Weekend Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 200-901 DevNet Associate (DEVASC) Exam Practice Test

Page: 1 / 47
Total 467 questions

DevNet Associate (DEVASC) Questions and Answers

Question 1

What is a tenet of test-driven development?

Options:

A.

write documentation for tests

B.

write tests after adding new blocks of code

C.

write and run tests before writing new code

D.

run tests after writing new code

Question 2

Drag and drop the requests from the left into the correct order on the right to create and check the path trace between two devices using Cisco DNA center API.

Question # 2

Options:

Question 3

A developer is reviewing a code that was written by a colleague. It runs fine, but there are many lines of code to do a seemingly simple task repeatedly. Which action organizes the code?

Options:

A.

Refactor the code by removing any unnecessary tests

B.

Using functions, rewrite any pieces of code that are repeated

C.

Reverse engineer and rewrite the code logic

D.

Modify the code to use loops

Question 4

Which principle is a value from the manifesto for Agile software development?

Options:

A.

adhering to a plan over responding to requirements

B.

detailed documentation over working software

C.

processes and tools over teams and inter actions

D.

customer collaboration over contract negotiation

Question 5

Which two concepts describe test-driven development? (Choose two.)

Options:

A.

It enables code refactoring.

B.

Write a test before writing code.

C.

Implementation is driven by incremental testing of release candidates.

D.

User acceptance testers development the test requirements.

E.

Tests are created when code is ready for release.

Question 6

Refer to the exhibit.

Question # 6

Drag and drop the variables from the left onto the item numbers on the right that match the missing assignments in the exhibit.

Question # 6

Options:

Question 7

Which two protocols are used to apply a configuration change on a Cisco IOS XE device? (Choose two)

Options:

A.

CCX

B.

RESTCONF

C.

NETCONF

D.

HSRP

E.

CDP

Question 8

Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)

Options:

A.

An artifact repository allows to compare and merge changes in the source code of files involved in a build process.

B.

An artifact repository is needed only for CI/CD pipeline executed on a public cloud infrastructure.

C.

An artifact repository provides traceability, search, and management of binary files.

D.

An artifact repository is needed only for managing open source software.

E.

An artifact repository stores files needed and generated during the build process.

Question 9

Which network device monitors incoming and outgoing traffic and decides whether to allow or block specific traffic based on a defined set of rules?

Options:

A.

switch

B.

load balancer

C.

reverse proxy

D.

firewall

Question 10

Drag and drop the element of the Finesse API on the left onto the description of its functionally on the right.

Question # 10

Options:

Question 11

Which status code is used by a REST API to indicate that the submitted payload is incorrect?

Options:

A.

400

B.

403

C.

405

D.

429

Question 12

Which response status code is used by a RESTful interface to indicate successful execution of a request?

Options:

A.

200

B.

404

C.

405

D.

500

Question 13

Refer to the exhibit.

Question # 13

OR

Question # 13

An administrator attempts to perform a GET using the Cisco IOS XE RESTOCNF API to return the hostname of a device. The sequence diagram illustrated the HTTP message observed. Which change to the API request resolves the issue?

Options:

A.

Add Content-Type HTTP header with 'application/yang-data+json' using –H ‘Content-Type: application/yang-data+json’.

B.

Use -u cisco: cisco instead of -u ‘cisco: cisco'.

C.

Change the request method from -X "GET” to- X’ POST”.

D.

Remove the -H ’Accept: application/yang-data^/son’ HTTP header because it is not required.

Question 14

Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose two.)

Options:

A.

Cisco Intersight API interactions can be encoded in XML or JSON and require an APIs key in the HTTP header for authentication.

B.

USC Director API interactions can be XML- or JSON-encoded and require an APLs key in the HTTP header for authentication.

C.

UCS manager API interactions are XML-encoded and require a cookie in the method for authentication.

D.

Cisco Intersight uses XML to encoded API interactions and requires an API key pair for authentication.

E.

UCS manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the HTTP header for authentication.

Question 15

When a Cisco IOS XE networking device is configured using RESTCONF, what is the default data-encoding method?

Options:

A.

XML

B.

x-form-encoding

C.

YANG

D.

YAML

Question 16

Drag and drop the network component names from the left onto the correct descriptions on the right. Not all options are used.

Question # 16

Options:

Question 17

Which device is a system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?

Options:

A.

Switch

B.

Router

C.

Firewall

D.

Load balancer

Question 18

Which type of HTTP method is used by the Meraki nad webex teams APIs to send webhook notifications?

Options:

A.

HTTP GET

B.

HTTP PUT

C.

HTTP HEAD

D.

HTTP POST

Question 19

what is an advantage of a version control system?

Options:

A.

forces the practice of trunk-based development

B.

prevents over-writing code or configuration files

C.

facilitates resolving conflicts when merging code

D.

ensures that unit tests are written

Question 20

What are two advantages of YANG-based approaches for infrastructure automation? (Choose two.)

Options:

A.

directly maps to JavaScript

B.

multi-platform vendor abstraction

C.

designed to reflect networking concepts

D.

compiles to executables that run on network devices

E.

command line driven interface

Question 21

Which task is performed because the test-driven development approach is being used?

Options:

A.

testing existing software before developing new code

B.

refactoring code that is covered by existing tests

C.

writing code without committing any coding violations

D.

creating test scenarios based on continuous development

Question 22

Refer to the exhibit.

Question # 22

What is the result of executing this Ansible playbook?

Options:

A.

The playbook copies a new start-up configuration to CISCO_ROUTER_01.

B.

The playbook backs up the running configuration of CISCO_ROUTER_01.

C.

The playbook backs up the start-up configuration of C1SCO_ROUTER_01.

D.

The playbook copies a new running configuration to CISCO_ROUTER_01.

Question 23

Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve statement using RESTCONF on a CSR 1000V?

Options:

A.

Change the HTTP method to PUT.

B.

Change the transport protocol to HTTPS.

C.

Check the MIMF types in the HTTP headers.

D.

Check the authentication credentials.

Question 24

Refer to the exhibit.

Question # 24

What caused the error in this API request?

Options:

A.

The API resource does not support the POST operation.

B.

The API resource does not support JSON format payloads.

C.

The submitted JSON payload includes a field that is not supported by the API resources.

D.

The submitted JSON payload has a formatting issue.

Question 25

Refer to the exhibit.

Question # 25

Drag and drop the descriptors from the left onto the correct parts of the API request and response on the right.

Question # 25

Options:

Question 26

Refer to the exhibit.

Question # 26

Given the API documentation for the UCS SDK python class, UcsHandle, which code snippet creates a handle instance?

Question # 26

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 27

Refer to the exhibit.

Question # 27

What is the action of the Bash script that is shown?

Options:

A.

The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory.

B.

The script goes into the directory called “$ndir” and makes a new directory called “$ndir”

C.

The script waits unit input is entered, then it goes into the directory entered and creates a new directory with the same name.

D.

For all directories in the current folder. The script goes into directory and makes a new directory.

Question 28

Drag and drop the Python code from the left onto the correct step on the right to call a REST API.

Question # 28

Options:

Question 29

Drag and drop the capability on the left onto the Cisco compute management platform that supports the capability on the right.

Question # 29

Options:

Question 30

Refer to the exhibit.

Question # 30

Fill in the blank to complete the query parameter and value so that the result set is returned in reverse chronological order (most recent first) based on when message were entered.

Question # 30

Options:

Question 31

Which REST architectural constraint indicates that no client context should be stored on the server between requests?

Options:

A.

stateless

B.

uniform interface

C.

cacheable

D.

client-server

Question 32

Refer to the exhibit.

A process on the host wants to access the service running inside this Docker container. Which port is used to make a connection?

Options:

A.

only outbound connections between 3000 and 5000 are possible

B.

port 3000

C.

any port between 3000 and 5000

D.

port 5000

Question 33

Which platform has an API that be used to obtain a list of vulnerable software on user devices?

Options:

A.

Cisco Umbrella

B.

Cisco Firepower

C.

Cisco Identity Services Engine

D.

Cisco Advanced Malware Protection

Question 34

Refer to the exhibit.

Question # 34

What does the python function do?

Options:

A.

It returns DNAC user and password.

B.

It returns HTTP Basic Authentication.

C.

It returns an authorization token.

D.

It reads a token from a local JSON file and posts the token to the DNAC URL.

Question 35

Users cannot access a webserver and after the traffic is captured. the capture tool shows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?

Options:

A.

A router along the path is misrouting the packets in a wrong direction.

B.

A router along the path has the wrong time.

C.

The server is too far away and the packets require too much time to reach it

D.

The server is too loaded and the connection could not be handled in time

Question 36

Fill in the blanks to complete the python script to request a service ticket using the APIC-EM rest API for the user “devnetuser”.

Question # 36

Options:

Question 37

An application calls a REST API and expects a result set of more than 550 records, but each time the call is made, only 25 are returned. Which feature limits the amount of data that is returned by the API?

Options:

A.

pagination

B.

payload limit

C.

rate limiting

D.

service timeouts

Question 38

Drag and drop the Docker file instructions from the onto correct descriptions on the right. Not all options are used.

Question # 38

Options:

Question 39

Which description of a default gateway if true?

Options:

A.

It is a device that receives IP packets that have no explicit next-hop in the routing table.

B.

It is a feature that translates between public and private addresses.

C.

It is a security feature that denies certain traffic.

D.

It is a device that receives Layer 2 frames with an unknown destination address.

Question 40

Refer to the exhibit.

Question # 40

The JSON data in the exhibit has been parsed and stored in a variable, “data”. What returns the value “172.16.0.11” ?

Options:

A.

data['items'][0]['host']['value']

B.

data['items']['1']['host']['value']

C.

data['items']['host'][1]

D.

data['items']['host']['value']

Question 41

What is a function of the default gateway in a network?

Options:

A.

to drop traffic that is destined to the default gateway

B.

to drop traffic that is not destined to the default gateway

C.

to forward traffic to the same subnet

D.

to forward traffic to different subnets

Question 42

Which is an advantage of using network programmability?

Options:

A.

It removes CLI access for devices.

B.

It provides for more scalable and replicable network provisioning.

C.

Manual configuration is faster.

D.

No cloud abstraction occurs.

Question 43

Which model-driven programmability protocol does Cisco IOS XE Software support?

Options:

A.

CORBA

B.

SSH

C.

gNMI

D.

SOAP

Question 44

Refer to the exhibit.

Question # 44

Question # 44

A developer is troubleshooting an API with the given API with the given API documentation and cURL command. What is the cause of this problem?

Options:

A.

The user is not allowed to post massages from their account

B.

The request body is missing or incomplete

C.

The API token specified is expired

D.

The authorization header is missing or incomplete

Question 45

Which two items are Cisco DevNet resources? (Choose two.)

Options:

A.

TAC support

B.

Bitbucket

C.

Sandbox

D.

Software research

E.

API Documentation

Question 46

Refer to the exhibit.

Question # 46

Which two statements about the network diagram are true? (Choose two.)

Options:

A.

PC-A and PC-B are in the same subnet.

B.

One of the routers has two connected serial interfaces.

C.

The subnet of PC-C can contain 256 hosts.

D.

R1 and R3 are in the same subnet.

E.

The subnet address of PC-B has 18 bits dedicated to the network portion.

Question 47

What is the purpose of a MAC address?

Options:

A.

To uniquely identify a router in a LAN

B.

To uniquely identify a network interface in a LAN

C.

To uniquely identify a device on the internet

D.

To uniquely identify a switch in a LAN

Question 48

What is a capability of an agentless configuration management system?

Options:

A.

It requires managed hosts to have an interpreter for a high-level language such as Python or Ruby.

B.

It requires managed hosts to connect to a centralized host to receive updated configurations.

C.

It uses compiled languages as the basis of the domain-specific language to interface with managed hosts.

D.

It uses existing protocols to interface with the managed host.

Question 49

Refer to the exhibit.

Question # 49

A developer must integrate a bot with an internal communication app. The developer wants to replace the webexbot package with the teamsbot package by using Ansible and prepares a playbook In the first two tasks, the playbook stops the webexbot and verifies that the teamsbot is installed. What is accomplished in the last task of the workflow when the developer runs the Ansible playbook?

Options:

A.

stops the webexbot service and uninstals it and retains its configuration files

B.

installs the webexbot and retains the configuration files

C.

uninstalls the webexbot package and removes its configuration files

D.

searches whether the purge package is available in the repository and uninstalls the webexbot package

Question 50

A developer creates a script that configured multiple Cisco IOS XE devices in a corporate infrastructure. The internal test environment is unavailable, and no maintenance window is available to test on a low-priority production environment. Which resource is used to test the code before it is applied to the production environment?

Options:

A.

Code Exchange

B.

Cisco DevNet Learning Labs

C.

Cisco DevNet Sandbox

D.

Cisco Support

Question 51

A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?

Options:

A.

Communication between the application and the services is not encrypted.

B.

The database credentials should be stored in the configuration files so that they are secured on the same server.

C.

The API keys are stored in the configuration files but should be stored in the vault service.

D.

The synchronization logs should be encrypted and not stored in a relational database.

Question 52

How do XML and JSON compare regarding functionality?

Options:

A.

JSON natively supports arrays and XML does not natively support arrays.

B.

XML provides support for mapping data structures into host languages than JSON.

C.

XML provides more human readability than JSON.

D.

JSON provides support for data types than XML.

Question 53

Refer to the exhibit.

Question # 53

A network engineer must change the configuration on devices daily. The Python script must collect CLI arguments from the user, organize data according to the Cisco-IOS-XE-native YANG model, and utilize Cisco REST APIs to make the configuration. Which workflow is being automated by the Python script?

Options:

A.

updating an existing route on the device

B.

adding a new route to a device

C.

including a route on the device and overwriting the current routes

D.

deleting the route that is passed through the command-line variables

Question 54

Refer to the exhibit.

Question # 54

The script returns an output of 401. To use the supplied URL. an HTTP GET request must Be sent with an Authorization header. The header value is a BaseG4 encoded concatenation of the username and password. Which action must be taken to return an output of 200?

Options:

A.

Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication

B.

Modify the method from LOGIN to GET and supply the username ;password value as JSON payload

C.

Verify that the username and password values imported from the configuration file ate still valid.

D.

Insert an Authorization header with the values username password from the supplied configuration file.

Question 55

What are two benefits of using VLANs? (Choose two.)

Options:

A.

limits the devices that can join the network

B.

segments the broadcast domain

C.

extends the broadcast domain

D.

allows all network devices to be accessible from any host on the network

E.

enables the logical grouping of devices that belong to different Layer 2 devices

Question 56

Refer to the exhibit.

Question # 56

An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the 'get_all_interfaces' API call is used?

Options:

A.

times out

B.

rate limit

C.

pagination

D.

invalid password

Question 57

Question # 57

Refer to the exhibit. A network engineer must collect information from the network. The engineer prepares a script to automate workflow by using Cisco Meraki API. The script must run over nested loops to collect organization and network information and uses the collected data for final collection. Which process is being automated by using the Python script?

Options:

A.

Gather the IDs of the ACME organization, the BLDG21 network, and the dents on the network

B.

Provide the BLDG21 network information if it is part of the ACME organization

C.

Collect the IDs of the clients on the BLDG21 network

D.

List the IDs from the ACME organization

Question 58

Question # 58

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request to find the Cisco DNA Center switch count. Not all options are used.

Question # 58

Options:

Question 59

Which HTTP response status code means “Forbidden”?

Options:

A.

500

B.

401

C.

403

D.

502

Question 60

Which application should be used to externally access all applications deployed in the same host machine with a single public IP address and port, when each application listens on different local ports?

Options:

A.

reverse proxy

B.

load balancer

C.

DNS

D.

firewall

Question 61

Why is refactoring done during test-driven development?

Options:

A.

to enable larger objects and longer methods

B.

to improve maintainability and readability

C.

to ensure that the previous uses of the objects are explained

D.

to ensure the duplication of essential code

Question 62

What are two benefits of model-driven programmability?

Options:

A.

model-driven APIs for abstraction and simplification

B.

single choice of transport, protocol, and encoding

C.

model-based, structured, and human friendly

D.

easier to design, deploy, and manage APIs

E.

models decoupled from transport, protocol, and encoding

Question 63

A developer created a new secure API and is testing the functionality locally. The API was added to a container for further testing, and other team members and applications need to connect to the API. Which command exposes the API in the container as port 8443 and allows connections external to the host?

Options:

A.

docker run -p 127.0.0.1:80:8443/tcp myapiservice

B.

docker run -p 0.0.0.0:443:8443/tcp myapiservice

C.

docker run -p 0.0.0.0:8443:443/tcp myapiservice

D.

docker run -p 127.0.0.1:443:8443/tcp myapiservice

Question 64

Refer to the exhibit.

Question # 64

An engineer must check the admin rights of users on a database regularly and prepares

the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?

Options:

A.

They must be stored in configuration files if there is a possibility of leakage.

B.

They must be Base64-encoded if stored in the user database.

C.

They must be encrypted if stored in the user database.

D.

They must be stored in configuration files if no authentication will be used.

Question 65

What is a benefit of organizing code into modules?

Options:

A.

improves overall performance

B.

reduces the length of code

C.

enables code to be multifunctional

D.

enables the reuse of code

Question 66

Which Cisco platform provides organization-wide automation, security, policy enforcement, any agility across wired and wireless networks?

Options:

A.

Cisco ACI

B.

Cisco DNA Center

C.

Cisco Umbrella

D.

Cisco SD-WAN

Question 67

What is a benefit of organizing into modules?

Options:

A.

improves collaboration of the development team

B.

makes it easier to deal with large and complex systems

C.

enables the code to be broken down into layers

D.

enables the inclusion of more programming languages in the code

Question 68

Refer to the exhibit.

Question # 68

A Python code has been written to query a device. The executed code results in the error shown. Which action resolves the problem?

Options:

A.

import json

B.

requests("GET", base_url + request_url, cookles=cookies)

C.

pip install requests

D.

import requests

Question 69

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

Question # 69

Options:

Question 70

Before which process is code review performed when version control is used?

Options:

A.

Branching code

B.

Merge of code

C.

Checkout of code

D.

Committing code

Question 71

Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:

• MySQL database that stores data about customers

• HTML5 and JavaScript UI that runs on Apache

• REST API written in Python

What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)

Options:

A.

to enable multiple views of the same data to be presented to different groups of users

B.

to provide separation between the view and the model by ensuring that all logic is separated out into the controller

C.

to ensure data consistency, which requires that changes to the view are also made to the model

D.

to ensure that only one instance of the data model can be created

E.

to provide only a single view of the data to ensure consistency

Question 72

Refer to the exhibit.

Question # 72

OWASP threat does this example demonstrate?

Options:

A.

Broken access control

B.

SQL injection

C.

Man-in-the-middle

D.

Cross-site-scripting

Question 73

Which platform is used to programmatically create a space and invite users for collaboration?

Options:

A.

Cisco Intersight

B.

Cisco Finesse

C.

Cisco Webex

D.

Cisco UCM

Question 74

Refer to the exhibit.

Question # 74

A developer creates a script to obtain a list of devices by using the Cisco DNA Center API. The remote server authorizes the request only if an authentication token is supplied in the headers. A function named get_auth_token() must retrieve a valid token by using HTTP Basic Authentication. Which code must be added to complete the get_auth_token() function?

Options:

A.

resp = requests.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

B.

resp = requests.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json ()['Token']

return token

C.

resp = http.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

D.

resp = http.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

Question 75

A developer needs a list of clients connected to a specific device in a Meraki network. After making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet resource should be used to identify the meaning of the response code?

Options:

A.

API documentation

B.

Sandbox

C.

Learning Labs

D.

Code Exchange

Question 76

Refer to the exhibit.

Question # 76

Which line must be included in the Bash script for the Python code to succeed?

Options:

A.

define WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

B.

export WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

C.

set WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

D.

WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

Question 77

Which HTTP code group is issued when a request is received successfully, understood, and processed?

Options:

A.

2xx

B.

3xx

C.

4xx

D.

5xx

Question 78

A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?

Options:

A.

git update

B.

git merge

C.

git add

D.

git rebase

Question 79

Refer to the exhibit.

Question # 79

The output of the diff-u README.md-repo README.md command is shown. The original file was 165 lines long How many lines are in the edited copy of the file?

Options:

A.

162

B.

165

C.

172

D.

173

Question 80

Where is an IP packet routed if the packet does not match any routes in the routing table?

Options:

A.

firewall

B.

load balancer

C.

central switch

D.

default gateway

Question 81

Refer to the exhibit.

Question # 81

Which JSON snippet configures a new interface according to YANG model?

A)

Question # 81

B)

Question # 81

C)

Question # 81

D)

Question # 81

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 82

While developing a real-Time VoIP application on a Cisco Webex platform, users report that their voice gets chopped or parts of the conversation drop out. Which network constraint is impacting the application?

Options:

A.

latency

B.

jitter

C.

capacity

D.

delay

Question 83

Drag and drop the code from the bottom onto the box where the code is missing in the Python script to complete a function to return all the clients on a network by using the Cisco Meraki Dashboard API. Not all options are used.

Question # 83

Options:

Question 84

How does a synchronous API request differ from an asynchronous API request?

Options:

A.

clients receive responses with a task id for further processing

B.

clients subscribe to a webhook for operation results

C.

clients are able to access the results immediately

D.

clients poll for the status of the execution of operations

Question 85

Which implementation creates a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire?

Options:

A.

WLAN

B.

VLAN

C.

IPsec

D.

HSRP

Question 86

Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?

Options:

A.

100

B.

204

C.

302

D.

402

Question 87

Which tool allows changes to the configuration management toolset to be tested?

Options:

A.

Cisco VIRL

B.

NAPALM

C.

Ansible

D.

pyATS

Question 88

Refer to the exhibit.

Question # 88

A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?

Options:

A.

results gathering of the show version and show ip int brief commands

B.

output of show ip int brief command on devices of type C9500-40X

C.

execution information of the show version and show ip int brief commands

D.

list of executed commands on C9500-40X and the information of show ip int brief command

Question 89

Refer to the exhibit.

Question # 89

Which device limits traffic between server 1 and server 2?

Options:

A.

Device B

B.

Device C

C.

Device D

D.

Device E

Question 90

What are two considerations when selecting the "best route" for a network device to reach its destination? (Choose two.)

Options:

A.

MAC address

B.

metrics

C.

administrative distance

D.

IP address

E.

subnet mask

Question 91

Drag and drop the code from the bottom onto the box where the code is missing in the Bash script to complete the missing assignment.

Question # 91

Options:

Question 92

A developer is working on a feature for a new application. The changes in the existing branch named 'feat00304' must be integrated into a single commit with the current working primary branch named 'prodapp411926287'. Which git command must be used?

Options:

A.

git rebase --merge feat00304

B.

git merge --squash feat00304

C.

git push --rebase feat00304

D.

git checkout --squash feat00304

Question 93

What is the difference between YAML and JSON data structure?

Options:

A.

YAML uses spaces; JSON uses parentheses

B.

YAML uses indentation; JSON uses brackets and braces

C.

YAML uses brackets and braces; JSON uses indentation

D.

YAML uses parentheses; JSON uses spaces

Question 94

Refer to the exhibit.

Question # 94

The documentation outlines how to use credentials for the AMP API Which script successfully performs an API call using basic authentication?

A)

Question # 94

B)

Question # 94

C)

Question # 94

D)

Question # 94

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Question 95

Which technology is responsible for resolving a host name to an IP address?

Options:

A.

DNS

B.

SNMP

C.

DHCP

D.

NTP

Question 96

Question # 96

Refer to the exhibit. Drag and drop the actions from the left that the contents of this Dockerfile accomplish onto the right. Not all options are used.

Question # 96

Options:

Question 97

Which protocol is used for clock synchronization between network devices?

Options:

A.

FTP

B.

NNTP

C.

BGP

D.

NTP

Question 98

What is a characteristic of Waterfall compared to Agile software development method?

Options:

A.

Waterfall focuses on continuous improvement, and Agile focuses on the design phase.

B.

Waterfall separates the project development lifecycle into sprints, and Agile does not use cycles.

C.

Waterfall specifies requirements before development begins, and Agile responds flexibly to changes in requirements.

D.

Waterfall uses reviews with step by step approach, and Agile uses a serially phased approach.

Question 99

An engineer deploys a Cisco CSR 1000 V instance to a virtual machine. The engineer must output the device configuration in JSON format. Which protocol is used for this task?

Options:

A.

YANG

B.

NETCONF

C.

SNMP

D.

RESTCONF

Question 100

Question # 100

Refer to the exhibit. An engineer must authorize a REST API call. The API password is "Cisco123!". Which Bash command must be placed in the code to authorize the call?

Options:

A.

mkdir API_PASSWORD=Cisco123!

B.

set API_PASSWORD=Cisco123!

C.

cp API_PASSWORD=Cisco123!

D.

export API_PASSWORD=Cisco123!

Question 101

Which action do webhooks enable an application to perform?

Options:

A.

Increase the request rate limit.

B.

Populate the application with restricted data.

C.

Receive real-time data.

D.

Implement a push model.

Question 102

A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?

Options:

A.

Store the username and password in a separate configuration file.

B.

Store the username and password in a vault.

C.

Store the passwords in a dictionary.

D.

Store the username and password in code.

Question 103

What is a benefit of using a code review process in application development?

Options:

A.

accelerates the deployment of new features in an existing application

B.

provides version control during code development

C.

enables the quick deployment of new code

D.

eliminates common mistakes during development

Question 104

Question # 104

Refer to the exhibit. A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?

Options:

A.

cp ./PROD/current.txt ./TEST/config.txt

B.

cp ./TESTi/current.txt ./PROD/config.txt

C.

cp ./PROD/config.txt ./TEST/current.txt

D.

cp ./TEST/config.txt ./PROD/current.txt

Question 105

Drag and drop the capabilities from the left onto the Cisco Network Management Platforms that support the capabilities on the right.

Question # 105

Options:

Question 106

A developer is attempting to retrieve all the messages from a Cisco Webex space. The server responds by sending the first 1,000 messages. The developer must make additional requests to retrieve the rest of the messages. Which API constraint is described in this scenario?

Options:

A.

payload limiting

B.

throttling

C.

pagination

D.

rate limiting

Question 107

What is the impact on an application from having a large distance between a client device and a host server?

Options:

A.

jitter

B.

latency

C.

loss of connectivity

D.

increased bandwidth

Question 108

A network engineer makes several API calls lo Cisco Prime to retrieve a list of all devices. Each time a response is received, only a subset of the devices is returned. The engineer :ices that HTTP code 429 is returned instead of 200 for some API calls. Why did the response exclude some of the devices?

Options:

A.

The API applied an offset that was indicated In the request.

B.

The API failed to identify how many items to retrieve.

C.

The API timed out the request.

D.

The API rate limited the request

Question 109

Which Cisco compute management platform controls server, network, storage, and virtual resources with policy-driven management for up to 10000 physical Cisco servers?

Options:

A.

UCS Central

B.

Cisco Intersight

C.

Cisco DNA Center

D.

Cisco HyperFlex

Question 110

Question # 110

Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer's account?

Options:

A.

The encoded credentials were available in the source code.

B.

The application was not encrypting the communication with the server.

C.

The credentials were encrypted in the source code.

D.

An SSL certificate was used instead of the TLS protocol to authenticate.

Question 111

Refer to the exhibit.

Question # 111

A company recently acquired new IP-based security cameras. After discussion with the engineering team, they decide to segment the security camera traffic m the rest…The engineer assigns the new VLAN 10 for the security camera traffic. After all the devices are configured, it seems as if the cameras cannot access the Internet, .. a few minutes of debugging, the engineer restricts the problem to the router configuration. What is the cause of the issue?

Options:

A.

A specific permit statement for the 192.168.20.0/24 subnet is missing from the access list.

B.

A NAT inside rule is missing from the GlgabitEthernet0/0/0.10 interface.

C.

A specific permit statement for the 192.168.10.0/24 subnet is missing from the access list.

D.

A NAT inside rule is missing from the GigabitEthemet0/0/0 interface.

Question 112

Which RFC 1918 address space includes a subnet of 172.16.0.0 that uses a mask of 255.255.0.0?

Options:

A.

class A

B.

class B

C.

class C

D.

class D

Question 113

A developer is working on a new feature in a branch named 'newfeat123456789' and the current working primary branch is named 'prim987654321'. The developer requires a merge commit during a fast forward merge for record-keeping purposes. Which Git command must be used?

Options:

A.

git merge --no-ff newfeat123456789

B.

git commit --no-ff newfeat123456789

C.

git add --commit-ff newfeat123456789

D.

git reset --commit-ff newfeat123456789

Question 114

What is a benefit of using Python classes?

Options:

A.

They improve code organization by keeping data members and methods together.

B.

They remove the concept of inheritance to improve code readability and maintainability.

C.

They allow a Python script to import code from various independent modules.

D.

They simplify integration by testing the classes independently from other components.

Question 115

Which port does HTTPS use by default?

Options:

A.

433

B.

443

C.

803

D.

883

Question 116

Question # 116

Refer to the exhibit. Which RESTCONF request results in this response?

Options:

A.

Option A116

B.

Option B116

C.

Option C116

D.

Option D116

Question 117

Which two HTTP code series relate to errors? (Choose two.

Options:

A.

400

B.

200

C.

500

D.

300

E.

100

Question 118

A developer has addressed a bug that was found in the production code of an application. A separate file named ‘bug427896191v_fix” has been created with the changes to the code. Which Git command must be used to incorporate the bug fix into the production code?

Options:

A.

git rebase

B.

git cat-file

C.

git merge-file

D.

git bisert

Question 119

Question # 119

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script by using the Cisco SDK. Not all options are used.

Question # 119

Options:

Question 120

Refer to the exhibit.

Question # 120

An engineer sends the request to collect data over Cisco AMP for Endpoints API. The Engineer must list guide and hostname data for all computers, but the first request returns only 500 items out of 2,000. Then, the engineer adds the loop to collect all the data. What must be added to the script where the code is missing to complete the requests?

Question # 120

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 121

An engineer prepares a set of Python scripts to interact with network devices. To avoid network performance issues, the engineer wants to run them in a test environment. Which resource must be used to monitor the

live execution of code in an always-available environment?

Options:

A.

packet tracer

B.

learning labs

C.

sandbox

D.

code exchange

Question 122

Question # 122

Refer to the exhibit. Which code snippet represents the sequence.

Options:

A.

Option A122

B.

Option B122

C.

Option C122

D.

Option D122

Question 123

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python script to retrieve a list of network devices from Cisco DNA Center. Not all options are used.

Question # 123

Options:

Question 124

What is a capability of the AXL API?

Options:

A.

It signs a user in to a phone that is configured for extension mobility.

B.

It pulls logs for the Cisco Tomcat service.

C.

It authenticates users who exist in Cisco Unified Communications Manager.

D.

It provides support for HTTP and HTTPS communications.

Question 125

What does a developer import in a script to parse a file from XML to Python?

Options:

A.

function

B.

library

C.

variable

D.

method

Question 126

Drag and drop the characteristics from the left onto the corresponding categories on the right to compare RESTful and RPC APIs.

Question # 126

Options:

Question 127

How does edge computing analyze sensitive data in the context of privacy control?

Options:

A.

locally instead of sending the data to the cloud for analysis

B.

locally or on the cloud depending on the configuration

C.

all at once by sending the data to the cloud

D.

locally on each node, and then sends the data to the cloud

Question 128

Refer to the exhibit.

Question # 128

Which XML snippet has interface information that conforms to the YANG model?

A)

Question # 128

B)

Question # 128

C)

Question # 128

D)

Question # 128

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 129

Which solution reduces costs from MPLS, improves application performance, and simplifies operations?

Options:

A.

Cisco NSO

B.

Cisco SD-WAN

C.

Cisco ACI

D.

Cisco DNA Center

Question 130

What is a capability of Cisco Webex?

Options:

A.

Join preconfigured or new spaces with fixed user rights.

B.

Configure devices at scale via automation scripts or by manual execution.

C.

Initiate or respond to calls automatically via automation.

D.

Get space history or notified in real time when new messages are posted.

Question 131

Question # 131

Refer to the exhibit. A network engineer must configure new interfaces on a set of devices and is planning to use an Ansible playbook for the task. All devices support SSH and NETCONF protocol, and the interface variables are unique per device. In which directory are the YAML files including variables hosted to automate the task with the netconf_config module?

Options:

A.

current working directory

B.

host_vars directory

C.

group_vars directory

D.

home directory

Question 132

A developer starts to learn about building applications that use Cisco APIs. The developer needs access to Cisco security products in a development lab to test the first new Dlication that has been built. Which DevNet resource must be used?

Options:

A.

DevNet Code Exchange

B.

DevNet Automation Exchange

C.

DevNet Sandbox

D.

DevNet Communities

Question 133

What is a function of the default gateway in a network?

Options:

A.

to drop traffic that is destined to the default gateway

B.

to forward traffic to different subnets

C.

to forward traffic to the same subnet

D.

to drop traffic that is not destined to the default gateway

Question 134

Refer to the exhibit.

Question # 134

An engineer wants to create a Bash script to automate a workflow that is related to a machine learning-based application. The engineer wants to use the application as a container and use an image from the open-source public repository. What is accomplished by the script?

Options:

A.

Create a new software package.

B.

Install and remove files.

C.

Update an existing software package.

D.

Install a software package

Question 135

What is a benefit of version control?

Options:

A.

application of code directly to hardware

B.

tracking development changes

C.

reuse of code-on-code patches

D.

compatibility with back-end systems

Question 136

What is the function of an Ethernet switch in a networking environment?

Options:

A.

to switch a frame from one port to another port based on IP address

B.

to switch a frame from one port to another port based on MAC address

C.

to provide IP addressing to connected hosts

D.

to block unwanted traffic

Question 137

Which TCP port is used to connect to a network device by using Telnet?

Options:

A.

23

B.

69

C.

400

D.

830

Question 138

A resource named /item is protected by oAuth2 authentication. An endpoint named /login must request authentication. Which method must be used to access the resource by using the REST API?

Options:

A.

Make a GET call to /login that includes the username and password, and retrieve a token to insert into the /item call.

B.

Make a POST call to /login including the user credentials in the message, and retrieve a token to insert into the authorization header of the /item call.

C.

Make a GET call to /item, then make a call to /login that includes the username and password in the body of the message, and wait for the authorization code.

D.

Make a POST call to /item that includes the username and password in the body of the request message, and submit it to request access.

Question 139

A developer must test the performance and reliability of an application. After functional and load tests are run, the application crashes due to traffic spikes from users. Which type of API constraint must be implemented to maintain reliability?

Options:

A.

rate limiting

B.

pagination

C.

payload limits

D.

filtering

Question 140

Question # 140

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Question # 140

Options:

Page: 1 / 47
Total 467 questions