Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Cisco 200-901 DevNet Associate (DEVASC) Exam Practice Test

Demo: 140 questions
Total 467 questions

DevNet Associate (DEVASC) Questions and Answers

Question 1

A developer created a new secure API and is testing the functionality locally. The API was added to a container for further testing, and other team members and applications need to connect to the API. Which command exposes the API in the container as port 8443 and allows connections external to the host?

Options:

A.

docker run -p 127.0.0.1:80:8443/tcp myapiservice

B.

docker run -p 0.0.0.0:443:8443/tcp myapiservice

C.

docker run -p 0.0.0.0:8443:443/tcp myapiservice

D.

docker run -p 127.0.0.1:443:8443/tcp myapiservice

Question 2

Which tool allows changes to the configuration management toolset to be tested?

Options:

A.

Cisco VIRL

B.

NAPALM

C.

Ansible

D.

pyATS

Question 3

Refer to the exhibit.

A developer needs to upload a local file by using the REST API. The developer gathers information according to the documentation and sends the request by using the cURL command in the exhibit but gets an error code. Which action should be followed to get valid response?

Options:

A.

change content type as JSON

B.

add the authorization header with the access token

C.

add a username-password combination to request command

D.

change request method as GET

Question 4

A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?

Options:

A.

git update

B.

git merge

C.

git add

D.

git rebase

Question 5

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code,

which resource must be used to verify that the code works correctly?

Options:

A.

Cisco NX-OS SDK

B.

Cisco Learning Labs

C.

Cisco Code Exchange

D.

Cisco Modeling Labs

Question 6

Which advantage does the agile process offer compared to waterfall software development?

Options:

A.

to view the full scope of end-to-end work

B.

to have each phase end before the next begins

C.

to fix any issues at the end of the development cycle

D.

to add or update features with incremental delivery

Question 7

A company wants to accelerate the adoption of technologies that will simplify its operations. Staff have different skill levels and are looking for a single site to find easy-to-consume beginner, intermediate, and advanced multidomain use cases. Which site should be used?

Options:

A.

DevNet Ecosystem Exchange

B.

DevNet Automation Exchange

C.

DevNet Creations

D.

DevNet Support Forum

Question 8

A new application is being developed that must be hardware independent. The application includes an administrative component which is accessed using a Windows desktop GUI. Installation and management of the environment must be fully automated. Which application deployment type meets the requirements?

Options:

A.

bare metal

B.

virtual Python environment

C.

container

D.

virtual machine

Question 9

How are load balancers used in modern application deployment?

Options:

A.

Allow traffic to continue as new compute units are brought up and old compute units are taken down.

B.

Allow http and https traffic to continue as old compute units are discontinued before new units are brought up.

C.

Turn off traffic and take down compute units, then update and bring the compute units back up.

D.

Bring up new compute units, test the compute units, and switch the traffic from old units to new units.

Question 10

Refer to the exhibit.

A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?

Options:

A.

enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

B.

enable_function(‘iana-if-type:softwareLoopback’, Loopback1, true,)

C.

def enable_function(‘iana-if-type:softwareLoopback’, Loopback1, false,)

D.

def enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

Question 11

Refer to the exhibit.

A developer must integrate a bot with an internal communication app. The developer wants to replace the webexbot package with the teamsbot package by using Ansible and prepares a playbook In the first two tasks, the playbook stops the webexbot and verifies that the teamsbot is installed. What is accomplished in the last task of the workflow when the developer runs the Ansible playbook?

Options:

A.

stops the webexbot service and uninstals it and retains its configuration files

B.

installs the webexbot and retains the configuration files

C.

uninstalls the webexbot package and removes its configuration files

D.

searches whether the purge package is available in the repository and uninstalls the webexbot package

Question 12

Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.

Options:

Question 13

Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?

Options:

A.

100

B.

204

C.

302

D.

402

Question 14

What is a benefit of test-driven development?

Options:

A.

early customer involvement

B.

increased code quality

C.

faster releases that have minimal features

D.

strict adherence to product requirements

Question 15

Refer to the exhibit.

Which device limits traffic between server 1 and server 2?

Options:

A.

Device B

B.

Device C

C.

Device D

D.

Device E

Question 16

What are two key capabilities of Cisco Finesse? (Choose two.)

Options:

A.

Finesse includes an RPC API that enables the development of custom gadgets.

B.

Agents access Finesse from a browser without needing to install or configure anything on the client machine.

C.

Finesse automatically collects telemetry data

D.

An OpenDNS utility is preconfigured and ready to use on Finesse.

E.

Gadget containers provide a seamless experience in a single user interface.

Question 17

What is the main purpose of a code review?

Options:

A.

To provide the technical lead visibility into all code

B.

To identify and review errors with the team

C.

To ensure that all code is checked in simultaneously

D.

To detect logical errors

Question 18

What is a benefit of model-driven programmability?

Options:

A.

It addresses the static architecture of traditional networks being decentralized and complex.

B.

By modeling data, it ensures that vast quantities of data are usable for monitoring.

C.

It provides a programmatic and standards-based way of writing configurations to any network device.

D.

It simplifies management and operations by decoupling the networking hardware from its control mechanism.

Question 19

Which protocol must be allowed on the firewall so that NTP services work properly?

Options:

A.

ICMP

B.

BGP

C.

UDP

D.

TCP

Question 20

Drag and drop the code from the bottom onto the box where the code is missing in the Python script to complete a function to return all the clients on a network by using the Cisco Meraki Dashboard API. Not all options are used.

Options:

Question 21

Refer to the exhibit. What does the load balancer enable in the network topology?

Options:

A.

hosted application to access Internet services

B.

external requests to be routed to the application servers

C.

workstations to access the Internet

D.

application to access the database server

Question 22

Drag and drop the code snippets from the bottom into the Python script to write API output to a csv file. Not all options are used.

Options:

Question 23

Which API must an engineer use to change a netmask on a Cisco IOS XE device?

Options:

A.

Meraki

B.

RESTCONF/YANG

C.

SD-WAN

D.

DNAC

Question 24

Refer to the exhibit.

Drag and drop the code from the bottom onto the blanks in the code to construct a cURL command using the Cisco DNA Center API. which will provide the details of a WLAN controller with Id af397748444. Not at options are used.

Options:

Question 25

What are two considerations when selecting the "best route" for a network device to reach its destination? (Choose two.)

Options:

A.

MAC address

B.

metrics

C.

administrative distance

D.

IP address

E.

subnet mask

Question 26

A developer is creating a script to interact with a REST API service which requires basic authentication. The credentials are "devnet:391665405" and the Base64 encoding of the credentials is "GV2bmV0dXNlcjpDaXNj=". Which payload and header combination must be used for authentication?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 27

What are two properties of private IP addresses? (Choose two.)

Options:

A.

They can be used to access the Internet directly.

B.

They are more secure than public IP addresses.

C.

They are not globally unique.

D.

They can be repeated within the same local network.

E.

They are controlled globally by an IP address registry.

Question 28

Refer to the exhibit.

A developer needs to automatically retrieve all of the messages of a Webex room with the roomld of

HY2l2Y292cGFyazovL3Vz397748444YjU5NjAtNTk0ZJ0xMWVhLTk0Mj". Using the Webex API documentation shown, drag and drop the code snippets from below onto the code to complete the Python script to list all of the messages in the room. Not all options are used.

Options:

Question 29

How do XML and JSON compare regarding functionality?

Options:

A.

JSON natively supports arrays and XML does not natively support arrays.

B.

XML provides support for mapping data structures into host languages than JSON.

C.

XML provides more human readability than JSON.

D.

JSON provides support for data types than XML.

Question 30

Refer to the exhibit.

A developer creates a Python script that queries Cisco Webex. When the script is executed, a 401 code is returned. After troubleshooting, the developer discovers that the service is missing privileges. Which change to the header in line 4 of the script results in the code 200?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 31

Which HTTP response status code means “Forbidden”?

Options:

A.

500

B.

401

C.

403

D.

502

Question 32

Refer to the exhibit.

A network engineer must change the configuration on devices daily. The Python script must collect CLI arguments from the user, organize data according to the Cisco-IOS-XE-native YANG model, and utilize Cisco REST APIs to make the configuration. Which workflow is being automated by the Python script?

Options:

A.

updating an existing route on the device

B.

adding a new route to a device

C.

including a route on the device and overwriting the current routes

D.

deleting the route that is passed through the command-line variables

Question 33

A developer is working on a feature for a new application. The changes in the existing branch named 'feat00304' must be integrated into a single commit with the current working primary branch named 'prodapp411926287'. Which git command must be used?

Options:

A.

git rebase --merge feat00304

B.

git merge --squash feat00304

C.

git push --rebase feat00304

D.

git checkout --squash feat00304

Question 34

Refer to the exhibit. A network engineer must collect information from the network. The engineer prepares a script to automate workflow by using Cisco Meraki API. The script must run over nested loops to collect organization and network information and uses the collected data for final collection. Which process is being automated by using the Python script?

Options:

A.

Gather the IDs of the ACME organization, the BLDG21 network, and the dents on the network

B.

Provide the BLDG21 network information if it is part of the ACME organization

C.

Collect the IDs of the clients on the BLDG21 network

D.

List the IDs from the ACME organization

Question 35

Refer to the exhibit.

Which infrastructure automation method is shown?

Options:

A.

Waterfall

B.

CI/CD pipeline

C.

Agile

D.

Lean

Question 36

Refer to the exhibit.

Which command needs to be placed on the box where the code is missing to output the value of page_jd in the Python 3.7 script?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 37

What is a benefit of a model-driven approach for infrastructure automation?

Options:

A.

enforces the generation of all automation scripts through the modeling environment

B.

provides a small learning curve and helps system administrators with limited coding experience

C.

ensures that system administrators gain a good understanding of coding and expand their experience and capabilities

D.

enables a user to understand a declarative language to translate the model into an actionable script

Question 38

Which configuration management tool has an agentless capability?

Options:

A.

Chef

B.

Puppet

C.

Ansible

D.

CFEngine

Question 39

Which Cisco platform provides organization-wide automation, security, policy enforcement, any agility across wired and wireless networks?

Options:

A.

Cisco ACI

B.

Cisco DNA Center

C.

Cisco Umbrella

D.

Cisco SD-WAN

Question 40

What is a capability of an agentless configuration management system?

Options:

A.

It requires managed hosts to have an interpreter for a high-level language such as Python or Ruby.

B.

It requires managed hosts to connect to a centralized host to receive updated configurations.

C.

It uses compiled languages as the basis of the domain-specific language to interface with managed hosts.

D.

It uses existing protocols to interface with the managed host.

Question 41

Refer to the exhibit.

Which line must be included in the Bash script for the Python code to succeed?

Options:

A.

define WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

B.

export WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

C.

set WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

D.

WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

Question 42

What are two benefits of model-driven programmability?

Options:

A.

model-driven APIs for abstraction and simplification

B.

single choice of transport, protocol, and encoding

C.

model-based, structured, and human friendly

D.

easier to design, deploy, and manage APIs

E.

models decoupled from transport, protocol, and encoding

Question 43

A developer needs a list of clients connected to a specific device in a Meraki network. After making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet resource should be used to identify the meaning of the response code?

Options:

A.

API documentation

B.

Sandbox

C.

Learning Labs

D.

Code Exchange

Question 44

In which two ways is an application characterized when interacting with a webhook? (Choose two.)

Options:

A.

codec

B.

receiver

C.

transaction monitor

D.

processor

E.

listener

Question 45

Drag and drop the code snippets from the bottom to the blanks in the code to test the API response through the Python unittest library. Not all options are used.

Options:

Question 46

Refer to the exhibit.

A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?

Options:

A.

compilation and configuration of the Cisco DevNet application so that it must be started manually

B.

compilation, installation, and configuration of the Cisco DevNet application so that it starts automatically

C.

compilation and installation of the Cisco DevNet application for an autonomous deployment model

D.

installation and configuration of the Cisco DevNet application so that it starts manually

Question 47

Refer to the exhibit.

A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?

Options:

A.

results gathering of the show version and show ip int brief commands

B.

output of show ip int brief command on devices of type C9500-40X

C.

execution information of the show version and show ip int brief commands

D.

list of executed commands on C9500-40X and the information of show ip int brief command

Question 48

Refer to the exhibit.

A security team observes an attack that originates from a Cisco Meraki device. To mitigate the attack, the team requests that the engineering team remove the /ice from the network. The security team also requests information about the device, such as Its name and location. Which tool must the engineering team use to meet the luirements by using tasks?

Options:

A.

CFEngine

B.

cURL

C.

Postman

D.

Ansible

Question 49

Which IP service synchronizes the time across devices?

Options:

A.

DNS

B.

NTP

C.

SNMP

D.

NAT

Question 50

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to add a subnet to each bridge domain in the Ten1 tenant. Not all options are used.

Options:

Question 51

Which two protocols are associated with the control plane on a network device? (Choose two.)

Options:

A.

BGP

B.

UDP

C.

SNMP

D.

FTP

E.

OSPF

Question 52

Which Python function is used to parse a string that contains JSON data into a Python dictionary?

Options:

A.

json.dumps()

B.

json.to_json()

C.

json.parse()

D.

json.loads()

Question 53

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script by using the Cisco SDK. Not all options are used.

Options:

Question 54

Refer to the exhibit.

What occurs when the script runs?

Options:

A.

The contents of both files are displayed.

B.

The total length of the files is displayed.

C.

The files are combined.

D.

File differences are compared.

Question 55

Refer to the exhibit. An engineer prepares a script to automate workflow by using Cisco DNA Center APIs to display:

total count of devices

list of the network devices

information of one device with a hostname filter

What is displayed in the final step after the Python script is executed?

Options:

A.

information about a device of type C9500-40x.

B.

filtered results by the hostname and the platformld C9500-40X

C.

information about the test devices

D.

list of devices with platformId C9500-40x

Question 56

Refer to the exhibit. An engineer is comparing two files by using the unified diff format. Which cade snippet belongs to the new.py file?

Options:

A.

B.

C.

D.

Question 57

Drag and drop the code snippets from the bottom onto the blanks in the code to complete the happy path scenario. Not all options are used.

Options:

Question 58

What is a characteristic of lest-driven development?

Options:

A.

It enables code refactoring.

B.

User tests are created after deployment.

C.

Infrastructure testing is done at every stage.

D.

Large updates are applied infrequently.

Question 59

A developer writes an application that refines data in temporary secure file storage hosted on the public cloud. Data will be deleted after processing and does not contain any private information. What is the advantage that a public cloud deployment provides to the developer?

Options:

A.

high security with encryption

B.

ease in infrastructure management

C.

flexible development

D.

bespoke services

Question 60

Drag and drop the code from the bottom onto the box where the code is missing to obtain a list of network devices by using the Cisco Meraki API. Not all options are used.

Options:

Question 61

Which two commands download and execute an Apache web server container in Docker with a port binding 8080 in the container to 80 on the host? (Choose two.)

Options:

A.

docker pull apache

B.

docker run -p 8080:80 httpd

C.

docker run -p 80:8080 httpd

D.

docker pull httpd

E.

docker pull https

Question 62

An engineer needs to collect information about 20,000 Bluetooth clients using the Cisco Meraki API. The API returns only 1,000 results. One of the HTTP response headers has the data:

Link: https://api.meraki.com.info/api/v0/networks/ABC/bluetoothClients?perPage=1000 &startingAfter=1000>;rel=“next”

Which RFC is implemented by the API to apply the restriction?

Options:

A.

RFC 5988 – Web Linking

B.

RFC 5890 – Response Constraints

C.

RFC 5005 – Feed Paging and Archiving

D.

RFC 5446 – Content Limits

Question 63

Which HTTP error code series relates to redirection?

Options:

A.

400

B.

500

C.

200

D.

300

Question 64

What is a capability of Cisco Webex?

Options:

A.

Join preconfigured or new spaces with fixed user rights.

B.

Configure devices at scale via automation scripts or by manual execution.

C.

Initiate or respond to calls automatically via automation.

D.

Get space history or notified in real time when new messages are posted.

Question 65

A developer completed the creation of a script using Git. Before delivering it to the customer, the developer wants to be sure about all untracked files, without losing any information. Which command gathers this information?

Options:

A.

git clean –n

B.

git rm –f

C.

git clean –r

D.

git rm *

Question 66

Drag and drop the functions from the left onto the networking devices on the right.

Options:

Question 67

Drag and drop the characteristics from the left onto the software development methodologies on the right.

Options:

Question 68

Which TCP port is used to connect to a network device by using Telnet?

Options:

A.

23

B.

69

C.

400

D.

830

Question 69

Refer to the exhibit.

A developer can access the TLS REST API on server A, but cannot access the API on server B. The developer can ping server B. When the developer performs a packet capture on the TLS REST API port on server B, the capture shows that the packet arrived and the server responded. What causes the issue?

Options:

A.

Port 80 is blocked on the outgoing interface of firewall B.

B.

Port 443 is blocked on the outgoing interface of firewall A.

C.

Port 443 is blocked on the incoming interface of firewall B.

D.

Port 80 is blocked on the incoming interface of firewall A.

Question 70

Refer to the exhibit. A developer creates a Python script by using the Cisco Meraki API. The solution must:

• Obtain a list of HTTP servers for a network named "netl".

• Print the response body if the HTTP status code is 200.

• Handle the timeout requests as exceptions, and print Timeout Error next to the exception to stdout.

Which block of code completes the script?

A)

B)

Options:

A.

Option A

B.

Option B

Question 71

What is a characteristic of the Cisco Finesse platform?

Options:

A.

Applications allow services to be invoked on a network triggered event.

B.

The platform provides a ready-to-go platform for HD video and audio conferencing.

C.

Applications are added to the platform from the desktop remotely.

D.

The platform includes an enterprise-class IM engine.

Question 72

What is a feature of XML compared to other data formats?

Options:

A.

It uses tags to define the structure.

B.

It uses parenthesis for key-value pairs.

C.

It uses indentation to define the structure.

D.

It uses namespaces for list representation.

Question 73

Which Cisco platform is used to manage data center infrastructure through third-party tools and system integrations?

Options:

A.

Cisco DNA Center

B.

Cisco UCS Manager

C.

Cisco Intersight

D.

Cisco UCS Director

Question 74

Developer is working on a new feature and made changes on a branch named ‘branch-413667549a-new’. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?

Options:

A.

git merge -no-edit

B.

git merge -commit

C.

git merge -revert

D.

git merge -abort

Question 75

Which IP service is responsible for automatically assigning an IP address to a device?

Options:

A.

DNS

B.

DHCP

C.

SNMP

D.

NAT

Question 76

A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?

Options:

A.

Store the username and password in a separate configuration file.

B.

Store the username and password in a vault.

C.

Store the passwords in a dictionary.

D.

Store the username and password in code.

Question 77

Drag and drop the code from the bottom onto the box where the code is missing to enable ports on a switch by using RESTCONF. Not all options are used.

Options:

Question 78

Refer to the exhibit.

An engineer sends the request to collect data over Cisco AMP for Endpoints API. The Engineer must list guide and hostname data for all computers, but the first request returns only 500 items out of 2,000. Then, the engineer adds the loop to collect all the data. What must be added to the script where the code is missing to complete the requests?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 79

Refer to the exhibit.

The IT team deployed a new Linux virtual machine for a software engineer to use. but the engineer is not comfortable configuring services using Bash. Which workflow is automated by the Ansible playbook?

Options:

A.

Restart the network on the ethO interlace and start the httpd service if it is not already started.

B.

Restart the httpd service and start the network service for the ethO interface.

C.

Start the network service on the ethO interface even if it was brought down manually.

D.

Restart the httpd service and the network service regardless of the state.

Question 80

Refer to the exhibit.

A network engineer must improve the fabric discovery process in a data center. The engineer wants to check current ACI scripts in the myproject repository and clone them to a folder named aci. The engineer will optimize the scripts from the new folder. Which command performs this task on the Git repository?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 81

Refer to the exhibit.

Which XML snippet has interface information that conforms to the YANG model?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 82

A company wants to automate the orders processed on its website using API. The network device that supports the solution must:

    support XML encoding

    support distributed transactions

    support YANG data models

    be support software redundancy

Which requirement prevents the use of RESTCONF for the solution?

Options:

A.

software redundancy

B.

YANG data models

C.

distributed transactions

D.

XML encoding

Question 83

An engineer must run tests on several Cisco controllers. Due to the nature of the task, the infrastructure must be running at all times and have access to APIs. Which Cisco DevNet source must the engineer use?

Options:

A.

DevNet Learning Labs

B.

DevNet Code Exchange

C.

DevNet Sandbox

D.

DevNet API documentation

Question 84

Which action do webhooks enable an application to perform?

Options:

A.

Increase the request rate limit.

B.

Populate the application with restricted data.

C.

Receive real-time data.

D.

Implement a push model.

Question 85

Rotor to the exhibit. Which API is called when the REMOTE TU sends a TCONNECT Response to the LOCAL TU?

Options:

A.

TCONNECT completion

B.

TCONNECT request

C.

TCONNECT indication

D.

TCONNECT confirm

Question 86

Which protocol is used for clock synchronization between network devices?

Options:

A.

FTP

B.

NNTP

C.

BGP

D.

NTP

Question 87

Refer to the exhibit. Which HTTP code is returned after the RESTCONF query is executed?

Options:

A.

201

B.

204

C.

302

D.

304

Question 88

What is a capability of the AXL API?

Options:

A.

It adds a user to a collaboration space to share information and files.

B.

It executes SQL commands in Cisco Unified Communications Manager.

C.

It allows a meeting to be created with users that do not belong to same organization.

D.

It collects information about system, cluster, and database settings.

Question 89

What is a benefit of using Python classes?

Options:

A.

They improve code organization by keeping data members and methods together.

B.

They remove the concept of inheritance to improve code readability and maintainability.

C.

They allow a Python script to import code from various independent modules.

D.

They simplify integration by testing the classes independently from other components.

Question 90

What is the function of an Ethernet switch in a networking environment?

Options:

A.

to switch a frame from one port to another port based on IP address

B.

to switch a frame from one port to another port based on MAC address

C.

to provide IP addressing to connected hosts

D.

to block unwanted traffic

Question 91

Drag and drop the code from the bottom onto the box where the code is missing to authenticate with the Cisco DNA Center REST API by using basic authentication. Then generate a token for later use. Not all options are used.

Options:

Question 92

Refer to the exhibit.

An administrator attempts to perform a GET operation by using the Cisco IOS XE RESTCONF API to return the hostname of a device. The sequence diagram in the exhibit illustrates the HTTP messages observed. Which change to the API request resolves the issue?

Options:

A.

Remove the -H 'Accept: application/yang-data+json’ header.

B.

Replace -u cisco:cisco parameter with -u ‘cisco:cisco’.

C.

Change the request method from -X ‘GET’ to -X ‘POST’.

D.

Add the -H ‘Content-Type: application/yang-data+json’ header.

Question 93

A developer attempts to refactor and improve the application code. It is noticed that the code contains several pieces of key information that could be a security threat if this code is accessible by those who are not

authorized to this data. Which approach addresses the security concerns noticed by the developer?

Options:

A.

Host the application code on a machine located in a secure data center.

B.

Utilize environment variables for username and password details.

C.

Rely on the security teams’ goodwill to not give access to those who do not need it.

D.

Move the hardware that the application is deployed on to a secure location.

Question 94

What is a firehose webhook?

Options:

A.

It collects data from third-party cloud APIs for custom applications.

B.

It enables an application to receive real-time data from Cisco Webex.

C.

It enables data to flow from the Cisco Webex API to a user’s application.

D.

It sends a notification of any event for commonly used resources.

Question 95

Which type of threat occur when an attacker can send hostile data to an interpreter within an application?

Options:

A.

Cross-site scripting

B.

Sensitive data exposure

C.

Broken authentication

D.

Injection

Question 96

Refer to the exhibit.

What is represented in this YANG module?

Options:

A.

interface management

B.

topology

C.

BGP

D.

OpenFlow

Question 97

What is used in Layer 2 switches to direct packet transmission to the intended recipient?

Options:

A.

spanning tree

B.

IPv4 address

C.

IPv6 address

D.

MAC address

Question 98

Which mechanism is used to consume a RESTful API design when large amounts of data are returned?

Options:

A.

Data sets

B.

Scrolling

C.

Blobs

D.

Pagination

Question 99

Which network device monitors incoming and outgoing traffic and decides whether to allow or block specific traffic based on a defined set of rules?

Options:

A.

switch

B.

load balancer

C.

reverse proxy

D.

firewall

Question 100

What is the purpose of the Cisco VIRL software tool?

Options:

A.

To verify configurations against compliance standards

B.

To simulate and model networks

C.

To automate API workflows

D.

To test performance of an application

Question 101

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right.

Options:

Question 102

Which HTTP status Code means that the server cannot or will not process the request because of perceived client error?

Options:

A.

100

B.

203

C.

303

D.

400

Question 103

: 19 DRAG DROP

Drag and drop the HTTP methods from the left onto their generally accepted corresponding create, read, update, and delete operations on the right.

Options:

Question 104

Which way should be used to safely the API keys?

Options:

A.

In an environment variable unique to the system database

B.

Encrypted in a configuration file that is separate from the code

C.

Encrypted in the code in a function

D.

Plain text in the code as a constant

Question 105

Refer to the exhibit.

Drag and drop the code from the left code from the left onto the item number on the right to complete the Meraki code to obtain a list of client which have used this network.

Options:

Question 106

When a Cisco IOS XE networking device is configured using RESTCONF, what is the default data-encoding method?

Options:

A.

XML

B.

x-form-encoding

C.

YANG

D.

YAML

Question 107

Which action does the Git command git merge allow the development to perform?

Options:

A.

Combine multiple sequence of commits into one unified history.

B.

Push changes to the remote repository

C.

Switch between branches

D.

Create, list, rename, and delete branches

Question 108

A 401 HTTP response code is returned when calling a REST API. What is the error state identified by this response code?

Options:

A.

The server cannot process the request as it has detected an issue in the request syntax or body.

B.

The server accepted the request but the client is not authorized for this content.

C.

The request has not been accepted because it requires authentication.

D.

The server cannot find the requested resource because the path specified is incorrect.

Question 109

Refer to the exhibit.

Fill in the blanks to complete the cURL command to the list of networks in the Meraki organization with an id of 384279060

Options:

Question 110

Drag and Drop the GIT commands from the left onto the right that add modified local files to a remote repository. Not all options are used

Options:

Question 111

Fill in the blanks to complete the Python script to update the Webex Teams membership of a room using the Python requests library import requests

Options:

Question 112

Drag and drop elements of the RESTCONF protocol stack from the left onto the correct description on the right. Not all elements on the left are used.

Options:

Question 113

A REST API service requires authentication based on the username and password. The user “john” has the password “384279060” and the Base64 encoding of those credentials is “am9objowMTIzNDU2Nzg=”. Which method completes an authentication request?

Options:

A.

The header must include:

Authorization: Bearer am9obJowMTlzNDU2Nzg=

B.

The payload must include:

Authorization: Bearer am9objowMTIzNDU2Nzg=

C.

The payload must include.

Authorization: Basic am9objowMTlzNDU2Nzg=

D.

The header must include:

Authorization: Basic am9objowMTlzNDU2Nzg=

Question 114

Users cannot access a webserver and after the traffic is captured, the capture too* shows an ICMP packet that reports "communication administratively prohibited" What Is the cause of this webserver access Issue?

Options:

A.

An access list along the path is blocking the traffic

B.

The traffic is not allowed to be translated with NAT and dropped.

C.

Users must authenticate on the webserver to access It

D.

A router along the path is overloaded and thus dropping traffic

Question 115

Which model-driven programmability protocol does Cisco IOS XE Software support?

Options:

A.

CORBA

B.

SSH

C.

gNMI

D.

SOAP

Question 116

Refer to the exhibit.

The output of a unified diff when comparing two versions of a python script is shown. Which two “single_request _timeout ()”

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 117

Which principle is a value from the manifesto for Agile software development?

Options:

A.

adhering to a plan over responding to requirements

B.

detailed documentation over working software

C.

processes and tools over teams and inter actions

D.

customer collaboration over contract negotiation

Question 118

Drag and drop the characteristics from the left onto the corresponding software development methodologies on the right?

Options:

Question 119

Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.

Options:

Question 120

Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?

Options:

A.

OAuth must be used.

B.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

C.

Basic authentication must be used.

D.

No authentication is required.

Question 121

Refer to Exhibit.

Which JSON is equivalent to the XML-encoded data.

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 122

What are the two purposes for using a VLAN in a network? (Choose two)

Options:

A.

It is used to create the routing table.

B.

It creates a collection of MAC addresses.

C.

It is used for VM network traffic.

D.

It segments a network.

E.

It creates a broadcast domain.

Question 123

In which situation would an edge computing solution be used?

Options:

A.

where low latency is needed

B.

where high CPU throughput is needed

C.

where fast memory is needed

D.

where high disk space is needed

Question 124

Drag and Drop the Bash commands from the left onto the correct actions on the right.

Options:

Question 125

Which description of a default gateway if true?

Options:

A.

It is a device that receives IP packets that have no explicit next-hop in the routing table.

B.

It is a feature that translates between public and private addresses.

C.

It is a security feature that denies certain traffic.

D.

It is a device that receives Layer 2 frames with an unknown destination address.

Question 126

Which service provides a directory lookup for IP addresses and host names?

Options:

A.

DNS

B.

DHCP

C.

SNMP

D.

NAT

Question 127

Which detail is included in a routing table?

Options:

A.

IP protocol

B.

Broadcast address

C.

TCP or UDP port number

D.

Destination next hop or outgoing interface

Question 128

Which Cisco DevNet resource allows access to products in a development lab to explore, learn, and build application that use Cisco APLs?

Options:

A.

DevNet communities

B.

DevNet code Exchange

C.

DevNet Automation Exchange

D.

DevNet sandbox

Question 129

Drag and drop the Python code from the left onto the correct step on the right to call a REST API.

Options:

Question 130

Drag and drop the network component names from the left onto the correct descriptions on the right. Not all options are used.

Options:

Question 131

Which two statements describe the traits of an asynchronous API call? (Choose two.)

Options:

A.

The order in which API calls return can be guaranteed

B.

A call to an API does not block the code, but rather it allows application processing to continue

C.

The end user can experience latency or performance lag while waiting for the API call to return

D.

Code execution blocks or waits for the call to an API to return.

E.

A callback function typically is used to process the response from an API call

Question 132

Refer to the exhibit.

Which OWASP threat does this example demonstrate?

Options:

A.

broken access control

B.

SQL injection

C.

man-in-the-middle

D.

cross-site scripting

Question 133

A small company has 5 servers and 50 clients. What are two reasons an engineer should spilt this network into separate client and server subnets? (Choose two)

Options:

A.

Internet access to the servers will be denied on the router.

B.

A router will limit the traffic types between the clients and servers.

C.

Subnets will split domains to limit failures.

D.

A router will bridge the traffic between clients and servers.

E.

Subnets provide more IP address space for clients and servers.

Question 134

On which network plane is routing protocol traffic handled?

Options:

A.

data plane

B.

management plane

C.

authentication plane

D.

control plane

Question 135

Refer to the exhibit.

Drag and Drop the code from the bottom onto the box where the code is missing on the Meraki Python script to create a new network

Options:

Question 136

Which two protocols are used to apply a configuration change on a Cisco IOS XE device? (Choose two)

Options:

A.

CCX

B.

RESTCONF

C.

NETCONF

D.

HSRP

E.

CDP

Question 137

What are two advantages of the Model-view-controller software design pattern? (Choose two.)

Options:

A.

simplifies network automation

B.

allows for multiple views of the same model

C.

makes code easier to deploy using Cl/CD pipelines

D.

reduces need for error handling

E.

separates responsibilities of the code, which makes future modifications easier

Question 138

Which two statements describe the advantages of using a version control system? (Choose two.)

Options:

A.

It allows for branching and merging so that different tasks are worked on in isolation before they are merged into a feature or master branch.

B.

It allows multiple engineers to work against the same code and configuration files and manage differences and conflicts.

C.

It provides tooling to automate application builds and infrastructure provisioning.

D.

It allows developers to write effective unit tests.

E.

It provides a system to track User Stories and allocate to backlogs.

Question 139

What is the first development task in test-driven development?

Options:

A.

Write code that implements a desired function.

B.

Write a failing test case for a desired function.

C.

Write a passing test case for existing code.

D.

Reverse engineer the code for a desired function.

Question 140

A developer is writing an application that a REST API and the application requires a valid from the API which element of the response is used in the conditional check?

Options:

A.

URL

B.

Status code

C.

Link

D.

Body

E.

Headers

Demo: 140 questions
Total 467 questions