Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Cisco 200-901 DevNet Associate (DEVASC) Exam Practice Test

Page: 1 / 47
Total 467 questions

DevNet Associate (DEVASC) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36  $119.99
Question 1

What are two key capabilities of Cisco Finesse? (Choose two.)

Options:

A.

Finesse includes an RPC API that enables the development of custom gadgets.

B.

Agents access Finesse from a browser without needing to install or configure anything on the client machine.

C.

Finesse automatically collects telemetry data

D.

An OpenDNS utility is preconfigured and ready to use on Finesse.

E.

Gadget containers provide a seamless experience in a single user interface.

Question 2

Drag and drop the code snippets from the bottom to the blanks in the code to test the API response through the Python unittest library. Not all options are used.

Options:

Question 3

Refer to the exhibit.

The output of the diff-u README.md-repo README.md command is shown. The original file was 165 lines long How many lines are in the edited copy of the file?

Options:

A.

162

B.

165

C.

172

D.

173

Question 4

A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?

Options:

A.

git update

B.

git merge

C.

git add

D.

git rebase

Question 5

What is a requirement when authenticating a RESTCONF API session with a router that runs Cisco IOS XE Software?

Options:

A.

No authentication is required.

B.

OAuth must be used.

C.

Basic authentication must be used.

D.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

Question 6

Which Cisco platform provides organization-wide automation, security, policy enforcement, any agility across wired and wireless networks?

Options:

A.

Cisco ACI

B.

Cisco DNA Center

C.

Cisco Umbrella

D.

Cisco SD-WAN

Question 7

Refer to the exhibit.

A developer creates a script to obtain a list of devices by using the Cisco DNA Center API. The remote server authorizes the request only if an authentication token is supplied in the headers. A function named get_auth_token() must retrieve a valid token by using HTTP Basic Authentication. Which code must be added to complete the get_auth_token() function?

Options:

A.

resp = requests.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

B.

resp = requests.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json ()['Token']

return token

C.

resp = http.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

D.

resp = http.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

Question 8

A developer creates a script that configured multiple Cisco IOS XE devices in a corporate infrastructure. The internal test environment is unavailable, and no maintenance window is available to test on a low-priority production environment. Which resource is used to test the code before it is applied to the production environment?

Options:

A.

Code Exchange

B.

Cisco DevNet Learning Labs

C.

Cisco DevNet Sandbox

D.

Cisco Support

Question 9

How does a developer create and switch to a new branch called "my-bug-fix" to develop a product fix?

Options:

A.

git checkout -b my-bug-fix

B.

git branch -b my-bug-fix

C.

git branch my-bug-fix

D.

git checkout my-bug-fix

Question 10

What is a benefit of model-driven programmability?

Options:

A.

It addresses the static architecture of traditional networks being decentralized and complex.

B.

By modeling data, it ensures that vast quantities of data are usable for monitoring.

C.

It provides a programmatic and standards-based way of writing configurations to any network device.

D.

It simplifies management and operations by decoupling the networking hardware from its control mechanism.

Question 11

Which implementation creates a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire?

Options:

A.

WLAN

B.

VLAN

C.

IPsec

D.

HSRP

Question 12

Which Cisco product provides malware and content filtering through DNS?

Options:

A.

Cisco ASA Firepower module

B.

Cisco AMP

C.

Cisco ISE

D.

Cisco Umbrella

Question 13

What are two functions of a routing table on a network device? (Choose two.)

Options:

A.

It lists entries more than two hops away.

B.

It lists the routes to a particular destination.

C.

It lists the routes to drop traffic.

D.

It lists hosts that are one hop away.

E.

It lists the static and dynamic entries.

Question 14

Which tool is used to block all traffic to the domain by using a single API call?

Options:

A.

Cisco ISE

B.

Cisco Firepower

C.

Cisco AMP

D.

Cisco Umbrella

Question 15

Into which type of Python data structure should common data formats be parsed?

Options:

A.

sequence

B.

set

C.

dictionary

D.

list

Question 16

What are two considerations when selecting the "best route" for a network device to reach its destination? (Choose two.)

Options:

A.

MAC address

B.

metrics

C.

administrative distance

D.

IP address

E.

subnet mask

Question 17

What is a functionality of the Waterfall method as compared to the Agile method for software development?

Options:

A.

Waterfall increases agility to implement faster while Agile promotes reliability.

B.

A phase begins after the previous phase has ended in Waterfall while Agile phases run in parallel.

C.

Customers get feedback during the process in Waterfall while they can see the result at the end in Agile.

D.

Requirements can be updated in Waterfall while in Agile it should be gathered in the beginning.

Question 18

Drag and drop the code from the bottom onto the box where the code is missing in the Bash script to complete the missing assignment.

Options:

Question 19

Refer to the exhibit.

A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?

Options:

A.

compilation and configuration of the Cisco DevNet application so that it must be started manually

B.

compilation, installation, and configuration of the Cisco DevNet application so that it starts automatically

C.

compilation and installation of the Cisco DevNet application for an autonomous deployment model

D.

installation and configuration of the Cisco DevNet application so that it starts manually

Question 20

What is a capability of the NETCONF protocol?

Options:

A.

allows Python scripts to be executed externally from a network device

B.

uses JSON to encode data in its content layer

C.

allows XML messages to be exchanged via the SSH protocol

D.

exposes a web-based interface

Question 21

Which HTTP code group is issued when a request is received successfully, understood, and processed?

Options:

A.

2xx

B.

3xx

C.

4xx

D.

5xx

Question 22

Refer to the exhibit.

Which function does the EXPOSE line perform when building an image from this Dockerfile?

Options:

A.

Local port 8080 of the container that launched with this docker image is accessible from co-hosted containers and external clients.

B.

Local port 8080 is not reachable at all because no IP address is specified along with the EXPOSE command of the Dockerfile.

C.

Local port 8080 is accessible from other containers running on the same docker host as the container that launched with this docker image.

D.

Local port 8080 of the container that launched with this docker image is accessible to external clients.

Question 23

Which application should be used to externally access all applications deployed in the same host machine with a single public IP address and port, when each application listens on different local ports?

Options:

A.

reverse proxy

B.

load balancer

C.

DNS

D.

firewall

Question 24

How are load balancers used in modern application deployment?

Options:

A.

Allow traffic to continue as new compute units are brought up and old compute units are taken down.

B.

Allow http and https traffic to continue as old compute units are discontinued before new units are brought up.

C.

Turn off traffic and take down compute units, then update and bring the compute units back up.

D.

Bring up new compute units, test the compute units, and switch the traffic from old units to new units.

Question 25

Which data is specified in the response header?

Options:

A.

{

"id": "y123987jdkl". HTTP/1.1 200 OK

"status: "online",

"type": "switch"

}

B.

HTTP/1.1 200 OK

C.

''type'', ''switch''

D.

Content-Type

Question 26

A developer needs a list of clients connected to a specific device in a Meraki network. After making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet resource should be used to identify the meaning of the response code?

Options:

A.

API documentation

B.

Sandbox

C.

Learning Labs

D.

Code Exchange

Question 27

In the test-driven development model, what is changed after a test fails?

Options:

A.

test

B.

schedule

C.

project requirements

D.

code

Question 28

Refer to the exhibit.

An engineer must check the admin rights of users on a database regularly and prepares

the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?

Options:

A.

They must be stored in configuration files if there is a possibility of leakage.

B.

They must be Base64-encoded if stored in the user database.

C.

They must be encrypted if stored in the user database.

D.

They must be stored in configuration files if no authentication will be used.

Question 29

Refer to the exhibit.

A Python script must delete all Cisco Catayst 9300 Series switches that have an uptime that is greater than 90 days The script must also query for the status of all the other devices Drag and drop the code from the bottom onto the bottom box the code is missing to complete the script Not at options are used

Options:

Question 30

Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:

• MySQL database that stores data about customers

• HTML5 and JavaScript UI that runs on Apache

• REST API written in Python

What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)

Options:

A.

to enable multiple views of the same data to be presented to different groups of users

B.

to provide separation between the view and the model by ensuring that all logic is separated out into the controller

C.

to ensure data consistency, which requires that changes to the view are also made to the model

D.

to ensure that only one instance of the data model can be created

E.

to provide only a single view of the data to ensure consistency

Question 31

Refer to the exhibit.

A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?

Options:

A.

enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

B.

enable_function(‘iana-if-type:softwareLoopback’, Loopback1, true,)

C.

def enable_function(‘iana-if-type:softwareLoopback’, Loopback1, false,)

D.

def enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

Question 32

Refer to the exhibit.

A developer needs to upload a local file by using the REST API. The developer gathers information according to the documentation and sends the request by using the cURL command in the exhibit but gets an error code. Which action should be followed to get valid response?

Options:

A.

change content type as JSON

B.

add the authorization header with the access token

C.

add a username-password combination to request command

D.

change request method as GET

Question 33

Which HTTP response status code means “Forbidden”?

Options:

A.

500

B.

401

C.

403

D.

502

Question 34

What are two benefits of using VLANs? (Choose two.)

Options:

A.

limits the devices that can join the network

B.

segments the broadcast domain

C.

extends the broadcast domain

D.

allows all network devices to be accessible from any host on the network

E.

enables the logical grouping of devices that belong to different Layer 2 devices

Question 35

Which configuration management tool has an agentless capability?

Options:

A.

Chef

B.

Puppet

C.

Ansible

D.

CFEngine

Question 36

In test-driven development, what are two of the green bar patterns? (Choose two.)

Options:

A.

another test

B.

break

C.

triangulate

D.

starter test

E.

fake it

Question 37

Refer to the exhibit.

Drag and drop the code from the bottom onto the blanks in the code to construct a cURL command using the Cisco DNA Center API. which will provide the details of a WLAN controller with Id af397748444. Not at options are used.

Options:

Question 38

Refer to the exhibit.

A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?

Options:

A.

verifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages

B.

verifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version

C.

uninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version

D.

installing nginx, uninstalling apache2, and then verifying that the package repository is at the latest version

Question 39

Refer to the exhibit.

The documentation outlines how to use credentials for the AMP API Which script successfully performs an API call using basic authentication?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Question 40

Refer to the exhibit. What does the load balancer enable in the network topology?

Options:

A.

hosted application to access Internet services

B.

external requests to be routed to the application servers

C.

workstations to access the Internet

D.

application to access the database server

Question 41

Refer to the exhibit.

OWASP threat does this example demonstrate?

Options:

A.

Broken access control

B.

SQL injection

C.

Man-in-the-middle

D.

Cross-site-scripting

Question 42

Refer to the exhibit.

Which device limits traffic between server 1 and server 2?

Options:

A.

Device B

B.

Device C

C.

Device D

D.

Device E

Question 43

Refer to the exhibit.

A network engineer wants to use an API to update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which line of code needs to be placed in the snippet where the code is missing?

Options:

A.

{'Content-Type': 'application/yang.data+xml', 'Accept': 'application/yang.data

+xml'}

B.

{'Content-Type': 'application/yang.data+yaml', 'Accept': 'application/yang.data

+yaml'}

C.

{'Content-Type': 'application/restconf.data+json', 'Accept': 'application/

restconf.data+json'}

D.

{'Content-Type': 'application/yang.data+utf8', 'Accept': 'application/

restconf.data+utf8'}

Question 44

Drag and drop the code snippets from the bottom into the Python script to write API output to a csv file. Not all options are used.

Options:

Question 45

While developing a real-Time VoIP application on a Cisco Webex platform, users report that their voice gets chopped or parts of the conversation drop out. Which network constraint is impacting the application?

Options:

A.

latency

B.

jitter

C.

capacity

D.

delay

Question 46

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code,

which resource must be used to verify that the code works correctly?

Options:

A.

Cisco NX-OS SDK

B.

Cisco Learning Labs

C.

Cisco Code Exchange

D.

Cisco Modeling Labs

Question 47

What does a load balancer distribute in a network environment?

Options:

A.

outgoing connections to the network

B.

incoming traffic across multiple servers

C.

different TCP connections to the routers

D.

traffic in the network by leveraging the switch architecture

Question 48

What operation is performed with YANG model-driven programmability in NX-OS?

Options:

A.

configure a device with native and OpenConfig-based models

B.

send CLI commands to a device and retrieve output in JSON format

C.

run Linux commands natively on the device

D.

bootstrap a device that has a factory-default configuration

Question 49

Which REST architectural constraint indicates that no client context should be stored on the server between requests?

Options:

A.

stateless

B.

uniform interface

C.

cacheable

D.

client-server

Question 50

Which network device monitors incoming and outgoing traffic and decides whether to allow or block specific traffic based on a defined set of rules?

Options:

A.

switch

B.

load balancer

C.

reverse proxy

D.

firewall

Question 51

Refer to the exhibit.

The output of a unified diff when comparing two versions of a python script is shown. Which two “single_request _timeout ()”

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 52

What is the purpose of the Cisco VIRL software tool?

Options:

A.

To verify configurations against compliance standards

B.

To simulate and model networks

C.

To automate API workflows

D.

To test performance of an application

Question 53

Which platform is run directly using a hypervisor?

Options:

A.

Virtual

B.

Bare metal systems

C.

Containers

D.

Applications

Question 54

Refer to the exhibit.

Which OWASP threat does this example demonstrate?

Options:

A.

broken access control

B.

SQL injection

C.

man-in-the-middle

D.

cross-site scripting

Question 55

Refer to the exhibit.

What is the action of the Bash script that is shown?

Options:

A.

The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory.

B.

The script goes into the directory called “$ndir” and makes a new directory called “$ndir”

C.

The script waits unit input is entered, then it goes into the directory entered and creates a new directory with the same name.

D.

For all directories in the current folder. The script goes into directory and makes a new directory.

Question 56

What are two advantages of YANG-based approaches for infrastructure automation? (Choose two.)

Options:

A.

directly maps to JavaScript

B.

multi-platform vendor abstraction

C.

designed to reflect networking concepts

D.

compiles to executables that run on network devices

E.

command line driven interface

Question 57

A Company is looking for cloud deployment which will use the on-premise infrastructure, is user self-service, and easy to scale. Which cloud solution should be selected for these requirements?

Options:

A.

multi

B.

public

C.

private

D.

hybrid

Question 58

Which two use cases are supported by Meraki APIs? (Choose two.)

Options:

A.

Retrieve live streams from a Meraki Camera.

B.

Build a custom Captive Portal for Mobile Apps.

C.

Configure network devices via the Dashboard API.

D.

Build location-aware apps from Wi-Fi and LoRaWAN devices.

E.

Deploy applications onto the devices.

Question 59

Refer to the exhibit.

Fill in the blanks to complete the cURL command to the list of networks in the Meraki organization with an id of 384279060

Options:

Question 60

Which status code is used by a REST API to indicate that the submitted payload is incorrect?

Options:

A.

400

B.

403

C.

405

D.

429

Question 61

A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without error and the bundles are produced. However, when the script is run during business hours, report poor voice quality of phones calls. What explains this behavior?

Options:

A.

The application is running in the Voice VLAN and causes delays and jitter in the subnet.

B.

The speed and duplex settings in Cisco DNA Center are sot incorrectly, which causes the transfer to be too slow.

C.

9 The script is written in a low-level programming language where there is no memory safety. This causes a buffer overflow and disruption on the network.

D.

Generating the logs causes the CPU on the network controller to spike, which causes delays m forwarding the voice IP packets.

Question 62

Refer to Exhibit.

Which JSON is equivalent to the XML-encoded data.

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 63

Refer to the exhibit.

What is represented in this YANG module?

Options:

A.

interface management

B.

topology

C.

BGP

D.

OpenFlow

Question 64

Which two statements describe the traits of an asynchronous API call? (Choose two.)

Options:

A.

The order in which API calls return can be guaranteed

B.

A call to an API does not block the code, but rather it allows application processing to continue

C.

The end user can experience latency or performance lag while waiting for the API call to return

D.

Code execution blocks or waits for the call to an API to return.

E.

A callback function typically is used to process the response from an API call

Question 65

Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose two.)

Options:

A.

Cisco Intersight API interactions can be encoded in XML or JSON and require an APIs key in the HTTP header for authentication.

B.

USC Director API interactions can be XML- or JSON-encoded and require an APLs key in the HTTP header for authentication.

C.

UCS manager API interactions are XML-encoded and require a cookie in the method for authentication.

D.

Cisco Intersight uses XML to encoded API interactions and requires an API key pair for authentication.

E.

UCS manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the HTTP header for authentication.

Question 66

What is the Git command to delete a local branch named “experiment” without a warning?

Options:

A.

git branch –n experiment

B.

git branch –rm experiment

C.

git branch –f experiment

D.

git branch –D experiment

Question 67

Drag and drop the Python code from the left onto the correct step on the right to call a REST API.

Options:

Question 68

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. Not all options are used.

Options:

Question 69

Drag and drop the functionalities from the left onto correct networking devices on the right.

Options:

Question 70

When using the Bash shell, how it the output of the devnet command saved to a tile named “output.txt”?

Options:

A.

devnet & output.txt

B.

devnet > output.txt

C.

devnet < output.txt

D.

devnet I output.txt

Question 71

In python, which expression checks whether the script returns a success status code when the Requests library is used?

Options:

A.

response.status_code== requests.ok

B.

response.status_code== requests.codes.ok

C.

response.code== requests.codes.ok

D.

response.status_code ! == requests.codes.ok

Question 72

Refer to the exhibit.

Which python data structure does my_json contain?

Options:

A.

List

B.

Json

C.

Map

D.

Dict

Question 73

Fill in the blanks to complete the cURL command that invokes a RESTful API to retrieve a resource in JSON format using OAuth.

Options:

Question 74

Which type of threat occur when an attacker can send hostile data to an interpreter within an application?

Options:

A.

Cross-site scripting

B.

Sensitive data exposure

C.

Broken authentication

D.

Injection

Question 75

Refer to the exhibit.

A REST API retune this JSON output for a GET HTTP request, Which has assigned to a variable called “vegetables” Using python, which output is the result of this command?

Options:

A.

Lettuce

B.

Kiwi

C.

[‘kiwi’, ‘grape’]

D.

{‘color’: ‘green’, ‘items’: [‘kiwi’, ‘grape’]

Question 76

Refer to the exhibit.

A process on the host wants to access the service running inside this Docker container. Which port is used to make a connection?

Options:

A.

only outbound connections between 3000 and 5000 are possible

B.

port 3000

C.

any port between 3000 and 5000

D.

port 5000

Question 77

Which description of a default gateway if true?

Options:

A.

It is a device that receives IP packets that have no explicit next-hop in the routing table.

B.

It is a feature that translates between public and private addresses.

C.

It is a security feature that denies certain traffic.

D.

It is a device that receives Layer 2 frames with an unknown destination address.

Question 78

An application calls a REST API and expects a result set of more than 550 records, but each time the call is made, only 25 are returned. Which feature limits the amount of data that is returned by the API?

Options:

A.

pagination

B.

payload limit

C.

rate limiting

D.

service timeouts

Question 79

Refer to the exhibit.

What is the value of the node defined by this YANG structure?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 80

Which Cisco DevNet resource allows access to products in a development lab to explore, learn, and build application that use Cisco APLs?

Options:

A.

DevNet communities

B.

DevNet code Exchange

C.

DevNet Automation Exchange

D.

DevNet sandbox

Question 81

Refer to the exhibit.

The JSON data in the exhibit has been parsed and stored in a variable, “data”. What returns the value “172.16.0.11” ?

Options:

A.

data['items'][0]['host']['value']

B.

data['items']['1']['host']['value']

C.

data['items']['host'][1]

D.

data['items']['host']['value']

Question 82

Refer to the exhibit.

Drag and drop the code from the left onto the item numbers on the right to complete to Meraki python script shown in the exhibit.

Options:

Question 83

What are the two purposes for using a VLAN in a network? (Choose two)

Options:

A.

It is used to create the routing table.

B.

It creates a collection of MAC addresses.

C.

It is used for VM network traffic.

D.

It segments a network.

E.

It creates a broadcast domain.

Question 84

Refer to the exhibit.

OR

An administrator attempts to perform a GET using the Cisco IOS XE RESTOCNF API to return the hostname of a device. The sequence diagram illustrated the HTTP message observed. Which change to the API request resolves the issue?

Options:

A.

Add Content-Type HTTP header with 'application/yang-data+json' using –H ‘Content-Type: application/yang-data+json’.

B.

Use -u cisco: cisco instead of -u ‘cisco: cisco'.

C.

Change the request method from -X "GET” to- X’ POST”.

D.

Remove the -H ’Accept: application/yang-data^/son’ HTTP header because it is not required.

Question 85

Which two NETCONF operations cover the RESTCONF GET operation? (Choose two.)

Options:

A.

B.

C.

D.

E.

Question 86

Drag and drop the function on the left onto the type of plane that handles the function on the right.

Options:

Question 87

What is the purpose of a MAC address?

Options:

A.

To uniquely identify a router in a LAN

B.

To uniquely identify a network interface in a LAN

C.

To uniquely identify a device on the internet

D.

To uniquely identify a switch in a LAN

Question 88

Fill in the blanks to complete the statement.

Cisco DNA provide the capability to send an HTTP _______________ request to the API endpoint and receive the network __________ list in __________ format.

Options:

Question 89

On which port does NETCONF operate by default?

Options:

A.

23

B.

443

C.

822

D.

830

Question 90

Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.)

Options:

A.

Processor

B.

Codec

C.

Listener

D.

Receiver

E.

Transaction monitor

Question 91

what is an advantage of a version control system?

Options:

A.

forces the practice of trunk-based development

B.

prevents over-writing code or configuration files

C.

facilitates resolving conflicts when merging code

D.

ensures that unit tests are written

Question 92

Refer to the exhibit.

Drag and Drop the code from the bottom onto the box where the code is missing on the Meraki Python script to create a new network

Options:

Question 93

What is the purpose of a firewall in application deployment?

Options:

A.

adds TLS support to an application that does not support it natively

B.

forwards traffic to a pool of instances of the application

C.

provides translation for an application's hostname to its IP address

D.

limits traffic to only ports required by the application

Question 94

An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device mut be at fault?

Options:

A.

Laptop on which the script is running

B.

Router

C.

Switch

D.

Load balancer

Question 95

A team of developers is responsible for a network orchestration application in the company. The responsibilities also include:

developing and improving the application in a continuous manner

deployment of the application and management of CI/CD frameworks

monitoring the usage and problems and managing the performance improvements

Which principle best describes this DevOps practice?

Options:

A.

responsible for IT operations

B.

automation of processes

C.

end-to-end responsibility

D.

quality assurance checks

Question 96

Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.

Options:

Question 97

Drag and drop the API characteristics from the left onto the categories on the right.

Options:

Question 98

What is an advantage of device-level management as compared to controller-level management to automate the configuration of network devices?

Options:

A.

Device-level management has access to all devices from a single point on the network and controller-level management does not.

B.

Device-level management supports all subsets of the potential device settings and controller-level management does not.

C.

Device-level management supports REST API-enabled devices and controller-level management does not.

D.

Device-level management requires one controller per vendor and controller-level management does not.

Question 99

Which function does a router provide to a network?

Options:

A.

broadcast domain segmentation

B.

unique host on a Layer 3 network

C.

unique hardware address for every node on a LAN

D.

broadcast domain extension

Question 100

Drag and drop the capabilities from the left onto the Cisco Network Management Platforms that support the capabilities on the right.

Options:

Question 101

Which network component enables communication between broadcast domains?

Options:

A.

load balancer

B.

switch

C.

router

D.

firewall

Question 102

Drag and drop the functions from the left onto the networking devices on the right.

Options:

Question 103

Refer to the exhibit. Which action does the script perform?

Options:

A.

It queries user credentials from Cisco IOS XE devices.

B.

It retrieves device identification from Cisco DNA Center.

C.

It exports SSID information from Meraki dashboard.

D.

It collects group information from ACI.

Question 104

Refer to the exhibit. A script must output details of all the Cisco Meraki MS220-BP switches across all organizations and networks. Drag and drop the code snippets from the bottom onto the boxes in the code to complete the script. Not all options are used.

Options:

Question 105

A developer must test the performance and reliability of an application. After functional and load tests are run, the application crashes due to traffic spikes from users. Which type of API constraint must be implemented to maintain reliability?

Options:

A.

rate limiting

B.

pagination

C.

payload limits

D.

filtering

Question 106

Refer to the exhibit. An engineer must authorize a REST API call. The API password is "Cisco123!". Which Bash command must be placed in the code to authorize the call?

Options:

A.

mkdir API_PASSWORD=Cisco123!

B.

set API_PASSWORD=Cisco123!

C.

cp API_PASSWORD=Cisco123!

D.

export API_PASSWORD=Cisco123!

Question 107

Refer to the exhibit.

Options:

A.

It deletes some device configurations.

B.

It deletes all the device configurations.

C.

It shuts off the device.

D.

It adds a new device configuration

Question 108

Refer to the exhibit.

An engineer needs to retrieve all the organizations in a Cisco UCS Manager deployment. Drag and drop the code snippets from the bottom onto the blanks in.. Python script to print the information to standard output. Some options may be used more than once. Not all options are used.

Options:

Question 109

An engineer must review and clean up a code repository. During the review, the engineer finds a file named config.json that contains API URLs, shared keys, and other application configurations. Which two methods, according to best practice, must be used to protect secrets? (Choose two.)

Options:

A.

Store in plaintext if they are not stored in a code repository.

B.

Store as plaintext when the server is secured physically.

C.

Never appear in plaintext at rest or in transit.

D.

Make them long, secure strings that include numbers with special characters.

E.

Always store in a secure vault.

Question 110

A developer plans to deploy a new application that will use an API to implement automated data collection from Webex with these requirements:

The application was created by using the request library.

Requires HTTP basic authentication.

Provides data in JSON or XML formats.

Which Cisco DevNet resource helps the developer with how to use the API?

Options:

A.

DevNet sandbox

B.

API documentation

C.

forums

D.

DevNet code exchange

Question 111

Refer to the exhibit. The YAML shown contains an object "param0" that is equal to "Workflow1", a second object "param1" that contains an object called "list" which contains an array of two objects, "name" (equal to "VLAN_ID") and "value" (equal to a text value "198"), and finally a third object "param2" that is equal to "0". What is the equivalent message in JSON data format?

Options:

A.

B.

C.

D.

Question 112

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python script to retrieve a list of network devices from Cisco DNA Center. Not all options are used.

Options:

Question 113

Refer to the exhibit. An engineer is comparing two files by using the unified diff format. Which cade snippet belongs to the new.py file?

Options:

A.

B.

C.

D.

Question 114

A resource named /item is protected by oAuth2 authentication. An endpoint named /login must request authentication. Which method must be used to access the resource by using the REST API?

Options:

A.

Make a GET call to /login that includes the username and password, and retrieve a token to insert into the /item call.

B.

Make a POST call to /login including the user credentials in the message, and retrieve a token to insert into the authorization header of the /item call.

C.

Make a GET call to /item, then make a call to /login that includes the username and password in the body of the message, and wait for the authorization code.

D.

Make a POST call to /item that includes the username and password in the body of the request message, and submit it to request access.

Question 115

A developer has addressed a bug that was found in the production code of an application. A separate file named ‘bug427896191v_fix” has been created with the changes to the code. Which Git command must be used to incorporate the bug fix into the production code?

Options:

A.

git rebase

B.

git cat-file

C.

git merge-file

D.

git bisert

Question 116

A group of software developers wants to improve its collaboration with the operations team. The group wants to deliver release-ready code that merges code changes back to the main branch and runs the automated testing as often as possible. Which DevOps concept does this scenario represent?

Options:

A.

continuous delivery

B.

version control

C.

continuous integration

D.

continuous deployment

Question 117

What is a feature of XML compared to other data formats?

Options:

A.

It uses tags to define the structure.

B.

It uses parenthesis for key-value pairs.

C.

It uses indentation to define the structure.

D.

It uses namespaces for list representation.

Question 118

Refer to the exhibit.

The server.js Node.js script runs after the Dockerfile creates its container. What is the working directory of the application inside the container?

Options:

A.

/source

B.

/app

C.

/app/source

D.

/app/produclion

Question 119

Which HTTP error code series relates to redirection?

Options:

A.

400

B.

500

C.

200

D.

300

Question 120

Drag and drop the code from the bottom onto the box where the code is missing to obtain a list of network devices by using the Cisco Meraki API. Not all options are used.

Options:

Question 121

Which protocol runs over TCP port 830?

Options:

A.

NETCONF

B.

Telnet

C.

RESTCONF

D.

HTTP

Question 122

When a Cisco IOS XE networking device is configured by using RESTCONF, what is the default data encoding method?

Options:

A.

application/yaml-data+json

B.

application/yang-data+json

C.

application/xml-data+json

D.

application/json-data+xml

Question 123

Refer to the exhibit. A network engineer must configure new interfaces on a set of devices and is planning to use an Ansible playbook for the task. All devices support SSH and NETCONF protocol, and the interface variables are unique per device. In which directory are the YAML files including variables hosted to automate the task with the netconf_config module?

Options:

A.

current working directory

B.

host_vars directory

C.

group_vars directory

D.

home directory

Question 124

An engineer deploys a Cisco CSR 1000 V instance to a virtual machine. The engineer must output the device configuration in JSON format. Which protocol is used for this task?

Options:

A.

YANG

B.

NETCONF

C.

SNMP

D.

RESTCONF

Question 125

A network engineer makes several API calls lo Cisco Prime to retrieve a list of all devices. Each time a response is received, only a subset of the devices is returned. The engineer :ices that HTTP code 429 is returned instead of 200 for some API calls. Why did the response exclude some of the devices?

Options:

A.

The API applied an offset that was indicated In the request.

B.

The API failed to identify how many items to retrieve.

C.

The API timed out the request.

D.

The API rate limited the request

Question 126

Which technology is responsible for resolving a host name to an IP address?

Options:

A.

DNS

B.

SNMP

C.

DHCP

D.

NTP

Question 127

A developer pushes an application to production. The application receives a webhook over HTTPS without a secret. The webhook information contains credentials to service in cleartext. When the information is received, it is stored in the database with an SHA-256 hash. Credentials to the database are accessed at runtime through the use of a vault service. While troubleshooting, the developer sets the logging to debug to view the message from the webhook. What is the security issue in this scenario?

Options:

A.

Database credentials should be accessed by using environment variables defined at runtime.

B.

During the transport of webhook messages, the credentials could be unencrypted and leaked.

C.

During logging, debugging should be disabled for the webhook message.

D.

Hashing the credentials in the database is not secure enough; the credentials should be encrypted.

Question 128

Which Cisco compute management platform controls server, network, storage, and virtual resources with policy-driven management for up to 10000 physical Cisco servers?

Options:

A.

UCS Central

B.

Cisco Intersight

C.

Cisco DNA Center

D.

Cisco HyperFlex

Question 129

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to return the number of interfaces on a network device by using the Cisco DNA Center SDK. Not all options are used.

Options:

Question 130

Drag and drop the code snippets from the bottom onto the blanks in the code to complete the happy path scenario. Not all options are used.

Options:

Question 131

Users cannot access a webserver and after the traffic is captured, the capture tool snows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?

Options:

A.

The large distance between the server and the users means that the packets require too much time to reach the destination.

B.

A router along the path is misrouting the packets in a wrong direction.

C.

A router along the path has the wrong time.

D.

The server is overloaded and the connection was not able to be processed in time.

Question 132

What is a capability of Ansible playbooks?

Options:

A.

They execute scheduled tasks regularly.

B.

They define the state for a device configuration.

C.

They collect SNMP logs from networking devices.

D.

They utilize the target device agent to execute.

Question 133

Drag and drop characteristics from the left onto the infrastructure management methodologies on the right.

Options:

Question 134

Drag and drop the characteristics from the left onto the software development methodologies on the right.

Options:

Question 135

What is a feature of a MAC address?

Options:

A.

It consists of 6 hexadecimal numbers.

B.

It consists of 24 bits.

C.

It consists of 38 bits.

D.

It consists of 12 hexadecimal numbers.

Question 136

Refer to the exhibit.

What are two results of running the RESTCONF query? (Choose two.)

Options:

A.

Interfaces are created as containers.

B.

The module letf-interfaces:interfaces is created.

C.

GigabitEthemet2 becomes shut down.

D.

GigabitEthernetl becomes shut down.

E.

Descriptions for two interfaces are applied.

Question 137

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer will use an Ansible playbook to configure devices through Cisco NX REST API. Before the code is run, which resource must be used to verify that the REST API requests work as expected?

Options:

A.

Cisco Open NX-OS

B.

Cisco NX-OS SDK

C.

Cisco Learning Labs

D.

Cisco Code Exchange for Nexus

Question 138

What is a benefit of version control?

Options:

A.

prevents two users from working on the same file

B.

keeps track of all changes to the files

C.

prevents the sharing of files

D.

keeps the list of data types used in the files

Question 139

Refer to the exhibit.

The IT team deployed a new Linux virtual machine for a software engineer to use. but the engineer is not comfortable configuring services using Bash. Which workflow is automated by the Ansible playbook?

Options:

A.

Restart the network on the ethO interlace and start the httpd service if it is not already started.

B.

Restart the httpd service and start the network service for the ethO interface.

C.

Start the network service on the ethO interface even if it was brought down manually.

D.

Restart the httpd service and the network service regardless of the state.

Question 140

Refer to the exhibit. A developer writes a script to create a new network by using the Cisco DNA Center API. After running the script for the first time, the developer observes that HTTP code 404 is printed to the console. Which action resolves the problem?

Options:

A.

The x-auth-token value must be changed to a valid token.

B.

The API URL must be changed with a valid URL.

C.

The requested payload must be fixed to include missing parts.

D.

Internal errors on the code of API server must be fixed.

Page: 1 / 47
Total 467 questions