Month End Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

200-901 DevNet Associate (DEVASC) Questions and Answers

Questions 4

A developer must test the performance and reliability of an application. After functional and load tests are run, the application crashes due to traffic spikes from users. Which type of API constraint must be implemented to maintain reliability?

Options:

A.

rate limiting

B.

pagination

C.

payload limits

D.

filtering

Buy Now
Questions 5

A company wants to automate the orders processed on its website using API. The network device that supports the solution must:

    support XML encoding

    support distributed transactions

    support YANG data models

    be support software redundancy

Which requirement prevents the use of RESTCONF for the solution?

Options:

A.

software redundancy

B.

YANG data models

C.

distributed transactions

D.

XML encoding

Buy Now
Questions 6

Which two details are captured from the subnet mask? (Choose two.)

Options:

A.

portion of an IP address that refers to the subnet

B.

default gateway of the host

C.

unique number ID assigned to the host

D.

part of an IP address that refers to the host

E.

network connection of a host or interface

Buy Now
Questions 7

A developer writes an application that refines data in temporary secure file storage hosted on the public cloud. Data will be deleted after processing and does not contain any private information. What is the advantage that a public cloud deployment provides to the developer?

Options:

A.

high security with encryption

B.

ease in infrastructure management

C.

flexible development

D.

bespoke services

Buy Now
Questions 8

Which Cisco platform is used to manage data center infrastructure through third-party tools and system integrations?

Options:

A.

Cisco DNA Center

B.

Cisco UCS Manager

C.

Cisco Intersight

D.

Cisco UCS Director

Buy Now
Questions 9

200-901 Question 9

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.

200-901 Question 9

Options:

Buy Now
Questions 10

What is a capability of Cisco Webex?

Options:

A.

Join preconfigured or new spaces with fixed user rights.

B.

Configure devices at scale via automation scripts or by manual execution.

C.

Initiate or respond to calls automatically via automation.

D.

Get space history or notified in real time when new messages are posted.

Buy Now
Questions 11

A developer has experienced security issues with a previously developed application. The API offered by that application is open and without any constraints. During a recent attack, the application was overloaded with API requests. To address this issue, an API constraint is implemented to protect the application from future attacks or any sudden throttling. Which API constraint must the application developer implement in this situation?

Options:

A.

pagination

B.

rate limiting

C.

filtering

D.

payload limiting

Buy Now
Questions 12

Drag and drop characteristics from the left onto the infrastructure management methodologies on the right.

200-901 Question 12

Options:

Buy Now
Questions 13

Which solution reduces costs from MPLS, improves application performance, and simplifies operations?

Options:

A.

Cisco NSO

B.

Cisco SD-WAN

C.

Cisco ACI

D.

Cisco DNA Center

Buy Now
Questions 14

A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?

Options:

A.

Store the username and password in a separate configuration file.

B.

Store the username and password in a vault.

C.

Store the passwords in a dictionary.

D.

Store the username and password in code.

Buy Now
Questions 15

Which network device plane is responsible for handling QoS?

Options:

A.

management plane

B.

data plane

C.

configuration plane

D.

control plane

Buy Now
Questions 16

Which function does a router provide to a network?

Options:

A.

broadcast domain segmentation

B.

unique host on a Layer 3 network

C.

unique hardware address for every node on a LAN

D.

broadcast domain extension

Buy Now
Questions 17

200-901 Question 17

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python script to retrieve a list of hosts using the Cisco DNA Center API. Not all options …used.

200-901 Question 17

Options:

Buy Now
Questions 18

Which RFC 1918 address space includes a subnet of 172.16.0.0 that uses a mask of 255.255.0.0?

Options:

A.

class A

B.

class B

C.

class C

D.

class D

Buy Now
Questions 19

200-901 Question 19

Refer to the exhibit. A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?

Options:

A.

cp ./PROD/current.txt ./TEST/config.txt

B.

cp ./TESTi/current.txt ./PROD/config.txt

C.

cp ./PROD/config.txt ./TEST/current.txt

D.

cp ./TEST/config.txt ./PROD/current.txt

Buy Now
Questions 20

Drag and drop the code from the bottom onto the box where the code is missing to present GigabilEthernet2 details in the XML format. Not all options are used.

200-901 Question 20

Options:

Buy Now
Questions 21

Which standard supported by Cisco IOS XE and Cisco NX-OS is used for automating the configuration of multiple devices across a network?

Options:

A.

SNMP – YANG

B.

SYSLOG – YANG

C.

CLI – YANG

D.

NETCONF – YANG

Buy Now
Questions 22

Drag and drop the code snippets from the bottom onto the blanks in the code to complete the happy path scenario. Not all options are used.

200-901 Question 22

Options:

Buy Now
Questions 23

Which two situations align with infrastructure as code principles? (Choose two.)

Options:

A.

nonreplicable snowflake servers

B.

release versions to specific hardware

C.

maximized configuration drift

D.

easily reproducible systems

E.

repeatable processes

Buy Now
Questions 24

A developer checks the performance of a web application. The application is in the local data center and uses a REST-based API. Based on the API logs, it is discovered that many its abandon API requests. Also, the response is taking too long to get back. What is the reason for this issue?

Options:

A.

Pagination is not implemented

B.

Token-based authentication is enabled.

C.

Rate limiting is not implemented.

D.

Token-based authentication is disabled

Buy Now
Questions 25

A developer plans to deploy a new application that will use an API to implement automated data collection from Webex with these requirements:

The application was created by using the request library.

Requires HTTP basic authentication.

Provides data in JSON or XML formats.

Which Cisco DevNet resource helps the developer with how to use the API?

Options:

A.

DevNet sandbox

B.

API documentation

C.

forums

D.

DevNet code exchange

Buy Now
Questions 26

Which two HTTP code series relate to errors? (Choose two.

Options:

A.

400

B.

200

C.

500

D.

300

E.

100

Buy Now
Questions 27

A developer creates a new application, but the application must be tested before being released to a customer. When a mobile phone that uses 4G is used to access the application, the request fails. Why does the connection to the application fail?

Options:

A.

The application is hosted on premises and VPN connectivity is required

B.

The application must be added to the production server before testing.

C.

The application must be moved to the cloud before testing is possible.

D.

The application connectivity is limited to HTTPS protocol.

Buy Now
Questions 28

Refer to the exhibit.

200-901 Question 28

What are two results of running the RESTCONF query? (Choose two.)

Options:

A.

Interfaces are created as containers.

B.

The module letf-interfaces:interfaces is created.

C.

GigabitEthemet2 becomes shut down.

D.

GigabitEthernetl becomes shut down.

E.

Descriptions for two interfaces are applied.

Buy Now
Questions 29

Which Python function is used to parse a string that contains JSON data into a Python dictionary?

Options:

A.

json.dumps()

B.

json.to_json()

C.

json.parse()

D.

json.loads()

Buy Now
Questions 30

200-901 Question 30

Refer to the exhibit. Which RESTCONF request results in this response?

Options:

A.

200-901 Question 30 Option 1

B.

30

C.

30

D.

30

Buy Now
Questions 31

What is the purpose of Infrastructure as Code?

Options:

A.

to provide the ability of independent development process

B.

to manually configure and manage infrastructure at scale

C.

to apply new practices on the development process

D.

to use development engineering practices on the infrastructure

Buy Now
Questions 32

Drag and drop the characteristics from the left onto the software development methodologies on the right.

200-901 Question 32

Options:

Buy Now
Questions 33

What is a feature of a MAC address?

Options:

A.

It consists of 6 hexadecimal numbers.

B.

It consists of 24 bits.

C.

It consists of 38 bits.

D.

It consists of 12 hexadecimal numbers.

Buy Now
Questions 34

A developer is working on a new feature in a branch named 'newfeat123456789' and the current working primary branch is named 'prim987654321'. The developer requires a merge commit during a fast forward merge for record-keeping purposes. Which Git command must be used?

Options:

A.

git merge --no-ff newfeat123456789

B.

git commit --no-ff newfeat123456789

C.

git add --commit-ff newfeat123456789

D.

git reset --commit-ff newfeat123456789

Buy Now
Questions 35

200-901 Question 35

Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer's account?

Options:

A.

The encoded credentials were available in the source code.

B.

The application was not encrypting the communication with the server.

C.

The credentials were encrypted in the source code.

D.

An SSL certificate was used instead of the TLS protocol to authenticate.

Buy Now
Questions 36

200-901 Question 36

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

200-901 Question 36

Options:

Buy Now
Questions 37

Refer to the exhibit.

200-901 Question 37

An engineer is comparing two tiles by using the unified cliff format What is determined by the content in the file2.py file?

Options:

A.

Line 16 of file2.py is auth=HTTPBasicAuth(USERNAME. PASSWORD).

B.

Line 17 of file2.py is auth = HTTPBasicAuth{USERNAME. PASSWORD).

C.

Line 93 of file2.py is 'DEVICE-STATS'.

D.

Line 92 of file2.py is 'DEVICE-STATS'.

Buy Now
Questions 38

200-901 Question 38

Refer to the exhibit. An engineer is comparing two files by using the unified diff format. Which cade snippet belongs to the new.py file?

Options:

A.

200-901 Question 38 Option 1

B.

38

C.

38

D.

38

Buy Now
Questions 39

Which command reverses the last commit without changing the index file or the working tree position?

Options:

A.

git revert HEAD

B.

git reset --hard HEAD~3

C.

git reset --soft HEAD^

D.

git revert

Buy Now
Questions 40

Refer to the exhibit.

200-901 Question 40

A collaboration engineer has developed a script to automate the gathering of information by providing the email address of the individual. When the engineer tests the script, a 401 error is received. Which command fixes the script?

Options:

A.

Add "Authorization": "Bearer <WEBEX_TOKEN>" to the headers

B.

Add "Authentication": "Basic <WEBEX_TOKEN>" in the base_url after "https://".

C.

Add "<Authorization>:<password>@" in the base_url after "https://".

D.

Add "Authentication": "Bearer <WEBEX TOKEN>" to the headers

Buy Now
Questions 41

A developer is running an application that connects to the Cisco website and collects data. The application will be hosted in a local data center and the data will need to be collected on a frequent basis. The application client requires certain environmental variables to be set before the run. Which Bash command sets the environmental variables for a Linux system?

Options:

A.

200-901 Question 41 Option 1

B.

41

C.

41

D.

41

Buy Now
Questions 42

What is a comparison of YAML and JSON?

Options:

A.

YAML has a more consistent approach to representing data compared to JSON.

B.

JSON does not support comments and YAML does.

C.

YAML is a more verbose data structure compared to JSON.

D.

JSON has more common usage in configuration management tools compared to YAML.

Buy Now
Questions 43

Which Cisco compute management platform controls server, network, storage, and virtual resources with policy-driven management for up to 10000 physical Cisco servers?

Options:

A.

UCS Central

B.

Cisco Intersight

C.

Cisco DNA Center

D.

Cisco HyperFlex

Buy Now
Questions 44

What is the purpose of grouping devices in a VLAN?

Options:

A.

Devices communicate as if they are connected on the same wire.

B.

Multicast network traffic is limited to the VLAN connected devices.

C.

Unicast messages are limited to the clients connected on the same VLAN.

D.

Network traffic is load balanced between the devices connected to the VLAN.

Buy Now
Questions 45

A lead engineer is managing the development of a web application with a team of remote developers using Git as the version control system. What is the advantage of a version Control system that allows developers to pick code from any part of the project and perform updates on it?

Options:

A.

efficient handling of projects

B.

linear development

C.

build automation

D.

nonlinear development

Buy Now
Questions 46

Drag and drop the code from the bottom onto the box where the code is missing to obtain a list of network devices by using the Cisco Meraki API. Not all options are used.

200-901 Question 46

Options:

Buy Now
Questions 47

Drag and drop the capabilities from the left onto the Cisco Network Management Platforms that support the capabilities on the right.

200-901 Question 47

Options:

Buy Now
Questions 48

Refer to the exhibit.

200-901 Question 48

The JSON data in the exhibit has been parsed and stored in a variable, “data”. What returns the value “172.16.0.11” ?

Options:

A.

data['items'][0]['host']['value']

B.

data['items']['1']['host']['value']

C.

data['items']['host'][1]

D.

data['items']['host']['value']

Buy Now
Questions 49

What operation is performed with YANG model-driven programmability in NX-OS?

Options:

A.

configure a device with native and OpenConfig-based models

B.

send CLI commands to a device and retrieve output in JSON format

C.

run Linux commands natively on the device

D.

bootstrap a device that has a factory-default configuration

Buy Now
Questions 50

What is used in Layer 2 switches to direct packet transmission to the intended recipient?

Options:

A.

spanning tree

B.

IPv4 address

C.

IPv6 address

D.

MAC address

Buy Now
Questions 51

Drag and drop the capability on the left onto the Cisco compute management platform that supports the capability on the right.

200-901 Question 51

Options:

Buy Now
Questions 52

Which two types of NAT are used in a network? (Choose two.)

Options:

A.

Static NAT

B.

Normal NAT

C.

Multicast NAT

D.

Dynamic NAT

E.

Router NAT

Buy Now
Questions 53

Which two elements are foundational principles of DevOps? (Choose two.)

Options:

A.

designing applications as microservices

B.

encouraging containers for the deployment of applications

C.

organizing cross-functional teams over organizational silos

D.

optimizing the cost of infrastructures

E.

automating over documenting

Buy Now
Questions 54

Drag and drop the functionalities from the left onto correct networking devices on the right.

200-901 Question 54

Options:

Buy Now
Questions 55

When using the Bash shell, how it the output of the devnet command saved to a tile named “output.txt”?

Options:

A.

devnet & output.txt

B.

devnet > output.txt

C.

devnet < output.txt

D.

devnet I output.txt

Buy Now
Questions 56

Which two statements about JSON and XML are true? (Choose two.)

Options:

A.

JSON objects are collection of key value pair.

B.

The syntax of JSON contains tags, elements, and attributes.

C.

JSON arrays are an unordered set of key value pairs.

D.

The syntax of XML contains tags, elements, and attributes.

E.

XML objects are collections of key-value pairs.

Buy Now
Questions 57

Which two protocols are used to apply a configuration change on a Cisco IOS XE device? (Choose two)

Options:

A.

CCX

B.

RESTCONF

C.

NETCONF

D.

HSRP

E.

CDP

Buy Now
Questions 58

Which model-driven programmability protocol does Cisco IOS XE Software support?

Options:

A.

CORBA

B.

SSH

C.

gNMI

D.

SOAP

Buy Now
Questions 59

What is the purpose of the Cisco VIRL software tool?

Options:

A.

To verify configurations against compliance standards

B.

To simulate and model networks

C.

To automate API workflows

D.

To test performance of an application

Buy Now
Questions 60

Drag and drop the element of the Finesse API on the left onto the description of its functionally on the right.

200-901 Question 60

Options:

Buy Now
Questions 61

Which network device monitors incoming and outgoing traffic and decides whether to allow or block specific traffic based on a defined set of rules?

Options:

A.

switch

B.

load balancer

C.

reverse proxy

D.

firewall

Buy Now
Questions 62

Drag and Drop the Bash commands from the left onto the correct actions on the right.

200-901 Question 62

Options:

Buy Now
Questions 63

In which situation would an edge computing solution be used?

Options:

A.

where low latency is needed

B.

where high CPU throughput is needed

C.

where fast memory is needed

D.

where high disk space is needed

Buy Now
Questions 64

What is an example of a network interface hardware address?

Options:

A.

domain name

B.

IP address

C.

workstation name

D.

MAC address

Buy Now
Questions 65

Fill in the blanks to complete the statement.

Given a username of “devnet” And a password “Cisco123”, applications must create a base64 encoding of the string” ____________ ” when sanding HTTP requests to an API that uses _______________ authentication.

Options:

Buy Now
Questions 66

Which two statements describe the advantages of using a version control system? (Choose two.)

Options:

A.

It allows for branching and merging so that different tasks are worked on in isolation before they are merged into a feature or master branch.

B.

It allows multiple engineers to work against the same code and configuration files and manage differences and conflicts.

C.

It provides tooling to automate application builds and infrastructure provisioning.

D.

It allows developers to write effective unit tests.

E.

It provides a system to track User Stories and allocate to backlogs.

Buy Now
Questions 67

What is the benefit of edge computing?

Options:

A.

It reduces network latency by moving processing closer to the data source.

B.

It simplifies security as devices and processing are brought closer together

C.

It removes the need for centralized data processing.

D.

It reduces data velocity from devices or other data sources.

Buy Now
Questions 68

Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.

200-901 Question 68

Options:

Buy Now
Questions 69

Which CI/CD tool is an automation tool used to build, test, and deploy software?

Options:

A.

Nagios

B.

Gradle

C.

Jenkins

D.

Git

Buy Now
Questions 70

A developer is writing an application that a REST API and the application requires a valid from the API which element of the response is used in the conditional check?

Options:

A.

URL

B.

Status code

C.

Link

D.

Body

E.

Headers

Buy Now
Questions 71

Refer to the exhibit.

200-901 Question 71

200-901 Question 71

The python interpreter and the Cisco python SDK are available by default in the Cisco NX-OS software. The SDK documentation shows how the cild() API can be used when working with working with JSON and XML. What are two effect of running the script? (Choose two.)

Options:

A.

configure interlace loopback 5

B.

issue shutdown on interface loopback 5

C.

show only the interfaces In the up status

D.

show only the interfaces in admin shut status

E.

show details for the TABLE interface

Buy Now
Questions 72

A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without error and the bundles are produced. However, when the script is run during business hours, report poor voice quality of phones calls. What explains this behavior?

Options:

A.

The application is running in the Voice VLAN and causes delays and jitter in the subnet.

B.

The speed and duplex settings in Cisco DNA Center are sot incorrectly, which causes the transfer to be too slow.

C.

9 The script is written in a low-level programming language where there is no memory safety. This causes a buffer overflow and disruption on the network.

D.

Generating the logs causes the CPU on the network controller to spike, which causes delays m forwarding the voice IP packets.

Buy Now
Questions 73

What are two roles of an artifact repository in a CI/CD pipeline? (Choose two.)

Options:

A.

is required for CI/CD pipelines executed on a public cloud infrastructure

B.

is required for managing open source software

C.

stores files needed and generated during the build process

D.

allows for comparing and merging changes in the source code

E.

provides traceability, search, and management of binary files

Buy Now
Questions 74

Refer to the exhibit.

200-901 Question 74

What is the result of executing this Ansible playbook?

Options:

A.

The playbook copies a new start-up configuration to CISCO_ROUTER_01.

B.

The playbook backs up the running configuration of CISCO_ROUTER_01.

C.

The playbook backs up the start-up configuration of C1SCO_ROUTER_01.

D.

The playbook copies a new running configuration to CISCO_ROUTER_01.

Buy Now
Questions 75

What are the two principles of an infrastructure as code environment? (Choose two)

Options:

A.

Complete complex systems must be able to be built from reusable infrastructure definitions.

B.

Environments must be provisioned consistently using the same inputs.

C.

Redeployments cause varying environment definitions.

D.

Service overlap is encouraged to cater for unique environment needs.

E.

Components are coupled, and definitions must be deployed for the environment to function.

Buy Now
Questions 76

Before which process is code review performed when version control is used?

Options:

A.

committing code

B.

branching code

C.

merge of code

D.

checkout of code

Buy Now
Questions 77

In python, which expression checks whether the script returns a success status code when the Requests library is used?

Options:

A.

response.status_code== requests.ok

B.

response.status_code== requests.codes.ok

C.

response.code== requests.codes.ok

D.

response.status_code ! == requests.codes.ok

Buy Now
Questions 78

A developer is reviewing a code that was written by a colleague. It runs fine, but there are many lines of code to do a seemingly simple task repeatedly. Which action organizes the code?

Options:

A.

Refactor the code by removing any unnecessary tests

B.

Using functions, rewrite any pieces of code that are repeated

C.

Reverse engineer and rewrite the code logic

D.

Modify the code to use loops

Buy Now
Questions 79

what is an advantage of a version control system?

Options:

A.

forces the practice of trunk-based development

B.

prevents over-writing code or configuration files

C.

facilitates resolving conflicts when merging code

D.

ensures that unit tests are written

Buy Now
Questions 80

Refer to the exhibit.

200-901 Question 80

Given the API documentation for the UCS SDK python class, UcsHandle, which code snippet creates a handle instance?

200-901 Question 80

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 81

A Company is looking for cloud deployment which will use the on-premise infrastructure, is user self-service, and easy to scale. Which cloud solution should be selected for these requirements?

Options:

A.

multi

B.

public

C.

private

D.

hybrid

Buy Now
Questions 82

Users cannot access a webserver and after the traffic is captured. the capture tool shows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?

Options:

A.

A router along the path is misrouting the packets in a wrong direction.

B.

A router along the path has the wrong time.

C.

The server is too far away and the packets require too much time to reach it

D.

The server is too loaded and the connection could not be handled in time

Buy Now
Questions 83

What are two advantages of YANG-based approaches for infrastructure automation? (Choose two.)

Options:

A.

directly maps to JavaScript

B.

multi-platform vendor abstraction

C.

designed to reflect networking concepts

D.

compiles to executables that run on network devices

E.

command line driven interface

Buy Now
Questions 84

Which type of HTTP method is used by the Meraki nad webex teams APIs to send webhook notifications?

Options:

A.

HTTP GET

B.

HTTP PUT

C.

HTTP HEAD

D.

HTTP POST

Buy Now
Questions 85

Drag and drop elements of the RESTCONF protocol stack from the left onto the correct description on the right. Not all elements on the left are used.

200-901 Question 85

Options:

Buy Now
Questions 86

Which product provides network controller-level management features?

Options:

A.

Cisco DNA Center

B.

Cisco NX-OS

C.

Cisco UCS Manager

D.

Cisco ISE

Buy Now
Questions 87

Which two concepts describe test-driven development? (Choose two.)

Options:

A.

It enables code refactoring.

B.

Write a test before writing code.

C.

Implementation is driven by incremental testing of release candidates.

D.

User acceptance testers development the test requirements.

E.

Tests are created when code is ready for release.

Buy Now
Questions 88

Which device is used to transport traffic from one broadcast domain to another broadcast domain?

Options:

A.

load balancer

B.

layer 2 switch

C.

router

D.

proxy server

Buy Now
Questions 89

What is the Git command to delete a local branch named “experiment” without a warning?

Options:

A.

git branch –n experiment

B.

git branch –rm experiment

C.

git branch –f experiment

D.

git branch –D experiment

Buy Now
Questions 90

Which line is an example of the start of a chunk from a unified diff?

Options:

A.

@@ -90,88 +20191008T1349@@

B.

@@ -20191007T1200 +88,90 @@

C.

@@ -20191007T1200 +20191008T1349@@

D.

@@ -88,10 +88,6 @@

Buy Now
Questions 91

What are two advantages of the Model-view-controller software design pattern? (Choose two.)

Options:

A.

simplifies network automation

B.

allows for multiple views of the same model

C.

makes code easier to deploy using Cl/CD pipelines

D.

reduces need for error handling

E.

separates responsibilities of the code, which makes future modifications easier

Buy Now
Questions 92

Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose two.)

Options:

A.

Cisco Intersight API interactions can be encoded in XML or JSON and require an APIs key in the HTTP header for authentication.

B.

USC Director API interactions can be XML- or JSON-encoded and require an APLs key in the HTTP header for authentication.

C.

UCS manager API interactions are XML-encoded and require a cookie in the method for authentication.

D.

Cisco Intersight uses XML to encoded API interactions and requires an API key pair for authentication.

E.

UCS manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the HTTP header for authentication.

Buy Now
Questions 93

Refer to the exhibit.

200-901 Question 93

Drag and Drop the code from the bottom onto the box where the code is missing on the Meraki Python script to create a new network

200-901 Question 93

Options:

Buy Now
Questions 94

Refer to the exhibit.

200-901 Question 94

Which OWASP threat does this example demonstrate?

Options:

A.

broken access control

B.

SQL injection

C.

man-in-the-middle

D.

cross-site scripting

Buy Now
Questions 95

Which HTTP response status code means “Forbidden”?

Options:

A.

500

B.

401

C.

403

D.

502

Buy Now
Questions 96

How are load balancers used in modern application deployment?

Options:

A.

Allow traffic to continue as new compute units are brought up and old compute units are taken down.

B.

Allow http and https traffic to continue as old compute units are discontinued before new units are brought up.

C.

Turn off traffic and take down compute units, then update and bring the compute units back up.

D.

Bring up new compute units, test the compute units, and switch the traffic from old units to new units.

Buy Now
Questions 97

Refer to the exhibit.

200-901 Question 97

Which command, including arguments, is executed when the container starts?

Options:

A.

/bin/sh -c "/bin/sleep 30 && nginx -g 'daemon off;'"

B.

/bin/sh -c "/bin/sleep 10 && nginx -g 'daemon off;'"

C.

/bin/bash -c "/bin/sleep 30 && nginx -g 'daemon off;'"

D.

/bin/sh -c "/bin/sleep 30" && nginx -g 'daemon off;'

Buy Now
Questions 98

Why is refactoring done during test-driven development?

Options:

A.

to enable larger objects and longer methods

B.

to improve maintainability and readability

C.

to ensure that the previous uses of the objects are explained

D.

to ensure the duplication of essential code

Buy Now
Questions 99

In test-driven development, what are two of the green bar patterns? (Choose two.)

Options:

A.

another test

B.

break

C.

triangulate

D.

starter test

E.

fake it

Buy Now
Questions 100

What are two use cause where webhooks are effective? (Choose two.)

Options:

A.

Close a session with a web server after a specific amount of time.

B.

Filter out information from a response to an API call

C.

Change the response format or content type of an API call.

D.

Inform a previously defined chat channel after a deployment fate.

E.

Send an email to a customer of an online store after payment is complete

Buy Now
Questions 101

Refer to the exhibit.

200-901 Question 101

A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?

Options:

A.

enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

B.

enable_function(‘iana-if-type:softwareLoopback’, Loopback1, true,)

C.

def enable_function(‘iana-if-type:softwareLoopback’, Loopback1, false,)

D.

def enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

Buy Now
Questions 102

A new application is being developed with specific platform requirements. The platform and application deployment and the ongoing platform management must be fully automated. The application includes a large database component that has significant disk I/O requirements. Which application deployment type meets the requirements?

Options:

A.

Python virtual environment

B.

virtual machine

C.

bare metal

D.

container

Buy Now
Questions 103

A local Docker alpine image has been created with an image ID of a391665405fe and tagged as “latest”. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?

Options:

A.

docker build -p 8080:80 alpine:latest

B.

docker exec -p 8080:80 alpine:latest

C.

docker start -p 8080:80 alpine:latest

D.

docker run -p 8080:80 alpine:latest

Buy Now
Questions 104

Refer to the exhibit.

200-901 Question 104

What do all the calls shown in the sequence diagram have in common?

Options:

A.

All the calls are optional.

B.

All the calls are asynchronous.

C.

All the calls are synchronous.

D.

All the calls depend on the catalog.

Buy Now
Questions 105

Refer to the exhibit.

200-901 Question 105

A network engineer must manage the network devices. The engineer prepares a Python scripts to authenticate to the Cisco to DNA Center API and request a device list. The device request fails and returns errors code 401. Which action solves the problem?

Options:

A.

Update the API URL. which matched the API endpoint for device list.

B.

Send the request to another network in case there are reachability Issues.

C.

Send the Authentication header In the request with a valid configuration.

D.

Update the credentials that are already supplied and retry the request

Buy Now
Questions 106

What is a capability of an agentless configuration management system?

Options:

A.

It requires managed hosts to have an interpreter for a high-level language such as Python or Ruby.

B.

It requires managed hosts to connect to a centralized host to receive updated configurations.

C.

It uses compiled languages as the basis of the domain-specific language to interface with managed hosts.

D.

It uses existing protocols to interface with the managed host.

Buy Now
Questions 107

Refer to the exhibit.

200-901 Question 107

A developer creates a Python script that queries Cisco Webex. When the script is executed, a 401 code is returned. After troubleshooting, the developer discovers that the service is missing privileges. Which change to the header in line 4 of the script results in the code 200?

A)

200-901 Question 107

B)

200-901 Question 107

C)

200-901 Question 107

D)

200-901 Question 107

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 108

How do XML and JSON compare regarding functionality?

Options:

A.

JSON natively supports arrays and XML does not natively support arrays.

B.

XML provides support for mapping data structures into host languages than JSON.

C.

XML provides more human readability than JSON.

D.

JSON provides support for data types than XML.

Buy Now
Questions 109

Refer to the exhibit.

200-901 Question 109

The Cisco Meraki API manages two organizations. In each organization, two independent networks are defined. How many calls to the /organizations/(orgid)networks endpoint will be run parallel by the GetAllNetwork function of the API client?

Options:

A.

0

B.

1

C.

2

D.

4

Buy Now
Questions 110

What is a benefit of using edge computing in an IoT implementation?

Options:

A.

low cost in network design

B.

low network design complexity

C.

high availability for network components

D.

high speed in data processing

Buy Now
Questions 111

Refer to the exhibit.

200-901 Question 111

Which two files are being edited in the unified diff? (Choose two.)

Options:

A.

README.md

B.

setup.py

C.

axl.py

D.

ciscoaxl.py

E.

index.py

Buy Now
Questions 112

What is a benefit of a model-driven approach for infrastructure automation?

Options:

A.

enforces the generation of all automation scripts through the modeling environment

B.

provides a small learning curve and helps system administrators with limited coding experience

C.

ensures that system administrators gain a good understanding of coding and expand their experience and capabilities

D.

enables a user to understand a declarative language to translate the model into an actionable script

Buy Now
Questions 113

In which two ways is an application characterized when interacting with a webhook? (Choose two.)

Options:

A.

codec

B.

receiver

C.

transaction monitor

D.

processor

E.

listener

Buy Now
Questions 114

Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?

Options:

A.

100

B.

204

C.

302

D.

402

Buy Now
Questions 115

Refer to the exhibit.

200-901 Question 115

Drag and drop the code from the bottom onto the blanks in the code to construct a cURL command using the Cisco DNA Center API. which will provide the details of a WLAN controller with Id af397748444. Not at options are used.

200-901 Question 115

Options:

Buy Now
Questions 116

Refer to the exhibit.

200-901 Question 116

The output of the diff-u README.md-repo README.md command is shown. The original file was 165 lines long How many lines are in the edited copy of the file?

Options:

A.

162

B.

165

C.

172

D.

173

Buy Now
Questions 117

What is a benefit of using functions in the code for the development process?

Options:

A.

better user experience in the end product

B.

improves code performance

C.

easier to compile the code

D.

fester code development

Buy Now
Questions 118

Which advantage does the agile process offer compared to waterfall software development?

Options:

A.

to view the full scope of end-to-end work

B.

to have each phase end before the next begins

C.

to fix any issues at the end of the development cycle

D.

to add or update features with incremental delivery

Buy Now
Questions 119

How does a developer create and switch to a new branch called "my-bug-fix" to develop a product fix?

Options:

A.

git checkout -b my-bug-fix

B.

git branch -b my-bug-fix

C.

git branch my-bug-fix

D.

git checkout my-bug-fix

Buy Now
Questions 120

Refer to the exhibit.

200-901 Question 120

A developer must integrate a bot with an internal communication app. The developer wants to replace the webexbot package with the teamsbot package by using Ansible and prepares a playbook In the first two tasks, the playbook stops the webexbot and verifies that the teamsbot is installed. What is accomplished in the last task of the workflow when the developer runs the Ansible playbook?

Options:

A.

stops the webexbot service and uninstals it and retains its configuration files

B.

installs the webexbot and retains the configuration files

C.

uninstalls the webexbot package and removes its configuration files

D.

searches whether the purge package is available in the repository and uninstalls the webexbot package

Buy Now
Questions 121

Refer to the exhibit.

200-901 Question 121

An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the 'get_all_interfaces' API call is used?

Options:

A.

times out

B.

rate limit

C.

pagination

D.

invalid password

Buy Now
Questions 122

A developer created a new secure API and is testing the functionality locally. The API was added to a container for further testing, and other team members and applications need to connect to the API. Which command exposes the API in the container as port 8443 and allows connections external to the host?

Options:

A.

docker run -p 127.0.0.1:80:8443/tcp myapiservice

B.

docker run -p 0.0.0.0:443:8443/tcp myapiservice

C.

docker run -p 0.0.0.0:8443:443/tcp myapiservice

D.

docker run -p 127.0.0.1:443:8443/tcp myapiservice

Buy Now
Questions 123

A developer needs a list of clients connected to a specific device in a Meraki network. After making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet resource should be used to identify the meaning of the response code?

Options:

A.

API documentation

B.

Sandbox

C.

Learning Labs

D.

Code Exchange

Buy Now
Questions 124

How does a synchronous API request differ from an asynchronous API request?

Options:

A.

clients receive responses with a task id for further processing

B.

clients subscribe to a webhook for operation results

C.

clients are able to access the results immediately

D.

clients poll for the status of the execution of operations

Buy Now
Questions 125

Which Cisco product provides malware and content filtering through DNS?

Options:

A.

Cisco ASA Firepower module

B.

Cisco AMP

C.

Cisco ISE

D.

Cisco Umbrella

Buy Now
Questions 126

Drag and drop the code from the bottom onto the box where the code is missing in the Python script to complete a function to return all the clients on a network by using the Cisco Meraki Dashboard API. Not all options are used.

200-901 Question 126

Options:

Buy Now
Questions 127

A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?

Options:

A.

git update

B.

git merge

C.

git add

D.

git rebase

Buy Now
Questions 128

Refer to the exhibit.

200-901 Question 128

A Python script must delete all Cisco Catayst 9300 Series switches that have an uptime that is greater than 90 days The script must also query for the status of all the other devices Drag and drop the code from the bottom onto the bottom box the code is missing to complete the script Not at options are used

200-901 Question 128

Options:

Buy Now
Questions 129

Which Cisco platform provides organization-wide automation, security, policy enforcement, any agility across wired and wireless networks?

Options:

A.

Cisco ACI

B.

Cisco DNA Center

C.

Cisco Umbrella

D.

Cisco SD-WAN

Buy Now
Questions 130

Refer to the exhibit.

200-901 Question 130

A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?

Options:

A.

compilation and configuration of the Cisco DevNet application so that it must be started manually

B.

compilation, installation, and configuration of the Cisco DevNet application so that it starts automatically

C.

compilation and installation of the Cisco DevNet application for an autonomous deployment model

D.

installation and configuration of the Cisco DevNet application so that it starts manually

Buy Now
Questions 131

Refer to the exhibit.

200-901 Question 131

An engineer must configure a load balancer server. The engineer prepares a script to automate workflow by using Bash. The script install the nginx package, moves to the /optAtginx directory, and reads the sites M We (or further processing Based on the script workflow, which process is being automated within the loop by using the information mi sites txt?

Options:

A.

creating a new Me Based on template .conf in the /etc/ngin/sites_enabled directory for each lie in the sites txt file. and then changing the file execution permission.

B.

creating a Me per each the in sites txt with the information in template conf. creating a link for the previously created file. and then changing the ownership of the created files

C.

using the content of the file to create the template conf file. creating a Iink from the created file to the /etc/nginx/files.enabled. and then changing the file execution permissions.

D.

using the information in the file to create a set of empty files in the /etchginx/sites_enabled directory and then assigning the owner of the file.

Buy Now
Questions 132

What is a functionality of the Waterfall method as compared to the Agile method for software development?

Options:

A.

Waterfall increases agility to implement faster while Agile promotes reliability.

B.

A phase begins after the previous phase has ended in Waterfall while Agile phases run in parallel.

C.

Customers get feedback during the process in Waterfall while they can see the result at the end in Agile.

D.

Requirements can be updated in Waterfall while in Agile it should be gathered in the beginning.

Buy Now
Questions 133

Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:

• MySQL database that stores data about customers

• HTML5 and JavaScript UI that runs on Apache

• REST API written in Python

What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)

Options:

A.

to enable multiple views of the same data to be presented to different groups of users

B.

to provide separation between the view and the model by ensuring that all logic is separated out into the controller

C.

to ensure data consistency, which requires that changes to the view are also made to the model

D.

to ensure that only one instance of the data model can be created

E.

to provide only a single view of the data to ensure consistency

Buy Now
Questions 134

What is a capability of the NETCONF protocol?

Options:

A.

allows Python scripts to be executed externally from a network device

B.

uses JSON to encode data in its content layer

C.

allows XML messages to be exchanged via the SSH protocol

D.

exposes a web-based interface

Buy Now
Questions 135

What is the purpose of a MAC address on a network device?

Options:

A.

unique network address that identifies the network interface of a device

B.

unique network interlace address that is provided by the DHCP server

C.

unique hardware address that identifies the network interface of a device

D.

unique hardware interface address that is provided by the central switch

Buy Now
Questions 136

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

200-901 Question 136

Options:

Buy Now
Questions 137

Refer to the exhibit.

200-901 Question 137

A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?

Options:

A.

results gathering of the show version and show ip int brief commands

B.

output of show ip int brief command on devices of type C9500-40X

C.

execution information of the show version and show ip int brief commands

D.

list of executed commands on C9500-40X and the information of show ip int brief command

Buy Now
Questions 138

A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:

$ docker tag 84fe411926287 local/app:0.4

Which command must be executed next to build the Docker image using the tag?

Options:

A.

$ docker build -p local/app:0.4

B.

$ docker run -t local/app:0.4

C.

$ docker run -p local/app:0.4

D.

$ docker build -t local/app:0.4

Buy Now
Questions 139

What does a load balancer distribute in a network environment?

Options:

A.

outgoing connections to the network

B.

incoming traffic across multiple servers

C.

different TCP connections to the routers

D.

traffic in the network by leveraging the switch architecture

Buy Now
Questions 140

Drag and drop the code snippets from the bottom to the blanks in the code to test the API response through the Python unittest library. Not all options are used.

200-901 Question 140

Options:

Buy Now
Exam Code: 200-901
Exam Name: DevNet Associate (DEVASC)
Last Update: Feb 27, 2025
Questions: 467

PDF + Testing Engine

$61.25  $174.99

Testing Engine

$47.25  $134.99
buy now 200-901 testing engine

PDF (Q&A)

$40.25  $114.99
buy now 200-901 pdf