Special Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

200-901 DevNet Associate (DEVASC) Questions and Answers

Questions 4

Refer to the exhibit.

200-901 Question 4

A network engineer must manage the network devices. The engineer prepares a Python scripts to authenticate to the Cisco to DNA Center API and request a device list. The device request fails and returns errors code 401. Which action solves the problem?

Options:

A.

Update the API URL. which matched the API endpoint for device list.

B.

Send the request to another network in case there are reachability Issues.

C.

Send the Authentication header In the request with a valid configuration.

D.

Update the credentials that are already supplied and retry the request

Buy Now
Questions 5

Drag and drop the code from the bottom onto the box where the code is missing in the Bash script to complete the missing assignment.

200-901 Question 5

Options:

Buy Now
Questions 6

What is a benefit of using edge computing in an IoT implementation?

Options:

A.

low cost in network design

B.

low network design complexity

C.

high availability for network components

D.

high speed in data processing

Buy Now
Questions 7

Refer to the exhibit.

200-901 Question 7

A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?

Options:

A.

enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

B.

enable_function(‘iana-if-type:softwareLoopback’, Loopback1, true,)

C.

def enable_function(‘iana-if-type:softwareLoopback’, Loopback1, false,)

D.

def enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

Buy Now
Questions 8

A developer creates a script that configured multiple Cisco IOS XE devices in a corporate infrastructure. The internal test environment is unavailable, and no maintenance window is available to test on a low-priority production environment. Which resource is used to test the code before it is applied to the production environment?

Options:

A.

Code Exchange

B.

Cisco DevNet Learning Labs

C.

Cisco DevNet Sandbox

D.

Cisco Support

Buy Now
Questions 9

How are load balancers used in modern application deployment?

Options:

A.

Allow traffic to continue as new compute units are brought up and old compute units are taken down.

B.

Allow http and https traffic to continue as old compute units are discontinued before new units are brought up.

C.

Turn off traffic and take down compute units, then update and bring the compute units back up.

D.

Bring up new compute units, test the compute units, and switch the traffic from old units to new units.

Buy Now
Questions 10

200-901 Question 10

Refer to the exhibit. A developer is creating a Python script to obtain a list of HTTP servers on a network named office_east by using the Cisco Meraki API. The request has these requirements:

• Must time out if the response is not received within 2 seconds.

• Must utilize client certificates and SSL certificate verification.

• Must utilize basic authentication that uses a username of admin and a password of cisco.

• Must save the response to an object named response.

Drag and drop the code snippets from the bottom onto the blanks in the code to meet the requirements. Not all options are used.

200-901 Question 10

Options:

Buy Now
Questions 11

Refer to the exhibit.

200-901 Question 11

Which infrastructure automation method is shown?

Options:

A.

Waterfall

B.

CI/CD pipeline

C.

Agile

D.

Lean

Buy Now
Questions 12

What are two properties of private IP addresses? (Choose two.)

Options:

A.

They can be used to access the Internet directly.

B.

They are more secure than public IP addresses.

C.

They are not globally unique.

D.

They can be repeated within the same local network.

E.

They are controlled globally by an IP address registry.

Buy Now
Questions 13

A new application is being developed with specific platform requirements. The platform and application deployment and the ongoing platform management must be fully automated. The application includes a large database component that has significant disk I/O requirements. Which application deployment type meets the requirements?

Options:

A.

Python virtual environment

B.

virtual machine

C.

bare metal

D.

container

Buy Now
Questions 14

Refer to the exhibit.

200-901 Question 14

An engineer must check the admin rights of users on a database regularly and prepares

the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?

Options:

A.

They must be stored in configuration files if there is a possibility of leakage.

B.

They must be Base64-encoded if stored in the user database.

C.

They must be encrypted if stored in the user database.

D.

They must be stored in configuration files if no authentication will be used.

Buy Now
Questions 15

A developer needs a list of clients connected to a specific device in a Meraki network. After making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet resource should be used to identify the meaning of the response code?

Options:

A.

API documentation

B.

Sandbox

C.

Learning Labs

D.

Code Exchange

Buy Now
Questions 16

What is the main purpose of a code review?

Options:

A.

To provide the technical lead visibility into all code

B.

To identify and review errors with the team

C.

To ensure that all code is checked in simultaneously

D.

To detect logical errors

Buy Now
Questions 17

What does a load balancer distribute in a network environment?

Options:

A.

outgoing connections to the network

B.

incoming traffic across multiple servers

C.

different TCP connections to the routers

D.

traffic in the network by leveraging the switch architecture

Buy Now
Questions 18

Refer to the exhibit.

200-901 Question 18

Which command, including arguments, is executed when the container starts?

Options:

A.

/bin/sh -c "/bin/sleep 30 && nginx -g 'daemon off;'"

B.

/bin/sh -c "/bin/sleep 10 && nginx -g 'daemon off;'"

C.

/bin/bash -c "/bin/sleep 30 && nginx -g 'daemon off;'"

D.

/bin/sh -c "/bin/sleep 30" && nginx -g 'daemon off;'

Buy Now
Questions 19

Refer to the exhibit.

200-901 Question 19

An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the 'get_all_interfaces' API call is used?

Options:

A.

times out

B.

rate limit

C.

pagination

D.

invalid password

Buy Now
Questions 20

What is a benefit of using functions in the code for the development process?

Options:

A.

better user experience in the end product

B.

improves code performance

C.

easier to compile the code

D.

fester code development

Buy Now
Questions 21

A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?

Options:

A.

git update

B.

git merge

C.

git add

D.

git rebase

Buy Now
Questions 22

Where is an IP packet routed if the packet does not match any routes in the routing table?

Options:

A.

firewall

B.

load balancer

C.

central switch

D.

default gateway

Buy Now
Questions 23

200-901 Question 23

Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.

200-901 Question 23

Options:

Buy Now
Questions 24

What is the purpose of the first three pairs of digits in a MAC address?

Options:

A.

defines a routing identifier for the client

B.

indicates the IP address of the client in Hex

C.

defines packet forwarding priority sent or received by the adapter

D.

indicates vendor of the network card or adapter

Buy Now
Questions 25

200-901 Question 25

Which data is specified in the response header?

Options:

A.

{

"id": "y123987jdkl". HTTP/1.1 200 OK

"status: "online",

"type": "switch"

}

B.

HTTP/1.1 200 OK

C.

''type'', ''switch''

D.

Content-Type

Buy Now
Questions 26

Refer to the exhibit.

200-901 Question 26

The documentation outlines how to use credentials for the AMP API Which script successfully performs an API call using basic authentication?

A)

200-901 Question 26

B)

200-901 Question 26

C)

200-901 Question 26

D)

200-901 Question 26

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 27

What is a capability of an agentless configuration management system?

Options:

A.

It requires managed hosts to have an interpreter for a high-level language such as Python or Ruby.

B.

It requires managed hosts to connect to a centralized host to receive updated configurations.

C.

It uses compiled languages as the basis of the domain-specific language to interface with managed hosts.

D.

It uses existing protocols to interface with the managed host.

Buy Now
Questions 28

Drag and drop the Dockerfile instructions from the left onto the descriptions on the right. Not at options are used.

200-901 Question 28

Options:

Buy Now
Questions 29

In the test-driven development model, what is changed after a test fails?

Options:

A.

test

B.

schedule

C.

project requirements

D.

code

Buy Now
Questions 30

Which protocol runs over TCP port 22?

Options:

A.

SSH

B.

HTTP

C.

Telnet

D.

NETCONF

Buy Now
Questions 31

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

200-901 Question 31

Options:

Buy Now
Questions 32

Drag and drop the code snippets from the bottom to the blanks in the code to complete the HTTP response. Not all options are used.

200-901 Question 32

Options:

Buy Now
Questions 33

Which platform is used to programmatically create a space and invite users for collaboration?

Options:

A.

Cisco Intersight

B.

Cisco Finesse

C.

Cisco Webex

D.

Cisco UCM

Buy Now
Questions 34

A new application is being developed that must be hardware independent. The application includes an administrative component which is accessed using a Windows desktop GUI. Installation and management of the environment must be fully automated. Which application deployment type meets the requirements?

Options:

A.

bare metal

B.

virtual Python environment

C.

container

D.

virtual machine

Buy Now
Questions 35

Drag and drop the code snippets from the bottom into the Python script to write API output to a csv file. Not all options are used.

200-901 Question 35

Options:

Buy Now
Questions 36

What is a capability of the NETCONF protocol?

Options:

A.

allows Python scripts to be executed externally from a network device

B.

uses JSON to encode data in its content layer

C.

allows XML messages to be exchanged via the SSH protocol

D.

exposes a web-based interface

Buy Now
Questions 37

Refer to the exhibit.

200-901 Question 37

A Python script must delete all Cisco Catayst 9300 Series switches that have an uptime that is greater than 90 days The script must also query for the status of all the other devices Drag and drop the code from the bottom onto the bottom box the code is missing to complete the script Not at options are used

200-901 Question 37

Options:

Buy Now
Questions 38

Refer to the exhibit.

200-901 Question 38

The output of the diff-u README.md-repo README.md command is shown. The original file was 165 lines long How many lines are in the edited copy of the file?

Options:

A.

162

B.

165

C.

172

D.

173

Buy Now
Questions 39

Which protocol must be allowed on the firewall so that NTP services work properly?

Options:

A.

ICMP

B.

BGP

C.

UDP

D.

TCP

Buy Now
Questions 40

What are two benefits of using VLANs? (Choose two.)

Options:

A.

limits the devices that can join the network

B.

segments the broadcast domain

C.

extends the broadcast domain

D.

allows all network devices to be accessible from any host on the network

E.

enables the logical grouping of devices that belong to different Layer 2 devices

Buy Now
Questions 41

Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?

Options:

A.

100

B.

204

C.

302

D.

402

Buy Now
Questions 42

Why is refactoring done during test-driven development?

Options:

A.

to enable larger objects and longer methods

B.

to improve maintainability and readability

C.

to ensure that the previous uses of the objects are explained

D.

to ensure the duplication of essential code

Buy Now
Questions 43

How does a synchronous API request differ from an asynchronous API request?

Options:

A.

clients receive responses with a task id for further processing

B.

clients subscribe to a webhook for operation results

C.

clients are able to access the results immediately

D.

clients poll for the status of the execution of operations

Buy Now
Questions 44

Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)

Options:

A.

22

B.

23

C.

80

D.

443

E.

880

Buy Now
Questions 45

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code,

which resource must be used to verify that the code works correctly?

Options:

A.

Cisco NX-OS SDK

B.

Cisco Learning Labs

C.

Cisco Code Exchange

D.

Cisco Modeling Labs

Buy Now
Questions 46

Drag and drop the code from the bottom onto the box where the code is missing to authenticate with the Cisco DNA Center REST API by using basic authentication. Then generate a token for later use. Not all options are used.

200-901 Question 46

Options:

Buy Now
Questions 47

How does a developer create and switch to a new branch called "my-bug-fix" to develop a product fix?

Options:

A.

git checkout -b my-bug-fix

B.

git branch -b my-bug-fix

C.

git branch my-bug-fix

D.

git checkout my-bug-fix

Buy Now
Questions 48

What is a capability of model-driven programmability for infrastructure automation?

Options:

A.

compatibility with any networking device

B.

automatic version control

C.

generic APIs that are compatible with multiple platforms

D.

a single data model acr oss the network

Buy Now
Questions 49

Refer to the exhibit.

200-901 Question 49

A company recently acquired new IP-based security cameras. After discussion with the engineering team, they decide to segment the security camera traffic m the rest…The engineer assigns the new VLAN 10 for the security camera traffic. After all the devices are configured, it seems as if the cameras cannot access the Internet, .. a few minutes of debugging, the engineer restricts the problem to the router configuration. What is the cause of the issue?

Options:

A.

A specific permit statement for the 192.168.20.0/24 subnet is missing from the access list.

B.

A NAT inside rule is missing from the GlgabitEthernet0/0/0.10 interface.

C.

A specific permit statement for the 192.168.10.0/24 subnet is missing from the access list.

D.

A NAT inside rule is missing from the GigabitEthemet0/0/0 interface.

Buy Now
Questions 50

An engineer prepares a set of Python scripts to interact with network devices. To avoid network performance issues, the engineer wants to run them in a test environment. Which resource must be used to monitor the

live execution of code in an always-available environment?

Options:

A.

packet tracer

B.

learning labs

C.

sandbox

D.

code exchange

Buy Now
Questions 51

Refer to the exhibit.

200-901 Question 51

An engineer must add new users and set privileges for executing a few Python scripts. The engineer prepares a Bash script to automate this task. The script ds a user and a group from the command-line arguments, creates a directory, and copies the Python scripts to it. The script then changes to the directory and lists the scripts, used on the script workflow, which process is being automated within the loop by using the list of Python scripts?

Options:

A.

removing the files that are not Python, listing the Python files, and assigning execution privileges to the initially created user and group.

B.

assigning execution privileges to everyone and changing the ownership to the initially created user and group

C.

assigning execution privileges to the owner, setting the user and group owner to the scripts that were initially created, and storing the script names in a file.

D.

creating a file with the content of all the files, assigning execution permissions to each script, and then changing ownership to the initially created user and group.

Buy Now
Questions 52

What is the purpose of running tests before writing code in test-driven development?

Options:

A.

to find unexpected failures in the tests

B.

to demonstrate that the tests fail for expected reasons

C.

to ensure that the tests pass

D.

to provide proof of the work carried out

Buy Now
Questions 53

200-901 Question 53

Refer to the exhibit. Drag and drop the Dockerfile contents from the left onto the functions on the right that create a container image to run traceroute to track network path to specific targets. Not all options are used.

200-901 Question 53

Options:

Buy Now
Questions 54

What is a benefit of using a code review process in application development?

Options:

A.

accelerates the deployment of new features in an existing application

B.

provides version control during code development

C.

enables the quick deployment of new code

D.

eliminates common mistakes during development

Buy Now
Questions 55

During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?

Options:

A.

integration

B.

deployment

C.

development

D.

testing

Buy Now
Questions 56

What is the purpose of Infrastructure as Code?

Options:

A.

to provide the ability of independent development process

B.

to manually configure and manage infrastructure at scale

C.

to apply new practices on the development process

D.

to use development engineering practices on the infrastructure

Buy Now
Questions 57

Refer to the exhibit.

200-901 Question 57

An administrator attempts to perform a GET operation by using the Cisco IOS XE RESTCONF API to return the hostname of a device. The sequence diagram in the exhibit illustrates the HTTP messages observed. Which change to the API request resolves the issue?

Options:

A.

Remove the -H 'Accept: application/yang-data+json’ header.

B.

Replace -u cisco:cisco parameter with -u ‘cisco:cisco’.

C.

Change the request method from -X ‘GET’ to -X ‘POST’.

D.

Add the -H ‘Content-Type: application/yang-data+json’ header.

Buy Now
Questions 58

Which IP service is responsible for automatically assigning an IP address to a device?

Options:

A.

DNS

B.

DHCP

C.

SNMP

D.

NAT

Buy Now
Questions 59

Which solution reduces costs from MPLS, improves application performance, and simplifies operations?

Options:

A.

Cisco NSO

B.

Cisco SD-WAN

C.

Cisco ACI

D.

Cisco DNA Center

Buy Now
Questions 60

A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing? The data contains sensitive information, so specialist encryption tools must be used to secure the data. Which application deployment model meets the requirements?

Options:

A.

edge

B.

private cloud

C.

public cloud

D.

hybrid cloud

Buy Now
Questions 61

Refer to the exhibit.

200-901 Question 61

A security team observes an attack that originates from a Cisco Meraki device. To mitigate the attack, the team requests that the engineering team remove the /ice from the network. The security team also requests information about the device, such as Its name and location. Which tool must the engineering team use to meet the luirements by using tasks?

Options:

A.

CFEngine

B.

cURL

C.

Postman

D.

Ansible

Buy Now
Questions 62

200-901 Question 62

Refer to the exhibit. A developer must use a token to collect data from Cisco DNA Center API and prepares a Python script to send requests. Which line of code needs to be placed on the snippet where the code is missing to obtain a token from the Cisco DNA Center API?

Options:

A.

token=BasicAuth(‘user’,‘password’))

B.

auth=BasicAuth(‘user’,‘password’))

C.

auth=HTTPBasicAuth(user,password))

D.

token=HTTPBasicAuth(user,password))

Buy Now
Questions 63

Which network constraint causes the performance of the application to decrease as the number of users accessing the application increases?

Options:

A.

latency

B.

loss

C.

bandwidth

D.

jitter

Buy Now
Questions 64

Drag and drop the common API styles from the left onto the requirement on the right.

200-901 Question 64

Options:

Buy Now
Questions 65

What is a benefit of organizing code into modules?

Options:

A.

better maintainability

B.

reduced development costs

C.

simplified development

D.

compatibility with REST APIs

Buy Now
Questions 66

A developer writes an application that refines data in temporary secure file storage hosted on the public cloud. Data will be deleted after processing and does not contain any private information. What is the advantage that a public cloud deployment provides to the developer?

Options:

A.

high security with encryption

B.

ease in infrastructure management

C.

flexible development

D.

bespoke services

Buy Now
Questions 67

200-901 Question 67

Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.

200-901 Question 67

Options:

Buy Now
Questions 68

Refer to the exhibit.

200-901 Question 68

What does the command marked (2) do when it is run?

Options:

A.

It duplicates the test" branch.

B.

It deletes the "test" branch only if a new branch is created.

C.

It deletes the "test" branch.

D.

It does not delete the branch until it is merged.

Buy Now
Questions 69

200-901 Question 69

Refer to the exhibit. A developer creates a Python script by using the Cisco Meraki API. The solution must:

• Obtain a list of HTTP servers for a network named "netl".

• Print the response body if the HTTP status code is 200.

• Handle the timeout requests as exceptions, and print Timeout Error next to the exception to stdout.

Which block of code completes the script?

A)

200-901 Question 69

B)

200-901 Question 69

Options:

A.

Option A

B.

Option B

Buy Now
Questions 70

A developer plans to deploy a new application that will use an API to implement automated data collection from Webex with these requirements:

The application was created by using the request library.

Requires HTTP basic authentication.

Provides data in JSON or XML formats.

Which Cisco DevNet resource helps the developer with how to use the API?

Options:

A.

DevNet sandbox

B.

API documentation

C.

forums

D.

DevNet code exchange

Buy Now
Questions 71

Refer to the exhibit.

200-901 Question 71

Which XML snippet has interface information that conforms to the YANG model?

A)

200-901 Question 71

B)

200-901 Question 71

C)

200-901 Question 71

D)

200-901 Question 71

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 72

An engineer needs to retrieve a list of locally available Firepower Threat Defense upgrade packages by using the Firepower Management Center REST API. The engineer uses a GET request with the URL:

/api/fmc_platform/v1/updates/upgradepackages/f413afeb-e6f6-75f4-9169-6d9bd49s625e

What does “f413afeb-e6f6-75f4-9169-6d9bd49s625e” represent?

Options:

A.

container UUID

B.

package UUID

C.

domain UUID

D.

object UUID

Buy Now
Questions 73

200-901 Question 73

Refer to the exhibit. An engineer is comparing two files by using the unified diff format. Which cade snippet belongs to the new.py file?

Options:

A.

200-901 Question 73 Option 1

B.

73

C.

73

D.

73

Buy Now
Questions 74

A developer checks the performance of a web application. The application is in the local data center and uses a REST-based API. Based on the API logs, it is discovered that many its abandon API requests. Also, the response is taking too long to get back. What is the reason for this issue?

Options:

A.

Pagination is not implemented

B.

Token-based authentication is enabled.

C.

Rate limiting is not implemented.

D.

Token-based authentication is disabled

Buy Now
Questions 75

Drag and drop the code from the bottom onto the box where the code is missing to present GigabilEthernet2 details in the XML format. Not all options are used.

200-901 Question 75

Options:

Buy Now
Questions 76

200-901 Question 76

Refer to the exhibit. A network engineer makes a RESTCONF API call to Cisco IOS XE to retrieve information. Which HTTP method and URL does the engineer use to make the ..call?

A)

200-901 Question 76

B)

200-901 Question 76

C)

200-901 Question 76

D)

200-901 Question 76

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 77

200-901 Question 77

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to add a subnet to each bridge domain in the Ten1 tenant. Not all options are used.

200-901 Question 77

Options:

Buy Now
Questions 78

What is a feature of a MAC address?

Options:

A.

It consists of 6 hexadecimal numbers.

B.

It consists of 24 bits.

C.

It consists of 38 bits.

D.

It consists of 12 hexadecimal numbers.

Buy Now
Questions 79

200-901 Question 79

Refer to the exhibit. Which action does the script perform?

Options:

A.

It queries user credentials from Cisco IOS XE devices.

B.

It retrieves device identification from Cisco DNA Center.

C.

It exports SSID information from Meraki dashboard.

D.

It collects group information from ACI.

Buy Now
Questions 80

Drag and drop the code from the bottom onto the box where the code is missing to enable ports on a switch by using RESTCONF. Not all options are used.

200-901 Question 80

Options:

Buy Now
Questions 81

Which technology is responsible for matching a name to an IP address of an application running on a host?

Options:

A.

firewall

B.

proxy

C.

load balancer

D.

DNS

Buy Now
Questions 82

When a Cisco IOS XE networking device is configured by using RESTCONF, what is the default data encoding method?

Options:

A.

application/yaml-data+json

B.

application/yang-data+json

C.

application/xml-data+json

D.

application/json-data+xml

Buy Now
Questions 83

200-901 Question 83

Refer to the exhibit. An engineer prepares a script to automate workflow by using Cisco DNA Center APIs to display:

total count of devices

list of the network devices

information of one device with a hostname filter

What is displayed in the final step after the Python script is executed?

Options:

A.

information about a device of type C9500-40x.

B.

filtered results by the hostname and the platformld C9500-40X

C.

information about the test devices

D.

list of devices with platformId C9500-40x

Buy Now
Questions 84

200-901 Question 84

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.

200-901 Question 84

Options:

Buy Now
Questions 85

An engineer clones a repository that contains a Python script from GitLab to a laptop. After modifying the code, the engineer wants to validate the changes. Which command starts … CI/CD pipeline and runs the automated tests?

200-901 Question 85

Options:

Buy Now
Questions 86

Which platform has an API that has the capability to obtain a list of vulnerable software on user devices?

Options:

A.

Cisco Advanced Malware Protection

B.

Cisco Umbrella

C.

Cisco Identity Services Engine

D.

Cisco Firepower

Buy Now
Questions 87

An engineer must make changes on a network device through the management platform API. The engineer prepares a script to send the request and analyze the response, check headers, and read the body according to information inside response headers. Drag and drop the HTTP header values from the left onto the elements of an HTTP response on the right.

200-901 Question 87

Options:

Buy Now
Questions 88

200-901 Question 88

Refer to the exhibit. A bespoke meeting booking system must be integrated with Cisco Webex so that meetings are created automatically. Drag and drop the code from the bottom onto the box where the code is missing to create a sample meeting. Not all options are used.

200-901 Question 88

Options:

Buy Now
Questions 89

What is a firehose webhook?

Options:

A.

It collects data from third-party cloud APIs for custom applications.

B.

It enables an application to receive real-time data from Cisco Webex.

C.

It enables data to flow from the Cisco Webex API to a user’s application.

D.

It sends a notification of any event for commonly used resources.

Buy Now
Questions 90

Refer to the exhibit.

200-901 Question 90

A developer needs to create a Docker image that listens on port 5000. Which code snippet must be placed onto the blank in the code?

Options:

A.

PORT 5000

B.

LISTEN 5000

C.

EXPOSE 5000

D.

OPEN 5000

Buy Now
Questions 91

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

200-901 Question 91

Options:

Buy Now
Questions 92

Which Python function is used to parse a string that contains JSON data into a Python dictionary?

Options:

A.

json.dumps()

B.

json.to_json()

C.

json.parse()

D.

json.loads()

Buy Now
Questions 93

Which RFC 1918 address space includes a subnet of 172.16.0.0 that uses a mask of 255.255.0.0?

Options:

A.

class A

B.

class B

C.

class C

D.

class D

Buy Now
Questions 94

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right.

200-901 Question 94

Options:

Buy Now
Questions 95

Refer to the exhibit.

200-901 Question 95

A REST API retune this JSON output for a GET HTTP request, Which has assigned to a variable called “vegetables” Using python, which output is the result of this command?

200-901 Question 95

Options:

A.

Lettuce

B.

Kiwi

C.

[‘kiwi’, ‘grape’]

D.

{‘color’: ‘green’, ‘items’: [‘kiwi’, ‘grape’]

Buy Now
Questions 96

A small company has 5 servers and 50 clients. What are two reasons an engineer should spilt this network into separate client and server subnets? (Choose two)

Options:

A.

Internet access to the servers will be denied on the router.

B.

A router will limit the traffic types between the clients and servers.

C.

Subnets will split domains to limit failures.

D.

A router will bridge the traffic between clients and servers.

E.

Subnets provide more IP address space for clients and servers.

Buy Now
Questions 97

Refer to the exhibit.

200-901 Question 97

Given the API documentation for the UCS SDK python class, UcsHandle, which code snippet creates a handle instance?

200-901 Question 97

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 98

Which line is an example of the start of a chunk from a unified diff?

Options:

A.

@@ -90,88 +20191008T1349@@

B.

@@ -20191007T1200 +88,90 @@

C.

@@ -20191007T1200 +20191008T1349@@

D.

@@ -88,10 +88,6 @@

Buy Now
Questions 99

Which network device monitors incoming and outgoing traffic and decides whether to allow or block specific traffic based on a defined set of rules?

Options:

A.

switch

B.

load balancer

C.

reverse proxy

D.

firewall

Buy Now
Questions 100

Refer to the exhibit.

200-901 Question 100

The output of a unified diff when comparing two versions of a python script is shown. Which two “single_request _timeout ()”

200-901 Question 100

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 101

Fill in the blanks to complete the Bash script in which each file in a directory is renamed to Its SHA256 hash?

200-901 Question 101

Options:

Buy Now
Questions 102

In which situation would an edge computing solution be used?

Options:

A.

where low latency is needed

B.

where high CPU throughput is needed

C.

where fast memory is needed

D.

where high disk space is needed

Buy Now
Questions 103

Refer to the exhibit.

200-901 Question 103

Which JSON is equivalent to the XML –encoded data?

200-901 Question 103

200-901 Question 103

200-901 Question 103

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 104

Drag and drop the Python code from the left onto the correct step on the right to call a REST API.

200-901 Question 104

Options:

Buy Now
Questions 105

Which is an advantage of using network programmability?

Options:

A.

It removes CLI access for devices.

B.

It provides for more scalable and replicable network provisioning.

C.

Manual configuration is faster.

D.

No cloud abstraction occurs.

Buy Now
Questions 106

Before which process is code review performed when version control is used?

Options:

A.

committing code

B.

branching code

C.

merge of code

D.

checkout of code

Buy Now
Questions 107

Drag and drop the functionalities from the left onto correct networking devices on the right.

200-901 Question 107

Options:

Buy Now
Questions 108

Refer to the exhibit.

200-901 Question 108

Fill in the blank to complete the query parameter and value so that the result set is returned in reverse chronological order (most recent first) based on when message were entered.

200-901 Question 108

Options:

Buy Now
Questions 109

Which two statements describe the traits of an asynchronous API call? (Choose two.)

Options:

A.

The order in which API calls return can be guaranteed

B.

A call to an API does not block the code, but rather it allows application processing to continue

C.

The end user can experience latency or performance lag while waiting for the API call to return

D.

Code execution blocks or waits for the call to an API to return.

E.

A callback function typically is used to process the response from an API call

Buy Now
Questions 110

Refer to the exhibit.

200-901 Question 110

Which two statements about the network diagram are true? (Choose two.)

Options:

A.

PC-A and PC-B are in the same subnet.

B.

One of the routers has two connected serial interfaces.

C.

The subnet of PC-C can contain 256 hosts.

D.

R1 and R3 are in the same subnet.

E.

The subnet address of PC-B has 18 bits dedicated to the network portion.

Buy Now
Questions 111

Which service provides a directory lookup for IP addresses and host names?

Options:

A.

DNS

B.

DHCP

C.

SNMP

D.

NAT

Buy Now
Questions 112

Which CI/CD tool is an automation tool used to build, test, and deploy software?

Options:

A.

Nagios

B.

Gradle

C.

Jenkins

D.

Git

Buy Now
Questions 113

Which two elements are foundational principles of DevOps? (Choose two.)

Options:

A.

designing applications as microservices

B.

encouraging containers for the deployment of applications

C.

organizing cross-functional teams over organizational silos

D.

optimizing the cost of infrastructures

E.

automating over documenting

Buy Now
Questions 114

Drag and drop elements of the RESTCONF protocol stack from the left onto the correct description on the right. Not all elements on the left are used.

200-901 Question 114

Options:

Buy Now
Questions 115

Fill in the blanks to complete the python script to request a service ticket using the APIC-EM rest API for the user “devnetuser”.

200-901 Question 115

Options:

Buy Now
Questions 116

Fill in the blanks to complete the Python script to update the Webex Teams membership of a room using the Python requests library import requests

200-901 Question 116

Options:

Buy Now
Questions 117

Which two statements describe the advantages of using a version control system? (Choose two.)

Options:

A.

It allows for branching and merging so that different tasks are worked on in isolation before they are merged into a feature or master branch.

B.

It allows multiple engineers to work against the same code and configuration files and manage differences and conflicts.

C.

It provides tooling to automate application builds and infrastructure provisioning.

D.

It allows developers to write effective unit tests.

E.

It provides a system to track User Stories and allocate to backlogs.

Buy Now
Questions 118

A developer needs to prepare the file README.md in the working tree for the next commit operation using Git. Which command needs to be used to accomplish this?

Options:

A.

git add README.md staging

B.

git -a README.md

C.

git add README.md

D.

git commit README.md

Buy Now
Questions 119

The project is migrated to a new codebase, the “old_project” directory must be deleted. The directory has multiple read-only files, and it must be deleted recursively without prompting for confirmation. Which bash command must be used?

Options:

A.

rm -rf old_project

B.

rm -r old_project

C.

rmdir -p old_project

D.

rmdir old_project

Buy Now
Questions 120

Refer to the exhibit.

200-901 Question 120

200-901 Question 120

Drag and drop the code from the left onto the item numbers on the right to complete to Meraki python script shown in the exhibit.

200-901 Question 120

Options:

Buy Now
Questions 121

Which action does the Git command git merge allow the development to perform?

Options:

A.

Combine multiple sequence of commits into one unified history.

B.

Push changes to the remote repository

C.

Switch between branches

D.

Create, list, rename, and delete branches

Buy Now
Questions 122

How does requesting a synchronous API operation differ from requesting an asynchronous API operation?

Options:

A.

clients poll for the status of the execution of operations

B.

clients subscribe to a webhook for operation results

C.

clients can access the results immediately

D.

clients receive responses with a task id for further processing

Buy Now
Questions 123

Refer to the exhibit.

200-901 Question 123

Which OWASP threat does this example demonstrate?

Options:

A.

broken access control

B.

SQL injection

C.

man-in-the-middle

D.

cross-site scripting

Buy Now
Questions 124

Which platform has an API that be used to obtain a list of vulnerable software on user devices?

Options:

A.

Cisco Umbrella

B.

Cisco Firepower

C.

Cisco Identity Services Engine

D.

Cisco Advanced Malware Protection

Buy Now
Questions 125

Refer to the exhibit.

200-901 Question 125

What is the effect of this Ansible playbook on an IOS router?

Options:

A.

A new running configuration is pushed to the IOS router.

B.

The current running configuration of the IOS router is backed up.

C.

The start-up configuration of the IOS router is copied to a local folder.

D.

A new start-up configuration is copied to the IOS router.

Buy Now
Questions 126

A developer is reviewing a code that was written by a colleague. It runs fine, but there are many lines of code to do a seemingly simple task repeatedly. Which action organizes the code?

Options:

A.

Refactor the code by removing any unnecessary tests

B.

Using functions, rewrite any pieces of code that are repeated

C.

Reverse engineer and rewrite the code logic

D.

Modify the code to use loops

Buy Now
Questions 127

Refer to the exhibit.

A process on the host wants to access the service running inside this Docker container. Which port is used to make a connection?

Options:

A.

only outbound connections between 3000 and 5000 are possible

B.

port 3000

C.

any port between 3000 and 5000

D.

port 5000

Buy Now
Questions 128

Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose two.)

Options:

A.

Cisco Intersight API interactions can be encoded in XML or JSON and require an APIs key in the HTTP header for authentication.

B.

USC Director API interactions can be XML- or JSON-encoded and require an APLs key in the HTTP header for authentication.

C.

UCS manager API interactions are XML-encoded and require a cookie in the method for authentication.

D.

Cisco Intersight uses XML to encoded API interactions and requires an API key pair for authentication.

E.

UCS manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the HTTP header for authentication.

Buy Now
Questions 129

Which status code is used by a REST API to indicate that the submitted payload is incorrect?

Options:

A.

400

B.

403

C.

405

D.

429

Buy Now
Questions 130

On which port does NETCONF operate by default?

Options:

A.

23

B.

443

C.

822

D.

830

Buy Now
Questions 131

Drag and drop the capability on the left onto the Cisco compute management platform that supports the capability on the right.

200-901 Question 131

Options:

Buy Now
Questions 132

Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)

Options:

A.

An artifact repository allows to compare and merge changes in the source code of files involved in a build process.

B.

An artifact repository is needed only for CI/CD pipeline executed on a public cloud infrastructure.

C.

An artifact repository provides traceability, search, and management of binary files.

D.

An artifact repository is needed only for managing open source software.

E.

An artifact repository stores files needed and generated during the build process.

Buy Now
Questions 133

Which statement describes the benefit of using functions in programming?

Options:

A.

Functions allow problems to be split into simpler, smaller groups, and reduce code repetition, which makes the code easier to read.

B.

Functions ensure that a developer understands the inner logic contained before using them as part of a script or application.

C.

Functions create the implementation of secret and encrypted algorithms.

D.

Functions store mutable values within a script 01 application.

Buy Now
Questions 134

Refer to Exhibit.

200-901 Question 134

Which JSON is equivalent to the XML-encoded data.

A)

200-901 Question 134

B)

200-901 Question 134

C)

200-901 Question 134

D)

200-901 Question 134

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 135

A REST API service requires authentication based on the username and password. The user “john” has the password “384279060” and the Base64 encoding of those credentials is “am9objowMTIzNDU2Nzg=”. Which method completes an authentication request?

Options:

A.

The header must include:

Authorization: Bearer am9obJowMTlzNDU2Nzg=

B.

The payload must include:

Authorization: Bearer am9objowMTIzNDU2Nzg=

C.

The payload must include.

Authorization: Basic am9objowMTlzNDU2Nzg=

D.

The header must include:

Authorization: Basic am9objowMTlzNDU2Nzg=

Buy Now
Questions 136

Which response status code is used by a RESTful interface to indicate successful execution of a request?

Options:

A.

200

B.

404

C.

405

D.

500

Buy Now
Questions 137

Which two query types does a client make to a DNS server? (Choose Two)

Options:

A.

AAAA

B.

ACK

C.

DISCOVER

D.

Inverse

E.

PTR

Buy Now
Questions 138

What are the two purposes for using a VLAN in a network? (Choose two)

Options:

A.

It is used to create the routing table.

B.

It creates a collection of MAC addresses.

C.

It is used for VM network traffic.

D.

It segments a network.

E.

It creates a broadcast domain.

Buy Now
Questions 139

In python, which expression checks whether the script returns a success status code when the Requests library is used?

Options:

A.

response.status_code== requests.ok

B.

response.status_code== requests.codes.ok

C.

response.code== requests.codes.ok

D.

response.status_code ! == requests.codes.ok

Buy Now
Questions 140

Which two types of NAT are used in a network? (Choose two.)

Options:

A.

Static NAT

B.

Normal NAT

C.

Multicast NAT

D.

Dynamic NAT

E.

Router NAT

Buy Now
Exam Code: 200-901
Exam Name: DevNet Associate (DEVASC)
Last Update: Mar 27, 2025
Questions: 467

PDF + Testing Engine

$61.25  $174.99

Testing Engine

$47.25  $134.99
buy now 200-901 testing engine

PDF (Q&A)

$40.25  $114.99
buy now 200-901 pdf