Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Cisco 200-901 Dumps Questions Answers

Page: 1 / 35
Total 467 questions

DevNet Associate (DEVASC) Questions and Answers

Question 1

What are two advantages of YANG-based approaches for infrastructure automation? (Choose two.)

Options:

A.

directly maps to JavaScript

B.

multi-platform vendor abstraction

C.

designed to reflect networking concepts

D.

compiles to executables that run on network devices

E.

command line driven interface

Buy Now
Question 2

Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?

Options:

A.

OAuth must be used.

B.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

C.

Basic authentication must be used.

D.

No authentication is required.

Question 3

What are two security benefits of a Docker-based application?

Options:

A.

easier to patch because Docker containers include only dependencies that the application requires

B.

prevents information leakage that can occur when unhandled exceptions are returned in HTTP responses

C.

allows for separation of application that traditionally run in the same host

D.

natively secures access to secrets that are used by the running application

E.

guarantees container images are secured and free of vulnerabilities

Question 4

Which two statements describe the advantages of using a version control system? (Choose two.)

Options:

A.

It allows for branching and merging so that different tasks are worked on in isolation before they are merged into a feature or master branch.

B.

It allows multiple engineers to work against the same code and configuration files and manage differences and conflicts.

C.

It provides tooling to automate application builds and infrastructure provisioning.

D.

It allows developers to write effective unit tests.

E.

It provides a system to track User Stories and allocate to backlogs.

Question 5

Fill in the blanks to complete the Bash script in which each file in a directory is renamed to Its SHA256 hash?

Options:

Question 6

A Company is looking for cloud deployment which will use the on-premise infrastructure, is user self-service, and easy to scale. Which cloud solution should be selected for these requirements?

Options:

A.

multi

B.

public

C.

private

D.

hybrid

Question 7

What is used in Layer 2 switches to direct packet transmission to the intended recipient?

Options:

A.

spanning tree

B.

IPv4 address

C.

IPv6 address

D.

MAC address

Question 8

Refer to the exhibit.

What is the action of the Bash script that is shown?

Options:

A.

The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory.

B.

The script goes into the directory called “$ndir” and makes a new directory called “$ndir”

C.

The script waits unit input is entered, then it goes into the directory entered and creates a new directory with the same name.

D.

For all directories in the current folder. The script goes into directory and makes a new directory.

Question 9

Refer to the exhibit.

Drag and drop the descriptors from the left onto the correct parts of the API request and response on the right.

Options:

Question 10

Refer to the exhibit.

Which two statement describe the configuration of the Ansible script is run? (Choose two.)

Options:

A.

Traffic on port 0/2 and 0/3 is connected to port 0/6.

B.

Traffic from ports 0/2 to 0/5 can flow on port 0/1 due to the trunk.

C.

Traffic can flow between ports 0/2 to 0/5 due to the trunk on port 0/1.

D.

GigabitEthernet0/2 and GigabitEthernet0/3 are access ports for VLAN 6.

E.

GiabitEthernet0/1 is left unconfigured.

Question 11

Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve statement using RESTCONF on a CSR 1000V?

Options:

A.

Change the HTTP method to PUT.

B.

Change the transport protocol to HTTPS.

C.

Check the MIMF types in the HTTP headers.

D.

Check the authentication credentials.

Question 12

Users cannot access a webserver and after the traffic is captured, the capture too* shows an ICMP packet that reports "communication administratively prohibited" What Is the cause of this webserver access Issue?

Options:

A.

An access list along the path is blocking the traffic

B.

The traffic is not allowed to be translated with NAT and dropped.

C.

Users must authenticate on the webserver to access It

D.

A router along the path is overloaded and thus dropping traffic

Question 13

What is the benefit of edge computing?

Options:

A.

It reduces network latency by moving processing closer to the data source.

B.

It simplifies security as devices and processing are brought closer together

C.

It removes the need for centralized data processing.

D.

It reduces data velocity from devices or other data sources.

Question 14

An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device mut be at fault?

Options:

A.

Laptop on which the script is running

B.

Router

C.

Switch

D.

Load balancer

Question 15

Drag and drop the function on the left onto the type of plane that handles the function on the right.

Options:

Question 16

Drag and drop the capability on the left onto the Cisco compute management platform that supports the capability on the right.

Options:

Question 17

Which type of threat occur when an attacker can send hostile data to an interpreter within an application?

Options:

A.

Cross-site scripting

B.

Sensitive data exposure

C.

Broken authentication

D.

Injection

Question 18

A developer is writing an application that a REST API and the application requires a valid from the API which element of the response is used in the conditional check?

Options:

A.

URL

B.

Status code

C.

Link

D.

Body

E.

Headers

Question 19

On which network plane is routing protocol traffic handled?

Options:

A.

data plane

B.

management plane

C.

authentication plane

D.

control plane

Question 20

Which platform has an API that be used to obtain a list of vulnerable software on user devices?

Options:

A.

Cisco Umbrella

B.

Cisco Firepower

C.

Cisco Identity Services Engine

D.

Cisco Advanced Malware Protection

Question 21

Refer to the exhibit.

What is represented in this YANG module?

Options:

A.

interface management

B.

topology

C.

BGP

D.

OpenFlow

Question 22

Which description of a default gateway if true?

Options:

A.

It is a device that receives IP packets that have no explicit next-hop in the routing table.

B.

It is a feature that translates between public and private addresses.

C.

It is a security feature that denies certain traffic.

D.

It is a device that receives Layer 2 frames with an unknown destination address.

Question 23

Refer to the exhibit.

The definition of the YANG module and a RESTCONF query sent to a Cisco IOc XE device is shown. Which statement is correct if the RESTCONF interface responds with a 204 status code?

Options:

A.

The query failed at retrieving the logging seventy level.

B.

The query failed to set the logging seventy level due to an invalid path.

C.

The query retrieved the logging seventy level.

D.

The query updated the logging seventy level or created it if not present on the device.

Question 24

A 401 HTTP response code is returned when calling a REST API. What is the error state identified by this response code?

Options:

A.

The server cannot process the request as it has detected an issue in the request syntax or body.

B.

The server accepted the request but the client is not authorized for this content.

C.

The request has not been accepted because it requires authentication.

D.

The server cannot find the requested resource because the path specified is incorrect.

Question 25

Refer to the exhibit.

A REST API retune this JSON output for a GET HTTP request, Which has assigned to a variable called “vegetables” Using python, which output is the result of this command?

Options:

A.

Lettuce

B.

Kiwi

C.

[‘kiwi’, ‘grape’]

D.

{‘color’: ‘green’, ‘items’: [‘kiwi’, ‘grape’]

Question 26

An application calls a REST API and expects a result set of more than 550 records, but each time the call is made, only 25 are returned. Which feature limits the amount of data that is returned by the API?

Options:

A.

pagination

B.

payload limit

C.

rate limiting

D.

service timeouts

Question 27

Drag and Drop the GIT commands from the left onto the right that add modified local files to a remote repository. Not all options are used

Options:

Question 28

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right.

Options:

Question 29

Which two types of NAT are used in a network? (Choose two.)

Options:

A.

Static NAT

B.

Normal NAT

C.

Multicast NAT

D.

Dynamic NAT

E.

Router NAT

Question 30

Drag and Drop the Bash commands from the left onto the correct actions on the right.

Options:

Question 31

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. Not all options are used.

Options:

Question 32

Which platform is run directly using a hypervisor?

Options:

A.

Virtual

B.

Bare metal systems

C.

Containers

D.

Applications

Question 33

What is the Git command to delete a local branch named “experiment” without a warning?

Options:

A.

git branch –n experiment

B.

git branch –rm experiment

C.

git branch –f experiment

D.

git branch –D experiment

Question 34

Which principle is a value from the manifesto for Agile software development?

Options:

A.

adhering to a plan over responding to requirements

B.

detailed documentation over working software

C.

processes and tools over teams and inter actions

D.

customer collaboration over contract negotiation

Question 35

Fill in the blanks to complete the python script to request a service ticket using the APIC-EM rest API for the user “devnetuser”.

Options:

Question 36

Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.

Options:

Question 37

Refer to the exhibit.

Drag and drop the code from the left onto the item numbers on the right to complete to Meraki python script shown in the exhibit.

Options:

Question 38

Drag and drop the element of the Finesse API on the left onto the description of its functionally on the right.

Options:

Question 39

Fill in the blanks to complete the statement.

Given a username of “devnet” And a password “Cisco123”, applications must create a base64 encoding of the string” ____________ ” when sanding HTTP requests to an API that uses _______________ authentication.

Options:

Question 40

Which two NETCONF operations cover the RESTCONF GET operation? (Choose two.)

Options:

A.

B.

C.

D.

E.

Question 41

Refer to Exhibit.

Which JSON is equivalent to the XML-encoded data.

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 42

Package updates from a local server fail to download. However, the same updates work when a much slower external repository is used. Way are local updates failing?

Options:

A.

The update utility is trying to use a proxy to access the internal resource.

B.

The Internet connection is too slow.

C.

The Internet is down at the moment, which causes the local server to not be able to respond.

D.

The server is running out of disk space.

Question 43

Fill in the blanks to complete the statement.

Cisco DNA provide the capability to send an HTTP _______________ request to the API endpoint and receive the network __________ list in __________ format.

Options:

Question 44

Which two statements about JSON and XML are true? (Choose two.)

Options:

A.

JSON objects are collection of key value pair.

B.

The syntax of JSON contains tags, elements, and attributes.

C.

JSON arrays are an unordered set of key value pairs.

D.

The syntax of XML contains tags, elements, and attributes.

E.

XML objects are collections of key-value pairs.

Question 45

Which product provides network controller-level management features?

Options:

A.

Cisco DNA Center

B.

Cisco NX-OS

C.

Cisco UCS Manager

D.

Cisco ISE

Question 46

Which two statements describe the traits of an asynchronous API call? (Choose two.)

Options:

A.

The order in which API calls return can be guaranteed

B.

A call to an API does not block the code, but rather it allows application processing to continue

C.

The end user can experience latency or performance lag while waiting for the API call to return

D.

Code execution blocks or waits for the call to an API to return.

E.

A callback function typically is used to process the response from an API call

Question 47

Refer to the exhibit.

The output of a unified diff when comparing two versions of a python script is shown. Which two “single_request _timeout ()”

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 48

While developing a real-Time VoIP application on a Cisco Webex platform, users report that their voice gets chopped or parts of the conversation drop out. Which network constraint is impacting the application?

Options:

A.

latency

B.

jitter

C.

capacity

D.

delay

Question 49

A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?

Options:

A.

Communication between the application and the services is not encrypted.

B.

The database credentials should be stored in the configuration files so that they are secured on the same server.

C.

The API keys are stored in the configuration files but should be stored in the vault service.

D.

The synchronization logs should be encrypted and not stored in a relational database.

Question 50

What is a functionality of the Waterfall method as compared to the Agile method for software development?

Options:

A.

Waterfall increases agility to implement faster while Agile promotes reliability.

B.

A phase begins after the previous phase has ended in Waterfall while Agile phases run in parallel.

C.

Customers get feedback during the process in Waterfall while they can see the result at the end in Agile.

D.

Requirements can be updated in Waterfall while in Agile it should be gathered in the beginning.

Question 51

A local Docker alpine image has been created with an image ID of a391665405fe and tagged as “latest”. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?

Options:

A.

docker build -p 8080:80 alpine:latest

B.

docker exec -p 8080:80 alpine:latest

C.

docker start -p 8080:80 alpine:latest

D.

docker run -p 8080:80 alpine:latest

Question 52

Which platform is used to programmatically create a space and invite users for collaboration?

Options:

A.

Cisco Intersight

B.

Cisco Finesse

C.

Cisco Webex

D.

Cisco UCM

Question 53

Which HTTP code group is issued when a request is received successfully, understood, and processed?

Options:

A.

2xx

B.

3xx

C.

4xx

D.

5xx

Question 54

Refer to the exhibit.

The Cisco Meraki API manages two organizations. In each organization, two independent networks are defined. How many calls to the /organizations/(orgid)networks endpoint will be run parallel by the GetAllNetwork function of the API client?

Options:

A.

0

B.

1

C.

2

D.

4

Question 55

Refer to the exhibit.

Which command, including arguments, is executed when the container starts?

Options:

A.

/bin/sh -c "/bin/sleep 30 && nginx -g 'daemon off;'"

B.

/bin/sh -c "/bin/sleep 10 && nginx -g 'daemon off;'"

C.

/bin/bash -c "/bin/sleep 30 && nginx -g 'daemon off;'"

D.

/bin/sh -c "/bin/sleep 30" && nginx -g 'daemon off;'

Question 56

What is a capability of the NETCONF protocol?

Options:

A.

allows Python scripts to be executed externally from a network device

B.

uses JSON to encode data in its content layer

C.

allows XML messages to be exchanged via the SSH protocol

D.

exposes a web-based interface

Question 57

Refer to the exhibit. A network engineer must collect information from the network. The engineer prepares a script to automate workflow by using Cisco Meraki API. The script must run over nested loops to collect organization and network information and uses the collected data for final collection. Which process is being automated by using the Python script?

Options:

A.

Gather the IDs of the ACME organization, the BLDG21 network, and the dents on the network

B.

Provide the BLDG21 network information if it is part of the ACME organization

C.

Collect the IDs of the clients on the BLDG21 network

D.

List the IDs from the ACME organization

Question 58

A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:

$ docker tag 84fe411926287 local/app:0.4

Which command must be executed next to build the Docker image using the tag?

Options:

A.

$ docker build -p local/app:0.4

B.

$ docker run -t local/app:0.4

C.

$ docker run -p local/app:0.4

D.

$ docker build -t local/app:0.4

Question 59

Refer to the exhibit.

A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?

Options:

A.

results gathering of the show version and show ip int brief commands

B.

output of show ip int brief command on devices of type C9500-40X

C.

execution information of the show version and show ip int brief commands

D.

list of executed commands on C9500-40X and the information of show ip int brief command

Question 60

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

Options:

Question 61

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code,

which resource must be used to verify that the code works correctly?

Options:

A.

Cisco NX-OS SDK

B.

Cisco Learning Labs

C.

Cisco Code Exchange

D.

Cisco Modeling Labs

Question 62

Refer to the exhibit.

A developer creates a script to obtain a list of devices by using the Cisco DNA Center API. The remote server authorizes the request only if an authentication token is supplied in the headers. A function named get_auth_token() must retrieve a valid token by using HTTP Basic Authentication. Which code must be added to complete the get_auth_token() function?

Options:

A.

resp = requests.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

B.

resp = requests.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json ()['Token']

return token

C.

resp = http.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

D.

resp = http.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

Question 63

Refer to the exhibit.

A developer needs to upload a local file by using the REST API. The developer gathers information according to the documentation and sends the request by using the cURL command in the exhibit but gets an error code. Which action should be followed to get valid response?

Options:

A.

change content type as JSON

B.

add the authorization header with the access token

C.

add a username-password combination to request command

D.

change request method as GET

Question 64

What is the purpose of a MAC address on a network device?

Options:

A.

unique network address that identifies the network interface of a device

B.

unique network interlace address that is provided by the DHCP server

C.

unique hardware address that identifies the network interface of a device

D.

unique hardware interface address that is provided by the central switch

Question 65

A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?

Options:

A.

git update

B.

git merge

C.

git add

D.

git rebase

Question 66

How does a synchronous API request differ from an asynchronous API request?

Options:

A.

clients receive responses with a task id for further processing

B.

clients subscribe to a webhook for operation results

C.

clients are able to access the results immediately

D.

clients poll for the status of the execution of operations

Question 67

In the test-driven development model, what is changed after a test fails?

Options:

A.

test

B.

schedule

C.

project requirements

D.

code

Question 68

Refer to the exhibit.

A Python script must delete all Cisco Catayst 9300 Series switches that have an uptime that is greater than 90 days The script must also query for the status of all the other devices Drag and drop the code from the bottom onto the bottom box the code is missing to complete the script Not at options are used

Options:

Question 69

In test-driven development, what are two of the green bar patterns? (Choose two.)

Options:

A.

another test

B.

break

C.

triangulate

D.

starter test

E.

fake it

Question 70

What are two functions of a routing table on a network device? (Choose two.)

Options:

A.

It lists entries more than two hops away.

B.

It lists the routes to a particular destination.

C.

It lists the routes to drop traffic.

D.

It lists hosts that are one hop away.

E.

It lists the static and dynamic entries.

Question 71

Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.

Options:

Question 72

A developer creates a script that configured multiple Cisco IOS XE devices in a corporate infrastructure. The internal test environment is unavailable, and no maintenance window is available to test on a low-priority production environment. Which resource is used to test the code before it is applied to the production environment?

Options:

A.

Code Exchange

B.

Cisco DevNet Learning Labs

C.

Cisco DevNet Sandbox

D.

Cisco Support

Question 73

Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?

Options:

A.

100

B.

204

C.

302

D.

402

Question 74

A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time.

Which area of the CALMS framework must the company target for improvement?

Options:

A.

Collaboration

B.

Lean

C.

Sharing

D.

Measurement

Question 75

Drag and drop the code snippets from the bottom into the Python script to write API output to a csv file. Not all options are used.

Options:

Question 76

Refer to the exhibit.

A developer must integrate a bot with an internal communication app. The developer wants to replace the webexbot package with the teamsbot package by using Ansible and prepares a playbook In the first two tasks, the playbook stops the webexbot and verifies that the teamsbot is installed. What is accomplished in the last task of the workflow when the developer runs the Ansible playbook?

Options:

A.

stops the webexbot service and uninstals it and retains its configuration files

B.

installs the webexbot and retains the configuration files

C.

uninstalls the webexbot package and removes its configuration files

D.

searches whether the purge package is available in the repository and uninstalls the webexbot package

Question 77

A company wants to accelerate the adoption of technologies that will simplify its operations. Staff have different skill levels and are looking for a single site to find easy-to-consume beginner, intermediate, and advanced multidomain use cases. Which site should be used?

Options:

A.

DevNet Ecosystem Exchange

B.

DevNet Automation Exchange

C.

DevNet Creations

D.

DevNet Support Forum

Question 78

Refer to the exhibit.

The script returns an output of 401. To use the supplied URL. an HTTP GET request must Be sent with an Authorization header. The header value is a BaseG4 encoded concatenation of the username and password. Which action must be taken to return an output of 200?

Options:

A.

Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication

B.

Modify the method from LOGIN to GET and supply the username ;password value as JSON payload

C.

Verify that the username and password values imported from the configuration file ate still valid.

D.

Insert an Authorization header with the values username password from the supplied configuration file.

Question 79

In which two ways is an application characterized when interacting with a webhook? (Choose two.)

Options:

A.

codec

B.

receiver

C.

transaction monitor

D.

processor

E.

listener

Question 80

Refer to the exhibit.

An engineer must configure a load balancer server. The engineer prepares a script to automate workflow by using Bash. The script install the nginx package, moves to the /optAtginx directory, and reads the sites M We (or further processing Based on the script workflow, which process is being automated within the loop by using the information mi sites txt?

Options:

A.

creating a new Me Based on template .conf in the /etc/ngin/sites_enabled directory for each lie in the sites txt file. and then changing the file execution permission.

B.

creating a Me per each the in sites txt with the information in template conf. creating a link for the previously created file. and then changing the ownership of the created files

C.

using the content of the file to create the template conf file. creating a Iink from the created file to the /etc/nginx/files.enabled. and then changing the file execution permissions.

D.

using the information in the file to create a set of empty files in the /etchginx/sites_enabled directory and then assigning the owner of the file.

Question 81

Refer to the exhibit.

A network engineer uses model-driven programmability to monitor and perform changes on the network. The network engineer decides to use the NETCONF RPC message to complete one of their tasks. What is accomplished by sending the RPC message?

Options:

A.

The running-config of the device is returned.

B.

The name of each interface is reset to a default name.

C.

All the YANG capabilities supported by the device are returned.

D.

A list of interface names is returned.

Question 82

Which HTTP response status code means “Forbidden”?

Options:

A.

500

B.

401

C.

403

D.

502

Question 83

Drag and drop the Dockerfile instructions from the left onto the descriptions on the right. Not at options are used.

Options:

Question 84

Refer to the exhibit.

The documentation outlines how to use credentials for the AMP API Which script successfully performs an API call using basic authentication?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Question 85

Why is refactoring done during test-driven development?

Options:

A.

to enable larger objects and longer methods

B.

to improve maintainability and readability

C.

to ensure that the previous uses of the objects are explained

D.

to ensure the duplication of essential code

Question 86

Refer to the exhibit.

What do all the calls shown in the sequence diagram have in common?

Options:

A.

All the calls are optional.

B.

All the calls are asynchronous.

C.

All the calls are synchronous.

D.

All the calls depend on the catalog.

Question 87

A developer is creating a script to interact with a REST API service which requires basic authentication. The credentials are "devnet:391665405" and the Base64 encoding of the credentials is "GV2bmV0dXNlcjpDaXNj=". Which payload and header combination must be used for authentication?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 88

Which implementation creates a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire?

Options:

A.

WLAN

B.

VLAN

C.

IPsec

D.

HSRP

Question 89

Which API must an engineer use to change a netmask on a Cisco IOS XE device?

Options:

A.

Meraki

B.

RESTCONF/YANG

C.

SD-WAN

D.

DNAC

Question 90

Before which process is code review performed when version control is used?

Options:

A.

Branching code

B.

Merge of code

C.

Checkout of code

D.

Committing code

Question 91

A developer is trying to retrieve data over a REST API. The API server responds with an HTTP client error response code. After investigating the response the developer realizes the realizes the response has a Retry-After header. What is the root cause of this error?

Options:

A.

The REST service is unreachable at the time of the REST request

B.

Too many requests were sent to the REST service in a given amount of time.

C.

An appliance limited the rate of requests to the transport layer.

D.

An appliance limited the rate of requests to the application layer

Question 92

What is a benefit of using edge computing in an IoT implementation?

Options:

A.

low cost in network design

B.

low network design complexity

C.

high availability for network components

D.

high speed in data processing

Question 93

What is the main purpose of a code review?

Options:

A.

To provide the technical lead visibility into all code

B.

To identify and review errors with the team

C.

To ensure that all code is checked in simultaneously

D.

To detect logical errors

Question 94

Which tool allows changes to the configuration management toolset to be tested?

Options:

A.

Cisco VIRL

B.

NAPALM

C.

Ansible

D.

pyATS

Question 95

Which protocol is used for clock synchronization between network devices?

Options:

A.

FTP

B.

NNTP

C.

BGP

D.

NTP

Question 96

What is a benefit of using Python classes?

Options:

A.

They improve code organization by keeping data members and methods together.

B.

They remove the concept of inheritance to improve code readability and maintainability.

C.

They allow a Python script to import code from various independent modules.

D.

They simplify integration by testing the classes independently from other components.

Question 97

Refer to the exhibit. A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?

Options:

A.

cp ./PROD/current.txt ./TEST/config.txt

B.

cp ./TESTi/current.txt ./PROD/config.txt

C.

cp ./PROD/config.txt ./TEST/current.txt

D.

cp ./TEST/config.txt ./PROD/current.txt

Question 98

How does edge computing analyze sensitive data in the context of privacy control?

Options:

A.

locally instead of sending the data to the cloud for analysis

B.

locally or on the cloud depending on the configuration

C.

all at once by sending the data to the cloud

D.

locally on each node, and then sends the data to the cloud

Question 99

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a request that generates a security token and gets a list of network devices. Not all options are used.

Options:

Question 100

Refer to the exhibit. A bespoke meeting booking system must be integrated with Cisco Webex so that meetings are created automatically. Drag and drop the code from the bottom onto the box where the code is missing to create a sample meeting. Not all options are used.

Options:

Question 101

A developer completed the creation of a script using Git. Before delivering it to the customer, the developer wants to be sure about all untracked files, without losing any information. Which command gathers this information?

Options:

A.

git clean –n

B.

git rm –f

C.

git clean –r

D.

git rm *

Question 102

Refer to the exhibit. A network engineer makes a RESTCONF API call to Cisco IOS XE to retrieve information. Which HTTP method and URL does the engineer use to make the ..call?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 103

A development team is creating an application used for contactless payments. The application must:

Be web-based

Capture and process the credit card information for a purchase.

Which security action must the web application use to gather and process the private customer data?

Options:

A.

Enable RATs to monitor the web application remotely.

B.

Disable botnets to eliminate risks.

C.

Disable TLS to increase the connection speed.

D.

Enable the encryption of network traffic.

Question 104

What is a capability of the AXL API?

Options:

A.

It signs a user in to a phone that is configured for extension mobility.

B.

It pulls logs for the Cisco Tomcat service.

C.

It authenticates users who exist in Cisco Unified Communications Manager.

D.

It provides support for HTTP and HTTPS communications.

Question 105

Refer to the exhibit.

What occurs when the script runs?

Options:

A.

The contents of both files are displayed.

B.

The total length of the files is displayed.

C.

The files are combined.

D.

File differences are compared.

Question 106

What is a benefit of using a code review process in application development?

Options:

A.

accelerates the deployment of new features in an existing application

B.

provides version control during code development

C.

enables the quick deployment of new code

D.

eliminates common mistakes during development

Question 107

Which two details are captured from the subnet mask? (Choose two.)

Options:

A.

portion of an IP address that refers to the subnet

B.

default gateway of the host

C.

unique number ID assigned to the host

D.

part of an IP address that refers to the host

E.

network connection of a host or interface

Question 108

Refer to the exhibit.

The IT team deployed a new Linux virtual machine for a software engineer to use. but the engineer is not comfortable configuring services using Bash. Which workflow is automated by the Ansible playbook?

Options:

A.

Restart the network on the ethO interlace and start the httpd service if it is not already started.

B.

Restart the httpd service and start the network service for the ethO interface.

C.

Start the network service on the ethO interface even if it was brought down manually.

D.

Restart the httpd service and the network service regardless of the state.

Question 109

Refer to the exhibit.

An engineer sends the request to collect data over Cisco AMP for Endpoints API. The Engineer must list guide and hostname data for all computers, but the first request returns only 500 items out of 2,000. Then, the engineer adds the loop to collect all the data. What must be added to the script where the code is missing to complete the requests?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 110

What is a benefit of a distributed version control system?

Options:

A.

encourages users to commit small places of work to the system more frequently

B.

ensures that all code meets minimum standards before being committed to the system

C.

allows users to work on the codebase even when not connected to the Internet

D.

ensures that all code is tested before being committed to the system

Question 111

Refer to the exhibit. A script must output details of all the Cisco Meraki MS220-BP switches across all organizations and networks. Drag and drop the code snippets from the bottom onto the boxes in the code to complete the script. Not all options are used.

Options:

Question 112

Which IP service is responsible for automatically assigning an IP address to a device?

Options:

A.

DNS

B.

DHCP

C.

SNMP

D.

NAT

Question 113

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Options:

Question 114

Which two protocols are associated with the control plane on a network device? (Choose two.)

Options:

A.

BGP

B.

UDP

C.

SNMP

D.

FTP

E.

OSPF

Question 115

Which function does a router provide to a network?

Options:

A.

broadcast domain segmentation

B.

unique host on a Layer 3 network

C.

unique hardware address for every node on a LAN

D.

broadcast domain extension

Question 116

Refer to the exhibit.

A developer can access the TLS REST API on server A, but cannot access the API on server B. The developer can ping server B. When the developer performs a packet capture on the TLS REST API port on server B, the capture shows that the packet arrived and the server responded. What causes the issue?

Options:

A.

Port 80 is blocked on the outgoing interface of firewall B.

B.

Port 443 is blocked on the outgoing interface of firewall A.

C.

Port 443 is blocked on the incoming interface of firewall B.

D.

Port 80 is blocked on the incoming interface of firewall A.

Question 117

Refer to the exhibit. An engineer prepares a script to automate workflow by using Cisco DNA Center APIs to display:

total count of devices

list of the network devices

information of one device with a hostname filter

What is displayed in the final step after the Python script is executed?

Options:

A.

information about a device of type C9500-40x.

B.

filtered results by the hostname and the platformld C9500-40X

C.

information about the test devices

D.

list of devices with platformId C9500-40x

Question 118

Which OWASP threat takes advantage of a web application that the user has already authenticated to execute an attack?

Options:

A.

phishing

B.

DoS

C.

brute force attack

D.

CSRF

Question 119

Refer to the exhibit.

Which type of YANG object is "interfaces"?

Options:

A.

node

B.

subitem

C.

item

D.

container

Question 120

Refer to the exhibit.

A developer cannot reach the web application behind an NGINX load balancer. The developer sends a request to an application FQDN with cURL but gets an HTTP 502 response. Which action solves the problem?

Options:

A.

Fix errors in the server configuration, which is behind the load balancer.

B.

Bring up the load balancer to the active state.

C.

Fix errors in the cURL request sent by the client.

D.

Change the default gateway on the load balancer to an active one.

Question 121

Which two commands download and execute an Apache web server container in Docker with a port binding 8080 in the container to 80 on the host? (Choose two.)

Options:

A.

docker pull apache

B.

docker run -p 8080:80 httpd

C.

docker run -p 80:8080 httpd

D.

docker pull httpd

E.

docker pull https

Question 122

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. The Python script retrieves a list of tasks from a to-do list for effective project management purposes. Not all options are used.

Options:

Question 123

Refer to the exhibit.

A collaboration engineer has developed a script to automate the gathering of information by providing the email address of the individual. When the engineer tests the script, a 401 error is received. Which command fixes the script?

Options:

A.

Add "Authorization": "Bearer <WEBEX_TOKEN>" to the headers

B.

Add "Authentication": "Basic <WEBEX_TOKEN>" in the base_url after "https://".

C.

Add "<Authorization>:<password>@" in the base_url after "https://".

D.

Add "Authentication": "Bearer <WEBEX TOKEN>" to the headers

Question 124

Which action do webhooks enable an application to perform?

Options:

A.

Increase the request rate limit.

B.

Populate the application with restricted data.

C.

Receive real-time data.

D.

Implement a push model.

Question 125

Which solution reduces costs from MPLS, improves application performance, and simplifies operations?

Options:

A.

Cisco NSO

B.

Cisco SD-WAN

C.

Cisco ACI

D.

Cisco DNA Center

Question 126

Drag and drop the code from the bottom onto the box where the code is missing to enable ports on a switch by using RESTCONF. Not all options are used.

Options:

Question 127

What is the impact on an application from having a large distance between a client device and a host server?

Options:

A.

jitter

B.

latency

C.

loss of connectivity

D.

increased bandwidth

Question 128

A group of software developers wants to improve its collaboration with the operations team. The group wants to deliver release-ready code that merges code changes back to the main branch and runs the automated testing as often as possible. Which DevOps concept does this scenario represent?

Options:

A.

continuous delivery

B.

version control

C.

continuous integration

D.

continuous deployment

Question 129

Refer to the exhibit. A developer writes a script to create a new network by using the Cisco DNA Center API. After running the script for the first time, the developer observes that HTTP code 404 is printed to the console. Which action resolves the problem?

Options:

A.

The x-auth-token value must be changed to a valid token.

B.

The API URL must be changed with a valid URL.

C.

The requested payload must be fixed to include missing parts.

D.

Internal errors on the code of API server must be fixed.

Question 130

A developer creates a program in which an object maintains a list of classes based on the observer pattern. The classes are dependent on the object. Whenever the state of the object changes, it notifies the dependent classes directly through callbacks. Which advantage of the observer pattern offers minimum dependencies and maximum flexibility between dependent objects or classes?

Options:

A.

tight coupling

B.

cohesion

C.

mediation

D.

loose coupling

Question 131

An engineer must investigate the problems on a web application and address them to related teams. The engineer verifies the application reachability from the single public IP

dress with port and discovers that HTTPS access works to three servers of a network farm with IP 172.16.50.1 .2 and .4. but HTTPS access to the server with IP 172.16.50.3 does : work. Which problem type must be addressed as the cause for the case?

Options:

A.

VPN connectivity

B.

NAT

C.

blocked transport port

D.

proxy

Question 132

What is the function of an Ethernet switch in a networking environment?

Options:

A.

to switch a frame from one port to another port based on IP address

B.

to switch a frame from one port to another port based on MAC address

C.

to provide IP addressing to connected hosts

D.

to block unwanted traffic

Question 133

Which technology is responsible for matching a name to an IP address of an application running on a host?

Options:

A.

firewall

B.

proxy

C.

load balancer

D.

DNS

Question 134

Drag and drop the steps from the left into order on the right to create a common CI/CD pipeline process. Not all options are used.

Options:

Question 135

A distributed application was developed using the Cisco intersight SDK. While testing the interaction between the application and the intersight API. the requests that were sent to ..server could not execute because the application was blocked by the firewall. Which URL and port must be provided to the firewall administrator to allow the traffic?

Options:

A.

svc.intersight.com port 443

B.

intersight.com port 443

C.

intersight.com port 80

D.

svc.intersight.com port 80

Question 136

Which IP service is used to monitor the performance of network devices?

Options:

A.

SNMP

B.

DHCP

C.

DNS

D.

NTP

Question 137

A developer creates a new application, but the application must be tested before being released to a customer. When a mobile phone that uses 4G is used to access the application, the request fails. Why does the connection to the application fail?

Options:

A.

The application is hosted on premises and VPN connectivity is required

B.

The application must be added to the production server before testing.

C.

The application must be moved to the cloud before testing is possible.

D.

The application connectivity is limited to HTTPS protocol.

Question 138

Refer to the exhibit.

A developer just finished testing a Python script and wants to save the list of packages and versions installed on the current machine. The developer must make sure that it will not cause any issues if tested on another device due to different library versions. Which line of code needs to be placed on the snippet where the code is missing?

Options:

A.

pip freeze 2> requirements.txt

B.

pip freeze > requirements.txt

C.

pip freeze => requirements.txt

D.

pip freeze | requirements.txt

Question 139

What is the purpose of grouping devices in a VLAN?

Options:

A.

Devices communicate as if they are connected on the same wire.

B.

Multicast network traffic is limited to the VLAN connected devices.

C.

Unicast messages are limited to the clients connected on the same VLAN.

D.

Network traffic is load balanced between the devices connected to the VLAN.

Question 140

Drag and drop the code snippets from the bottom onto the blanks in the code to complete the happy path scenario. Not all options are used.

Options:

Exam Detail
Vendor: Cisco
Exam Code: 200-901
Last Update: Mar 10, 2025
200-901 Question Answers
Page: 1 / 35
Total 467 questions