Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 60certs

Cisco 200-901 Dumps

Page: 1 / 15
Total 406 questions

DevNet Associate (DEVASC) Questions and Answers

Question 1

A group of software developers wants to improve its collaboration with the operations team. The group wants to deliver release-ready code that merges code changes back to the main branch and runs the automated testing as often as possible. Which DevOps concept does this scenario represent?

Options:

A.

continuous delivery

B.

version control

C.

continuous integration

D.

continuous deployment

Question 2

Refer to the exhibit.

Up to which device does the communication server 1 and server 2 go?

Options:

A.

device B

B.

device C

C.

device D

D.

device E

Question 3

A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?

Options:

A.

Store the username and password in a separate configuration file.

B.

Store the username and password in a vault.

C.

Store the passwords in a dictionary.

D.

Store the username and password in code.

Question 4

A business needs to create a simulated environment that mimics a production infrastructure to make changes to the OSPF process and analyze the impact. What should be used?

Options:

A.

Cisco VIRL / Cisco CML

B.

Cisco DevNet Sandbox labs

C.

pyATS

D.

Puppet

Question 5

Which IP service synchronizes the time across devices?

Options:

A.

DNS

B.

NTP

C.

SNMP

D.

NAT

Question 6

Which port does HTTPS use by default?

Options:

A.

433

B.

443

C.

803

D.

883

Question 7

An engineer needs to collect information about 20,000 Bluetooth clients using the Cisco Meraki API. The API returns only 1,000 results. One of the HTTP response headers has the data:

Link: &startingAfter=1000>;rel=“next”

Which RFC is implemented by the API to apply the restriction?

Options:

A.

RFC 5988 – Web Linking

B.

RFC 5890 – Response Constraints

C.

RFC 5005 – Feed Paging and Archiving

D.

RFC 5446 – Content Limits

Question 8

Refer to the exhibit. A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?

Options:

A.

cp ./PROD/current.txt ./TEST/config.txt

B.

cp ./TESTi/current.txt ./PROD/config.txt

C.

cp ./PROD/config.txt ./TEST/current.txt

D.

cp ./TEST/config.txt ./PROD/current.txt

Question 9

What is a principle of a code review process?

Options:

A.

Changes are made after the code is submitted to source control.

B.

It must not prevent code from getting into production as quickly as possible.

C.

Naming standards must be consistent.

D.

A technical lead must sign off on the review.

Question 10

A developer completed the creation of a script using Git. Before delivering it to the customer, the developer wants to be sure about all untracked files, without losing any information. Which command gathers this information?

Options:

A.

git clean –n

B.

git rm –f

C.

git clean –r

D.

git rm *

Question 11

An engineer must make changes on a network device through the management platform API. The engineer prepares a script to send the request and analyze the response, check headers, and read the body according to information inside response headers. Drag and drop the HTTP header values from the left onto the elements of an HTTP response on the right.

Options:

Question 12

A developer has addressed a bug that was found in the production code of an application. A separate file named ‘bug427896191v_fix” has been created with the changes to the code. Which Git command must be used to incorporate the bug fix into the production code?

Options:

A.

git rebase

B.

git cat-file

C.

git merge-file

D.

git bisert

Question 13

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script by using the Cisco SDK. Not all options are used.

Options:

Question 14

How are operations on REST APIs performed as compared to RPC APIs?

Options:

A.

In a REST API, operations are performed on an object (node) that is identified by a URL, but RPC APIs are operation-oriented.

B.

In a REST API, operations are performed on an external resource that is defined on the API, but the RCP APIs are resource-oriented.

C.

In a REST API, operations are performed on a platform that is identified by the URL, but RPC APIs are platform-oriented.

D.

In a REST API, operations are performed on an internal resource that is defined on the API, but RPC APIs are resource-oriented.

Question 15

Which standard supported by Cisco IOS XE and Cisco NX-OS is used for automating the configuration of multiple devices across a network?

Options:

A.

SNMP – YANG

B.

SYSLOG – YANG

C.

CLI – YANG

D.

NETCONF – YANG

Question 16

During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?

Options:

A.

integration

B.

deployment

C.

development

D.

testing

Question 17

What is a comparison of YAML and JSON?

Options:

A.

YAML has a more consistent approach to representing data compared to JSON.

B.

JSON does not support comments and YAML does.

C.

YAML is a more verbose data structure compared to JSON.

D.

JSON has more common usage in configuration management tools compared to YAML.

Question 18

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python script to retrieve a list of network devices from Cisco DNA Center. Not all options are used.

Options:

Question 19

Drag and drop the functions from the left onto the networking devices on the right.

Options:

Question 20

A developer attempts to refactor and improve the application code. It is noticed that the code contains several pieces of key information that could be a security threat if this code is accessible by those who are not

authorized to this data. Which approach addresses the security concerns noticed by the developer?

Options:

A.

Host the application code on a machine located in a secure data center.

B.

Utilize environment variables for username and password details.

C.

Rely on the security teams’ goodwill to not give access to those who do not need it.

D.

Move the hardware that the application is deployed on to a secure location.

Question 21

Which Cisco platform provides organization-wide automation, security, policy enforcement, any agility across wired and wireless networks?

Options:

A.

Cisco ACI

B.

Cisco DNA Center

C.

Cisco Umbrella

D.

Cisco SD-WAN

Question 22

Which protocol must be allowed on the firewall so that NTP services work properly?

Options:

A.

ICMP

B.

BGP

C.

UDP

D.

TCP

Question 23

What is a benefit of test-driven development?

Options:

A.

early customer involvement

B.

increased code quality

C.

faster releases that have minimal features

D.

strict adherence to product requirements

Question 24

A new application is being developed with specific platform requirements. The platform and application deployment and the ongoing platform management must be fully automated. The application includes a large database component that has significant disk I/O requirements. Which application deployment type meets the requirements?

Options:

A.

Python virtual environment

B.

virtual machine

C.

bare metal

D.

container

Question 25

A developer is working on a feature for a new application. The changes in the existing branch named 'feat00304' must be integrated into a single commit with the current working primary branch named 'prodapp411926287'. Which git command must be used?

Options:

A.

git rebase --merge feat00304

B.

git merge --squash feat00304

C.

git push --rebase feat00304

D.

git checkout --squash feat00304

Question 26

A developer is trying to retrieve data over a REST API. The API server responds with an HTTP client error response code. After investigating the response the developer realizes the realizes the response has a Retry-After header. What is the root cause of this error?

Options:

A.

The REST service is unreachable at the time of the REST request

B.

Too many requests were sent to the REST service in a given amount of time.

C.

An appliance limited the rate of requests to the transport layer.

D.

An appliance limited the rate of requests to the application layer

Question 27

Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.

Options:

Question 28

Refer to the exhibit.

A network engineer must change the configuration on devices daily. The Python script must collect CLI arguments from the user, organize data according to the Cisco-IOS-XE-native YANG model, and utilize Cisco REST APIs to make the configuration. Which workflow is being automated by the Python script?

Options:

A.

updating an existing route on the device

B.

adding a new route to a device

C.

including a route on the device and overwriting the current routes

D.

deleting the route that is passed through the command-line variables

Question 29

A developer creates a script that configured multiple Cisco IOS XE devices in a corporate infrastructure. The internal test environment is unavailable, and no maintenance window is available to test on a low-priority production environment. Which resource is used to test the code before it is applied to the production environment?

Options:

A.

Code Exchange

B.

Cisco DevNet Learning Labs

C.

Cisco DevNet Sandbox

D.

Cisco Support

Question 30

Refer to the exhibit.

OWASP threat does this example demonstrate?

Options:

A.

Broken access control

B.

SQL injection

C.

Man-in-the-middle

D.

Cross-site-scripting

Question 31

Refer to the exhibit. A developer is creating a Python script to obtain a list of HTTP servers on a network named office_east by using the Cisco Meraki API. The request has these requirements:

• Must time out if the response is not received within 2 seconds.

• Must utilize client certificates and SSL certificate verification.

• Must utilize basic authentication that uses a username of admin and a password of cisco.

• Must save the response to an object named response.

Drag and drop the code snippets from the bottom onto the blanks in the code to meet the requirements. Not all options are used.

Options:

Question 32

Refer to the exhibit.

A developer must integrate a bot with an internal communication app. The developer wants to replace the webexbot package with the teamsbot package by using Ansible and prepares a playbook In the first two tasks, the playbook stops the webexbot and verifies that the teamsbot is installed. What is accomplished in the last task of the workflow when the developer runs the Ansible playbook?

Options:

A.

stops the webexbot service and uninstals it and retains its configuration files

B.

installs the webexbot and retains the configuration files

C.

uninstalls the webexbot package and removes its configuration files

D.

searches whether the purge package is available in the repository and uninstalls the webexbot package

Question 33

Drag and drop the code snippets from the bottom into the Python script to write API output to a csv file. Not all options are used.

Options:

Question 34

Which platform is used to programmatically create a space and invite users for collaboration?

Options:

A.

Cisco Intersight

B.

Cisco Finesse

C.

Cisco Webex

D.

Cisco UCM

Question 35

Refer to the exhibit.

Which command, including arguments, is executed when the container starts?

Options:

A.

/bin/sh -c "/bin/sleep 30 && nginx -g 'daemon off;'"

B.

/bin/sh -c "/bin/sleep 10 && nginx -g 'daemon off;'"

C.

/bin/bash -c "/bin/sleep 30 && nginx -g 'daemon off;'"

D.

/bin/sh -c "/bin/sleep 30" && nginx -g 'daemon off;'

Question 36

In test-driven development, what are two of the green bar patterns? (Choose two.)

Options:

A.

another test

B.

break

C.

triangulate

D.

starter test

E.

fake it

Question 37

Refer to the exhibit.

An engineer must check the admin rights of users on a database regularly and prepares

the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?

Options:

A.

They must be stored in configuration files if there is a possibility of leakage.

B.

They must be Base64-encoded if stored in the user database.

C.

They must be encrypted if stored in the user database.

D.

They must be stored in configuration files if no authentication will be used.

Question 38

A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?

Options:

A.

Communication between the application and the services is not encrypted.

B.

The database credentials should be stored in the configuration files so that they are secured on the same server.

C.

The API keys are stored in the configuration files but should be stored in the vault service.

D.

The synchronization logs should be encrypted and not stored in a relational database.

Question 39

Refer to the exhibit.

An API call is constructed to retrieve the inventory in XML format by using the API. The response to the call is 401 Unauthorized. Which two headers must be added to the API call? (Choose two.)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Question 40

Which application should be used to externally access all applications deployed in the same host machine with a single public IP address and port, when each application listens on different local ports?

Options:

A.

reverse proxy

B.

load balancer

C.

DNS

D.

firewall

Question 41

Which mechanism is used to consume a RESTful API design when large amounts of data are returned?

Options:

A.

Data sets

B.

Scrolling

C.

Blobs

D.

Pagination

Question 42

Before which process is code review performed when version control is used?

Options:

A.

committing code

B.

branching code

C.

merge of code

D.

checkout of code

Question 43

An application calls a REST API and expects a result set of more than 550 records, but each time the call is made, only 25 are returned. Which feature limits the amount of data that is returned by the API?

Options:

A.

pagination

B.

payload limit

C.

rate limiting

D.

service timeouts

Question 44

Fill in the blanks to complete the statement.

Given a username of “devnet” And a password “Cisco123”, applications must create a base64 encoding of the string” ____________ ” when sanding HTTP requests to an API that uses _______________ authentication.

Options:

Question 45

What are two advantages of version control software? (Choose two.)

Options:

A.

It supports tracking and comparison of changes in binary formate files.

B.

It allows old versions of packaged applications to be hosted on the Internet

C.

It provides wiki collaboration software for documentation.

D.

It supports comparisons between revisions of source code files.

E.

It allows new team members to access the current code and history.

Question 46

How does requesting a synchronous API operation differ from requesting an asynchronous API operation?

Options:

A.

clients poll for the status of the execution of operations

B.

clients subscribe to a webhook for operation results

C.

clients can access the results immediately

D.

clients receive responses with a task id for further processing

Question 47

A Company is looking for cloud deployment which will use the on-premise infrastructure, is user self-service, and easy to scale. Which cloud solution should be selected for these requirements?

Options:

A.

multi

B.

public

C.

private

D.

hybrid

Question 48

A 401 HTTP response code is returned when calling a REST API. What is the error state identified by this response code?

Options:

A.

The server cannot process the request as it has detected an issue in the request syntax or body.

B.

The server accepted the request but the client is not authorized for this content.

C.

The request has not been accepted because it requires authentication.

D.

The server cannot find the requested resource because the path specified is incorrect.

Question 49

Which two items are Cisco DevNet resources? (Choose two.)

Options:

A.

TAC support

B.

Bitbucket

C.

Sandbox

D.

Software research

E.

API Documentation

Question 50

Which CI/CD tool is an automation tool used to build, test, and deploy software?

Options:

A.

Nagios

B.

Gradle

C.

Jenkins

D.

Git

Question 51

Which two statements describe the traits of an asynchronous API call? (Choose two.)

Options:

A.

The order in which API calls return can be guaranteed

B.

A call to an API does not block the code, but rather it allows application processing to continue

C.

The end user can experience latency or performance lag while waiting for the API call to return

D.

Code execution blocks or waits for the call to an API to return.

E.

A callback function typically is used to process the response from an API call

Question 52

In which situation would an edge computing solution be used?

Options:

A.

where low latency is needed

B.

where high CPU throughput is needed

C.

where fast memory is needed

D.

where high disk space is needed

Question 53

Refer to the exhibit.

Which python data structure does my_json contain?

Options:

A.

List

B.

Json

C.

Map

D.

Dict

Question 54

Which type of threat occur when an attacker can send hostile data to an interpreter within an application?

Options:

A.

Cross-site scripting

B.

Sensitive data exposure

C.

Broken authentication

D.

Injection

Question 55

Which service provides a directory lookup for IP addresses and host names?

Options:

A.

DNS

B.

DHCP

C.

SNMP

D.

NAT

Question 56

Which model-driven programmability protocol does Cisco IOS XE Software support?

Options:

A.

CORBA

B.

SSH

C.

gNMI

D.

SOAP

Question 57

Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.

Options:

Question 58

Which platform is run directly using a hypervisor?

Options:

A.

Virtual

B.

Bare metal systems

C.

Containers

D.

Applications

Question 59

Refer to the exhibit.

OR

An administrator attempts to perform a GET using the Cisco IOS XE RESTOCNF API to return the hostname of a device. The sequence diagram illustrated the HTTP message observed. Which change to the API request resolves the issue?

Options:

A.

Add Content-Type HTTP header with 'application/yang-data+json' using –H ‘Content-Type: application/yang-data+json’.

B.

Use -u cisco: cisco instead of -u ‘cisco: cisco'.

C.

Change the request method from -X "GET” to- X’ POST”.

D.

Remove the -H ’Accept: application/yang-data^/son’ HTTP header because it is not required.

Question 60

What is the Git command to delete a local branch named “experiment” without a warning?

Options:

A.

git branch –n experiment

B.

git branch –rm experiment

C.

git branch –f experiment

D.

git branch –D experiment

Page: 1 / 15
Total 406 questions