Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > Cisco Certified DevNet Associate > 200-901

200-901 DevNet Associate (DEVASC) Question and Answers

Question # 4

Which network constraint causes the performance of the application to decrease as the number of users accessing the application increases?

A.

latency

B.

loss

C.

bandwidth

D.

jitter

Full Access
Question # 5

Drag and drop the capabilities from the left onto the Cisco Network Management Platforms that support the capabilities on the right.

Full Access
Question # 6

Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.

Full Access
Question # 7

How is a branch called "my-bug-fix" started to develop a fix needed in a product?

A.

git branch -b my-bug-fix

B.

git checkout -b my-bug-fix

C.

git checkout my-bug-fix

D.

git branch my-bug-fix

Full Access
Question # 8

Which type of threat occur when an attacker can send hostile data to an interpreter within an application?

A.

Cross-site scripting

B.

Sensitive data exposure

C.

Broken authentication

D.

Injection

Full Access
Question # 9

Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?

A.

OAuth must be used.

B.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

C.

Basic authentication must be used.

D.

No authentication is required.

Full Access
Question # 10

Refer to Exhibit.

Which JSON is equivalent to the XML-encoded data.

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 11

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. Not all options are used.

Full Access
Question # 12

Which two elements are foundational principles of DevOps? (Choose two.)

A.

designing applications as microservices

B.

encouraging containers for the deployment of applications

C.

organizing cross-functional teams over organizational silos

D.

optimizing the cost of infrastructures

E.

automating over documenting

Full Access
Question # 13

An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device mut be at fault?

A.

Laptop on which the script is running

B.

Router

C.

Switch

D.

Load balancer

Full Access
Question # 14

Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose two.)

A.

Cisco Intersight API interactions can be encoded in XML or JSON and require an APIs key in the HTTP header for authentication.

B.

USC Director API interactions can be XML- or JSON-encoded and require an APLs key in the HTTP header for authentication.

C.

UCS manager API interactions are XML-encoded and require a cookie in the method for authentication.

D.

Cisco Intersight uses XML to encoded API interactions and requires an API key pair for authentication.

E.

UCS manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the HTTP header for authentication.

Full Access
Question # 15

Which status code is used by a REST API to indicate that the submitted payload is incorrect?

A.

400

B.

403

C.

405

D.

429

Full Access
Question # 16

How does requesting a synchronous API operation differ from requesting an asynchronous API operation?

A.

clients poll for the status of the execution of operations

B.

clients subscribe to a webhook for operation results

C.

clients can access the results immediately

D.

clients receive responses with a task id for further processing

Full Access
Question # 17

What are two security benefits of a Docker-based application?

A.

easier to patch because Docker containers include only dependencies that the application requires

B.

prevents information leakage that can occur when unhandled exceptions are returned in HTTP responses

C.

allows for separation of application that traditionally run in the same host

D.

natively secures access to secrets that are used by the running application

E.

guarantees container images are secured and free of vulnerabilities

Full Access
Question # 18

On which network plane is routing protocol traffic handled?

A.

data plane

B.

management plane

C.

authentication plane

D.

control plane

Full Access
Question # 19

A 401 HTTP response code is returned when calling a REST API. What is the error state identified by this response code?

A.

The server cannot process the request as it has detected an issue in the request syntax or body.

B.

The server accepted the request but the client is not authorized for this content.

C.

The request has not been accepted because it requires authentication.

D.

The server cannot find the requested resource because the path specified is incorrect.

Full Access
Question # 20

Refer to the exhibit.

A REST API retune this JSON output for a GET HTTP request, Which has assigned to a variable called “vegetables” Using python, which output is the result of this command?

A.

Lettuce

B.

Kiwi

C.

[‘kiwi’, ‘grape’]

D.

{‘color’: ‘green’, ‘items’: [‘kiwi’, ‘grape’]

Full Access
Question # 21

Package updates from a local server fail to download. However, the same updates work when a much slower external repository is used. Way are local updates failing?

A.

The update utility is trying to use a proxy to access the internal resource.

B.

The Internet connection is too slow.

C.

The Internet is down at the moment, which causes the local server to not be able to respond.

D.

The server is running out of disk space.

Full Access
Question # 22

Which function does a router provide to a network?

A.

broadcast domain segmentation

B.

unique host on a Layer 3 network

C.

unique hardware address for every node on a LAN

D.

broadcast domain extension

Full Access
Question # 23

A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing? The data contains sensitive information, so specialist encryption tools must be used to secure the data. Which application deployment model meets the requirements?

A.

edge

B.

private cloud

C.

public cloud

D.

hybrid cloud

Full Access
Question # 24

Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)

A.

An artifact repository allows to compare and merge changes in the source code of files involved in a build process.

B.

An artifact repository is needed only for CI/CD pipeline executed on a public cloud infrastructure.

C.

An artifact repository provides traceability, search, and management of binary files.

D.

An artifact repository is needed only for managing open source software.

E.

An artifact repository stores files needed and generated during the build process.

Full Access
Question # 25

Refer to the exhibit.

What is the function of the python script?

A.

Count and print the total number of available devices.

B.

Iterate over a list of network devices and write all device names and management IP addresses to an output file.

C.

Iterate over a list of network devices and write all device type and associated management IP address.

D.

For each device that is returned, display the device and, for each device, print the device name and management IP address.

E.

Loop through the returned list of network devices and, for each device, print the device name management IP address.

Full Access
Question # 26

What are the two principles of an infrastructure as code environment? (Choose two)

A.

Complete complex systems must be able to be built from reusable infrastructure definitions.

B.

Environments must be provisioned consistently using the same inputs.

C.

Redeployments cause varying environment definitions.

D.

Service overlap is encouraged to cater for unique environment needs.

E.

Components are coupled, and definitions must be deployed for the environment to function.

Full Access
Question # 27

Refer to the exhibit.

What caused the error in this API request?

A.

The API resource does not support the POST operation

B.

The API resource does not support JSON format payloads.

C.

The submitted JSON payload includes a field that is not supported by the API resource.

D.

The submitted JSON payload has a formatting issue

Full Access
Question # 28

Refer to the exhibit. A bespoke meeting booking system must be integrated with Cisco Webex so that meetings are created automatically. Drag and drop the code from the bottom onto the box where the code is missing to create a sample meeting. Not all options are used.

Full Access
Question # 29

A developer completed the creation of a script using Git. Before delivering it to the customer, the developer wants to be sure about all untracked files, without losing any information. Which command gathers this information?

A.

git clean –n

B.

git rm –f

C.

git clean –r

D.

git rm *

Full Access
Question # 30

A developer has experienced security issues with a previously developed application. The API offered by that application is open and without any constraints. During a recent attack, the application was overloaded with API requests. To address this issue, an API constraint is implemented to protect the application from future attacks or any sudden throttling. Which API constraint must the application developer implement in this situation?

A.

pagination

B.

rate limiting

C.

filtering

D.

payload limiting

Full Access
Question # 31

A developer pushes an application to production. The application receives a webhook over HTTPS without a secret. The webhook information contains credentials to service in cleartext. When the information is received, it is stored in the database with an SHA-256 hash. Credentials to the database are accessed at runtime through the use of a vault service. While troubleshooting, the developer sets the logging to debug to view the message from the webhook. What is the security issue in this scenario?

A.

Database credentials should be accessed by using environment variables defined at runtime.

B.

During the transport of webhook messages, the credentials could be unencrypted and leaked.

C.

During logging, debugging should be disabled for the webhook message.

D.

Hashing the credentials in the database is not secure enough; the credentials should be encrypted.

Full Access
Question # 32

Drag and drop the code from the bottom onto the box where the code is missing to obtain a list of network devices by using the Cisco Meraki API. Not all options are used.

Full Access
Question # 33

What is the purpose of grouping devices in a VLAN?

A.

Devices communicate as if they are connected on the same wire.

B.

Multicast network traffic is limited to the VLAN connected devices.

C.

Unicast messages are limited to the clients connected on the same VLAN.

D.

Network traffic is load balanced between the devices connected to the VLAN.

Full Access
Question # 34

A file in a local Git repository has been updated and issued the git add . command. The git diff command has been run to compare the changes to the previous commit, but nothing shows. Which action identifies the problem?

A.

Run the git add . command again in the correct subdirectory to ensure changes added to the staging area.

B.

Run the git commit command before the differences are compared to receive the end state of the code.

C.

Run the git status command to see the differences between current and previous code review stages.

D.

Run the git diff --staged command to compare the code added to the staging area.

Full Access
Question # 35

Developer is working on a new feature and made changes on a branch named ‘branch-413667549a-new’. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?

A.

git merge -no-edit

B.

git merge -commit

C.

git merge -revert

D.

git merge -abort

Full Access
Question # 36

A developer is working on a new feature in a branch named 'newfeat123456789' and the current working primary branch is named 'prim987654321'. The developer requires a merge commit during a fast forward merge for record-keeping purposes. Which Git command must be used?

A.

git merge --no-ff newfeat123456789

B.

git commit --no-ff newfeat123456789

C.

git add --commit-ff newfeat123456789

D.

git reset --commit-ff newfeat123456789

Full Access
Question # 37

Refer to the exhibit. Drag and drop the Dockerfile contents from the left onto the functions on the right that create a container image to run traceroute to track network path to specific targets. Not all options are used.

Full Access
Question # 38

Which HTTP method is used by webhooks and notifies a listener about an event change?

A.

PUT

B.

POST

C.

PATCH

D.

GET

Full Access
Question # 39

What is a capability of the AXL API?

A.

It signs a user in to a phone that is configured for extension mobility.

B.

It pulls logs for the Cisco Tomcat service.

C.

It authenticates users who exist in Cisco Unified Communications Manager.

D.

It provides support for HTTP and HTTPS communications.

Full Access
Question # 40

Drag and drop characteristics from the left onto the infrastructure management methodologies on the right.

Full Access
Question # 41

Refer to the exhibit.

Drag and drop the code from the bottom onto the blanks in the code to construct a cURL command using the Cisco DNA Center API. which will provide the details of a WLAN controller with Id af397748444. Not at options are used.

Full Access
Question # 42

Refer to the exhibit.

Which device limits traffic between server 1 and server 2?

A.

Device B

B.

Device C

C.

Device D

D.

Device E

Full Access
Question # 43

Which data is specified in the response header?

A.

{

"id": "y123987jdkl". HTTP/1.1 200 OK

"status: "online",

"type": "switch"

}

B.

HTTP/1.1 200 OK

C.

''type'', ''switch''

D.

Content-Type

Full Access
Question # 44

Refer to the exhibit.

A developer wants to create a room named cisco through Webex API. The developer prepares the request by putting an API token inside the authorization header; however, the given HTTP call returns error code 400. How must the call parameters be changed to ensure a valid response?

A.

Replace the team body parameter with the name body parameter.

B.

Replace cisco with a valid name for a team.

C.

Change the token in the header with the authorization token.

D.

Change the HTTP method of the call to PUT.

Full Access
Question # 45

Which protocol runs over TCP port 22?

A.

SSH

B.

HTTP

C.

Telnet

D.

NETCONF

Full Access
Question # 46

What is a benefit of using edge computing in an IoT implementation?

A.

low cost in network design

B.

low network design complexity

C.

high availability for network components

D.

high speed in data processing

Full Access
Question # 47

Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:

• MySQL database that stores data about customers

• HTML5 and JavaScript UI that runs on Apache

• REST API written in Python

What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)

A.

to enable multiple views of the same data to be presented to different groups of users

B.

to provide separation between the view and the model by ensuring that all logic is separated out into the controller

C.

to ensure data consistency, which requires that changes to the view are also made to the model

D.

to ensure that only one instance of the data model can be created

E.

to provide only a single view of the data to ensure consistency

Full Access
Question # 48

Refer to the exhibit.

An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the 'get_all_interfaces' API call is used?

A.

times out

B.

rate limit

C.

pagination

D.

invalid password

Full Access
Question # 49

Before which process is code review performed when version control is used?

A.

Branching code

B.

Merge of code

C.

Checkout of code

D.

Committing code

Full Access
Question # 50

What is a benefit of test-driven development?

A.

early customer involvement

B.

increased code quality

C.

faster releases that have minimal features

D.

strict adherence to product requirements

Full Access
Question # 51

What is a capability of an agentless configuration management system?

A.

It requires managed hosts to have an interpreter for a high-level language such as Python or Ruby.

B.

It requires managed hosts to connect to a centralized host to receive updated configurations.

C.

It uses compiled languages as the basis of the domain-specific language to interface with managed hosts.

D.

It uses existing protocols to interface with the managed host.

Full Access
Question # 52

Refer to the exhibit.

Which line must be included in the Bash script for the Python code to succeed?

A.

define WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

B.

export WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

C.

set WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

D.

WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

Full Access
Question # 53

Refer to the exhibit.

The Cisco Meraki API manages two organizations. In each organization, two independent networks are defined. How many calls to the /organizations/(orgid)networks endpoint will be run parallel by the GetAllNetwork function of the API client?

A.

0

B.

1

C.

2

D.

4

Full Access
Question # 54

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request to find the Cisco DNA Center switch count. Not all options are used.

Full Access
Question # 55

How are load balancers used in modern application deployment?

A.

Allow traffic to continue as new compute units are brought up and old compute units are taken down.

B.

Allow http and https traffic to continue as old compute units are discontinued before new units are brought up.

C.

Turn off traffic and take down compute units, then update and bring the compute units back up.

D.

Bring up new compute units, test the compute units, and switch the traffic from old units to new units.

Full Access
Question # 56

In which two ways is an application characterized when interacting with a webhook? (Choose two.)

A.

codec

B.

receiver

C.

transaction monitor

D.

processor

E.

listener

Full Access
Question # 57

A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time.

Which area of the CALMS framework must the company target for improvement?

A.

Collaboration

B.

Lean

C.

Sharing

D.

Measurement

Full Access
Question # 58

A local Docker alpine image has been created with an image ID of a391665405fe and tagged as “latest”. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?

A.

docker build -p 8080:80 alpine:latest

B.

docker exec -p 8080:80 alpine:latest

C.

docker start -p 8080:80 alpine:latest

D.

docker run -p 8080:80 alpine:latest

Full Access
Question # 59

Refer to the exhibit.

A developer creates a Python script that queries Cisco Webex. When the script is executed, a 401 code is returned. After troubleshooting, the developer discovers that the service is missing privileges. Which change to the header in line 4 of the script results in the code 200?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 60

Refer to the exhibit.

A network engineer must change the configuration on devices daily. The Python script must collect CLI arguments from the user, organize data according to the Cisco-IOS-XE-native YANG model, and utilize Cisco REST APIs to make the configuration. Which workflow is being automated by the Python script?

A.

updating an existing route on the device

B.

adding a new route to a device

C.

including a route on the device and overwriting the current routes

D.

deleting the route that is passed through the command-line variables

Full Access