Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

200-901 DevNet Associate (DEVASC) Questions and Answers

Questions 4

A new application is being developed that must be hardware independent. The application includes an administrative component which is accessed using a Windows desktop GUI. Installation and management of the environment must be fully automated. Which application deployment type meets the requirements?

Options:

A.

bare metal

B.

virtual Python environment

C.

container

D.

virtual machine

Buy Now
Questions 5

Refer to the exhibit.

The script returns an output of 401. To use the supplied URL. an HTTP GET request must Be sent with an Authorization header. The header value is a BaseG4 encoded concatenation of the username and password. Which action must be taken to return an output of 200?

Options:

A.

Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication

B.

Modify the method from LOGIN to GET and supply the username ;password value as JSON payload

C.

Verify that the username and password values imported from the configuration file ate still valid.

D.

Insert an Authorization header with the values username password from the supplied configuration file.

Buy Now
Questions 6

How does a synchronous API request differ from an asynchronous API request?

Options:

A.

clients receive responses with a task id for further processing

B.

clients subscribe to a webhook for operation results

C.

clients are able to access the results immediately

D.

clients poll for the status of the execution of operations

Buy Now
Questions 7

Refer to the exhibit.

A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?

Options:

A.

compilation and configuration of the Cisco DevNet application so that it must be started manually

B.

compilation, installation, and configuration of the Cisco DevNet application so that it starts automatically

C.

compilation and installation of the Cisco DevNet application for an autonomous deployment model

D.

installation and configuration of the Cisco DevNet application so that it starts manually

Buy Now
Questions 8

Refer to the exhibit.

Which infrastructure automation method is shown?

Options:

A.

Waterfall

B.

CI/CD pipeline

C.

Agile

D.

Lean

Buy Now
Questions 9

A developer created a new secure API and is testing the functionality locally. The API was added to a container for further testing, and other team members and applications need to connect to the API. Which command exposes the API in the container as port 8443 and allows connections external to the host?

Options:

A.

docker run -p 127.0.0.1:80:8443/tcp myapiservice

B.

docker run -p 0.0.0.0:443:8443/tcp myapiservice

C.

docker run -p 0.0.0.0:8443:443/tcp myapiservice

D.

docker run -p 127.0.0.1:443:8443/tcp myapiservice

Buy Now
Questions 10

Which platform is used to programmatically create a space and invite users for collaboration?

Options:

A.

Cisco Intersight

B.

Cisco Finesse

C.

Cisco Webex

D.

Cisco UCM

Buy Now
Questions 11

Why is refactoring done during test-driven development?

Options:

A.

to enable larger objects and longer methods

B.

to improve maintainability and readability

C.

to ensure that the previous uses of the objects are explained

D.

to ensure the duplication of essential code

Buy Now
Questions 12

What is the purpose of the first three pairs of digits in a MAC address?

Options:

A.

defines a routing identifier for the client

B.

indicates the IP address of the client in Hex

C.

defines packet forwarding priority sent or received by the adapter

D.

indicates vendor of the network card or adapter

Buy Now
Questions 13

Refer to the exhibit.

Which JSON snippet configures a new interface according to YANG model?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 14

Refer to the exhibit.

The output of the diff-u README.md-repo README.md command is shown. The original file was 165 lines long How many lines are in the edited copy of the file?

Options:

A.

162

B.

165

C.

172

D.

173

Buy Now
Questions 15

Refer to the exhibit.

Which line must be included in the Bash script for the Python code to succeed?

Options:

A.

define WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

B.

export WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

C.

set WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

D.

WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

Buy Now
Questions 16

What is the purpose of a MAC address on a network device?

Options:

A.

unique network address that identifies the network interface of a device

B.

unique network interlace address that is provided by the DHCP server

C.

unique hardware address that identifies the network interface of a device

D.

unique hardware interface address that is provided by the central switch

Buy Now
Questions 17

Refer to the exhibit.

A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?

Options:

A.

results gathering of the show version and show ip int brief commands

B.

output of show ip int brief command on devices of type C9500-40X

C.

execution information of the show version and show ip int brief commands

D.

list of executed commands on C9500-40X and the information of show ip int brief command

Buy Now
Questions 18

Which HTTP code group is issued when a request is received successfully, understood, and processed?

Options:

A.

2xx

B.

3xx

C.

4xx

D.

5xx

Buy Now
Questions 19

Refer to the exhibit.

A Python code has been written to query a device. The executed code results in the error shown. Which action resolves the problem?

Options:

A.

import json

B.

requests("GET", base_url + request_url, cookles=cookies)

C.

pip install requests

D.

import requests

Buy Now
Questions 20

Refer to the exhibit. A network engineer must collect information from the network. The engineer prepares a script to automate workflow by using Cisco Meraki API. The script must run over nested loops to collect organization and network information and uses the collected data for final collection. Which process is being automated by using the Python script?

Options:

A.

Gather the IDs of the ACME organization, the BLDG21 network, and the dents on the network

B.

Provide the BLDG21 network information if it is part of the ACME organization

C.

Collect the IDs of the clients on the BLDG21 network

D.

List the IDs from the ACME organization

Buy Now
Questions 21

Refer to the exhibit.

A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?

Options:

A.

enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

B.

enable_function(‘iana-if-type:softwareLoopback’, Loopback1, true,)

C.

def enable_function(‘iana-if-type:softwareLoopback’, Loopback1, false,)

D.

def enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

Buy Now
Questions 22

Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:

• MySQL database that stores data about customers

• HTML5 and JavaScript UI that runs on Apache

• REST API written in Python

What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)

Options:

A.

to enable multiple views of the same data to be presented to different groups of users

B.

to provide separation between the view and the model by ensuring that all logic is separated out into the controller

C.

to ensure data consistency, which requires that changes to the view are also made to the model

D.

to ensure that only one instance of the data model can be created

E.

to provide only a single view of the data to ensure consistency

Buy Now
Questions 23

What is used in JSON to represent a Python Tuple?

Options:

A.

Object

B.

Array

C.

Dict

D.

Collection

Buy Now
Questions 24

A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?

Options:

A.

Communication between the application and the services is not encrypted.

B.

The database credentials should be stored in the configuration files so that they are secured on the same server.

C.

The API keys are stored in the configuration files but should be stored in the vault service.

D.

The synchronization logs should be encrypted and not stored in a relational database.

Buy Now
Questions 25

What is a difference between a synchronous API and an asynchronous API?

Options:

A.

An asynchronous API can make offline calls while synchronous APIs do not have this capability.

B.

Synchronous API calls are returned immediately while asynchronous calls do not guarantee an immediate response.

C.

Synchronous API calls require an authentication header to be sent while asynchronous calls do not require authentication.

D.

An asynchronous API can make a larger number of calls in a specified time period than a synchronous API.

Buy Now
Questions 26

What is a capability of an agentless configuration management system?

Options:

A.

It requires managed hosts to have an interpreter for a high-level language such as Python or Ruby.

B.

It requires managed hosts to connect to a centralized host to receive updated configurations.

C.

It uses compiled languages as the basis of the domain-specific language to interface with managed hosts.

D.

It uses existing protocols to interface with the managed host.

Buy Now
Questions 27

Refer to the exhibit.

A network engineer wants to use an API to update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which line of code needs to be placed in the snippet where the code is missing?

Options:

A.

{'Content-Type': 'application/yang.data+xml', 'Accept': 'application/yang.data

+xml'}

B.

{'Content-Type': 'application/yang.data+yaml', 'Accept': 'application/yang.data

+yaml'}

C.

{'Content-Type': 'application/restconf.data+json', 'Accept': 'application/

restconf.data+json'}

D.

{'Content-Type': 'application/yang.data+utf8', 'Accept': 'application/

restconf.data+utf8'}

Buy Now
Questions 28

How does a developer create and switch to a new branch called "my-bug-fix" to develop a product fix?

Options:

A.

git checkout -b my-bug-fix

B.

git branch -b my-bug-fix

C.

git branch my-bug-fix

D.

git checkout my-bug-fix

Buy Now
Questions 29

Which HTTP response status code means “Forbidden”?

Options:

A.

500

B.

401

C.

403

D.

502

Buy Now
Questions 30

What is the main purpose of a code review?

Options:

A.

To provide the technical lead visibility into all code

B.

To identify and review errors with the team

C.

To ensure that all code is checked in simultaneously

D.

To detect logical errors

Buy Now
Questions 31

What are two functions of a routing table on a network device? (Choose two.)

Options:

A.

It lists entries more than two hops away.

B.

It lists the routes to a particular destination.

C.

It lists the routes to drop traffic.

D.

It lists hosts that are one hop away.

E.

It lists the static and dynamic entries.

Buy Now
Questions 32

Before which process is code review performed when version control is used?

Options:

A.

Branching code

B.

Merge of code

C.

Checkout of code

D.

Committing code

Buy Now
Questions 33

Refer to the exhibit.

What do all the calls shown in the sequence diagram have in common?

Options:

A.

All the calls are optional.

B.

All the calls are asynchronous.

C.

All the calls are synchronous.

D.

All the calls depend on the catalog.

Buy Now
Questions 34

Which tool is used to block all traffic to the domain by using a single API call?

Options:

A.

Cisco ISE

B.

Cisco Firepower

C.

Cisco AMP

D.

Cisco Umbrella

Buy Now
Questions 35

In the test-driven development model, what is changed after a test fails?

Options:

A.

test

B.

schedule

C.

project requirements

D.

code

Buy Now
Questions 36

What are two benefits of model-driven programmability?

Options:

A.

model-driven APIs for abstraction and simplification

B.

single choice of transport, protocol, and encoding

C.

model-based, structured, and human friendly

D.

easier to design, deploy, and manage APIs

E.

models decoupled from transport, protocol, and encoding

Buy Now
Questions 37

What are two use cause where webhooks are effective? (Choose two.)

Options:

A.

Close a session with a web server after a specific amount of time.

B.

Filter out information from a response to an API call

C.

Change the response format or content type of an API call.

D.

Inform a previously defined chat channel after a deployment fate.

E.

Send an email to a customer of an online store after payment is complete

Buy Now
Questions 38

Refer to the exhibit.

A developer needs to upload a local file by using the REST API. The developer gathers information according to the documentation and sends the request by using the cURL command in the exhibit but gets an error code. Which action should be followed to get valid response?

Options:

A.

change content type as JSON

B.

add the authorization header with the access token

C.

add a username-password combination to request command

D.

change request method as GET

Buy Now
Questions 39

Refer to the exhibit.

A developer creates a script to obtain a list of devices by using the Cisco DNA Center API. The remote server authorizes the request only if an authentication token is supplied in the headers. A function named get_auth_token() must retrieve a valid token by using HTTP Basic Authentication. Which code must be added to complete the get_auth_token() function?

Options:

A.

resp = requests.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

B.

resp = requests.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json ()['Token']

return token

C.

resp = http.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

D.

resp = http.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

Buy Now
Questions 40

Refer to the exhibit.

OWASP threat does this example demonstrate?

Options:

A.

Broken access control

B.

SQL injection

C.

Man-in-the-middle

D.

Cross-site-scripting

Buy Now
Questions 41

A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:

$ docker tag 84fe411926287 local/app:0.4

Which command must be executed next to build the Docker image using the tag?

Options:

A.

$ docker build -p local/app:0.4

B.

$ docker run -t local/app:0.4

C.

$ docker run -p local/app:0.4

D.

$ docker build -t local/app:0.4

Buy Now
Questions 42

Refer to the exhibit.

A network engineer must manage the network devices. The engineer prepares a Python scripts to authenticate to the Cisco to DNA Center API and request a device list. The device request fails and returns errors code 401. Which action solves the problem?

Options:

A.

Update the API URL. which matched the API endpoint for device list.

B.

Send the request to another network in case there are reachability Issues.

C.

Send the Authentication header In the request with a valid configuration.

D.

Update the credentials that are already supplied and retry the request

Buy Now
Questions 43

What are two properties of private IP addresses? (Choose two.)

Options:

A.

They can be used to access the Internet directly.

B.

They are more secure than public IP addresses.

C.

They are not globally unique.

D.

They can be repeated within the same local network.

E.

They are controlled globally by an IP address registry.

Buy Now
Questions 44

Which configuration management tool has an agentless capability?

Options:

A.

Chef

B.

Puppet

C.

Ansible

D.

CFEngine

Buy Now
Questions 45

Refer to the exhibit.

The Cisco Meraki API manages two organizations. In each organization, two independent networks are defined. How many calls to the /organizations/(orgid)networks endpoint will be run parallel by the GetAllNetwork function of the API client?

Options:

A.

0

B.

1

C.

2

D.

4

Buy Now
Questions 46

Refer to the exhibit.

A network engineer must change the configuration on devices daily. The Python script must collect CLI arguments from the user, organize data according to the Cisco-IOS-XE-native YANG model, and utilize Cisco REST APIs to make the configuration. Which workflow is being automated by the Python script?

Options:

A.

updating an existing route on the device

B.

adding a new route to a device

C.

including a route on the device and overwriting the current routes

D.

deleting the route that is passed through the command-line variables

Buy Now
Questions 47

Refer to the exhibit.

The documentation outlines how to use credentials for the AMP API Which script successfully performs an API call using basic authentication?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 48

Refer to the exhibit.

A developer cannot reach the web application behind an NGINX load balancer. The developer sends a request to an application FQDN with cURL but gets an HTTP 502 response. Which action solves the problem?

Options:

A.

Fix errors in the server configuration, which is behind the load balancer.

B.

Bring up the load balancer to the active state.

C.

Fix errors in the cURL request sent by the client.

D.

Change the default gateway on the load balancer to an active one.

Buy Now
Questions 49

What is a characteristic of RPC APIs compared to REST APIs?

Options:

A.

Authentication is done over provisions for the service caller and vice versa for RPC API, and REST API uses HTTP headers for authentication.

B.

All communications between the client and server must be stateless for RPC API, and REST API is stateful.

C.

The architecture model for RPC API is resource-focused, and REST API is procedure-focused.

D.

The data payload must be in JSON format for RPC API, and REST API allows JSON and XML formats.

Buy Now
Questions 50

Why would a developer compare a current version of code to a previous version?

Options:

A.

to provide the single source of truth

B.

to troubleshoot code failures

C.

to track who made a change

D.

to aid in collaboration

Buy Now
Questions 51

A developer must test the performance and reliability of an application. After functional and load tests are run, the application crashes due to traffic spikes from users. Which type of API constraint must be implemented to maintain reliability?

Options:

A.

rate limiting

B.

pagination

C.

payload limits

D.

filtering

Buy Now
Questions 52

Refer to the exhibit. Drag and drop the Dockerfile contents from the left onto the functions on the right that create a container image to run traceroute to track network path to specific targets. Not all options are used.

Options:

Buy Now
Questions 53

Refer to the exhibit.

Which XML snippet has interface information that conforms to the YANG model?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 54

A developer attempts to refactor and improve the application code. It is noticed that the code contains several pieces of key information that could be a security threat if this code is accessible by those who are not

authorized to this data. Which approach addresses the security concerns noticed by the developer?

Options:

A.

Host the application code on a machine located in a secure data center.

B.

Utilize environment variables for username and password details.

C.

Rely on the security teams’ goodwill to not give access to those who do not need it.

D.

Move the hardware that the application is deployed on to a secure location.

Buy Now
Questions 55

A developer is running an application that connects to the Cisco website and collects data. The application will be hosted in a local data center and the data will need to be collected on a frequent basis. The application client requires certain environmental variables to be set before the run. Which Bash command sets the environmental variables for a Linux system?

Options:

A.

B.

C.

D.

Buy Now
Questions 56

A developer creates an application that must provide an encrypted connection or API keys. The keys will be used to communicate with a REST API. Which command must be used for the secure connection?

Options:

A.

curl –X PUSH ‘http://username.app.com/endpoint/?api_key=12345abcdef’

B.

curl –v ‘ftp://username.app.com/endpoint/?api_key=12345abcdef’

C.

curl –X GET ‘https://username.app.com/endpoint/?api_key=12345abcdef’

D.

curl –X GET ‘http://username.app.com/endpoint/?api_key=12345abcdef’

Buy Now
Questions 57

What is the meaning of the HTTP status code 204?

Options:

A.

request completed; new resource created

B.

server successfully processed request; no content returned

C.

standard response for successful requests

D.

invalid query parameters

Buy Now
Questions 58

Refer to the exhibit. An engineer prepares a script to automate workflow by using Cisco DNA Center APIs to display:

total count of devices

list of the network devices

information of one device with a hostname filter

What is displayed in the final step after the Python script is executed?

Options:

A.

information about a device of type C9500-40x.

B.

filtered results by the hostname and the platformld C9500-40X

C.

information about the test devices

D.

list of devices with platformId C9500-40x

Buy Now
Questions 59

Which type of OWASP threat forges a malicious HTTP request into an application?

Options:

A.

Clickjacking

B.

SQL Injection

C.

CSRF

D.

XSS

Buy Now
Questions 60

A group of software developers wants to improve its collaboration with the operations team. The group wants to deliver release-ready code that merges code changes back to the main branch and runs the automated testing as often as possible. Which DevOps concept does this scenario represent?

Options:

A.

continuous delivery

B.

version control

C.

continuous integration

D.

continuous deployment

Buy Now
Questions 61

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Options:

Buy Now
Questions 62

Refer to the exhibit. A network engineer executes the bash script shown. Which two things are achieved by running the script? (Choose two.)

Options:

A.

A directory called PRODUCTION is created.

B.

The engineer changes to the parent directory.

C.

A YAML file is created.

D.

A YAML file is removed.

E.

A directory called state.yml is created.

Buy Now
Questions 63

What is a feature of XML compared to other data formats?

Options:

A.

It uses tags to define the structure.

B.

It uses parenthesis for key-value pairs.

C.

It uses indentation to define the structure.

D.

It uses namespaces for list representation.

Buy Now
Questions 64

Refer to the exhibit.

While developing a Cisco Webex bot, an application reaches the public IP address of the firewall, but traffic is forwarded to the IP address of server 1 instead of the IP address of server 2. What causes this issue?

Options:

A.

The proxy server that rewrites traffic is misconfigured.

B.

The router is sending the traffic to server 1 instead of server 2.

C.

The switch is forwarding IP traffic to the wrong VLAN.

D.

NAT is misconfigured on the firewall.

Buy Now
Questions 65

Refer to the exhibit. Which action does the script perform?

Options:

A.

It queries user credentials from Cisco IOS XE devices.

B.

It retrieves device identification from Cisco DNA Center.

C.

It exports SSID information from Meraki dashboard.

D.

It collects group information from ACI.

Buy Now
Questions 66

Users cannot access a webserver and after the traffic is captured, the capture tool snows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?

Options:

A.

The large distance between the server and the users means that the packets require too much time to reach the destination.

B.

A router along the path is misrouting the packets in a wrong direction.

C.

A router along the path has the wrong time.

D.

The server is overloaded and the connection was not able to be processed in time.

Buy Now
Questions 67

Drag and drop characteristics from the left onto the infrastructure management methodologies on the right.

Options:

Buy Now
Questions 68

A development team is creating an application used for contactless payments. The application must:

Be web-based

Capture and process the credit card information for a purchase.

Which security action must the web application use to gather and process the private customer data?

Options:

A.

Enable RATs to monitor the web application remotely.

B.

Disable botnets to eliminate risks.

C.

Disable TLS to increase the connection speed.

D.

Enable the encryption of network traffic.

Buy Now
Questions 69

What does a developer import in a script to parse a file from XML to Python?

Options:

A.

function

B.

library

C.

variable

D.

method

Buy Now
Questions 70

Refer to the exhibit. A script must output details of all the Cisco Meraki MS220-BP switches across all organizations and networks. Drag and drop the code snippets from the bottom onto the boxes in the code to complete the script. Not all options are used.

Options:

Buy Now
Questions 71

Refer to the exhibit. Which code snippet represents the sequence.

Options:

A.

B.

C.

D.

Buy Now
Questions 72

How are operations on REST APIs performed as compared to RPC APIs?

Options:

A.

In a REST API, operations are performed on an object (node) that is identified by a URL, but RPC APIs are operation-oriented.

B.

In a REST API, operations are performed on an external resource that is defined on the API, but the RCP APIs are resource-oriented.

C.

In a REST API, operations are performed on a platform that is identified by the URL, but RPC APIs are platform-oriented.

D.

In a REST API, operations are performed on an internal resource that is defined on the API, but RPC APIs are resource-oriented.

Buy Now
Questions 73

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a request that generates a security token and gets a list of network devices. Not all options are used.

Options:

Buy Now
Questions 74

What is the impact on an application from having a large distance between a client device and a host server?

Options:

A.

jitter

B.

latency

C.

loss of connectivity

D.

increased bandwidth

Buy Now
Questions 75

Which Cisco compute management platform controls server, network, storage, and virtual resources with policy-driven management for up to 10000 physical Cisco servers?

Options:

A.

UCS Central

B.

Cisco Intersight

C.

Cisco DNA Center

D.

Cisco HyperFlex

Buy Now
Questions 76

A developer checks the performance of a web application. The application is in the local data center and uses a REST-based API. Based on the API logs, it is discovered that many its abandon API requests. Also, the response is taking too long to get back. What is the reason for this issue?

Options:

A.

Pagination is not implemented

B.

Token-based authentication is enabled.

C.

Rate limiting is not implemented.

D.

Token-based authentication is disabled

Buy Now
Questions 77

Which technology is responsible for resolving a host name to an IP address?

Options:

A.

DNS

B.

SNMP

C.

DHCP

D.

NTP

Buy Now
Questions 78

Drag and drop the code from the bottom onto the box where the code is missing to obtain a list of network devices by using the Cisco Meraki API. Not all options are used.

Options:

Buy Now
Questions 79

A team of developers is responsible for a network orchestration application in the company. The responsibilities also include:

developing and improving the application in a continuous manner

deployment of the application and management of CI/CD frameworks

monitoring the usage and problems and managing the performance improvements

Which principle best describes this DevOps practice?

Options:

A.

responsible for IT operations

B.

automation of processes

C.

end-to-end responsibility

D.

quality assurance checks

Buy Now
Questions 80

When a Cisco IOS XE networking device is configured by using RESTCONF, what is the default data encoding method?

Options:

A.

application/yaml-data+json

B.

application/yang-data+json

C.

application/xml-data+json

D.

application/json-data+xml

Buy Now
Questions 81

Which two situations align with infrastructure as code principles? (Choose two.)

Options:

A.

nonreplicable snowflake servers

B.

release versions to specific hardware

C.

maximized configuration drift

D.

easily reproducible systems

E.

repeatable processes

Buy Now
Questions 82

A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?

Options:

A.

Store the username and password in a separate configuration file.

B.

Store the username and password in a vault.

C.

Store the passwords in a dictionary.

D.

Store the username and password in code.

Buy Now
Questions 83

Refer to the exhibit.

Which type of YANG object is "interfaces"?

Options:

A.

node

B.

subitem

C.

item

D.

container

Buy Now
Questions 84

What is a capability of Ansible playbooks?

Options:

A.

They execute scheduled tasks regularly.

B.

They define the state for a device configuration.

C.

They collect SNMP logs from networking devices.

D.

They utilize the target device agent to execute.

Buy Now
Questions 85

Refer to the exhibit.

What are two results of running the RESTCONF query? (Choose two.)

Options:

A.

Interfaces are created as containers.

B.

The module letf-interfaces:interfaces is created.

C.

GigabitEthemet2 becomes shut down.

D.

GigabitEthernetl becomes shut down.

E.

Descriptions for two interfaces are applied.

Buy Now
Questions 86

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Options:

Buy Now
Questions 87

Drag and drop the common API styles from the left onto the requirement on the right.

Options:

Buy Now
Questions 88

What is a capability of model-driven programmability for infrastructure automation?

Options:

A.

compatibility with any networking device

B.

automatic version control

C.

generic APIs that are compatible with multiple platforms

D.

a single data model acr oss the network

Buy Now
Questions 89

Refer to the exhibit.

What does the command marked (2) do when it is run?

Options:

A.

It duplicates the test" branch.

B.

It deletes the "test" branch only if a new branch is created.

C.

It deletes the "test" branch.

D.

It does not delete the branch until it is merged.

Buy Now
Questions 90

Which tool simulates a network that runs Cisco equipment?

Options:

A.

Cisco Prime Infrastructure

B.

VMware

C.

Docker

D.

CML

Buy Now
Questions 91

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python script to retrieve a list of network devices from Cisco DNA Center. Not all options are used.

Options:

Buy Now
Questions 92

A developer starts to learn about building applications that use Cisco APIs. The developer needs access to Cisco security products in a development lab to test the first new Dlication that has been built. Which DevNet resource must be used?

Options:

A.

DevNet Code Exchange

B.

DevNet Automation Exchange

C.

DevNet Sandbox

D.

DevNet Communities

Buy Now
Questions 93

Refer to the exhibit.

Up to which device does the communication server 1 and server 2 go?

Options:

A.

device B

B.

device C

C.

device D

D.

device E

Buy Now
Questions 94

Refer to the exhibit. Which RESTCONF request results in this response?

Options:

A.

B.

C.

D.

Buy Now
Questions 95

Which REST architectural constraint indicates that no client context should be stored on the server between requests?

Options:

A.

stateless

B.

uniform interface

C.

cacheable

D.

client-server

Buy Now
Questions 96

Fill in the blanks to complete the Bash script in which each file in a directory is renamed to Its SHA256 hash?

Options:

Buy Now
Questions 97

Fill in the blanks to complete the cURL command that invokes a RESTful API to retrieve a resource in JSON format using OAuth.

Options:

Buy Now
Questions 98

Fill in the blanks to complete the python script to request a service ticket using the APIC-EM rest API for the user “devnetuser”.

Options:

Buy Now
Questions 99

Drag and drop the descriptions from the left onto correct application deployment models on the right.

Options:

Buy Now
Questions 100

Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.)

Options:

A.

Processor

B.

Codec

C.

Listener

D.

Receiver

E.

Transaction monitor

Buy Now
Questions 101

Refer to the exhibit.

Fill in the blanks to complete the cURL command to the list of networks in the Meraki organization with an id of 384279060

Options:

Buy Now
Questions 102

Refer to the exhibit.

Which OWASP threat does this example demonstrate?

Options:

A.

broken access control

B.

SQL injection

C.

man-in-the-middle

D.

cross-site scripting

Buy Now
Questions 103

Refer to the exhibit.

Drag and drop the descriptors from the left onto the correct parts of the API request and response on the right.

Options:

Buy Now
Questions 104

Refer to the exhibit.

Drag and Drop the code from the bottom onto the box where the code is missing on the Meraki Python script to create a new network

Options:

Buy Now
Questions 105

Refer to the exhibit.

What is represented in this YANG module?

Options:

A.

interface management

B.

topology

C.

BGP

D.

OpenFlow

Buy Now
Questions 106

Refer to the exhibit.

Which two statements about the network diagram are true? (Choose two.)

Options:

A.

PC-A and PC-B are in the same subnet.

B.

One of the routers has two connected serial interfaces.

C.

The subnet of PC-C can contain 256 hosts.

D.

R1 and R3 are in the same subnet.

E.

The subnet address of PC-B has 18 bits dedicated to the network portion.

Buy Now
Questions 107

Which line is an example of the start of a chunk from a unified diff?

Options:

A.

@@ -90,88 +20191008T1349@@

B.

@@ -20191007T1200 +88,90 @@

C.

@@ -20191007T1200 +20191008T1349@@

D.

@@ -88,10 +88,6 @@

Buy Now
Questions 108

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. Not all options are used.

Options:

Buy Now
Questions 109

Refer to the exhibit.

Fill in the blank to complete the query parameter and value so that the result set is returned in reverse chronological order (most recent first) based on when message were entered.

Options:

Buy Now
Questions 110

Which two concepts describe test-driven development? (Choose two.)

Options:

A.

It enables code refactoring.

B.

Write a test before writing code.

C.

Implementation is driven by incremental testing of release candidates.

D.

User acceptance testers development the test requirements.

E.

Tests are created when code is ready for release.

Buy Now
Questions 111

Drag and drop the element of the Finesse API on the left onto the description of its functionally on the right.

Options:

Buy Now
Questions 112

Refer to the exhibit.

Drag and drop the code from the left onto the item numbers on the right to complete to Meraki python script shown in the exhibit.

Options:

Buy Now
Questions 113

What is the purpose of the Cisco VIRL software tool?

Options:

A.

To verify configurations against compliance standards

B.

To simulate and model networks

C.

To automate API workflows

D.

To test performance of an application

Buy Now
Questions 114

Which principle is a value from the manifesto for Agile software development?

Options:

A.

adhering to a plan over responding to requirements

B.

detailed documentation over working software

C.

processes and tools over teams and inter actions

D.

customer collaboration over contract negotiation

Buy Now
Questions 115

Refer to the exhibit.

OR

An administrator attempts to perform a GET using the Cisco IOS XE RESTOCNF API to return the hostname of a device. The sequence diagram illustrated the HTTP message observed. Which change to the API request resolves the issue?

Options:

A.

Add Content-Type HTTP header with 'application/yang-data+json' using –H ‘Content-Type: application/yang-data+json’.

B.

Use -u cisco: cisco instead of -u ‘cisco: cisco'.

C.

Change the request method from -X "GET” to- X’ POST”.

D.

Remove the -H ’Accept: application/yang-data^/son’ HTTP header because it is not required.

Buy Now
Questions 116

Which two statements describe the advantages of using a version control system? (Choose two.)

Options:

A.

It allows for branching and merging so that different tasks are worked on in isolation before they are merged into a feature or master branch.

B.

It allows multiple engineers to work against the same code and configuration files and manage differences and conflicts.

C.

It provides tooling to automate application builds and infrastructure provisioning.

D.

It allows developers to write effective unit tests.

E.

It provides a system to track User Stories and allocate to backlogs.

Buy Now
Questions 117

A function my_func() returns True when it executes normally. Which python snippet tests my_func()?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 118

Drag and drop elements of the RESTCONF protocol stack from the left onto the correct description on the right. Not all elements on the left are used.

Options:

Buy Now
Questions 119

On which network plane is routing protocol traffic handled?

Options:

A.

data plane

B.

management plane

C.

authentication plane

D.

control plane

Buy Now
Questions 120

A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without error and the bundles are produced. However, when the script is run during business hours, report poor voice quality of phones calls. What explains this behavior?

Options:

A.

The application is running in the Voice VLAN and causes delays and jitter in the subnet.

B.

The speed and duplex settings in Cisco DNA Center are sot incorrectly, which causes the transfer to be too slow.

C.

9 The script is written in a low-level programming language where there is no memory safety. This causes a buffer overflow and disruption on the network.

D.

Generating the logs causes the CPU on the network controller to spike, which causes delays m forwarding the voice IP packets.

Buy Now
Questions 121

What are two advantages of version control software? (Choose two.)

Options:

A.

It supports tracking and comparison of changes in binary formate files.

B.

It allows old versions of packaged applications to be hosted on the Internet

C.

It provides wiki collaboration software for documentation.

D.

It supports comparisons between revisions of source code files.

E.

It allows new team members to access the current code and history.

Buy Now
Questions 122

Which two items are Cisco DevNet resources? (Choose two.)

Options:

A.

TAC support

B.

Bitbucket

C.

Sandbox

D.

Software research

E.

API Documentation

Buy Now
Questions 123

Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose two.)

Options:

A.

Cisco Intersight API interactions can be encoded in XML or JSON and require an APIs key in the HTTP header for authentication.

B.

USC Director API interactions can be XML- or JSON-encoded and require an APLs key in the HTTP header for authentication.

C.

UCS manager API interactions are XML-encoded and require a cookie in the method for authentication.

D.

Cisco Intersight uses XML to encoded API interactions and requires an API key pair for authentication.

E.

UCS manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the HTTP header for authentication.

Buy Now
Questions 124

Which device is used to transport traffic from one broadcast domain to another broadcast domain?

Options:

A.

load balancer

B.

layer 2 switch

C.

router

D.

proxy server

Buy Now
Questions 125

Refer to the exhibit.

Drag and drop the code from the left code from the left onto the item number on the right to complete the Meraki code to obtain a list of client which have used this network.

Options:

Buy Now
Questions 126

Refer to the exhibit.

A REST API retune this JSON output for a GET HTTP request, Which has assigned to a variable called “vegetables” Using python, which output is the result of this command?

Options:

A.

Lettuce

B.

Kiwi

C.

[‘kiwi’, ‘grape’]

D.

{‘color’: ‘green’, ‘items’: [‘kiwi’, ‘grape’]

Buy Now
Questions 127

Which type of HTTP method is used by the Meraki nad webex teams APIs to send webhook notifications?

Options:

A.

HTTP GET

B.

HTTP PUT

C.

HTTP HEAD

D.

HTTP POST

Buy Now
Questions 128

On which port does NETCONF operate by default?

Options:

A.

23

B.

443

C.

822

D.

830

Buy Now
Questions 129

Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)

Options:

A.

An artifact repository allows to compare and merge changes in the source code of files involved in a build process.

B.

An artifact repository is needed only for CI/CD pipeline executed on a public cloud infrastructure.

C.

An artifact repository provides traceability, search, and management of binary files.

D.

An artifact repository is needed only for managing open source software.

E.

An artifact repository stores files needed and generated during the build process.

Buy Now
Questions 130

What is used in Layer 2 switches to direct packet transmission to the intended recipient?

Options:

A.

spanning tree

B.

IPv4 address

C.

IPv6 address

D.

MAC address

Buy Now
Questions 131

Which two use cases are supported by Meraki APIs? (Choose two.)

Options:

A.

Retrieve live streams from a Meraki Camera.

B.

Build a custom Captive Portal for Mobile Apps.

C.

Configure network devices via the Dashboard API.

D.

Build location-aware apps from Wi-Fi and LoRaWAN devices.

E.

Deploy applications onto the devices.

Buy Now
Questions 132

Drag and drop the function on the left onto the type of plane that handles the function on the right.

Options:

Buy Now
Questions 133

Drag and Drop the GIT commands from the left onto the right that add modified local files to a remote repository. Not all options are used

Options:

Buy Now
Questions 134

Refer to Exhibit.

Which JSON is equivalent to the XML-encoded data.

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 135

Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.

Options:

Buy Now
Questions 136

Which two encoding formats do YANG interfaces support?

Options:

A.

JSON

B.

XML

C.

XHTML

D.

Plain text

E.

BER

Buy Now
Questions 137

Which mechanism is used to consume a RESTful API design when large amounts of data are returned?

Options:

A.

Data sets

B.

Scrolling

C.

Blobs

D.

Pagination

Buy Now
Questions 138

Refer to the exhibit.

What is the effect of this Ansible playbook on an IOS router?

Options:

A.

A new running configuration is pushed to the IOS router.

B.

The current running configuration of the IOS router is backed up.

C.

The start-up configuration of the IOS router is copied to a local folder.

D.

A new start-up configuration is copied to the IOS router.

Buy Now
Questions 139

Drag and drop the requests from the left into the correct order on the right to create and check the path trace between two devices using Cisco DNA center API.

Options:

Buy Now
Questions 140

Package updates from a local server fail to download. However, the same updates work when a much slower external repository is used. Way are local updates failing?

Options:

A.

The update utility is trying to use a proxy to access the internal resource.

B.

The Internet connection is too slow.

C.

The Internet is down at the moment, which causes the local server to not be able to respond.

D.

The server is running out of disk space.

Buy Now
Exam Code: 200-901
Exam Name: DevNet Associate (DEVASC)
Last Update: Jun 15, 2025
Questions: 467
200-901 pdf

200-901 PDF

$28.5  $94.99
200-901 Engine

200-901 Testing Engine

$33  $109.99
200-901 PDF + Engine

200-901 PDF + Testing Engine

$43.5  $144.99