Summer Special Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28285818

Home > Cisco > Cisco Certified DevNet Associate > 200-901

200-901 DevNet Associate (DEVASC) Question and Answers

Question # 4

What should a CI/CD pipeline aim to achieve?

A.

to allow manual testing before deployment

B.

to require minimal manual interaction

C.

to support new deployments on a fixed monthly schedule

D.

to provide a documented process for feedback

Full Access
Question # 5

Refer to the exhibit.

Drag and Drop the code from the bottom onto the box where the code is missing on the Meraki Python script to create a new network

Full Access
Question # 6

Drag and drop the Docker file instructions from the onto correct descriptions on the right. Not all options are used.

Full Access
Question # 7

A new application is being developed with specific platform requirements. The platform and application deployment and the ongoing platform management must be fully automated. The application includes a large database component that has significant disk I/O requirements. Which application deployment type meets the requirements?

A.

Python virtual environment

B.

virtual machine

C.

bare metal

D.

container

Full Access
Question # 8

What does a load balancer distribute in a network environment?

A.

outgoing connections to the network

B.

incoming traffic across multiple servers

C.

different TCP connections to the routers

D.

traffic in the network by leveraging the switch architecture

Full Access
Question # 9

Which description of a default gateway if true?

A.

It is a device that receives IP packets that have no explicit next-hop in the routing table.

B.

It is a feature that translates between public and private addresses.

C.

It is a security feature that denies certain traffic.

D.

It is a device that receives Layer 2 frames with an unknown destination address.

Full Access
Question # 10

What is a benefit of using functions in the code for the development process?

A.

better user experience in the end product

B.

improves code performance

C.

easier to compile the code

D.

fester code development

Full Access
Question # 11

What are two properties of private IP addresses? (Choose two.)

A.

They can be used to access the Internet directly.

B.

They are more secure than public IP addresses.

C.

They are not globally unique.

D.

They can be repeated within the same local network.

E.

They are controlled globally by an IP address registry.

Full Access
Question # 12

Which configuration management tool has an agentless capability?

A.

Chef

B.

Puppet

C.

Ansible

D.

CFEngine

Full Access
Question # 13

What is the benefit of edge computing?

A.

It reduces network latency by moving processing closer to the data source.

B.

It simplifies security as devices and processing are brought closer together

C.

It removes the need for centralized data processing.

D.

It reduces data velocity from devices or other data sources.

Full Access
Question # 14

Which platform is run directly using a hypervisor?

A.

bare metal systems

B.

containers

C.

virtual machines

D.

applications

Full Access
Question # 15

Refer to the exhibit.

A REST API retune this JSON output for a GET HTTP request, Which has assigned to a variable called “vegetables” Using python, which output is the result of this command?

A.

Lettuce

B.

Kiwi

C.

[‘kiwi’, ‘grape’]

D.

{‘color’: ‘green’, ‘items’: [‘kiwi’, ‘grape’]

Full Access
Question # 16

What is a benefit of model-driven programmability?

A.

It addresses the static architecture of traditional networks being decentralized and complex.

B.

By modeling data, it ensures that vast quantities of data are usable for monitoring.

C.

It provides a programmatic and standards-based way of writing configurations to any network device.

D.

It simplifies management and operations by decoupling the networking hardware from its control mechanism.

Full Access
Question # 17

Which way should be used to safely the API keys?

A.

In an environment variable unique to the system database

B.

Encrypted in a configuration file that is separate from the code

C.

Encrypted in the code in a function

D.

Plain text in the code as a constant

Full Access
Question # 18

Refer to the exhibit.

What caused the error in this API request?

A.

The API resource does not support the POST operation

B.

The API resource does not support JSON format payloads.

C.

The submitted JSON payload includes a field that is not supported by the API resource.

D.

The submitted JSON payload has a formatting issue

Full Access
Question # 19

How does requesting a synchronous API operation differ from requesting an asynchronous API operation?

A.

clients poll for the status of the execution of operations

B.

clients subscribe to a webhook for operation results

C.

clients can access the results immediately

D.

clients receive responses with a task id for further processing

Full Access
Question # 20

Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?

A.

100

B.

204

C.

302

D.

402

Full Access
Question # 21

Which product provides network controller-level management features?

A.

Cisco DNA Center

B.

Cisco NX-OS

C.

Cisco UCS Manager

D.

Cisco ISE

Full Access
Question # 22

Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)

A.

An artifact repository allows to compare and merge changes in the source code of files involved in a build process.

B.

An artifact repository is needed only for CI/CD pipeline executed on a public cloud infrastructure.

C.

An artifact repository provides traceability, search, and management of binary files.

D.

An artifact repository is needed only for managing open source software.

E.

An artifact repository stores files needed and generated during the build process.

Full Access
Question # 23

Which protocol must be allowed on the firewall so that NTP services work properly?

A.

ICMP

B.

BGP

C.

UDP

D.

TCP

Full Access
Question # 24

Refer to the exhibit.

The script returns an output of 401. To use the supplied URL. an HTTP GET request must Be sent with an Authorization header. The header value is a BaseG4 encoded concatenation of the username and password. Which action must be taken to return an output of 200?

A.

Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication

B.

Modify the method from LOGIN to GET and supply the username ;password value as JSON payload

C.

Verify that the username and password values imported from the configuration file ate still valid.

D.

Insert an Authorization header with the values username password from the supplied configuration file.

Full Access
Question # 25

Drag and drop the Dockerfile instructions from the left onto the descriptions on the right. Not at options are used.

Full Access
Question # 26

Which model-driven programmability protocol does Cisco IOS XE Software support?

A.

CORBA

B.

SSH

C.

gNMI

D.

SOAP

Full Access
Question # 27

A function my_func() returns True when it executes normally. Which python snippet tests my_func()?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 28

Refer to the exhibit.

What is the effect of this Ansible playbook on an IOS router?

A.

A new running configuration is pushed to the IOS router.

B.

The current running configuration of the IOS router is backed up.

C.

The start-up configuration of the IOS router is copied to a local folder.

D.

A new start-up configuration is copied to the IOS router.

Full Access
Question # 29

Which action does the Git command git merge allow the development to perform?

A.

Combine multiple sequence of commits into one unified history.

B.

Push changes to the remote repository

C.

Switch between branches

D.

Create, list, rename, and delete branches

Full Access
Question # 30

what is an advantage of a version control system?

A.

forces the practice of trunk-based development

B.

prevents over-writing code or configuration files

C.

facilitates resolving conflicts when merging code

D.

ensures that unit tests are written

Full Access
Question # 31

What are the two purposes for using a VLAN in a network? (Choose two)

A.

It is used to create the routing table.

B.

It creates a collection of MAC addresses.

C.

It is used for VM network traffic.

D.

It segments a network.

E.

It creates a broadcast domain.

Full Access
Question # 32

Which mechanism is used to consume a RESTful API design when large amounts of data are returned?

A.

Data sets

B.

Scrolling

C.

Blobs

D.

Pagination

Full Access
Question # 33

In test-driven development, what are two of the green bar patterns? (Choose two.)

A.

another test

B.

break

C.

triangulate

D.

starter test

E.

fake it

Full Access
Question # 34

A small company has 5 servers and 50 clients. What are two reasons an engineer should spilt this network into separate client and server subnets? (Choose two)

A.

Internet access to the servers will be denied on the router.

B.

A router will limit the traffic types between the clients and servers.

C.

Subnets will split domains to limit failures.

D.

A router will bridge the traffic between clients and servers.

E.

Subnets provide more IP address space for clients and servers.

Full Access
Question # 35

What is a benefit of organizing code into modules?

A.

improves overall performance

B.

reduces the length of code

C.

enables code to be multifunctional

D.

enables the reuse of code

Full Access
Question # 36

Which tool is used to block all traffic to the domain by using a single API call?

A.

Cisco ISE

B.

Cisco Firepower

C.

Cisco AMP

D.

Cisco Umbrella

Full Access
Question # 37

Which two query types does a client make to a DNS server? (Choose Two)

A.

AAAA

B.

ACK

C.

DISCOVER

D.

Inverse

E.

PTR

Full Access
Question # 38

Refer to the exhibit.

The output of a unified diff when comparing two versions of a python script is shown. Which two “single_request _timeout ()”

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 39

Refer to the exhibit.

A network engineer uses model-driven programmability to monitor and perform changes on the network. The network engineer decides to use the NETCONF RPC message to complete one of their tasks. What is accomplished by sending the RPC message?

A.

The running-config of the device is returned.

B.

The name of each interface is reset to a default name.

C.

All the YANG capabilities supported by the device are returned.

D.

A list of interface names is returned.

Full Access
Question # 40

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. Not all options are used.

Full Access