11.11 Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

200-901 DevNet Associate (DEVASC) Questions and Answers

Questions 4

A small company has 5 servers and 50 clients. What are two reasons an engineer should spilt this network into separate client and server subnets? (Choose two)

Options:

A.

Internet access to the servers will be denied on the router.

B.

A router will limit the traffic types between the clients and servers.

C.

Subnets will split domains to limit failures.

D.

A router will bridge the traffic between clients and servers.

E.

Subnets provide more IP address space for clients and servers.

Buy Now
Questions 5

Refer to the exhibit.

Drag and drop the descriptors from the left onto the correct parts of the API request and response on the right.

Options:

Buy Now
Questions 6

Which service provides a directory lookup for IP addresses and host names?

Options:

A.

DNS

B.

DHCP

C.

SNMP

D.

NAT

Buy Now
Questions 7

What are the two principles of an infrastructure as code environment? (Choose two)

Options:

A.

Complete complex systems must be able to be built from reusable infrastructure definitions.

B.

Environments must be provisioned consistently using the same inputs.

C.

Redeployments cause varying environment definitions.

D.

Service overlap is encouraged to cater for unique environment needs.

E.

Components are coupled, and definitions must be deployed for the environment to function.

Buy Now
Questions 8

Fill in the blanks to complete the python script to request a service ticket using the APIC-EM rest API for the user “devnetuser”.

Options:

Buy Now
Questions 9

: 19 DRAG DROP

Drag and drop the HTTP methods from the left onto their generally accepted corresponding create, read, update, and delete operations on the right.

Options:

Buy Now
Questions 10

Fill in the blanks to complete the statement.

Given a username of “devnet” And a password “Cisco123”, applications must create a base64 encoding of the string” ____________ ” when sanding HTTP requests to an API that uses _______________ authentication.

Options:

Buy Now
Questions 11

Refer to the exhibit.

Which python data structure does my_json contain?

Options:

A.

List

B.

Json

C.

Map

D.

Dict

Buy Now
Questions 12

What are two advantages of version control software? (Choose two.)

Options:

A.

It supports tracking and comparison of changes in binary formate files.

B.

It allows old versions of packaged applications to be hosted on the Internet

C.

It provides wiki collaboration software for documentation.

D.

It supports comparisons between revisions of source code files.

E.

It allows new team members to access the current code and history.

Buy Now
Questions 13

Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?

Options:

A.

OAuth must be used.

B.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

C.

Basic authentication must be used.

D.

No authentication is required.

Buy Now
Questions 14

Which platform has an API that be used to obtain a list of vulnerable software on user devices?

Options:

A.

Cisco Umbrella

B.

Cisco Firepower

C.

Cisco Identity Services Engine

D.

Cisco Advanced Malware Protection

Buy Now
Questions 15

Which two types of NAT are used in a network? (Choose two.)

Options:

A.

Static NAT

B.

Normal NAT

C.

Multicast NAT

D.

Dynamic NAT

E.

Router NAT

Buy Now
Questions 16

Refer to the exhibit.

What is the result of executing this Ansible playbook?

Options:

A.

The playbook copies a new start-up configuration to CISCO_ROUTER_01.

B.

The playbook backs up the running configuration of CISCO_ROUTER_01.

C.

The playbook backs up the start-up configuration of C1SCO_ROUTER_01.

D.

The playbook copies a new running configuration to CISCO_ROUTER_01.

Buy Now
Questions 17

Refer to the exhibit.

Fill in the blank to complete the query parameter and value so that the result set is returned in reverse chronological order (most recent first) based on when message were entered.

Options:

Buy Now
Questions 18

Which status code is used by a REST API to indicate that the submitted payload is incorrect?

Options:

A.

400

B.

403

C.

405

D.

429

Buy Now
Questions 19

Which platform is run directly using a hypervisor?

Options:

A.

bare metal systems

B.

containers

C.

virtual machines

D.

applications

Buy Now
Questions 20

Which model-driven programmability protocol does Cisco IOS XE Software support?

Options:

A.

CORBA

B.

SSH

C.

gNMI

D.

SOAP

Buy Now
Questions 21

Refer to the exhibit.

What is represented in this YANG module?

Options:

A.

interface management

B.

topology

C.

BGP

D.

OpenFlow

Buy Now
Questions 22

Which two NETCONF operations cover the RESTCONF GET operation? (Choose two.)

Options:

A.

B.

C.

D.

E.

Buy Now
Questions 23

Refer to the exhibit.

Which two statement describe the configuration of the Ansible script is run? (Choose two.)

Options:

A.

Traffic on port 0/2 and 0/3 is connected to port 0/6.

B.

Traffic from ports 0/2 to 0/5 can flow on port 0/1 due to the trunk.

C.

Traffic can flow between ports 0/2 to 0/5 due to the trunk on port 0/1.

D.

GigabitEthernet0/2 and GigabitEthernet0/3 are access ports for VLAN 6.

E.

GiabitEthernet0/1 is left unconfigured.

Buy Now
Questions 24

Which two use cases are supported by Meraki APIs? (Choose two.)

Options:

A.

Retrieve live streams from a Meraki Camera.

B.

Build a custom Captive Portal for Mobile Apps.

C.

Configure network devices via the Dashboard API.

D.

Build location-aware apps from Wi-Fi and LoRaWAN devices.

E.

Deploy applications onto the devices.

Buy Now
Questions 25

Which type of threat occur when an attacker can send hostile data to an interpreter within an application?

Options:

A.

Cross-site scripting

B.

Sensitive data exposure

C.

Broken authentication

D.

Injection

Buy Now
Questions 26

A developer is reviewing a code that was written by a colleague. It runs fine, but there are many lines of code to do a seemingly simple task repeatedly. Which action organizes the code?

Options:

A.

Refactor the code by removing any unnecessary tests

B.

Using functions, rewrite any pieces of code that are repeated

C.

Reverse engineer and rewrite the code logic

D.

Modify the code to use loops

Buy Now
Questions 27

Which two statements describe the advantages of using a version control system? (Choose two.)

Options:

A.

It allows for branching and merging so that different tasks are worked on in isolation before they are merged into a feature or master branch.

B.

It allows multiple engineers to work against the same code and configuration files and manage differences and conflicts.

C.

It provides tooling to automate application builds and infrastructure provisioning.

D.

It allows developers to write effective unit tests.

E.

It provides a system to track User Stories and allocate to backlogs.

Buy Now
Questions 28

Refer to the exhibit.

Drag and drop the code from the left onto the item numbers on the right to complete to Meraki python script shown in the exhibit.

Options:

Buy Now
Questions 29

Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.

Options:

Buy Now
Questions 30

Refer to the exhibit.

What caused the error in this API request?

Options:

A.

The API resource does not support the POST operation

B.

The API resource does not support JSON format payloads.

C.

The submitted JSON payload includes a field that is not supported by the API resource.

D.

The submitted JSON payload has a formatting issue

Buy Now
Questions 31

What are two advantages of YANG-based approaches for infrastructure automation? (Choose two.)

Options:

A.

directly maps to JavaScript

B.

multi-platform vendor abstraction

C.

designed to reflect networking concepts

D.

compiles to executables that run on network devices

E.

command line driven interface

Buy Now
Questions 32

Drag and drop the functionalities from the left onto correct networking devices on the right.

Options:

Buy Now
Questions 33

What are the two purposes for using a VLAN in a network? (Choose two)

Options:

A.

It is used to create the routing table.

B.

It creates a collection of MAC addresses.

C.

It is used for VM network traffic.

D.

It segments a network.

E.

It creates a broadcast domain.

Buy Now
Questions 34

Which device is used to transport traffic from one broadcast domain to another broadcast domain?

Options:

A.

load balancer

B.

layer 2 switch

C.

router

D.

proxy server

Buy Now
Questions 35

How does requesting a synchronous API operation differ from requesting an asynchronous API operation?

Options:

A.

clients poll for the status of the execution of operations

B.

clients subscribe to a webhook for operation results

C.

clients can access the results immediately

D.

clients receive responses with a task id for further processing

Buy Now
Questions 36

When a Cisco IOS XE networking device is configured using RESTCONF, what is the default data-encoding method?

Options:

A.

XML

B.

x-form-encoding

C.

YANG

D.

YAML

Buy Now
Questions 37

On which network plane is routing protocol traffic handled?

Options:

A.

data plane

B.

management plane

C.

authentication plane

D.

control plane

Buy Now
Questions 38

Refer to the exhibit.

The python interpreter and the Cisco python SDK are available by default in the Cisco NX-OS software. The SDK documentation shows how the cild() API can be used when working with working with JSON and XML. What are two effect of running the script? (Choose two.)

Options:

A.

configure interlace loopback 5

B.

issue shutdown on interface loopback 5

C.

show only the interfaces In the up status

D.

show only the interfaces in admin shut status

E.

show details for the TABLE interface

Buy Now
Questions 39

What is a function of the default gateway in a network?

Options:

A.

to drop traffic that is destined to the default gateway

B.

to drop traffic that is not destined to the default gateway

C.

to forward traffic to the same subnet

D.

to forward traffic to different subnets

Buy Now
Questions 40

Refer to the exhibit.

What is the value of the node defined by this YANG structure?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 41

What is a tenet of test-driven development?

Options:

A.

write documentation for tests

B.

write tests after adding new blocks of code

C.

write and run tests before writing new code

D.

run tests after writing new code

Buy Now
Questions 42

Which is an advantage of using network programmability?

Options:

A.

It removes CLI access for devices.

B.

It provides for more scalable and replicable network provisioning.

C.

Manual configuration is faster.

D.

No cloud abstraction occurs.

Buy Now
Questions 43

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. Not all options are used.

Options:

Buy Now
Questions 44

Which action does the Git command git merge allow the development to perform?

Options:

A.

Combine multiple sequence of commits into one unified history.

B.

Push changes to the remote repository

C.

Switch between branches

D.

Create, list, rename, and delete branches

Buy Now
Questions 45

How is a branch called "my-bug-fix" started to develop a fix needed in a product?

Options:

A.

git branch -b my-bug-fix

B.

git checkout -b my-bug-fix

C.

git checkout my-bug-fix

D.

git branch my-bug-fix

Buy Now
Questions 46

Refer to the exhibit.

Which OWASP threat does this example demonstrate?

Options:

A.

broken access control

B.

SQL injection

C.

man-in-the-middle

D.

cross-site scripting

Buy Now
Questions 47

Refer to the exhibit.

Given the API documentation for the UCS SDK python class, UcsHandle, which code snippet creates a handle instance?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 48

Which platform has an API that has the capability to obtain a list of vulnerable software on user devices?

Options:

A.

Cisco Advanced Malware Protection

B.

Cisco Umbrella

C.

Cisco Identity Services Engine

D.

Cisco Firepower

Buy Now
Questions 49

Refer to the exhibit.

A collaboration engineer has developed a script to automate the gathering of information by providing the email address of the individual. When the engineer tests the script, a 401 error is received. Which command fixes the script?

Options:

A.

Add "Authorization": "Bearer <WEBEX_TOKEN>" to the headers

B.

Add "Authentication": "Basic <WEBEX_TOKEN>" in the base_url after "https://".

C.

Add "<Authorization>:<password>@" in the base_url after "https://".

D.

Add "Authentication": "Bearer <WEBEX TOKEN>" to the headers

Buy Now
Questions 50

Which Python function is used to parse a string that contains JSON data into a Python dictionary?

Options:

A.

json.dumps()

B.

json.to_json()

C.

json.parse()

D.

json.loads()

Buy Now
Questions 51

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script by using the Cisco SDK. Not all options are used.

Options:

Buy Now
Questions 52

Refer to the exhibit. A developer creates a Python script by using the Cisco Meraki API. The solution must:

• Obtain a list of HTTP servers for a network named "netl".

• Print the response body if the HTTP status code is 200.

• Handle the timeout requests as exceptions, and print Timeout Error next to the exception to stdout.

Which block of code completes the script?

A)

B)

Options:

A.

Option A

B.

Option B

Buy Now
Questions 53

Drag and drop the characteristics from the left onto the software development methodologies on the right.

Options:

Buy Now
Questions 54

Refer to the exhibit. Drag and drop the Dockerfile contents from the left onto the functions on the right that create a container image to run traceroute to track network path to specific targets. Not all options are used.

Options:

Buy Now
Questions 55

A team of developers is responsible for a network orchestration application in the company. The responsibilities also include:

developing and improving the application in a continuous manner

deployment of the application and management of CI/CD frameworks

monitoring the usage and problems and managing the performance improvements

Which principle best describes this DevOps practice?

Options:

A.

responsible for IT operations

B.

automation of processes

C.

end-to-end responsibility

D.

quality assurance checks

Buy Now
Questions 56

What is a capability of Cisco Webex?

Options:

A.

Join preconfigured or new spaces with fixed user rights.

B.

Configure devices at scale via automation scripts or by manual execution.

C.

Initiate or respond to calls automatically via automation.

D.

Get space history or notified in real time when new messages are posted.

Buy Now
Questions 57

A developer is attempting to retrieve all the messages from a Cisco Webex space. The server responds by sending the first 1,000 messages. The developer must make additional requests to retrieve the rest of the messages. Which API constraint is described in this scenario?

Options:

A.

payload limiting

B.

throttling

C.

pagination

D.

rate limiting

Buy Now
Questions 58

Drag and drop characteristics from the left onto the infrastructure management methodologies on the right.

Options:

Buy Now
Questions 59

What is a capability of model-driven programmability for infrastructure automation?

Options:

A.

compatibility with any networking device

B.

automatic version control

C.

generic APIs that are compatible with multiple platforms

D.

a single data model acr oss the network

Buy Now
Questions 60

Refer to the exhibit.

An engineer needs to retrieve all the organizations in a Cisco UCS Manager deployment. Drag and drop the code snippets from the bottom onto the blanks in.. Python script to print the information to standard output. Some options may be used more than once. Not all options are used.

Options:

Buy Now
Questions 61

Refer to the exhibit. Which HTTP code is returned after the RESTCONF query is executed?

Options:

A.

201

B.

204

C.

302

D.

304

Buy Now
Questions 62

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python script to retrieve a list of hosts using the Cisco DNA Center API. Not all options …used.

Options:

Buy Now
Questions 63

What is the purpose of Infrastructure as Code?

Options:

A.

to provide the ability of independent development process

B.

to manually configure and manage infrastructure at scale

C.

to apply new practices on the development process

D.

to use development engineering practices on the infrastructure

Buy Now
Questions 64

What is a feature of XML compared to other data formats?

Options:

A.

It uses tags to define the structure.

B.

It uses parenthesis for key-value pairs.

C.

It uses indentation to define the structure.

D.

It uses namespaces for list representation.

Buy Now
Questions 65

Drag and drop the code from the bottom onto the box where the code is missing to obtain a list of network devices by using the Cisco Meraki API. Not all options are used.

Options:

Buy Now
Questions 66

What is a comparison of YAML and JSON?

Options:

A.

YAML has a more consistent approach to representing data compared to JSON.

B.

JSON does not support comments and YAML does.

C.

YAML is a more verbose data structure compared to JSON.

D.

JSON has more common usage in configuration management tools compared to YAML.

Buy Now
Questions 67

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Options:

Buy Now
Questions 68

Which HTTP response code is returned from a successful REST API call to create a new resource?

Options:

A.

201

B.

204

C.

302

D.

429

Buy Now
Questions 69

Refer to the exhibit. Which code snippet represents the sequence.

Options:

A.

B.

C.

D.

Buy Now
Questions 70

Which function does a router provide to a network?

Options:

A.

broadcast domain segmentation

B.

unique host on a Layer 3 network

C.

unique hardware address for every node on a LAN

D.

broadcast domain extension

Buy Now
Questions 71

A company wants to automate the orders processed on its website using API. The network device that supports the solution must:

    support XML encoding

    support distributed transactions

    support YANG data models

    be support software redundancy

Which requirement prevents the use of RESTCONF for the solution?

Options:

A.

software redundancy

B.

YANG data models

C.

distributed transactions

D.

XML encoding

Buy Now
Questions 72

A developer has experienced security issues with a previously developed application. The API offered by that application is open and without any constraints. During a recent attack, the application was overloaded with API requests. To address this issue, an API constraint is implemented to protect the application from future attacks or any sudden throttling. Which API constraint must the application developer implement in this situation?

Options:

A.

pagination

B.

rate limiting

C.

filtering

D.

payload limiting

Buy Now
Questions 73

Refer to the exhibit.

An application must be deployed on a server that has other applications installed. The server resources are to be allocated based on the deployment requirements. The OS for each application must be independent. Which type of deployment is used?

Options:

A.

hybrid

B.

virtual machines

C.

containers

D.

bare metal

Buy Now
Questions 74

Which tool simulates a network that runs Cisco equipment?

Options:

A.

Cisco Prime Infrastructure

B.

VMware

C.

Docker

D.

CML

Buy Now
Questions 75

Which solution reduces costs from MPLS, improves application performance, and simplifies operations?

Options:

A.

Cisco NSO

B.

Cisco SD-WAN

C.

Cisco ACI

D.

Cisco DNA Center

Buy Now
Questions 76

What is the purpose of grouping devices in a VLAN?

Options:

A.

Devices communicate as if they are connected on the same wire.

B.

Multicast network traffic is limited to the VLAN connected devices.

C.

Unicast messages are limited to the clients connected on the same VLAN.

D.

Network traffic is load balanced between the devices connected to the VLAN.

Buy Now
Questions 77

Drag and drop the capabilities from the left onto the Cisco Network Management Platforms that support the capabilities on the right.

Options:

Buy Now
Questions 78

Users cannot access a webserver and after the traffic is captured, the capture tool snows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?

Options:

A.

The large distance between the server and the users means that the packets require too much time to reach the destination.

B.

A router along the path is misrouting the packets in a wrong direction.

C.

A router along the path has the wrong time.

D.

The server is overloaded and the connection was not able to be processed in time.

Buy Now
Questions 79

An engineer is creating an API to automatically obtain specific zones from Cisco Meraki MV cameras. The data that is provided when the API runs must represent the current analytic zones that are configured on the cameras. The API must start automatically at 6 p.m. every day and save the data on a server for further processing. Which part of the HTTP request must be configured to meet these requirements?

Options:

A.

request body with Status Code set to "302"

B.

request header with Content-Type set to "application/json"

C.

request header with Content-Encoding set to "application/xml"

D.

request body with Content-Type set to "application/xml"

Buy Now
Questions 80

Drag and drop the code from the bottom onto the box where the code is missing to present GigabilEthernet2 details in the XML format. Not all options are used.

Options:

Buy Now
Questions 81

Drag and drop the common API styles from the left onto the requirement on the right.

Options:

Buy Now
Questions 82

Which protocol is used for clock synchronization between network devices?

Options:

A.

FTP

B.

NNTP

C.

BGP

D.

NTP

Buy Now
Questions 83

Refer to the exhibit.

What does the command marked (2) do when it is run?

Options:

A.

It duplicates the test" branch.

B.

It deletes the "test" branch only if a new branch is created.

C.

It deletes the "test" branch.

D.

It does not delete the branch until it is merged.

Buy Now
Questions 84

To which stage of development do Infrastructure as Code principles relate?

Options:

A.

manual configuration

B.

service provisioning

C.

physical deployment

D.

requirement collection

Buy Now
Questions 85

What is an advantage of device-level management as compared to controller-level management to automate the configuration of network devices?

Options:

A.

Device-level management has access to all devices from a single point on the network and controller-level management does not.

B.

Device-level management supports all subsets of the potential device settings and controller-level management does not.

C.

Device-level management supports REST API-enabled devices and controller-level management does not.

D.

Device-level management requires one controller per vendor and controller-level management does not.

Buy Now
Questions 86

Drag and drop the characteristics from the left onto the corresponding categories on the right to compare RESTful and RPC APIs.

Options:

Buy Now
Questions 87

Refer to the exhibit.

Which type of YANG object is "interfaces"?

Options:

A.

node

B.

subitem

C.

item

D.

container

Buy Now
Questions 88

Which two commands download and execute an Apache web server container in Docker with a port binding 8080 in the container to 80 on the host? (Choose two.)

Options:

A.

docker pull apache

B.

docker run -p 8080:80 httpd

C.

docker run -p 80:8080 httpd

D.

docker pull httpd

E.

docker pull https

Buy Now
Questions 89

What is the purpose of running tests before writing code in test-driven development?

Options:

A.

to find unexpected failures in the tests

B.

to demonstrate that the tests fail for expected reasons

C.

to ensure that the tests pass

D.

to provide proof of the work carried out

Buy Now
Questions 90

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.

Options:

Buy Now
Questions 91

What is a component of the first stage of an application development CI/CD pipeline?

Options:

A.

developer writing the initial lines of code

B.

triggering of the automated build phase

C.

commitment and pushing of code into a version control system

D.

triggering of the automated testing phase

Buy Now
Questions 92

Refer to the exhibit.

An engineer is comparing two tiles by using the unified cliff format What is determined by the content in the file2.py file?

Options:

A.

Line 16 of file2.py is auth=HTTPBasicAuth(USERNAME. PASSWORD).

B.

Line 17 of file2.py is auth = HTTPBasicAuth{USERNAME. PASSWORD).

C.

Line 93 of file2.py is 'DEVICE-STATS'.

D.

Line 92 of file2.py is 'DEVICE-STATS'.

Buy Now
Questions 93

Refer to the exhibit.

What are two characteristics of the NETCONF response? (Choose two.)

Options:

A.

ospf is defined by the ietf-ospf module.

B.

ietf-ospf imports ietf-routing.

C.

redistribution is a module of type cisco-ospf.

D.

routing protocols is a list.

E.

The main module is routing.

Buy Now
Questions 94

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. The Python script retrieves a list of tasks from a to-do list for effective project management purposes. Not all options are used.

Options:

Buy Now
Questions 95

What does a load balancer distribute in a network environment?

Options:

A.

outgoing connections to the network

B.

incoming traffic across multiple servers

C.

different TCP connections to the routers

D.

traffic in the network by leveraging the switch architecture

Buy Now
Questions 96

What is a requirement when authenticating a RESTCONF API session with a router that runs Cisco IOS XE Software?

Options:

A.

No authentication is required.

B.

OAuth must be used.

C.

Basic authentication must be used.

D.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

Buy Now
Questions 97

Drag and drop the Dockerfile instructions from the left onto the descriptions on the right. Not at options are used.

Options:

Buy Now
Questions 98

What are two key capabilities of Cisco Finesse? (Choose two.)

Options:

A.

Finesse includes an RPC API that enables the development of custom gadgets.

B.

Agents access Finesse from a browser without needing to install or configure anything on the client machine.

C.

Finesse automatically collects telemetry data

D.

An OpenDNS utility is preconfigured and ready to use on Finesse.

E.

Gadget containers provide a seamless experience in a single user interface.

Buy Now
Questions 99

What are two benefits of model-driven programmability?

Options:

A.

model-driven APIs for abstraction and simplification

B.

single choice of transport, protocol, and encoding

C.

model-based, structured, and human friendly

D.

easier to design, deploy, and manage APIs

E.

models decoupled from transport, protocol, and encoding

Buy Now
Questions 100

Refer to the exhibit.

A network engineer must change the configuration on devices daily. The Python script must collect CLI arguments from the user, organize data according to the Cisco-IOS-XE-native YANG model, and utilize Cisco REST APIs to make the configuration. Which workflow is being automated by the Python script?

Options:

A.

updating an existing route on the device

B.

adding a new route to a device

C.

including a route on the device and overwriting the current routes

D.

deleting the route that is passed through the command-line variables

Buy Now
Questions 101

A developer needs a list of clients connected to a specific device in a Meraki network. After making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet resource should be used to identify the meaning of the response code?

Options:

A.

API documentation

B.

Sandbox

C.

Learning Labs

D.

Code Exchange

Buy Now
Questions 102

What is a benefit of organizing into modules?

Options:

A.

improves collaboration of the development team

B.

makes it easier to deal with large and complex systems

C.

enables the code to be broken down into layers

D.

enables the inclusion of more programming languages in the code

Buy Now
Questions 103

Refer to the exhibit. What does the load balancer enable in the network topology?

Options:

A.

hosted application to access Internet services

B.

external requests to be routed to the application servers

C.

workstations to access the Internet

D.

application to access the database server

Buy Now
Questions 104

What is the main purpose of a code review?

Options:

A.

To provide the technical lead visibility into all code

B.

To identify and review errors with the team

C.

To ensure that all code is checked in simultaneously

D.

To detect logical errors

Buy Now
Questions 105

Refer to the exhibit.

A developer creates a Python script that queries Cisco Webex. When the script is executed, a 401 code is returned. After troubleshooting, the developer discovers that the service is missing privileges. Which change to the header in line 4 of the script results in the code 200?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 106

A local Docker alpine image has been created with an image ID of a391665405fe and tagged as “latest”. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?

Options:

A.

docker build -p 8080:80 alpine:latest

B.

docker exec -p 8080:80 alpine:latest

C.

docker start -p 8080:80 alpine:latest

D.

docker run -p 8080:80 alpine:latest

Buy Now
Questions 107

What is the difference between YAML and JSON data structure?

Options:

A.

YAML uses spaces; JSON uses parentheses

B.

YAML uses indentation; JSON uses brackets and braces

C.

YAML uses brackets and braces; JSON uses indentation

D.

YAML uses parentheses; JSON uses spaces

Buy Now
Questions 108

Refer to the exhibit.

Which JSON snippet configures a new interface according to YANG model?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 109

Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)

Options:

A.

22

B.

23

C.

80

D.

443

E.

880

Buy Now
Questions 110

What is the purpose of a MAC address on a network device?

Options:

A.

unique network address that identifies the network interface of a device

B.

unique network interlace address that is provided by the DHCP server

C.

unique hardware address that identifies the network interface of a device

D.

unique hardware interface address that is provided by the central switch

Buy Now
Questions 111

Which HTTP response status code means “Forbidden”?

Options:

A.

500

B.

401

C.

403

D.

502

Buy Now
Questions 112

What is the purpose of the first three pairs of digits in a MAC address?

Options:

A.

defines a routing identifier for the client

B.

indicates the IP address of the client in Hex

C.

defines packet forwarding priority sent or received by the adapter

D.

indicates vendor of the network card or adapter

Buy Now
Questions 113

Which tool allows changes to the configuration management toolset to be tested?

Options:

A.

Cisco VIRL

B.

NAPALM

C.

Ansible

D.

pyATS

Buy Now
Questions 114

What are two use cause where webhooks are effective? (Choose two.)

Options:

A.

Close a session with a web server after a specific amount of time.

B.

Filter out information from a response to an API call

C.

Change the response format or content type of an API call.

D.

Inform a previously defined chat channel after a deployment fate.

E.

Send an email to a customer of an online store after payment is complete

Buy Now
Questions 115

Which advantage does the agile process offer compared to waterfall software development?

Options:

A.

to view the full scope of end-to-end work

B.

to have each phase end before the next begins

C.

to fix any issues at the end of the development cycle

D.

to add or update features with incremental delivery

Buy Now
Questions 116

What is a benefit of organizing code into modules?

Options:

A.

improves overall performance

B.

reduces the length of code

C.

enables code to be multifunctional

D.

enables the reuse of code

Buy Now
Questions 117

What are two benefits of using VLANs? (Choose two.)

Options:

A.

limits the devices that can join the network

B.

segments the broadcast domain

C.

extends the broadcast domain

D.

allows all network devices to be accessible from any host on the network

E.

enables the logical grouping of devices that belong to different Layer 2 devices

Buy Now
Questions 118

Which application should be used to externally access all applications deployed in the same host machine with a single public IP address and port, when each application listens on different local ports?

Options:

A.

reverse proxy

B.

load balancer

C.

DNS

D.

firewall

Buy Now
Questions 119

Refer to the exhibit.

Which two files are being edited in the unified diff? (Choose two.)

Options:

A.

README.md

B.

setup.py

C.

axl.py

D.

ciscoaxl.py

E.

index.py

Buy Now
Questions 120

A developer is creating a script to interact with a REST API service which requires basic authentication. The credentials are "devnet:391665405" and the Base64 encoding of the credentials is "GV2bmV0dXNlcjpDaXNj=". Which payload and header combination must be used for authentication?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 121

Drag and drop the code from the bottom onto the box where the code is missing in the Python script to complete a function to return all the clients on a network by using the Cisco Meraki Dashboard API. Not all options are used.

Options:

Buy Now
Questions 122

Refer to the exhibit.

Which command, including arguments, is executed when the container starts?

Options:

A.

/bin/sh -c "/bin/sleep 30 && nginx -g 'daemon off;'"

B.

/bin/sh -c "/bin/sleep 10 && nginx -g 'daemon off;'"

C.

/bin/bash -c "/bin/sleep 30 && nginx -g 'daemon off;'"

D.

/bin/sh -c "/bin/sleep 30" && nginx -g 'daemon off;'

Buy Now
Questions 123

Refer to the exhibit.

A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?

Options:

A.

enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

B.

enable_function(‘iana-if-type:softwareLoopback’, Loopback1, true,)

C.

def enable_function(‘iana-if-type:softwareLoopback’, Loopback1, false,)

D.

def enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

Buy Now
Questions 124

Refer to the exhibit. A developer is creating a Python script to obtain a list of HTTP servers on a network named office_east by using the Cisco Meraki API. The request has these requirements:

• Must time out if the response is not received within 2 seconds.

• Must utilize client certificates and SSL certificate verification.

• Must utilize basic authentication that uses a username of admin and a password of cisco.

• Must save the response to an object named response.

Drag and drop the code snippets from the bottom onto the blanks in the code to meet the requirements. Not all options are used.

Options:

Buy Now
Questions 125

What is a benefit of using functions in the code for the development process?

Options:

A.

better user experience in the end product

B.

improves code performance

C.

easier to compile the code

D.

fester code development

Buy Now
Questions 126

Drag and drop the code snippets from the bottom into the Python script to write API output to a csv file. Not all options are used.

Options:

Buy Now
Questions 127

Refer to the exhibit.

An engineer must check the admin rights of users on a database regularly and prepares

the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?

Options:

A.

They must be stored in configuration files if there is a possibility of leakage.

B.

They must be Base64-encoded if stored in the user database.

C.

They must be encrypted if stored in the user database.

D.

They must be stored in configuration files if no authentication will be used.

Buy Now
Questions 128

Where is an IP packet routed if the packet does not match any routes in the routing table?

Options:

A.

firewall

B.

load balancer

C.

central switch

D.

default gateway

Buy Now
Questions 129

In which two ways is an application characterized when interacting with a webhook? (Choose two.)

Options:

A.

codec

B.

receiver

C.

transaction monitor

D.

processor

E.

listener

Buy Now
Questions 130

In test-driven development, what are two of the green bar patterns? (Choose two.)

Options:

A.

another test

B.

break

C.

triangulate

D.

starter test

E.

fake it

Buy Now
Questions 131

A developer creates a script that configured multiple Cisco IOS XE devices in a corporate infrastructure. The internal test environment is unavailable, and no maintenance window is available to test on a low-priority production environment. Which resource is used to test the code before it is applied to the production environment?

Options:

A.

Code Exchange

B.

Cisco DevNet Learning Labs

C.

Cisco DevNet Sandbox

D.

Cisco Support

Buy Now
Questions 132

Refer to the exhibit.

An engineer must configure a load balancer server. The engineer prepares a script to automate workflow by using Bash. The script install the nginx package, moves to the /optAtginx directory, and reads the sites M We (or further processing Based on the script workflow, which process is being automated within the loop by using the information mi sites txt?

Options:

A.

creating a new Me Based on template .conf in the /etc/ngin/sites_enabled directory for each lie in the sites txt file. and then changing the file execution permission.

B.

creating a Me per each the in sites txt with the information in template conf. creating a link for the previously created file. and then changing the ownership of the created files

C.

using the content of the file to create the template conf file. creating a Iink from the created file to the /etc/nginx/files.enabled. and then changing the file execution permissions.

D.

using the information in the file to create a set of empty files in the /etchginx/sites_enabled directory and then assigning the owner of the file.

Buy Now
Questions 133

What is used in JSON to represent a Python Tuple?

Options:

A.

Object

B.

Array

C.

Dict

D.

Collection

Buy Now
Questions 134

Into which type of Python data structure should common data formats be parsed?

Options:

A.

sequence

B.

set

C.

dictionary

D.

list

Buy Now
Questions 135

Refer to the exhibit.

A developer creates a script to obtain a list of devices by using the Cisco DNA Center API. The remote server authorizes the request only if an authentication token is supplied in the headers. A function named get_auth_token() must retrieve a valid token by using HTTP Basic Authentication. Which code must be added to complete the get_auth_token() function?

Options:

A.

resp = requests.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

B.

resp = requests.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json ()['Token']

return token

C.

resp = http.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

D.

resp = http.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

Buy Now
Questions 136

Refer to the exhibit.

Which line must be included in the Bash script for the Python code to succeed?

Options:

A.

define WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

B.

export WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

C.

set WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

D.

WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

Buy Now
Questions 137

What is the function of IP address in networking?

Options:

A.

specifies the type of traffic that is allowed to roam on a network

B.

represents the unique ID that is assigned to one host on a network

C.

specifies resource's location and the mechanism to retrieve it

D.

represents a network connection on specific devices

Buy Now
Questions 138

How do XML and JSON compare regarding functionality?

Options:

A.

JSON natively supports arrays and XML does not natively support arrays.

B.

XML provides support for mapping data structures into host languages than JSON.

C.

XML provides more human readability than JSON.

D.

JSON provides support for data types than XML.

Buy Now
Questions 139

Refer to the exhibit.

Which device limits traffic between server 1 and server 2?

Options:

A.

Device B

B.

Device C

C.

Device D

D.

Device E

Buy Now
Questions 140

Refer to the exhibit.

A Python code has been written to query a device. The executed code results in the error shown. Which action resolves the problem?

Options:

A.

import json

B.

requests("GET", base_url + request_url, cookles=cookies)

C.

pip install requests

D.

import requests

Buy Now
Exam Code: 200-901
Exam Name: DevNet Associate (DEVASC)
Last Update: Nov 16, 2024
Questions: 467

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90