to automate this task. The script ds a user and a group from the command-line arguments, creates a directory, and copies the Python scripts to it. The script then changes to the directory and lists the scripts, used on the script workflow, which process is being automated within the loop by using the list of Python scripts?

Options:

A.

removing the files that are not Python, listing the Python files, and assigning execution privileges to the initially created user and group.

B.

assigning execution privileges to everyone and changing the ownership to the initially created user and group

C.

assigning execution privileges to the owner, setting the user and group owner to the scripts that were initially created, and storing the script names in a file.

D.

creating a file with the content of all the files, assigning execution permissions to each script, and then changing ownership to the initially created user and group.

Buy Now
Questions 113

What is a characteristic of the Cisco Finesse platform?

Options:

A.

Applications allow services to be invoked on a network triggered event.

B.

The platform provides a ready-to-go platform for HD video and audio conferencing.

C.

Applications are added to the platform from the desktop remotely.

D.

The platform includes an enterprise-class IM engine.

Buy Now
Questions 114

Refer to the exhibit.

A developer needs to create a Docker image that listens on port 5000. Which code snippet must be placed onto the blank in the code?

Options:

A.

PORT 5000

B.

LISTEN 5000

C.

EXPOSE 5000

D.

OPEN 5000

Buy Now
Questions 115

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Options:

Buy Now
Questions 116

To which stage of development do Infrastructure as Code principles relate?

Options:

A.

manual configuration

B.

service provisioning

C.

physical deployment

D.

requirement collection

Buy Now
Questions 117

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Options:

Buy Now
Questions 118

Which traffic is handled on the control plane?

Options:

A.

BGP

B.

SMB

C.

NTP

D.

NETCONF

Buy Now
Questions 119

What is a comparison of YAML and JSON?

Options:

A.

YAML has a more consistent approach to representing data compared to JSON.

B.

JSON does not support comments and YAML does.

C.

YAML is a more verbose data structure compared to JSON.

D.

JSON has more common usage in configuration management tools compared to YAML.

Buy Now
Questions 120

Refer to the exhibit.

An application must be deployed on a server that has other applications installed. The server resources are to be allocated based on the deployment requirements. The OS for each application must be independent. Which type of deployment is used?

Options:

A.

hybrid

B.

virtual machines

C.

containers

D.

bare metal

Buy Now
Questions 121

A development team needs to containerize an application named 'cust475605674\ A Dockerfile has been created and now the docker build command needs to be run using the current folder to find the Dockerfile. build the image and create a local repository named 'cust321453857-rep' that points to that image. Which command must be used?

Options:

A.

docker build -t cust321453857-rep -f Dockerfile

B.

docker build cust321453857-rep -f Dockerfile.txt

C.

docker build cust321453857-rep Dockerfile

D.

docker build -t cust321453857-rep Dockerfile.txt

Buy Now
Questions 122

Which two details are captured from the subnet mask? (Choose two.)

Options:

A.

portion of an IP address that refers to the subnet

B.

default gateway of the host

C.

unique number ID assigned to the host

D.

part of an IP address that refers to the host

E.

network connection of a host or interface

Buy Now
Questions 123

What are two benefits of implementing common data structures when working with APIs in remote systems? (Choose two.)

Options:

A.

ensures that developers are limited to using one data schema type

B.

prevents multivendor interoperability

C.

improves security in RESTful web services

D.

enforces standardized data structures

E.

leverages code that is easily managed and reused

Buy Now
Questions 124

A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?

Options:

A.

Store the username and password in a separate configuration file.

B.

Store the username and password in a vault.

C.

Store the passwords in a dictionary.

D.

Store the username and password in code.

Buy Now
Questions 125

Refer to the exhibit.

A company recently acquired new IP-based security cameras. After discussion with the engineering team, they decide to segment the security camera traffic m the rest…The engineer assigns the new VLAN 10 for the security camera traffic. After all the devices are configured, it seems as if the cameras cannot access the Internet, .. a few minutes of debugging, the engineer restricts the problem to the router configuration. What is the cause of the issue?

Options:

A.

A specific permit statement for the 192.168.20.0/24 subnet is missing from the access list.

B.

A NAT inside rule is missing from the GlgabitEthernet0/0/0.10 interface.

C.

A specific permit statement for the 192.168.10.0/24 subnet is missing from the access list.

D.

A NAT inside rule is missing from the GigabitEthemet0/0/0 interface.

Buy Now
Questions 126

Refer to the exhibit.

A developer just finished testing a Python script and wants to save the list of packages and versions installed on the current machine. The developer must make sure that it will not cause any issues if tested on another device due to different library versions. Which line of code needs to be placed on the snippet where the code is missing?

Options:

A.

pip freeze 2> requirements.txt

B.

pip freeze > requirements.txt

C.

pip freeze => requirements.txt

D.

pip freeze | requirements.txt

Buy Now
Questions 127

Refer to the exhibit. A developer must use a token to collect data from Cisco DNA Center API and prepares a Python script to send requests. Which line of code needs to be placed on the snippet where the code is missing to obtain a token from the Cisco DNA Center API?

Options:

A.

token=BasicAuth(‘user’,‘password’))

B.

auth=BasicAuth(‘user’,‘password’))

C.

auth=HTTPBasicAuth(user,password))

D.

token=HTTPBasicAuth(user,password))

Buy Now
Questions 128

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Options:

Buy Now
Questions 129

Refer to the exhibit. A developer needs to create a webhook to send all Cisco Webex messages to a third-party tool by using the Cisco Webex API. The developer must Auhenticate with the API before any API calls can be made. To automate the procedure, a Python script is used. Which code snippet must be placed onto the blank in the code?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 130

Drag and drop the common API styles from the left onto the requirement on the right.

Options:

Buy Now
Questions 131

An engineer deploys a Cisco CSR 1000 V instance to a virtual machine. The engineer must output the device configuration in JSON format. Which protocol is used for this task?

Options:

A.

YANG

B.

NETCONF

C.

SNMP

D.

RESTCONF

Buy Now
Questions 132

What is a procedural component of CI/CD pipelines?

Options:

A.

Bundled artifacts must be generated.

B.

Every test must pass for the pipeline to continue its execution.

C.

Some tests fall without stopping the pipeline execution.

D.

The release label that identifies the build is optional.

Buy Now
Questions 133

Drag and drop the code snippets from the bottom onto the blanks in the code to complete the happy path scenario. Not all options are used.

Options:

Buy Now
Questions 134

What is a function of the default gateway in a network?

Options:

A.

to drop traffic that is destined to the default gateway

B.

to forward traffic to different subnets

C.

to forward traffic to the same subnet

D.

to drop traffic that is not destined to the default gateway

Buy Now
Questions 135

Refer to the exhibit. A script must output details of all the Cisco Meraki MS220-BP switches across all organizations and networks. Drag and drop the code snippets from the bottom onto the boxes in the code to complete the script. Not all options are used.

Options:

Buy Now
Questions 136

Refer to the exhibit. A network engineer executes the bash script shown. Which two things are achieved by running the script? (Choose two.)

Options:

A.

A directory called PRODUCTION is created.

B.

The engineer changes to the parent directory.

C.

A YAML file is created.

D.

A YAML file is removed.

E.

A directory called state.yml is created.

Buy Now
Questions 137

Refer to the exhibit.

A developer can access the TLS REST API on server A, but cannot access the API on server B. The developer can ping server B. When the developer performs a packet capture on the TLS REST API port on server B, the capture shows that the packet arrived and the server responded. What causes the issue?

Options:

A.

Port 80 is blocked on the outgoing interface of firewall B.

B.

Port 443 is blocked on the outgoing interface of firewall A.

C.

Port 443 is blocked on the incoming interface of firewall B.

D.

Port 80 is blocked on the incoming interface of firewall A.

Buy Now
Questions 138

What is the function of an Ethernet switch in a networking environment?

Options:

A.

to switch a frame from one port to another port based on IP address

B.

to switch a frame from one port to another port based on MAC address

C.

to provide IP addressing to connected hosts

D.

to block unwanted traffic

Buy Now
Questions 139

Refer to the exhibit.

A developer cannot reach the web application behind an NGINX load balancer. The developer sends a request to an application FQDN with cURL but gets an HTTP 502 response. Which action solves the problem?

Options:

A.

Fix errors in the server configuration, which is behind the load balancer.

B.

Bring up the load balancer to the active state.

C.

Fix errors in the cURL request sent by the client.

D.

Change the default gateway on the load balancer to an active one.

Buy Now
Questions 140

What is a capability of model-driven programmability for infrastructure automation?

Options:

A.

compatibility with any networking device

B.

automatic version control

C.

generic APIs that are compatible with multiple platforms

D.

a single data model acr oss the network

Buy Now
Exam Code: 200-901
Exam Name: DevNet Associate (DEVASC)
Last Update: Nov 21, 2024
Questions: 467
$68  $169.99
$52  $129.99
$44  $109.99
buy now 200-901