Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Cisco 200-901 Dumps

Page: 1 / 47
Total 467 questions

DevNet Associate (DEVASC) Questions and Answers

Question 1

A developer plans to deploy a new application that will use an API to implement automated data collection from Webex with these requirements:

The application was created by using the request library.

Requires HTTP basic authentication.

Provides data in JSON or XML formats.

Which Cisco DevNet resource helps the developer with how to use the API?

Options:

A.

DevNet sandbox

B.

API documentation

C.

forums

D.

DevNet code exchange

Question 2

A developer attempts to refactor and improve the application code. It is noticed that the code contains several pieces of key information that could be a security threat if this code is accessible by those who are not

authorized to this data. Which approach addresses the security concerns noticed by the developer?

Options:

A.

Host the application code on a machine located in a secure data center.

B.

Utilize environment variables for username and password details.

C.

Rely on the security teams’ goodwill to not give access to those who do not need it.

D.

Move the hardware that the application is deployed on to a secure location.

Question 3

What is a feature of a MAC address?

Options:

A.

It consists of 6 hexadecimal numbers.

B.

It consists of 24 bits.

C.

It consists of 38 bits.

D.

It consists of 12 hexadecimal numbers.

Question 4

A developer must test the performance and reliability of an application. After functional and load tests are run, the application crashes due to traffic spikes from users. Which type of API constraint must be implemented to maintain reliability?

Options:

A.

rate limiting

B.

pagination

C.

payload limits

D.

filtering

Question 5

When a Cisco IOS XE networking device is configured by using RESTCONF, what is the default data encoding method?

Options:

A.

application/yaml-data+json

B.

application/yang-data+json

C.

application/xml-data+json

D.

application/json-data+xml

Question 6

as

Refer to the exhibit. A network engineer must configure new interfaces on a set of devices and is planning to use an Ansible playbook for the task. All devices support SSH and NETCONF protocol, and the interface variables are unique per device. In which directory are the YAML files including variables hosted to automate the task with the netconf_config module?

Options:

A.

current working directory

B.

host_vars directory

C.

group_vars directory

D.

home directory

Question 7

Why would a developer compare a current version of code to a previous version?

Options:

A.

to provide the single source of truth

B.

to troubleshoot code failures

C.

to track who made a change

D.

to aid in collaboration

Question 8

Which IP service synchronizes the time across devices?

Options:

A.

DNS

B.

NTP

C.

SNMP

D.

NAT

Question 9

Which two protocols are associated with the control plane on a network device? (Choose two.)

Options:

A.

BGP

B.

UDP

C.

SNMP

D.

FTP

E.

OSPF

Question 10

An engineer must run tests on several Cisco controllers. Due to the nature of the task, the infrastructure must be running at all times and have access to APIs. Which Cisco DevNet source must the engineer use?

Options:

A.

DevNet Learning Labs

B.

DevNet Code Exchange

C.

DevNet Sandbox

D.

DevNet API documentation

Question 11

as

Refer to the exhibit. A network engineer makes a RESTCONF API call to Cisco IOS XE to retrieve information. Which HTTP method and URL does the engineer use to make the ..call?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 12

What is a capability of model-driven programmability for infrastructure automation?

Options:

A.

compatibility with any networking device

B.

automatic version control

C.

generic APIs that are compatible with multiple platforms

D.

a single data model acr oss the network

Question 13

A customer's cloud services must:

Migrate services to another data center on demand.

Save the operational state of the machine on demand.

Support Windows and Linux GUIs.

Maximize hardware utilization.

Which type of deployment meets these requirements?

Options:

A.

bare metal

B.

container

C.

virtual machine

D.

Kubernetes

Question 14

as

Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer's account?

Options:

A.

The encoded credentials were available in the source code.

B.

The application was not encrypting the communication with the server.

C.

The credentials were encrypted in the source code.

D.

An SSL certificate was used instead of the TLS protocol to authenticate.

Question 15

Which protocol is used for clock synchronization between network devices?

Options:

A.

FTP

B.

NNTP

C.

BGP

D.

NTP

Question 16

What is a procedural component of CI/CD pipelines?

Options:

A.

Bundled artifacts must be generated.

B.

Every test must pass for the pipeline to continue its execution.

C.

Some tests fall without stopping the pipeline execution.

D.

The release label that identifies the build is optional.

Question 17

What is the purpose of Infrastructure as Code?

Options:

A.

to provide the ability of independent development process

B.

to manually configure and manage infrastructure at scale

C.

to apply new practices on the development process

D.

to use development engineering practices on the infrastructure

Question 18

Refer to the exhibit.

as

An engineer needs to retrieve all the organizations in a Cisco UCS Manager deployment. Drag and drop the code snippets from the bottom onto the blanks in.. Python script to print the information to standard output. Some options may be used more than once. Not all options are used.

as

Options:

Question 19

A lead engineer is managing the development of a web application with a team of remote developers using Git as the version control system. What is the advantage of a version Control system that allows developers to pick code from any part of the project and perform updates on it?

Options:

A.

efficient handling of projects

B.

linear development

C.

build automation

D.

nonlinear development

Question 20

A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing? The data contains sensitive information, so specialist encryption tools must be used to secure the data. Which application deployment model meets the requirements?

Options:

A.

edge

B.

private cloud

C.

public cloud

D.

hybrid cloud

Question 21

as

Refer to the exhibit. Drag and drop the actions from the left that the contents of this Dockerfile accomplish onto the right. Not all options are used.

as

Options:

Question 22

What is a characteristic of RPC APIs compared to REST APIs?

Options:

A.

Authentication is done over provisions for the service caller and vice versa for RPC API, and REST API uses HTTP headers for authentication.

B.

All communications between the client and server must be stateless for RPC API, and REST API is stateful.

C.

The architecture model for RPC API is resource-focused, and REST API is procedure-focused.

D.

The data payload must be in JSON format for RPC API, and REST API allows JSON and XML formats.

Question 23

as

Refer to the exhibit. Which code snippet represents the sequence.

Options:

A.

B.

C.

D.

Question 24

What is a benefit of a distributed version control system?

Options:

A.

encourages users to commit small places of work to the system more frequently

B.

ensures that all code meets minimum standards before being committed to the system

C.

allows users to work on the codebase even when not connected to the Internet

D.

ensures that all code is tested before being committed to the system

Question 25

Drag and drop the code snippets from the bottom onto the blanks in the code to complete the happy path scenario. Not all options are used.

as

Options:

Question 26

Which protocol runs over TCP port 830?

Options:

A.

NETCONF

B.

Telnet

C.

RESTCONF

D.

HTTP

Question 27

Which network device plane is responsible for handling QoS?

Options:

A.

management plane

B.

data plane

C.

configuration plane

D.

control plane

Question 28

What is a function of the default gateway in a network?

Options:

A.

to drop traffic that is destined to the default gateway

B.

to forward traffic to different subnets

C.

to forward traffic to the same subnet

D.

to drop traffic that is not destined to the default gateway

Question 29

Which TCP port is used to connect to a network device by using Telnet?

Options:

A.

23

B.

69

C.

400

D.

830

Question 30

Refer to the exhibit.

as

A network engineer must improve the fabric discovery process in a data center. The engineer wants to check current ACI scripts in the myproject repository and clone them to a folder named aci. The engineer will optimize the scripts from the new folder. Which command performs this task on the Git repository?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 31

Drag and drop the code from the bottom onto the box where the code is missing to complete the error path scenario. Not all options are used.

as

Options:

Question 32

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

as

Options:

Question 33

What is a capability of the AXL API?

Options:

A.

It signs a user in to a phone that is configured for extension mobility.

B.

It pulls logs for the Cisco Tomcat service.

C.

It authenticates users who exist in Cisco Unified Communications Manager.

D.

It provides support for HTTP and HTTPS communications.

Question 34

What is a capability of Ansible playbooks?

Options:

A.

They execute scheduled tasks regularly.

B.

They define the state for a device configuration.

C.

They collect SNMP logs from networking devices.

D.

They utilize the target device agent to execute.

Question 35

A developer has experienced security issues with a previously developed application. The API offered by that application is open and without any constraints. During a recent attack, the application was overloaded with API requests. To address this issue, an API constraint is implemented to protect the application from future attacks or any sudden throttling. Which API constraint must the application developer implement in this situation?

Options:

A.

pagination

B.

rate limiting

C.

filtering

D.

payload limiting

Question 36

Drag and drop the API characteristics from the left onto the categories on the right.

as

Options:

Question 37

A developer pushes an application to production. The application receives a webhook over HTTPS without a secret. The webhook information contains credentials to service in cleartext. When the information is received, it is stored in the database with an SHA-256 hash. Credentials to the database are accessed at runtime through the use of a vault service. While troubleshooting, the developer sets the logging to debug to view the message from the webhook. What is the security issue in this scenario?

Options:

A.

Database credentials should be accessed by using environment variables defined at runtime.

B.

During the transport of webhook messages, the credentials could be unencrypted and leaked.

C.

During logging, debugging should be disabled for the webhook message.

D.

Hashing the credentials in the database is not secure enough; the credentials should be encrypted.

Question 38

To which stage of development do Infrastructure as Code principles relate?

Options:

A.

manual configuration

B.

service provisioning

C.

physical deployment

D.

requirement collection

Question 39

as

Refer to the exhibit. Which HTTP code is returned after the RESTCONF query is executed?

Options:

A.

201

B.

204

C.

302

D.

304

Question 40

Refer to the exhibit.

as

Options:

A.

It deletes some device configurations.

B.

It deletes all the device configurations.

C.

It shuts off the device.

D.

It adds a new device configuration

Question 41

A developer writes an application that refines data in temporary secure file storage hosted on the public cloud. Data will be deleted after processing and does not contain any private information. What is the advantage that a public cloud deployment provides to the developer?

Options:

A.

high security with encryption

B.

ease in infrastructure management

C.

flexible development

D.

bespoke services

Question 42

as

Refer to the exhibit. A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?

Options:

A.

cp ./PROD/current.txt ./TEST/config.txt

B.

cp ./TESTi/current.txt ./PROD/config.txt

C.

cp ./PROD/config.txt ./TEST/current.txt

D.

cp ./TEST/config.txt ./PROD/current.txt

Question 43

Which HTTP error code series relates to redirection?

Options:

A.

400

B.

500

C.

200

D.

300

Question 44

An engineer deploys a Cisco CSR 1000 V instance to a virtual machine. The engineer must output the device configuration in JSON format. Which protocol is used for this task?

Options:

A.

YANG

B.

NETCONF

C.

SNMP

D.

RESTCONF

Question 45

A developer checks the performance of a web application. The application is in the local data center and uses a REST-based API. Based on the API logs, it is discovered that many its abandon API requests. Also, the response is taking too long to get back. What is the reason for this issue?

Options:

A.

Pagination is not implemented

B.

Token-based authentication is enabled.

C.

Rate limiting is not implemented.

D.

Token-based authentication is disabled

Question 46

as

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to return the number of interfaces on a network device by using the Cisco DNA Center SDK. Not all options are used.

as

Options:

Question 47

as

Refer to the exhibit. A developer creates a Python script by using the Cisco Meraki API. The solution must:

• Obtain a list of HTTP servers for a network named "netl".

• Print the response body if the HTTP status code is 200.

• Handle the timeout requests as exceptions, and print Timeout Error next to the exception to stdout.

Which block of code completes the script?

A)

as

B)

as

Options:

A.

Option A

B.

Option B

Question 48

Which response status code is used by a RESTful interface to indicate successful execution of a request?

Options:

A.

200

B.

404

C.

405

D.

500

Question 49

Which two types of NAT are used in a network? (Choose two.)

Options:

A.

Static NAT

B.

Normal NAT

C.

Multicast NAT

D.

Dynamic NAT

E.

Router NAT

Question 50

Refer to the exhibit.

as

What caused the error in this API request?

Options:

A.

The API resource does not support the POST operation.

B.

The API resource does not support JSON format payloads.

C.

The submitted JSON payload includes a field that is not supported by the API resources.

D.

The submitted JSON payload has a formatting issue.

Question 51

Refer to the exhibit.

as

What is represented in this YANG module?

Options:

A.

interface management

B.

topology

C.

BGP

D.

OpenFlow

Question 52

What are the two purposes for using a VLAN in a network? (Choose two)

Options:

A.

It is used to create the routing table.

B.

It creates a collection of MAC addresses.

C.

It is used for VM network traffic.

D.

It segments a network.

E.

It creates a broadcast domain.

Question 53

Which two protocols are used to apply a configuration change on a Cisco IOS XE device? (Choose two)

Options:

A.

CCX

B.

RESTCONF

C.

NETCONF

D.

HSRP

E.

CDP

Question 54

Which way should be used to safely the API keys?

Options:

A.

In an environment variable unique to the system database

B.

Encrypted in a configuration file that is separate from the code

C.

Encrypted in the code in a function

D.

Plain text in the code as a constant

Question 55

Which device is used to transport traffic from one broadcast domain to another broadcast domain?

Options:

A.

load balancer

B.

layer 2 switch

C.

router

D.

proxy server

Question 56

Which task is performed because the test-driven development approach is being used?

Options:

A.

testing existing software before developing new code

B.

refactoring code that is covered by existing tests

C.

writing code without committing any coding violations

D.

creating test scenarios based on continuous development

Question 57

Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?

Options:

A.

OAuth must be used.

B.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

C.

Basic authentication must be used.

D.

No authentication is required.

Question 58

What is a tenet of test-driven development?

Options:

A.

write documentation for tests

B.

write tests after adding new blocks of code

C.

write and run tests before writing new code

D.

run tests after writing new code

Question 59

Which two query types does a client make to a DNS server? (Choose Two)

Options:

A.

AAAA

B.

ACK

C.

DISCOVER

D.

Inverse

E.

PTR

Question 60

Which model-driven programmability protocol does Cisco IOS XE Software support?

Options:

A.

CORBA

B.

SSH

C.

gNMI

D.

SOAP

Question 61

What are two advantages of the Model-view-controller software design pattern? (Choose two.)

Options:

A.

simplifies network automation

B.

allows for multiple views of the same model

C.

makes code easier to deploy using Cl/CD pipelines

D.

reduces need for error handling

E.

separates responsibilities of the code, which makes future modifications easier

Question 62

What is the purpose of a firewall in application deployment?

Options:

A.

adds TLS support to an application that does not support it natively

B.

forwards traffic to a pool of instances of the application

C.

provides translation for an application's hostname to its IP address

D.

limits traffic to only ports required by the application

Question 63

Refer to the exhibit.

as

What is the action of the Bash script that is shown?

Options:

A.

The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory.

B.

The script goes into the directory called “$ndir” and makes a new directory called “$ndir”

C.

The script waits unit input is entered, then it goes into the directory entered and creates a new directory with the same name.

D.

For all directories in the current folder. The script goes into directory and makes a new directory.

Question 64

What is used in Layer 2 switches to direct packet transmission to the intended recipient?

Options:

A.

spanning tree

B.

IPv4 address

C.

IPv6 address

D.

MAC address

Question 65

Drag and Drop the Bash commands from the left onto the correct actions on the right.

as

Options:

Question 66

Drag and drop the function on the left onto the type of plane that handles the function on the right.

as

Options:

Question 67

Refer to the exhibit.

as

The output of a unified diff when comparing two versions of a python script is shown. Which two “single_request _timeout ()”

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 68

How does requesting a synchronous API operation differ from requesting an asynchronous API operation?

Options:

A.

clients poll for the status of the execution of operations

B.

clients subscribe to a webhook for operation results

C.

clients can access the results immediately

D.

clients receive responses with a task id for further processing

Question 69

Drag and drop the Python code from the left onto the correct step on the right to call a REST API.

as

Options:

Question 70

What is the purpose of the Cisco VIRL software tool?

Options:

A.

To verify configurations against compliance standards

B.

To simulate and model networks

C.

To automate API workflows

D.

To test performance of an application

Question 71

Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.

as

Options:

Question 72

Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)

Options:

A.

An artifact repository allows to compare and merge changes in the source code of files involved in a build process.

B.

An artifact repository is needed only for CI/CD pipeline executed on a public cloud infrastructure.

C.

An artifact repository provides traceability, search, and management of binary files.

D.

An artifact repository is needed only for managing open source software.

E.

An artifact repository stores files needed and generated during the build process.

Question 73

What are two advantages of YANG-based approaches for infrastructure automation? (Choose two.)

Options:

A.

directly maps to JavaScript

B.

multi-platform vendor abstraction

C.

designed to reflect networking concepts

D.

compiles to executables that run on network devices

E.

command line driven interface

Question 74

Refer to the exhibit.

as

Fill in the blank to complete the query parameter and value so that the result set is returned in reverse chronological order (most recent first) based on when message were entered.

as

Options:

Question 75

Which two NETCONF operations cover the RESTCONF GET operation? (Choose two.)

Options:

A.

B.

C.

D.

E.

Question 76

An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device mut be at fault?

Options:

A.

Laptop on which the script is running

B.

Router

C.

Switch

D.

Load balancer

Question 77

Which description of a default gateway if true?

Options:

A.

It is a device that receives IP packets that have no explicit next-hop in the routing table.

B.

It is a feature that translates between public and private addresses.

C.

It is a security feature that denies certain traffic.

D.

It is a device that receives Layer 2 frames with an unknown destination address.

Question 78

Refer to the exhibit.

as

Drag and drop the variables from the left onto the item numbers on the right that match the missing assignments in the exhibit.

as

Options:

Question 79

Which service provides a directory lookup for IP addresses and host names?

Options:

A.

DNS

B.

DHCP

C.

SNMP

D.

NAT

Question 80

Fill in the blanks to complete the Python script to update the Webex Teams membership of a room using the Python requests library import requests

as

Options:

Question 81

Which network device monitors incoming and outgoing traffic and decides whether to allow or block specific traffic based on a defined set of rules?

Options:

A.

switch

B.

load balancer

C.

reverse proxy

D.

firewall

Question 82

Refer to the exhibit.

as

What caused the error in this API request?

Options:

A.

The API resource does not support the POST operation

B.

The API resource does not support JSON format payloads.

C.

The submitted JSON payload includes a field that is not supported by the API resource.

D.

The submitted JSON payload has a formatting issue

Question 83

Which principle is a value from the manifesto for Agile software development?

Options:

A.

adhering to a plan over responding to requirements

B.

detailed documentation over working software

C.

processes and tools over teams and inter actions

D.

customer collaboration over contract negotiation

Question 84

Fill in the blanks to complete the statement.

Given a username of “devnet” And a password “Cisco123”, applications must create a base64 encoding of the string” ____________ ” when sanding HTTP requests to an API that uses _______________ authentication.

Options:

Question 85

A developer is writing an application that a REST API and the application requires a valid from the API which element of the response is used in the conditional check?

Options:

A.

URL

B.

Status code

C.

Link

D.

Body

E.

Headers

Question 86

Which two statements describe the advantages of using a version control system? (Choose two.)

Options:

A.

It allows for branching and merging so that different tasks are worked on in isolation before they are merged into a feature or master branch.

B.

It allows multiple engineers to work against the same code and configuration files and manage differences and conflicts.

C.

It provides tooling to automate application builds and infrastructure provisioning.

D.

It allows developers to write effective unit tests.

E.

It provides a system to track User Stories and allocate to backlogs.

Question 87

Refer to the exhibit.

as

as

The python interpreter and the Cisco python SDK are available by default in the Cisco NX-OS software. The SDK documentation shows how the cild() API can be used when working with working with JSON and XML. What are two effect of running the script? (Choose two.)

Options:

A.

configure interlace loopback 5

B.

issue shutdown on interface loopback 5

C.

show only the interfaces In the up status

D.

show only the interfaces in admin shut status

E.

show details for the TABLE interface

Question 88

Drag and drop the Docker file instructions from the onto correct descriptions on the right. Not all options are used.

as

Options:

Question 89

Users cannot access a webserver and after the traffic is captured, the capture too* shows an ICMP packet that reports "communication administratively prohibited" What Is the cause of this webserver access Issue?

Options:

A.

An access list along the path is blocking the traffic

B.

The traffic is not allowed to be translated with NAT and dropped.

C.

Users must authenticate on the webserver to access It

D.

A router along the path is overloaded and thus dropping traffic

Question 90

What is the Git command to delete a local branch named “experiment” without a warning?

Options:

A.

git branch –n experiment

B.

git branch –rm experiment

C.

git branch –f experiment

D.

git branch –D experiment

Question 91

Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose two.)

Options:

A.

Cisco Intersight API interactions can be encoded in XML or JSON and require an APIs key in the HTTP header for authentication.

B.

USC Director API interactions can be XML- or JSON-encoded and require an APLs key in the HTTP header for authentication.

C.

UCS manager API interactions are XML-encoded and require a cookie in the method for authentication.

D.

Cisco Intersight uses XML to encoded API interactions and requires an API key pair for authentication.

E.

UCS manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the HTTP header for authentication.

Question 92

Which detail is included in a routing table?

Options:

A.

IP protocol

B.

Broadcast address

C.

TCP or UDP port number

D.

Destination next hop or outgoing interface

Question 93

Refer to the exhibit.

as

What is the function of the python script?

Options:

A.

Count and print the total number of available devices.

B.

Iterate over a list of network devices and write all device names and management IP addresses to an output file.

C.

Iterate over a list of network devices and write all device type and associated management IP address.

D.

For each device that is returned, display the device and, for each device, print the device name and management IP address.

E.

Loop through the returned list of network devices and, for each device, print the device name management IP address.

Question 94

Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.)

Options:

A.

Processor

B.

Codec

C.

Listener

D.

Receiver

E.

Transaction monitor

Question 95

In test-driven development, what are two of the green bar patterns? (Choose two.)

Options:

A.

another test

B.

break

C.

triangulate

D.

starter test

E.

fake it

Question 96

What does a load balancer distribute in a network environment?

Options:

A.

outgoing connections to the network

B.

incoming traffic across multiple servers

C.

different TCP connections to the routers

D.

traffic in the network by leveraging the switch architecture

Question 97

Which HTTP code group is issued when a request is received successfully, understood, and processed?

Options:

A.

2xx

B.

3xx

C.

4xx

D.

5xx

Question 98

How does a synchronous API request differ from an asynchronous API request?

Options:

A.

clients receive responses with a task id for further processing

B.

clients subscribe to a webhook for operation results

C.

clients are able to access the results immediately

D.

clients poll for the status of the execution of operations

Question 99

Why is refactoring done during test-driven development?

Options:

A.

to enable larger objects and longer methods

B.

to improve maintainability and readability

C.

to ensure that the previous uses of the objects are explained

D.

to ensure the duplication of essential code

Question 100

Refer to the exhibit.

as

A developer creates a script to obtain a list of devices by using the Cisco DNA Center API. The remote server authorizes the request only if an authentication token is supplied in the headers. A function named get_auth_token() must retrieve a valid token by using HTTP Basic Authentication. Which code must be added to complete the get_auth_token() function?

Options:

A.

resp = requests.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

B.

resp = requests.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json ()['Token']

return token

C.

resp = http.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

D.

resp = http.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

Question 101

Refer to the exhibit.

as

Which command, including arguments, is executed when the container starts?

Options:

A.

/bin/sh -c "/bin/sleep 30 && nginx -g 'daemon off;'"

B.

/bin/sh -c "/bin/sleep 10 && nginx -g 'daemon off;'"

C.

/bin/bash -c "/bin/sleep 30 && nginx -g 'daemon off;'"

D.

/bin/sh -c "/bin/sleep 30" && nginx -g 'daemon off;'

Question 102

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code,

which resource must be used to verify that the code works correctly?

Options:

A.

Cisco NX-OS SDK

B.

Cisco Learning Labs

C.

Cisco Code Exchange

D.

Cisco Modeling Labs

Question 103

as

Refer to the exhibit. A developer is creating a Python script to obtain a list of HTTP servers on a network named office_east by using the Cisco Meraki API. The request has these requirements:

• Must time out if the response is not received within 2 seconds.

• Must utilize client certificates and SSL certificate verification.

• Must utilize basic authentication that uses a username of admin and a password of cisco.

• Must save the response to an object named response.

Drag and drop the code snippets from the bottom onto the blanks in the code to meet the requirements. Not all options are used.

as

Options:

Question 104

Refer to the exhibit.

as

An engineer must configure a load balancer server. The engineer prepares a script to automate workflow by using Bash. The script install the nginx package, moves to the /optAtginx directory, and reads the sites M We (or further processing Based on the script workflow, which process is being automated within the loop by using the information mi sites txt?

Options:

A.

creating a new Me Based on template .conf in the /etc/ngin/sites_enabled directory for each lie in the sites txt file. and then changing the file execution permission.

B.

creating a Me per each the in sites txt with the information in template conf. creating a link for the previously created file. and then changing the ownership of the created files

C.

using the content of the file to create the template conf file. creating a Iink from the created file to the /etc/nginx/files.enabled. and then changing the file execution permissions.

D.

using the information in the file to create a set of empty files in the /etchginx/sites_enabled directory and then assigning the owner of the file.

Question 105

What is the function of IP address in networking?

Options:

A.

specifies the type of traffic that is allowed to roam on a network

B.

represents the unique ID that is assigned to one host on a network

C.

specifies resource's location and the mechanism to retrieve it

D.

represents a network connection on specific devices

Question 106

What are two considerations when selecting the "best route" for a network device to reach its destination? (Choose two.)

Options:

A.

MAC address

B.

metrics

C.

administrative distance

D.

IP address

E.

subnet mask

Question 107

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

as

Options:

Question 108

What is the difference between YAML and JSON data structure?

Options:

A.

YAML uses spaces; JSON uses parentheses

B.

YAML uses indentation; JSON uses brackets and braces

C.

YAML uses brackets and braces; JSON uses indentation

D.

YAML uses parentheses; JSON uses spaces

Question 109

Refer to the exhibit.

as

What do all the calls shown in the sequence diagram have in common?

Options:

A.

All the calls are optional.

B.

All the calls are asynchronous.

C.

All the calls are synchronous.

D.

All the calls depend on the catalog.

Question 110

What is a capability of the NETCONF protocol?

Options:

A.

allows Python scripts to be executed externally from a network device

B.

uses JSON to encode data in its content layer

C.

allows XML messages to be exchanged via the SSH protocol

D.

exposes a web-based interface

Question 111

Refer to the exhibit.

as

OWASP threat does this example demonstrate?

Options:

A.

Broken access control

B.

SQL injection

C.

Man-in-the-middle

D.

Cross-site-scripting

Question 112

Refer to the exhibit.

as

Which function does the EXPOSE line perform when building an image from this Dockerfile?

Options:

A.

Local port 8080 of the container that launched with this docker image is accessible from co-hosted containers and external clients.

B.

Local port 8080 is not reachable at all because no IP address is specified along with the EXPOSE command of the Dockerfile.

C.

Local port 8080 is accessible from other containers running on the same docker host as the container that launched with this docker image.

D.

Local port 8080 of the container that launched with this docker image is accessible to external clients.

Question 113

Refer to the exhibit.

as

A developer needs to automatically retrieve all of the messages of a Webex room with the roomld of

HY2l2Y292cGFyazovL3Vz397748444YjU5NjAtNTk0ZJ0xMWVhLTk0Mj". Using the Webex API documentation shown, drag and drop the code snippets from below onto the code to complete the Python script to list all of the messages in the room. Not all options are used.

as

Options:

Question 114

What are two benefits of using VLANs? (Choose two.)

Options:

A.

limits the devices that can join the network

B.

segments the broadcast domain

C.

extends the broadcast domain

D.

allows all network devices to be accessible from any host on the network

E.

enables the logical grouping of devices that belong to different Layer 2 devices

Question 115

How are load balancers used in modern application deployment?

Options:

A.

Allow traffic to continue as new compute units are brought up and old compute units are taken down.

B.

Allow http and https traffic to continue as old compute units are discontinued before new units are brought up.

C.

Turn off traffic and take down compute units, then update and bring the compute units back up.

D.

Bring up new compute units, test the compute units, and switch the traffic from old units to new units.

Question 116

How do XML and JSON compare regarding functionality?

Options:

A.

JSON natively supports arrays and XML does not natively support arrays.

B.

XML provides support for mapping data structures into host languages than JSON.

C.

XML provides more human readability than JSON.

D.

JSON provides support for data types than XML.

Question 117

Refer to the exhibit.

as

Which JSON snippet configures a new interface according to YANG model?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 118

Which protocol runs over TCP port 23?

Options:

A.

SSH

B.

NETCONF

C.

HTTP

D.

Telnet

Question 119

A new application is being developed with specific platform requirements. The platform and application deployment and the ongoing platform management must be fully automated. The application includes a large database component that has significant disk I/O requirements. Which application deployment type meets the requirements?

Options:

A.

Python virtual environment

B.

virtual machine

C.

bare metal

D.

container

Question 120

as

Refer to the exhibit. What does the load balancer enable in the network topology?

Options:

A.

hosted application to access Internet services

B.

external requests to be routed to the application servers

C.

workstations to access the Internet

D.

application to access the database server

Question 121

Drag and drop the code snippets from the bottom into the Python script to write API output to a csv file. Not all options are used.

as

Options:

Question 122

Refer to the exhibit.

as

An API call is constructed to retrieve the inventory in XML format by using the API. The response to the call is 401 Unauthorized. Which two headers must be added to the API call? (Choose two.)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Question 123

Which configuration management tool has an agentless capability?

Options:

A.

Chef

B.

Puppet

C.

Ansible

D.

CFEngine

Question 124

A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?

Options:

A.

git update

B.

git merge

C.

git add

D.

git rebase

Question 125

Drag and drop the code from the bottom onto the box where the code is missing in the Python script to complete a function to return all the clients on a network by using the Cisco Meraki Dashboard API. Not all options are used.

as

Options:

Question 126

Drag and drop the code from the bottom onto the box where the code is missing in the Bash script to complete the missing assignment.

as

Options:

Question 127

What is a benefit of a model-driven approach for infrastructure automation?

Options:

A.

enforces the generation of all automation scripts through the modeling environment

B.

provides a small learning curve and helps system administrators with limited coding experience

C.

ensures that system administrators gain a good understanding of coding and expand their experience and capabilities

D.

enables a user to understand a declarative language to translate the model into an actionable script

Question 128

A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:

$ docker tag 84fe411926287 local/app:0.4

Which command must be executed next to build the Docker image using the tag?

Options:

A.

$ docker build -p local/app:0.4

B.

$ docker run -t local/app:0.4

C.

$ docker run -p local/app:0.4

D.

$ docker build -t local/app:0.4

Question 129

What are two key capabilities of Cisco Finesse? (Choose two.)

Options:

A.

Finesse includes an RPC API that enables the development of custom gadgets.

B.

Agents access Finesse from a browser without needing to install or configure anything on the client machine.

C.

Finesse automatically collects telemetry data

D.

An OpenDNS utility is preconfigured and ready to use on Finesse.

E.

Gadget containers provide a seamless experience in a single user interface.

Question 130

Which advantage does the agile process offer compared to waterfall software development?

Options:

A.

to view the full scope of end-to-end work

B.

to have each phase end before the next begins

C.

to fix any issues at the end of the development cycle

D.

to add or update features with incremental delivery

Question 131

What are two properties of private IP addresses? (Choose two.)

Options:

A.

They can be used to access the Internet directly.

B.

They are more secure than public IP addresses.

C.

They are not globally unique.

D.

They can be repeated within the same local network.

E.

They are controlled globally by an IP address registry.

Question 132

as

Which data is specified in the response header?

Options:

A.

{

"id": "y123987jdkl". HTTP/1.1 200 OK

"status: "online",

"type": "switch"

}

B.

HTTP/1.1 200 OK

C.

''type'', ''switch''

D.

Content-Type

Question 133

Refer to the exhibit.

as

The output of the diff-u README.md-repo README.md command is shown. The original file was 165 lines long How many lines are in the edited copy of the file?

Options:

A.

162

B.

165

C.

172

D.

173

Question 134

What are two use cause where webhooks are effective? (Choose two.)

Options:

A.

Close a session with a web server after a specific amount of time.

B.

Filter out information from a response to an API call

C.

Change the response format or content type of an API call.

D.

Inform a previously defined chat channel after a deployment fate.

E.

Send an email to a customer of an online store after payment is complete

Question 135

Which implementation creates a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire?

Options:

A.

WLAN

B.

VLAN

C.

IPsec

D.

HSRP

Question 136

Refer to the exhibit.

as

A network engineer must manage the network devices. The engineer prepares a Python scripts to authenticate to the Cisco to DNA Center API and request a device list. The device request fails and returns errors code 401. Which action solves the problem?

Options:

A.

Update the API URL. which matched the API endpoint for device list.

B.

Send the request to another network in case there are reachability Issues.

C.

Send the Authentication header In the request with a valid configuration.

D.

Update the credentials that are already supplied and retry the request

Question 137

A developer is creating a script to interact with a REST API service which requires basic authentication. The credentials are "devnet:391665405" and the Base64 encoding of the credentials is "GV2bmV0dXNlcjpDaXNj=". Which payload and header combination must be used for authentication?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 138

Refer to the exhibit.

as

The script returns an output of 401. To use the supplied URL. an HTTP GET request must Be sent with an Authorization header. The header value is a BaseG4 encoded concatenation of the username and password. Which action must be taken to return an output of 200?

Options:

A.

Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication

B.

Modify the method from LOGIN to GET and supply the username ;password value as JSON payload

C.

Verify that the username and password values imported from the configuration file ate still valid.

D.

Insert an Authorization header with the values username password from the supplied configuration file.

Question 139

Which Cisco product provides malware and content filtering through DNS?

Options:

A.

Cisco ASA Firepower module

B.

Cisco AMP

C.

Cisco ISE

D.

Cisco Umbrella

Question 140

What is a requirement when authenticating a RESTCONF API session with a router that runs Cisco IOS XE Software?

Options:

A.

No authentication is required.

B.

OAuth must be used.

C.

Basic authentication must be used.

D.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

Page: 1 / 47
Total 467 questions