Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 200-901 DevNet Associate (DEVASC) Exam Practice Test

Page: 1 / 41
Total 406 questions

DevNet Associate (DEVASC) Questions and Answers

Question 1

Refer to the exhibit.

Question # 1

Up to which device does the communication server 1 and server 2 go?

Options:

A.

device B

B.

device C

C.

device D

D.

device E

Question 2

How does edge computing analyze sensitive data in the context of privacy control?

Options:

A.

locally instead of sending the data to the cloud for analysis

B.

locally or on the cloud depending on the configuration

C.

all at once by sending the data to the cloud

D.

locally on each node, and then sends the data to the cloud

Question 3

Question # 3

Refer to the exhibit. A developer must use a token to collect data from Cisco DNA Center API and prepares a Python script to send requests. Which line of code needs to be placed on the snippet where the code is missing to obtain a token from the Cisco DNA Center API?

Options:

A.

token=BasicAuth(‘user’,‘password’))

B.

auth=BasicAuth(‘user’,‘password’))

C.

auth=HTTPBasicAuth(user,password))

D.

token=HTTPBasicAuth(user,password))

Question 4

Question # 4

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script by using the Cisco SDK. Not all options are used.

Question # 4

Options:

Question 5

What is a comparison of YAML and JSON?

Options:

A.

YAML has a more consistent approach to representing data compared to JSON.

B.

JSON does not support comments and YAML does.

C.

YAML is a more verbose data structure compared to JSON.

D.

JSON has more common usage in configuration management tools compared to YAML.

Question 6

Which port does HTTPS use by default?

Options:

A.

433

B.

443

C.

803

D.

883

Question 7

Refer to the exhibit.

Question # 7

An application must be deployed on a server that has other applications installed. The server resources are to be allocated based on the deployment requirements. The OS for each application must be independent. Which type of deployment is used?

Options:

A.

hybrid

B.

virtual machines

C.

containers

D.

bare metal

Question 8

Which HTTP method is used by webhooks and notifies a listener about an event change?

Options:

A.

PUT

B.

POST

C.

PATCH

D.

GET

Question 9

Refer to the exhibit.

Question # 9

A developer can access the TLS REST API on server A, but cannot access the API on server B. The developer can ping server B. When the developer performs a packet capture on the TLS REST API port on server B, the capture shows that the packet arrived and the server responded. What causes the issue?

Options:

A.

Port 80 is blocked on the outgoing interface of firewall B.

B.

Port 443 is blocked on the outgoing interface of firewall A.

C.

Port 443 is blocked on the incoming interface of firewall B.

D.

Port 80 is blocked on the incoming interface of firewall A.

Question 10

Question # 10

Refer to the exhibit. A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?

Options:

A.

cp ./PROD/current.txt ./TEST/config.txt

B.

cp ./TESTi/current.txt ./PROD/config.txt

C.

cp ./PROD/config.txt ./TEST/current.txt

D.

cp ./TEST/config.txt ./PROD/current.txt

Question 11

Which two details are captured from the subnet mask? (Choose two.)

Options:

A.

portion of an IP address that refers to the subnet

B.

default gateway of the host

C.

unique number ID assigned to the host

D.

part of an IP address that refers to the host

E.

network connection of a host or interface

Question 12

Question # 12

Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer's account?

Options:

A.

The encoded credentials were available in the source code.

B.

The application was not encrypting the communication with the server.

C.

The credentials were encrypted in the source code.

D.

An SSL certificate was used instead of the TLS protocol to authenticate.

Question 13

Which HTTP error code series relates to redirection?

Options:

A.

400

B.

500

C.

200

D.

300

Question 14

Which two situations align with infrastructure as code principles? (Choose two.)

Options:

A.

nonreplicable snowflake servers

B.

release versions to specific hardware

C.

maximized configuration drift

D.

easily reproducible systems

E.

repeatable processes

Question 15

Which protocol runs over TCP port 830?

Options:

A.

NETCONF

B.

Telnet

C.

RESTCONF

D.

HTTP

Question 16

Which technology is responsible for resolving a host name to an IP address?

Options:

A.

DNS

B.

SNMP

C.

DHCP

D.

NTP

Question 17

What is a function of the default gateway in a network?

Options:

A.

to drop traffic that is destined to the default gateway

B.

to forward traffic to different subnets

C.

to forward traffic to the same subnet

D.

to drop traffic that is not destined to the default gateway

Question 18

How are operations on REST APIs performed as compared to RPC APIs?

Options:

A.

In a REST API, operations are performed on an object (node) that is identified by a URL, but RPC APIs are operation-oriented.

B.

In a REST API, operations are performed on an external resource that is defined on the API, but the RCP APIs are resource-oriented.

C.

In a REST API, operations are performed on a platform that is identified by the URL, but RPC APIs are platform-oriented.

D.

In a REST API, operations are performed on an internal resource that is defined on the API, but RPC APIs are resource-oriented.

Question 19

What is the purpose of running tests before writing code in test-driven development?

Options:

A.

to find unexpected failures in the tests

B.

to demonstrate that the tests fail for expected reasons

C.

to ensure that the tests pass

D.

to provide proof of the work carried out

Question 20

What are two benefits of using classes over functions when writing applications? (Choose two.)

Options:

A.

improved readability

B.

increased compatibility

C.

variable reusability

D.

increased performance

E.

code organization

Question 21

Fill in the blanks to complete the python script to request a service ticket using the APIC-EM rest API for the user “devnetuser”.

Question # 21

Options:

Question 22

What is the Git command to delete a local branch named “experiment” without a warning?

Options:

A.

git branch –n experiment

B.

git branch –rm experiment

C.

git branch –f experiment

D.

git branch –D experiment

Question 23

How does requesting a synchronous API operation differ from requesting an asynchronous API operation?

Options:

A.

clients poll for the status of the execution of operations

B.

clients subscribe to a webhook for operation results

C.

clients can access the results immediately

D.

clients receive responses with a task id for further processing

Question 24

Refer to the exhibit.

Question # 24

Question # 24

A developer is troubleshooting an API with the given API with the given API documentation and cURL command. What is the cause of this problem?

Options:

A.

The user is not allowed to post massages from their account

B.

The request body is missing or incomplete

C.

The API token specified is expired

D.

The authorization header is missing or incomplete

Question 25

Refer to the exhibit.

Question # 25

Fill in the blanks to complete the cURL command to the list of networks in the Meraki organization with an id of 384279060

Question # 25

Options:

Question 26

Which device is used to transport traffic from one broadcast domain to another broadcast domain?

Options:

A.

load balancer

B.

layer 2 switch

C.

router

D.

proxy server

Question 27

Which mechanism is used to consume a RESTful API design when large amounts of data are returned?

Options:

A.

Data sets

B.

Scrolling

C.

Blobs

D.

Pagination

Question 28

Refer to the exhibit.

Question # 28

What is represented in this YANG module?

Options:

A.

interface management

B.

topology

C.

BGP

D.

OpenFlow

Question 29

What are two advantages of YANG-based approaches for infrastructure automation? (Choose two.)

Options:

A.

directly maps to JavaScript

B.

multi-platform vendor abstraction

C.

designed to reflect networking concepts

D.

compiles to executables that run on network devices

E.

command line driven interface

Question 30

Which two concepts describe test-driven development? (Choose two.)

Options:

A.

It enables code refactoring.

B.

Write a test before writing code.

C.

Implementation is driven by incremental testing of release candidates.

D.

User acceptance testers development the test requirements.

E.

Tests are created when code is ready for release.

Question 31

Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.

Question # 31

Options:

Question 32

A developer is writing an application that a REST API and the application requires a valid from the API which element of the response is used in the conditional check?

Options:

A.

URL

B.

Status code

C.

Link

D.

Body

E.

Headers

Question 33

Refer to the exhibit.

Question # 33

The definition of the YANG module and a RESTCONF query sent to a Cisco IOc XE device is shown. Which statement is correct if the RESTCONF interface responds with a 204 status code?

Options:

A.

The query failed at retrieving the logging seventy level.

B.

The query failed to set the logging seventy level due to an invalid path.

C.

The query retrieved the logging seventy level.

D.

The query updated the logging seventy level or created it if not present on the device.

Question 34

Which API is used to obtain data voicemail ports?

Options:

A.

Finesse gadgets

B.

Cisco Unified Communications manager

C.

Webex devices

D.

Webex teams

Question 35

Which two NETCONF operations cover the RESTCONF GET operation? (Choose two.)

Options:

A.

B.

C.

D.

E.

Question 36

What operation is performed with YANG model-driven programmability in NX-OS?

Options:

A.

configure a device with native and OpenConfig-based models

B.

send CLI commands to a device and retrieve output in JSON format

C.

run Linux commands natively on the device

D.

bootstrap a device that has a factory-default configuration

Question 37

Which line is an example of the start of a chunk from a unified diff?

Options:

A.

@@ -90,88 +20191008T1349@@

B.

@@ -20191007T1200 +88,90 @@

C.

@@ -20191007T1200 +20191008T1349@@

D.

@@ -88,10 +88,6 @@

Question 38

When using the Bash shell, how it the output of the devnet command saved to a tile named “output.txt”?

Options:

A.

devnet & output.txt

B.

devnet > output.txt

C.

devnet < output.txt

D.

devnet I output.txt

Question 39

what is an advantage of a version control system?

Options:

A.

forces the practice of trunk-based development

B.

prevents over-writing code or configuration files

C.

facilitates resolving conflicts when merging code

D.

ensures that unit tests are written

Question 40

How is a branch called "my-bug-fix" started to develop a fix needed in a product?

Options:

A.

git branch -b my-bug-fix

B.

git checkout -b my-bug-fix

C.

git checkout my-bug-fix

D.

git branch my-bug-fix

Question 41

How does a developer create and switch to a new branch called "my-bug-fix" to develop a product fix?

Options:

A.

git checkout -b my-bug-fix

B.

git branch -b my-bug-fix

C.

git branch my-bug-fix

D.

git checkout my-bug-fix

Question 42

Refer to the exhibit.

Question # 42

A developer wants to create a room named cisco through Webex API. The developer prepares the request by putting an API token inside the authorization header; however, the given HTTP call returns error code 400. How must the call parameters be changed to ensure a valid response?

Options:

A.

Replace the team body parameter with the name body parameter.

B.

Replace cisco with a valid name for a team.

C.

Change the token in the header with the authorization token.

D.

Change the HTTP method of the call to PUT.

Question 43

How are load balancers used in modern application deployment?

Options:

A.

Allow traffic to continue as new compute units are brought up and old compute units are taken down.

B.

Allow http and https traffic to continue as old compute units are discontinued before new units are brought up.

C.

Turn off traffic and take down compute units, then update and bring the compute units back up.

D.

Bring up new compute units, test the compute units, and switch the traffic from old units to new units.

Question 44

Refer to the exhibit.

Question # 44

What do all the calls shown in the sequence diagram have in common?

Options:

A.

All the calls are optional.

B.

All the calls are asynchronous.

C.

All the calls are synchronous.

D.

All the calls depend on the catalog.

Question 45

Refer to the exhibit.

Question # 45

Drag and drop the code from the bottom onto the blanks in the code to construct a cURL command using the Cisco DNA Center API. which will provide the details of a WLAN controller with Id af397748444. Not at options are used.

Question # 45

Options:

Question 46

How do XML and JSON compare regarding functionality?

Options:

A.

JSON natively supports arrays and XML does not natively support arrays.

B.

XML provides support for mapping data structures into host languages than JSON.

C.

XML provides more human readability than JSON.

D.

JSON provides support for data types than XML.

Question 47

What is used in JSON to represent a Python Tuple?

Options:

A.

Object

B.

Array

C.

Dict

D.

Collection

Question 48

Which API must an engineer use to change a netmask on a Cisco IOS XE device?

Options:

A.

Meraki

B.

RESTCONF/YANG

C.

SD-WAN

D.

DNAC

Question 49

What is a requirement when authenticating a RESTCONF API session with a router that runs Cisco IOS XE Software?

Options:

A.

No authentication is required.

B.

OAuth must be used.

C.

Basic authentication must be used.

D.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

Question 50

Which application should be used to externally access all applications deployed in the same host machine with a single public IP address and port, when each application listens on different local ports?

Options:

A.

reverse proxy

B.

load balancer

C.

DNS

D.

firewall

Question 51

What is the purpose of the first three pairs of digits in a MAC address?

Options:

A.

defines a routing identifier for the client

B.

indicates the IP address of the client in Hex

C.

defines packet forwarding priority sent or received by the adapter

D.

indicates vendor of the network card or adapter

Question 52

A developer is creating a script to interact with a REST API service which requires basic authentication. The credentials are "devnet:391665405" and the Base64 encoding of the credentials is "GV2bmV0dXNlcjpDaXNj=". Which payload and header combination must be used for authentication?

Question # 52

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 53

Which Cisco product provides malware and content filtering through DNS?

Options:

A.

Cisco ASA Firepower module

B.

Cisco AMP

C.

Cisco ISE

D.

Cisco Umbrella

Question 54

What is the difference between YAML and JSON data structure?

Options:

A.

YAML uses spaces; JSON uses parentheses

B.

YAML uses indentation; JSON uses brackets and braces

C.

YAML uses brackets and braces; JSON uses indentation

D.

YAML uses parentheses; JSON uses spaces

Question 55

Which implementation creates a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire?

Options:

A.

WLAN

B.

VLAN

C.

IPsec

D.

HSRP

Question 56

Refer to the exhibit.

Question # 56

A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?

Options:

A.

compilation and configuration of the Cisco DevNet application so that it must be started manually

B.

compilation, installation, and configuration of the Cisco DevNet application so that it starts automatically

C.

compilation and installation of the Cisco DevNet application for an autonomous deployment model

D.

installation and configuration of the Cisco DevNet application so that it starts manually

Question 57

A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?

Options:

A.

Communication between the application and the services is not encrypted.

B.

The database credentials should be stored in the configuration files so that they are secured on the same server.

C.

The API keys are stored in the configuration files but should be stored in the vault service.

D.

The synchronization logs should be encrypted and not stored in a relational database.

Question 58

Refer to the exhibit.

Question # 58

A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?

Options:

A.

verifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages

B.

verifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version

C.

uninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version

D.

installing nginx, uninstalling apache2, and then verifying that the package repository is at the latest version

Question 59

Question # 59

Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.

Question # 59

Options:

Question 60

In the test-driven development model, what is changed after a test fails?

Options:

A.

test

B.

schedule

C.

project requirements

D.

code

Page: 1 / 41
Total 406 questions