Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

200-901 DevNet Associate (DEVASC) Questions and Answers

Questions 4

Drag and drop the descriptions from the left onto correct application deployment models on the right.

Options:

Buy Now
Questions 5

Which platform is run directly using a hypervisor?

Options:

A.

Virtual

B.

Bare metal systems

C.

Containers

D.

Applications

Buy Now
Questions 6

Refer to the exhibit.

Which two statements about the network diagram are true? (Choose two.)

Options:

A.

PC-A and PC-B are in the same subnet.

B.

One of the routers has two connected serial interfaces.

C.

The subnet of PC-C can contain 256 hosts.

D.

R1 and R3 are in the same subnet.

E.

The subnet address of PC-B has 18 bits dedicated to the network portion.

Buy Now
Questions 7

What are two advantages of version control software? (Choose two.)

Options:

A.

It supports tracking and comparison of changes in binary formate files.

B.

It allows old versions of packaged applications to be hosted on the Internet

C.

It provides wiki collaboration software for documentation.

D.

It supports comparisons between revisions of source code files.

E.

It allows new team members to access the current code and history.

Buy Now
Questions 8

Refer to the exhibit.

The JSON data in the exhibit has been parsed and stored in a variable, “data”. What returns the value “172.16.0.11” ?

Options:

A.

data['items'][0]['host']['value']

B.

data['items']['1']['host']['value']

C.

data['items']['host'][1]

D.

data['items']['host']['value']

Buy Now
Questions 9

Refer to the exhibit.

Drag and drop the variables from the left onto the item numbers on the right that match the missing assignments in the exhibit.

Options:

Buy Now
Questions 10

Refer to the exhibit.

The python interpreter and the Cisco python SDK are available by default in the Cisco NX-OS software. The SDK documentation shows how the cild() API can be used when working with working with JSON and XML. What are two effect of running the script? (Choose two.)

Options:

A.

configure interlace loopback 5

B.

issue shutdown on interface loopback 5

C.

show only the interfaces In the up status

D.

show only the interfaces in admin shut status

E.

show details for the TABLE interface

Buy Now
Questions 11

Which two statements describe the traits of an asynchronous API call? (Choose two.)

Options:

A.

The order in which API calls return can be guaranteed

B.

A call to an API does not block the code, but rather it allows application processing to continue

C.

The end user can experience latency or performance lag while waiting for the API call to return

D.

Code execution blocks or waits for the call to an API to return.

E.

A callback function typically is used to process the response from an API call

Buy Now
Questions 12

Refer to the exhibit.

Drag and drop the code from the left code from the left onto the item number on the right to complete the Meraki code to obtain a list of client which have used this network.

Options:

Buy Now
Questions 13

Drag and drop the requests from the left into the correct order on the right to create and check the path trace between two devices using Cisco DNA center API.

Options:

Buy Now
Questions 14

Which type of threat occur when an attacker can send hostile data to an interpreter within an application?

Options:

A.

Cross-site scripting

B.

Sensitive data exposure

C.

Broken authentication

D.

Injection

Buy Now
Questions 15

Which two statements describe the advantages of using a version control system? (Choose two.)

Options:

A.

It allows for branching and merging so that different tasks are worked on in isolation before they are merged into a feature or master branch.

B.

It allows multiple engineers to work against the same code and configuration files and manage differences and conflicts.

C.

It provides tooling to automate application builds and infrastructure provisioning.

D.

It allows developers to write effective unit tests.

E.

It provides a system to track User Stories and allocate to backlogs.

Buy Now
Questions 16

What are the two principles of an infrastructure as code environment? (Choose two)

Options:

A.

Complete complex systems must be able to be built from reusable infrastructure definitions.

B.

Environments must be provisioned consistently using the same inputs.

C.

Redeployments cause varying environment definitions.

D.

Service overlap is encouraged to cater for unique environment needs.

E.

Components are coupled, and definitions must be deployed for the environment to function.

Buy Now
Questions 17

Which two types of NAT are used in a network? (Choose two.)

Options:

A.

Static NAT

B.

Normal NAT

C.

Multicast NAT

D.

Dynamic NAT

E.

Router NAT

Buy Now
Questions 18

A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without error and the bundles are produced. However, when the script is run during business hours, report poor voice quality of phones calls. What explains this behavior?

Options:

A.

The application is running in the Voice VLAN and causes delays and jitter in the subnet.

B.

The speed and duplex settings in Cisco DNA Center are sot incorrectly, which causes the transfer to be too slow.

C.

9 The script is written in a low-level programming language where there is no memory safety. This causes a buffer overflow and disruption on the network.

D.

Generating the logs causes the CPU on the network controller to spike, which causes delays m forwarding the voice IP packets.

Buy Now
Questions 19

What should a CI/CD pipeline aim to achieve?

Options:

A.

to allow manual testing before deployment

B.

to require minimal manual interaction

C.

to support new deployments on a fixed monthly schedule

D.

to provide a documented process for feedback

Buy Now
Questions 20

Which model-driven programmability protocol does Cisco IOS XE Software support?

Options:

A.

CORBA

B.

SSH

C.

gNMI

D.

SOAP

Buy Now
Questions 21

Fill in the blanks to complete the Python script to update the Webex Teams membership of a room using the Python requests library import requests

Options:

Buy Now
Questions 22

Which response status code is used by a RESTful interface to indicate successful execution of a request?

Options:

A.

200

B.

404

C.

405

D.

500

Buy Now
Questions 23

Which product provides network controller-level management features?

Options:

A.

Cisco DNA Center

B.

Cisco NX-OS

C.

Cisco UCS Manager

D.

Cisco ISE

Buy Now
Questions 24

Which detail is included in a routing table?

Options:

A.

IP protocol

B.

Broadcast address

C.

TCP or UDP port number

D.

Destination next hop or outgoing interface

Buy Now
Questions 25

A developer is reviewing a code that was written by a colleague. It runs fine, but there are many lines of code to do a seemingly simple task repeatedly. Which action organizes the code?

Options:

A.

Refactor the code by removing any unnecessary tests

B.

Using functions, rewrite any pieces of code that are repeated

C.

Reverse engineer and rewrite the code logic

D.

Modify the code to use loops

Buy Now
Questions 26

Which line is an example of the start of a chunk from a unified diff?

Options:

A.

@@ -90,88 +20191008T1349@@

B.

@@ -20191007T1200 +88,90 @@

C.

@@ -20191007T1200 +20191008T1349@@

D.

@@ -88,10 +88,6 @@

Buy Now
Questions 27

Refer to the exhibit.

Given the API documentation for the UCS SDK python class, UcsHandle, which code snippet creates a handle instance?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 28

Refer to the exhibit.

What is represented in this YANG module?

Options:

A.

interface management

B.

topology

C.

BGP

D.

OpenFlow

Buy Now
Questions 29

Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve statement using RESTCONF on a CSR 1000V?

Options:

A.

Change the HTTP method to PUT.

B.

Change the transport protocol to HTTPS.

C.

Check the MIMF types in the HTTP headers.

D.

Check the authentication credentials.

Buy Now
Questions 30

Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.

Options:

Buy Now
Questions 31

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. (Not all Options are used)

Options:

Buy Now
Questions 32

Which two concepts describe test-driven development? (Choose two.)

Options:

A.

It enables code refactoring.

B.

Write a test before writing code.

C.

Implementation is driven by incremental testing of release candidates.

D.

User acceptance testers development the test requirements.

E.

Tests are created when code is ready for release.

Buy Now
Questions 33

Refer to the exhibit.

A REST API retune this JSON output for a GET HTTP request, Which has assigned to a variable called “vegetables” Using python, which output is the result of this command?

Options:

A.

Lettuce

B.

Kiwi

C.

[‘kiwi’, ‘grape’]

D.

{‘color’: ‘green’, ‘items’: [‘kiwi’, ‘grape’]

Buy Now
Questions 34

Which is an advantage of using network programmability?

Options:

A.

It removes CLI access for devices.

B.

It provides for more scalable and replicable network provisioning.

C.

Manual configuration is faster.

D.

No cloud abstraction occurs.

Buy Now
Questions 35

A function my_func() returns True when it executes normally. Which python snippet tests my_func()?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 36

Drag and drop the element of the Finesse API on the left onto the description of its functionally on the right.

Options:

Buy Now
Questions 37

Drag and drop the characteristics from the left onto the corresponding software development methodologies on the right?

Options:

Buy Now
Questions 38

Refer to the exhibit.

Which JSON is equivalent to the XML –encoded data?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 39

The project is migrated to a new codebase, the “old_project” directory must be deleted. The directory has multiple read-only files, and it must be deleted recursively without prompting for confirmation. Which bash command must be used?

Options:

A.

rm -rf old_project

B.

rm -r old_project

C.

rmdir -p old_project

D.

rmdir old_project

Buy Now
Questions 40

Which way should be used to safely the API keys?

Options:

A.

In an environment variable unique to the system database

B.

Encrypted in a configuration file that is separate from the code

C.

Encrypted in the code in a function

D.

Plain text in the code as a constant

Buy Now
Questions 41

When a Cisco IOS XE networking device is configured using RESTCONF, what is the default data-encoding method?

Options:

A.

XML

B.

x-form-encoding

C.

YANG

D.

YAML

Buy Now
Questions 42

How is a branch called "my-bug-fix" started to develop a fix needed in a product?

Options:

A.

git branch -b my-bug-fix

B.

git checkout -b my-bug-fix

C.

git checkout my-bug-fix

D.

git branch my-bug-fix

Buy Now
Questions 43

A developer is creating a script to interact with a REST API service which requires basic authentication. The credentials are "devnet:391665405" and the Base64 encoding of the credentials is "GV2bmV0dXNlcjpDaXNj=". Which payload and header combination must be used for authentication?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 44

Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:

• MySQL database that stores data about customers

• HTML5 and JavaScript UI that runs on Apache

• REST API written in Python

What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)

Options:

A.

to enable multiple views of the same data to be presented to different groups of users

B.

to provide separation between the view and the model by ensuring that all logic is separated out into the controller

C.

to ensure data consistency, which requires that changes to the view are also made to the model

D.

to ensure that only one instance of the data model can be created

E.

to provide only a single view of the data to ensure consistency

Buy Now
Questions 45

What is a capability of an agentless configuration management system?

Options:

A.

It requires managed hosts to have an interpreter for a high-level language such as Python or Ruby.

B.

It requires managed hosts to connect to a centralized host to receive updated configurations.

C.

It uses compiled languages as the basis of the domain-specific language to interface with managed hosts.

D.

It uses existing protocols to interface with the managed host.

Buy Now
Questions 46

Refer to the exhibit.

A network engineer must manage the network devices. The engineer prepares a Python scripts to authenticate to the Cisco to DNA Center API and request a device list. The device request fails and returns errors code 401. Which action solves the problem?

Options:

A.

Update the API URL. which matched the API endpoint for device list.

B.

Send the request to another network in case there are reachability Issues.

C.

Send the Authentication header In the request with a valid configuration.

D.

Update the credentials that are already supplied and retry the request

Buy Now
Questions 47

Refer to the exhibit.

Which two files are being edited in the unified diff? (Choose two.)

Options:

A.

README.md

B.

setup.py

C.

axl.py

D.

ciscoaxl.py

E.

index.py

Buy Now
Questions 48

What is a benefit of using functions in the code for the development process?

Options:

A.

better user experience in the end product

B.

improves code performance

C.

easier to compile the code

D.

fester code development

Buy Now
Questions 49

Refer to the exhibit.

Which command needs to be placed on the box where the code is missing to output the value of page_jd in the Python 3.7 script?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 50

Refer to the exhibit.

A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?

Options:

A.

results gathering of the show version and show ip int brief commands

B.

output of show ip int brief command on devices of type C9500-40X

C.

execution information of the show version and show ip int brief commands

D.

list of executed commands on C9500-40X and the information of show ip int brief command

Buy Now
Questions 51

A developer is working on a feature for a new application. The changes in the existing branch named 'feat00304' must be integrated into a single commit with the current working primary branch named 'prodapp411926287'. Which git command must be used?

Options:

A.

git rebase --merge feat00304

B.

git merge --squash feat00304

C.

git push --rebase feat00304

D.

git checkout --squash feat00304

Buy Now
Questions 52

What are two characteristics of Bare Metal environments that are related to application deployment? (Choose two.)

Options:

A.

Provide the hypervisor to host virtual servers

B.

Specifically designed for container-based workloads.

C.

Provides workloads with access to hardware features

D.

Suitable for legacy application that do not support virtualization

E.

Not compatible with other cloud services such as PaaS or SaaS offerings.

Buy Now
Questions 53

Fill in the blanks to complete the cURL command that invokes a RESTful API to retrieve a resource in JSON format using OAuth.

Options:

Buy Now
Questions 54

Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.

Options:

Buy Now
Questions 55

What are the two purposes for using a VLAN in a network? (Choose two)

Options:

A.

It is used to create the routing table.

B.

It creates a collection of MAC addresses.

C.

It is used for VM network traffic.

D.

It segments a network.

E.

It creates a broadcast domain.

Buy Now
Questions 56

When using the Bash shell, how it the output of the devnet command saved to a tile named “output.txt”?

Options:

A.

devnet & output.txt

B.

devnet > output.txt

C.

devnet < output.txt

D.

devnet I output.txt

Buy Now
Questions 57

What are two use cause where webhooks are effective? (Choose two.)

Options:

A.

Close a session with a web server after a specific amount of time.

B.

Filter out information from a response to an API call

C.

Change the response format or content type of an API call.

D.

Inform a previously defined chat channel after a deployment fate.

E.

Send an email to a customer of an online store after payment is complete

Buy Now
Questions 58

Which HTTP response status code means “Forbidden”?

Options:

A.

500

B.

401

C.

403

D.

502

Buy Now
Questions 59

Refer to the exhibit.

Which device limits traffic between server 1 and server 2?

Options:

A.

Device B

B.

Device C

C.

Device D

D.

Device E

Buy Now
Questions 60

Which implementation creates a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire?

Options:

A.

WLAN

B.

VLAN

C.

IPsec

D.

HSRP

Buy Now
Questions 61

What is a benefit of model-driven programmability?

Options:

A.

It addresses the static architecture of traditional networks being decentralized and complex.

B.

By modeling data, it ensures that vast quantities of data are usable for monitoring.

C.

It provides a programmatic and standards-based way of writing configurations to any network device.

D.

It simplifies management and operations by decoupling the networking hardware from its control mechanism.

Buy Now
Questions 62

A developer needs a list of clients connected to a specific device in a Meraki network. After making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet resource should be used to identify the meaning of the response code?

Options:

A.

API documentation

B.

Sandbox

C.

Learning Labs

D.

Code Exchange

Buy Now
Questions 63

What is a benefit of using edge computing in an IoT implementation?

Options:

A.

low cost in network design

B.

low network design complexity

C.

high availability for network components

D.

high speed in data processing

Buy Now
Questions 64

Which Cisco platform provides organization-wide automation, security, policy enforcement, any agility across wired and wireless networks?

Options:

A.

Cisco ACI

B.

Cisco DNA Center

C.

Cisco Umbrella

D.

Cisco SD-WAN

Buy Now
Questions 65

Refer to the exhibit.

Which infrastructure automation method is shown?

Options:

A.

Waterfall

B.

CI/CD pipeline

C.

Agile

D.

Lean

Buy Now
Questions 66

Refer to the exhibit.

The script returns an output of 401. To use the supplied URL. an HTTP GET request must Be sent with an Authorization header. The header value is a BaseG4 encoded concatenation of the username and password. Which action must be taken to return an output of 200?

Options:

A.

Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication

B.

Modify the method from LOGIN to GET and supply the username ;password value as JSON payload

C.

Verify that the username and password values imported from the configuration file ate still valid.

D.

Insert an Authorization header with the values username password from the supplied configuration file.

Buy Now
Questions 67

Refer to the exhibit.

An engineer must configure a load balancer server. The engineer prepares a script to automate workflow by using Bash. The script install the nginx package, moves to the /optAtginx directory, and reads the sites M We (or further processing Based on the script workflow, which process is being automated within the loop by using the information mi sites txt?

Options:

A.

creating a new Me Based on template .conf in the /etc/ngin/sites_enabled directory for each lie in the sites txt file. and then changing the file execution permission.

B.

creating a Me per each the in sites txt with the information in template conf. creating a link for the previously created file. and then changing the ownership of the created files

C.

using the content of the file to create the template conf file. creating a Iink from the created file to the /etc/nginx/files.enabled. and then changing the file execution permissions.

D.

using the information in the file to create a set of empty files in the /etchginx/sites_enabled directory and then assigning the owner of the file.

Buy Now
Questions 68

What is a benefit of organizing code into modules?

Options:

A.

improves overall performance

B.

reduces the length of code

C.

enables code to be multifunctional

D.

enables the reuse of code

Buy Now
Questions 69

Refer to the exhibit. A developer is creating a Python script to obtain a list of HTTP servers on a network named office_east by using the Cisco Meraki API. The request has these requirements:

• Must time out if the response is not received within 2 seconds.

• Must utilize client certificates and SSL certificate verification.

• Must utilize basic authentication that uses a username of admin and a password of cisco.

• Must save the response to an object named response.

Drag and drop the code snippets from the bottom onto the blanks in the code to meet the requirements. Not all options are used.

Options:

Buy Now
Questions 70

How do XML and JSON compare regarding functionality?

Options:

A.

JSON natively supports arrays and XML does not natively support arrays.

B.

XML provides support for mapping data structures into host languages than JSON.

C.

XML provides more human readability than JSON.

D.

JSON provides support for data types than XML.

Buy Now
Questions 71

Refer to the exhibit.

A network engineer wants to use an API to update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which line of code needs to be placed in the snippet where the code is missing?

Options:

A.

{'Content-Type': 'application/yang.data+xml', 'Accept': 'application/yang.data

+xml'}

B.

{'Content-Type': 'application/yang.data+yaml', 'Accept': 'application/yang.data

+yaml'}

C.

{'Content-Type': 'application/restconf.data+json', 'Accept': 'application/

restconf.data+json'}

D.

{'Content-Type': 'application/yang.data+utf8', 'Accept': 'application/

restconf.data+utf8'}

Buy Now
Questions 72

Refer to the exhibit.

An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the 'get_all_interfaces' API call is used?

Options:

A.

times out

B.

rate limit

C.

pagination

D.

invalid password

Buy Now
Questions 73

A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time.

Which area of the CALMS framework must the company target for improvement?

Options:

A.

Collaboration

B.

Lean

C.

Sharing

D.

Measurement

Buy Now
Questions 74

What does a load balancer distribute in a network environment?

Options:

A.

outgoing connections to the network

B.

incoming traffic across multiple servers

C.

different TCP connections to the routers

D.

traffic in the network by leveraging the switch architecture

Buy Now
Questions 75

A local Docker alpine image has been created with an image ID of a391665405fe and tagged as “latest”. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?

Options:

A.

docker build -p 8080:80 alpine:latest

B.

docker exec -p 8080:80 alpine:latest

C.

docker start -p 8080:80 alpine:latest

D.

docker run -p 8080:80 alpine:latest

Buy Now
Questions 76

A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?

Options:

A.

git update

B.

git merge

C.

git add

D.

git rebase

Buy Now
Questions 77

What is a benefit of test-driven development?

Options:

A.

early customer involvement

B.

increased code quality

C.

faster releases that have minimal features

D.

strict adherence to product requirements

Buy Now
Questions 78

Refer to the exhibit.

A developer creates a script to obtain a list of devices by using the Cisco DNA Center API. The remote server authorizes the request only if an authentication token is supplied in the headers. A function named get_auth_token() must retrieve a valid token by using HTTP Basic Authentication. Which code must be added to complete the get_auth_token() function?

Options:

A.

resp = requests.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

B.

resp = requests.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json ()['Token']

return token

C.

resp = http.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

D.

resp = http.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

Buy Now
Questions 79

Refer to the exhibit.

An API call is constructed to retrieve the inventory in XML format by using the API. The response to the call is 401 Unauthorized. Which two headers must be added to the API call? (Choose two.)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 80

Refer to the exhibit.

Which command, including arguments, is executed when the container starts?

Options:

A.

/bin/sh -c "/bin/sleep 30 && nginx -g 'daemon off;'"

B.

/bin/sh -c "/bin/sleep 10 && nginx -g 'daemon off;'"

C.

/bin/bash -c "/bin/sleep 30 && nginx -g 'daemon off;'"

D.

/bin/sh -c "/bin/sleep 30" && nginx -g 'daemon off;'

Buy Now
Questions 81

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

Options:

Buy Now
Questions 82

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code,

which resource must be used to verify that the code works correctly?

Options:

A.

Cisco NX-OS SDK

B.

Cisco Learning Labs

C.

Cisco Code Exchange

D.

Cisco Modeling Labs

Buy Now
Questions 83

Refer to the exhibit.

The Cisco Meraki API manages two organizations. In each organization, two independent networks are defined. How many calls to the /organizations/(orgid)networks endpoint will be run parallel by the GetAllNetwork function of the API client?

Options:

A.

0

B.

1

C.

2

D.

4

Buy Now
Questions 84

What is the difference between YAML and JSON data structure?

Options:

A.

YAML uses spaces; JSON uses parentheses

B.

YAML uses indentation; JSON uses brackets and braces

C.

YAML uses brackets and braces; JSON uses indentation

D.

YAML uses parentheses; JSON uses spaces

Buy Now
Questions 85

Where is an IP packet routed if the packet does not match any routes in the routing table?

Options:

A.

firewall

B.

load balancer

C.

central switch

D.

default gateway

Buy Now
Questions 86

What are two benefits of model-driven programmability?

Options:

A.

model-driven APIs for abstraction and simplification

B.

single choice of transport, protocol, and encoding

C.

model-based, structured, and human friendly

D.

easier to design, deploy, and manage APIs

E.

models decoupled from transport, protocol, and encoding

Buy Now
Questions 87

Refer to the exhibit.

A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?

Options:

A.

verifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages

B.

verifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version

C.

uninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version

D.

installing nginx, uninstalling apache2, and then verifying that the package repository is at the latest version

Buy Now
Questions 88

Which data is specified in the response header?

Options:

A.

{

"id": "y123987jdkl". HTTP/1.1 200 OK

"status: "online",

"type": "switch"

}

B.

HTTP/1.1 200 OK

C.

''type'', ''switch''

D.

Content-Type

Buy Now
Questions 89

What are two properties of private IP addresses? (Choose two.)

Options:

A.

They can be used to access the Internet directly.

B.

They are more secure than public IP addresses.

C.

They are not globally unique.

D.

They can be repeated within the same local network.

E.

They are controlled globally by an IP address registry.

Buy Now
Questions 90

What is a requirement when authenticating a RESTCONF API session with a router that runs Cisco IOS XE Software?

Options:

A.

No authentication is required.

B.

OAuth must be used.

C.

Basic authentication must be used.

D.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

Buy Now
Questions 91

Refer to the exhibit.

A developer needs to upload a local file by using the REST API. The developer gathers information according to the documentation and sends the request by using the cURL command in the exhibit but gets an error code. Which action should be followed to get valid response?

Options:

A.

change content type as JSON

B.

add the authorization header with the access token

C.

add a username-password combination to request command

D.

change request method as GET

Buy Now
Questions 92

Refer to the exhibit. A network engineer must collect information from the network. The engineer prepares a script to automate workflow by using Cisco Meraki API. The script must run over nested loops to collect organization and network information and uses the collected data for final collection. Which process is being automated by using the Python script?

Options:

A.

Gather the IDs of the ACME organization, the BLDG21 network, and the dents on the network

B.

Provide the BLDG21 network information if it is part of the ACME organization

C.

Collect the IDs of the clients on the BLDG21 network

D.

List the IDs from the ACME organization

Buy Now
Questions 93

Which HTTP code group is issued when a request is received successfully, understood, and processed?

Options:

A.

2xx

B.

3xx

C.

4xx

D.

5xx

Buy Now
Questions 94

What is a capability of the NETCONF protocol?

Options:

A.

allows Python scripts to be executed externally from a network device

B.

uses JSON to encode data in its content layer

C.

allows XML messages to be exchanged via the SSH protocol

D.

exposes a web-based interface

Buy Now
Questions 95

Which tool provides a testing environment to run tests on network devices and perform network automation scenarios?

Options:

A.

Visual Studio Code

B.

Cisco VIRL

C.

pyATS

D.

Cisco Packet Tracer

Buy Now
Questions 96

A developer pushes an application to production. The application receives a webhook over HTTPS without a secret. The webhook information contains credentials to service in cleartext. When the information is received, it is stored in the database with an SHA-256 hash. Credentials to the database are accessed at runtime through the use of a vault service. While troubleshooting, the developer sets the logging to debug to view the message from the webhook. What is the security issue in this scenario?

Options:

A.

Database credentials should be accessed by using environment variables defined at runtime.

B.

During the transport of webhook messages, the credentials could be unencrypted and leaked.

C.

During logging, debugging should be disabled for the webhook message.

D.

Hashing the credentials in the database is not secure enough; the credentials should be encrypted.

Buy Now
Questions 97

Which network device plane is responsible for handling QoS?

Options:

A.

management plane

B.

data plane

C.

configuration plane

D.

control plane

Buy Now
Questions 98

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to return the number of interfaces on a network device by using the Cisco DNA Center SDK. Not all options are used.

Options:

Buy Now
Questions 99

Refer to the exhibit. Which action does the script perform?

Options:

A.

It queries user credentials from Cisco IOS XE devices.

B.

It retrieves device identification from Cisco DNA Center.

C.

It exports SSID information from Meraki dashboard.

D.

It collects group information from ACI.

Buy Now
Questions 100

Refer to the exhibit.

An engineer is comparing two tiles by using the unified cliff format What is determined by the content in the file2.py file?

Options:

A.

Line 16 of file2.py is auth=HTTPBasicAuth(USERNAME. PASSWORD).

B.

Line 17 of file2.py is auth = HTTPBasicAuth{USERNAME. PASSWORD).

C.

Line 93 of file2.py is 'DEVICE-STATS'.

D.

Line 92 of file2.py is 'DEVICE-STATS'.

Buy Now
Questions 101

Refer to the exhibit. A developer must use a token to collect data from Cisco DNA Center API and prepares a Python script to send requests. Which line of code needs to be placed on the snippet where the code is missing to obtain a token from the Cisco DNA Center API?

Options:

A.

token=BasicAuth(‘user’,‘password’))

B.

auth=BasicAuth(‘user’,‘password’))

C.

auth=HTTPBasicAuth(user,password))

D.

token=HTTPBasicAuth(user,password))

Buy Now
Questions 102

What is a principle of a code review process?

Options:

A.

Changes are made after the code is submitted to source control.

B.

It must not prevent code from getting into production as quickly as possible.

C.

Naming standards must be consistent.

D.

A technical lead must sign off on the review.

Buy Now
Questions 103

What is a comparison of YAML and JSON?

Options:

A.

YAML has a more consistent approach to representing data compared to JSON.

B.

JSON does not support comments and YAML does.

C.

YAML is a more verbose data structure compared to JSON.

D.

JSON has more common usage in configuration management tools compared to YAML.

Buy Now
Questions 104

What is a benefit of using a code review process in application development?

Options:

A.

accelerates the deployment of new features in an existing application

B.

provides version control during code development

C.

enables the quick deployment of new code

D.

eliminates common mistakes during development

Buy Now
Questions 105

A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?

Options:

A.

Store the username and password in a separate configuration file.

B.

Store the username and password in a vault.

C.

Store the passwords in a dictionary.

D.

Store the username and password in code.

Buy Now
Questions 106

Refer to the exhibit. A bespoke meeting booking system must be integrated with Cisco Webex so that meetings are created automatically. Drag and drop the code from the bottom onto the box where the code is missing to create a sample meeting. Not all options are used.

Options:

Buy Now
Questions 107

Which traffic is handled on the control plane?

Options:

A.

BGP

B.

SMB

C.

NTP

D.

NETCONF

Buy Now
Questions 108

A developer checks the performance of a web application. The application is in the local data center and uses a REST-based API. Based on the API logs, it is discovered that many its abandon API requests. Also, the response is taking too long to get back. What is the reason for this issue?

Options:

A.

Pagination is not implemented

B.

Token-based authentication is enabled.

C.

Rate limiting is not implemented.

D.

Token-based authentication is disabled

Buy Now
Questions 109

Which HTTP method is used by webhooks and notifies a listener about an event change?

Options:

A.

PUT

B.

POST

C.

PATCH

D.

GET

Buy Now
Questions 110

What is the purpose of running tests before writing code in test-driven development?

Options:

A.

to find unexpected failures in the tests

B.

to demonstrate that the tests fail for expected reasons

C.

to ensure that the tests pass

D.

to provide proof of the work carried out

Buy Now
Questions 111

An engineer must review and clean up a code repository. During the review, the engineer finds a file named config.json that contains API URLs, shared keys, and other application configurations. Which two methods, according to best practice, must be used to protect secrets? (Choose two.)

Options:

A.

Store in plaintext if they are not stored in a code repository.

B.

Store as plaintext when the server is secured physically.

C.

Never appear in plaintext at rest or in transit.

D.

Make them long, secure strings that include numbers with special characters.

E.

Always store in a secure vault.

Buy Now
Questions 112

An engineer deploys a Cisco CSR 1000 V instance to a virtual machine. The engineer must output the device configuration in JSON format. Which protocol is used for this task?

Options:

A.

YANG

B.

NETCONF

C.

SNMP

D.

RESTCONF

Buy Now
Questions 113

Refer to the exhibit. A network engineer executes the bash script shown. Which two things are achieved by running the script? (Choose two.)

Options:

A.

A directory called PRODUCTION is created.

B.

The engineer changes to the parent directory.

C.

A YAML file is created.

D.

A YAML file is removed.

E.

A directory called state.yml is created.

Buy Now
Questions 114

An engineer prepares a set of Python scripts to interact with network devices. To avoid network performance issues, the engineer wants to run them in a test environment. Which resource must be used to monitor the

live execution of code in an always-available environment?

Options:

A.

packet tracer

B.

learning labs

C.

sandbox

D.

code exchange

Buy Now
Questions 115

Rotor to the exhibit. Which API is called when the REMOTE TU sends a TCONNECT Response to the LOCAL TU?

Options:

A.

TCONNECT completion

B.

TCONNECT request

C.

TCONNECT indication

D.

TCONNECT confirm

Buy Now
Questions 116

A developer is running an application that connects to the Cisco website and collects data. The application will be hosted in a local data center and the data will need to be collected on a frequent basis. The application client requires certain environmental variables to be set before the run. Which Bash command sets the environmental variables for a Linux system?

Options:

A.

B.

C.

D.

Buy Now
Questions 117

Which protocol runs over TCP port 830?

Options:

A.

NETCONF

B.

Telnet

C.

RESTCONF

D.

HTTP

Buy Now
Questions 118

What is a function of the default gateway in a network?

Options:

A.

to drop traffic that is destined to the default gateway

B.

to forward traffic to different subnets

C.

to forward traffic to the same subnet

D.

to drop traffic that is not destined to the default gateway

Buy Now
Questions 119

What is a component of the first stage of an application development CI/CD pipeline?

Options:

A.

developer writing the initial lines of code

B.

triggering of the automated build phase

C.

commitment and pushing of code into a version control system

D.

triggering of the automated testing phase

Buy Now
Questions 120

What is a characteristic of Waterfall compared to Agile software development method?

Options:

A.

Waterfall focuses on continuous improvement, and Agile focuses on the design phase.

B.

Waterfall separates the project development lifecycle into sprints, and Agile does not use cycles.

C.

Waterfall specifies requirements before development begins, and Agile responds flexibly to changes in requirements.

D.

Waterfall uses reviews with step by step approach, and Agile uses a serially phased approach.

Buy Now
Questions 121

Refer to the exhibit.

What does the command marked (2) do when it is run?

Options:

A.

It duplicates the test" branch.

B.

It deletes the "test" branch only if a new branch is created.

C.

It deletes the "test" branch.

D.

It does not delete the branch until it is merged.

Buy Now
Questions 122

Refer to the exhibit. A developer needs to create a webhook to send all Cisco Webex messages to a third-party tool by using the Cisco Webex API. The developer must Auhenticate with the API before any API calls can be made. To automate the procedure, a Python script is used. Which code snippet must be placed onto the blank in the code?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 123

During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?

Options:

A.

integration

B.

deployment

C.

development

D.

testing

Buy Now
Questions 124

What is an advantage of device-level management as compared to controller-level management to automate the configuration of network devices?

Options:

A.

Device-level management has access to all devices from a single point on the network and controller-level management does not.

B.

Device-level management supports all subsets of the potential device settings and controller-level management does not.

C.

Device-level management supports REST API-enabled devices and controller-level management does not.

D.

Device-level management requires one controller per vendor and controller-level management does not.

Buy Now
Questions 125

Refer to the exhibit.

An engineer needs to retrieve all the organizations in a Cisco UCS Manager deployment. Drag and drop the code snippets from the bottom onto the blanks in.. Python script to print the information to standard output. Some options may be used more than once. Not all options are used.

Options:

Buy Now
Questions 126

Refer to the exhibit. Which code snippet represents the sequence.

Options:

A.

B.

C.

D.

Buy Now
Questions 127

Drag and drop the functions from the left onto the networking devices on the right.

Options:

Buy Now
Questions 128

To which stage of development do Infrastructure as Code principles relate?

Options:

A.

manual configuration

B.

service provisioning

C.

physical deployment

D.

requirement collection

Buy Now
Questions 129

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. The Python script retrieves a list of tasks from a to-do list for effective project management purposes. Not all options are used.

Options:

Buy Now
Questions 130

What is a capability of Cisco Webex?

Options:

A.

Join preconfigured or new spaces with fixed user rights.

B.

Configure devices at scale via automation scripts or by manual execution.

C.

Initiate or respond to calls automatically via automation.

D.

Get space history or notified in real time when new messages are posted.

Buy Now
Questions 131

Which IP service synchronizes the time across devices?

Options:

A.

DNS

B.

NTP

C.

SNMP

D.

NAT

Buy Now
Questions 132

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer will use an Ansible playbook to configure devices through Cisco NX REST API. Before the code is run, which resource must be used to verify that the REST API requests work as expected?

Options:

A.

Cisco Open NX-OS

B.

Cisco NX-OS SDK

C.

Cisco Learning Labs

D.

Cisco Code Exchange for Nexus

Buy Now
Questions 133

Users cannot access a webserver and after the traffic is captured, the capture tool snows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?

Options:

A.

The large distance between the server and the users means that the packets require too much time to reach the destination.

B.

A router along the path is misrouting the packets in a wrong direction.

C.

A router along the path has the wrong time.

D.

The server is overloaded and the connection was not able to be processed in time.

Buy Now
Questions 134

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.

Options:

Buy Now
Questions 135

Which two protocols are associated with the control plane on a network device? (Choose two.)

Options:

A.

BGP

B.

UDP

C.

SNMP

D.

FTP

E.

OSPF

Buy Now
Questions 136

Which network component enables communication between broadcast domains?

Options:

A.

load balancer

B.

switch

C.

router

D.

firewall

Buy Now
Questions 137

What is the purpose of grouping devices in a VLAN?

Options:

A.

Devices communicate as if they are connected on the same wire.

B.

Multicast network traffic is limited to the VLAN connected devices.

C.

Unicast messages are limited to the clients connected on the same VLAN.

D.

Network traffic is load balanced between the devices connected to the VLAN.

Buy Now
Questions 138

What is a procedural component of CI/CD pipelines?

Options:

A.

Bundled artifacts must be generated.

B.

Every test must pass for the pipeline to continue its execution.

C.

Some tests fall without stopping the pipeline execution.

D.

The release label that identifies the build is optional.

Buy Now
Questions 139

A resource named /item is protected by oAuth2 authentication. An endpoint named /login must request authentication. Which method must be used to access the resource by using the REST API?

Options:

A.

Make a GET call to /login that includes the username and password, and retrieve a token to insert into the /item call.

B.

Make a POST call to /login including the user credentials in the message, and retrieve a token to insert into the authorization header of the /item call.

C.

Make a GET call to /item, then make a call to /login that includes the username and password in the body of the message, and wait for the authorization code.

D.

Make a POST call to /item that includes the username and password in the body of the request message, and submit it to request access.

Buy Now
Questions 140

What is a benefit of version control?

Options:

A.

prevents two users from working on the same file

B.

keeps track of all changes to the files

C.

prevents the sharing of files

D.

keeps the list of data types used in the files

Buy Now
Exam Code: 200-901
Exam Name: DevNet Associate (DEVASC)
Last Update: May 19, 2025
Questions: 467
200-901 pdf

200-901 PDF

$28.5  $94.99
200-901 Engine

200-901 Testing Engine

$33  $109.99
200-901 PDF + Engine

200-901 PDF + Testing Engine

$43.5  $144.99