Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

200-901 Exam Dumps - DevNet Associate (DEVASC)

Question # 4

Fill in the blanks to complete the cURL command that invokes a RESTful API to retrieve a resource in JSON format using OAuth.

Full Access
Question # 5

Refer to the exhibit.

The python interpreter and the Cisco python SDK are available by default in the Cisco NX-OS software. The SDK documentation shows how the cild() API can be used when working with working with JSON and XML. What are two effect of running the script? (Choose two.)

A.

configure interlace loopback 5

B.

issue shutdown on interface loopback 5

C.

show only the interfaces In the up status

D.

show only the interfaces in admin shut status

E.

show details for the TABLE interface

Full Access
Question # 6

What is a benefit of model-driven programmability?

A.

It addresses the static architecture of traditional networks being decentralized and complex.

B.

By modeling data, it ensures that vast quantities of data are usable for monitoring.

C.

It provides a programmatic and standards-based way of writing configurations to any network device.

D.

It simplifies management and operations by decoupling the networking hardware from its control mechanism.

Full Access
Question # 7

Refer to the exhibit. What does the load balancer enable in the network topology?

A.

hosted application to access Internet services

B.

external requests to be routed to the application servers

C.

workstations to access the Internet

D.

application to access the database server

Full Access
Question # 8

Refer to the exhibit.

OWASP threat does this example demonstrate?

A.

Broken access control

B.

SQL injection

C.

Man-in-the-middle

D.

Cross-site-scripting

Full Access
Question # 9

Drag and Drop the Bash commands from the left onto the correct actions on the right.

Full Access
Question # 10

A small company has 5 servers and 50 clients. What are two reasons an engineer should spilt this network into separate client and server subnets? (Choose two)

A.

Internet access to the servers will be denied on the router.

B.

A router will limit the traffic types between the clients and servers.

C.

Subnets will split domains to limit failures.

D.

A router will bridge the traffic between clients and servers.

E.

Subnets provide more IP address space for clients and servers.

Full Access
Question # 11

Fill in the blanks to complete the python script to request a service ticket using the APIC-EM rest API for the user “devnetuser”.

Full Access
Question # 12

Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.

Full Access
Question # 13

How are load balancers used in modern application deployment?

A.

Allow traffic to continue as new compute units are brought up and old compute units are taken down.

B.

Allow http and https traffic to continue as old compute units are discontinued before new units are brought up.

C.

Turn off traffic and take down compute units, then update and bring the compute units back up.

D.

Bring up new compute units, test the compute units, and switch the traffic from old units to new units.

Full Access
Question # 14

Refer to the exhibit.

A Python script must delete all Cisco Catayst 9300 Series switches that have an uptime that is greater than 90 days The script must also query for the status of all the other devices Drag and drop the code from the bottom onto the bottom box the code is missing to complete the script Not at options are used

Full Access
Question # 15

Refer to the exhibit.

A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?

A.

verifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages

B.

verifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version

C.

uninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version

D.

installing nginx, uninstalling apache2, and then verifying that the package repository is at the latest version

Full Access
Question # 16

What is the purpose of the first three pairs of digits in a MAC address?

A.

defines a routing identifier for the client

B.

indicates the IP address of the client in Hex

C.

defines packet forwarding priority sent or received by the adapter

D.

indicates vendor of the network card or adapter

Full Access
Question # 17

What are two benefits of model-driven programmability?

A.

model-driven APIs for abstraction and simplification

B.

single choice of transport, protocol, and encoding

C.

model-based, structured, and human friendly

D.

easier to design, deploy, and manage APIs

E.

models decoupled from transport, protocol, and encoding

Full Access
Question # 18

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

Full Access
Question # 19

Refer to the exhibit.

The script returns an output of 401. To use the supplied URL. an HTTP GET request must Be sent with an Authorization header. The header value is a BaseG4 encoded concatenation of the username and password. Which action must be taken to return an output of 200?

A.

Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication

B.

Modify the method from LOGIN to GET and supply the username ;password value as JSON payload

C.

Verify that the username and password values imported from the configuration file ate still valid.

D.

Insert an Authorization header with the values username password from the supplied configuration file.

Full Access
Question # 20

Why is refactoring done during test-driven development?

A.

to enable larger objects and longer methods

B.

to improve maintainability and readability

C.

to ensure that the previous uses of the objects are explained

D.

to ensure the duplication of essential code

Full Access
Question # 21

Refer to the exhibit.

An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the 'get_all_interfaces' API call is used?

A.

times out

B.

rate limit

C.

pagination

D.

invalid password

Full Access
Question # 22

A local Docker alpine image has been created with an image ID of a391665405fe and tagged as “latest”. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?

A.

docker build -p 8080:80 alpine:latest

B.

docker exec -p 8080:80 alpine:latest

C.

docker start -p 8080:80 alpine:latest

D.

docker run -p 8080:80 alpine:latest

Full Access
Question # 23

In which two ways is an application characterized when interacting with a webhook? (Choose two.)

A.

codec

B.

receiver

C.

transaction monitor

D.

processor

E.

listener

Full Access
Question # 24

Which principle is a value from the manifesto for Agile software development?

A.

adhering to a plan over responding to requirements

B.

detailed documentation over working software

C.

processes and tools over teams and inter actions

D.

customer collaboration over contract negotiation

Full Access
Question # 25

A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?

A.

git update

B.

git merge

C.

git add

D.

git rebase

Full Access
Question # 26

Refer to the exhibit.

Which line must be included in the Bash script for the Python code to succeed?

A.

define WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

B.

export WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

C.

set WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

D.

WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

Full Access
Question # 27

Refer to the exhibit.

What are two characteristics of the NETCONF response? (Choose two.)

A.

ospf is defined by the ietf-ospf module.

B.

ietf-ospf imports ietf-routing.

C.

redistribution is a module of type cisco-ospf.

D.

routing protocols is a list.

E.

The main module is routing.

Full Access
Question # 28

A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing? The data contains sensitive information, so specialist encryption tools must be used to secure the data. Which application deployment model meets the requirements?

A.

edge

B.

private cloud

C.

public cloud

D.

hybrid cloud

Full Access
Question # 29

Refer to the exhibit.

Which workflow does the script automate?

A.

retrieves a media server that is being monitored

B.

updates a media server that is being monitored

C.

adds a media server to be monitored

D.

deletes a media server that is being monitored

Full Access
Question # 30

Refer to the exhibit. An engineer is comparing two files by using the unified diff format. Which cade snippet belongs to the new.py file?

A.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

B.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

C.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

D.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

Full Access
Question # 31

Refer to the exhibit.

An administrator attempts to perform a GET operation by using the Cisco IOS XE RESTCONF API to return the hostname of a device. The sequence diagram in the exhibit illustrates the HTTP messages observed. Which change to the API request resolves the issue?

A.

Remove the -H 'Accept: application/yang-data+json’ header.

B.

Replace -u cisco:cisco parameter with -u ‘cisco:cisco’.

C.

Change the request method from -X ‘GET’ to -X ‘POST’.

D.

Add the -H ‘Content-Type: application/yang-data+json’ header.

Full Access
Question # 32

Which technology is responsible for matching a name to an IP address of an application running on a host?

A.

firewall

B.

proxy

C.

load balancer

D.

DNS

Full Access
Question # 33

What is the purpose of grouping devices in a VLAN?

A.

Devices communicate as if they are connected on the same wire.

B.

Multicast network traffic is limited to the VLAN connected devices.

C.

Unicast messages are limited to the clients connected on the same VLAN.

D.

Network traffic is load balanced between the devices connected to the VLAN.

Full Access
Question # 34

Which standard supported by Cisco IOS XE and Cisco NX-OS is used for automating the configuration of multiple devices across a network?

A.

SNMP – YANG

B.

SYSLOG – YANG

C.

CLI – YANG

D.

NETCONF – YANG

Full Access
Question # 35

What is the function of an Ethernet switch in a networking environment?

A.

to switch a frame from one port to another port based on IP address

B.

to switch a frame from one port to another port based on MAC address

C.

to provide IP addressing to connected hosts

D.

to block unwanted traffic

Full Access
Question # 36

Which OWASP threat occurs when untrusted data is supplied as input to an interpreter as part of a command or query?

A.

broken authentication

B.

data exposure

C.

injection

D.

cross-site scripting

Full Access
Question # 37

Refer to the exhibit. Drag and drop the Dockerfile contents from the left onto the functions on the right that create a container image to run traceroute to track network path to specific targets. Not all options are used.

Full Access
Question # 38

Refer to the exhibit.

Fill in the blank to complete the query parameter and value so that the result set is returned in reverse chronological order (most recent first) based on when message were entered.

Full Access
Question # 39

What is an example of a network interface hardware address?

A.

domain name

B.

IP address

C.

workstation name

D.

MAC address

Full Access
Question # 40

Users cannot access a webserver and after the traffic is captured, the capture too* shows an ICMP packet that reports "communication administratively prohibited" What Is the cause of this webserver access Issue?

A.

An access list along the path is blocking the traffic

B.

The traffic is not allowed to be translated with NAT and dropped.

C.

Users must authenticate on the webserver to access It

D.

A router along the path is overloaded and thus dropping traffic

Full Access
Question # 41

When using the Bash shell, how it the output of the devnet command saved to a tile named “output.txt”?

A.

devnet & output.txt

B.

devnet > output.txt

C.

devnet < output.txt

D.

devnet I output.txt

Full Access
Question # 42

Drag and drop the characteristics from the left onto the corresponding software development methodologies on the right?

Full Access
Question # 43

Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve statement using RESTCONF on a CSR 1000V?

A.

Change the HTTP method to PUT.

B.

Change the transport protocol to HTTPS.

C.

Check the MIMF types in the HTTP headers.

D.

Check the authentication credentials.

Full Access
Question # 44

Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.)

A.

Processor

B.

Codec

C.

Listener

D.

Receiver

E.

Transaction monitor

Full Access
Question # 45

Which protocol runs over TCP port 830?

A.

NETCONF

B.

Telnet

C.

RESTCONF

D.

HTTP

Full Access
Question # 46

A developer has addressed a bug that was found in the production code of an application. A separate file named ‘bug427896191v_fix” has been created with the changes to the code. Which Git command must be used to incorporate the bug fix into the production code?

A.

git rebase

B.

git cat-file

C.

git merge-file

D.

git bisert

Full Access
Question # 47

Drag and drop the characteristics from the left onto the corresponding categories on the right to compare RESTful and RPC APIs.

Full Access
Question # 48

A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?

A.

Communication between the application and the services is not encrypted.

B.

The database credentials should be stored in the configuration files so that they are secured on the same server.

C.

The API keys are stored in the configuration files but should be stored in the vault service.

D.

The synchronization logs should be encrypted and not stored in a relational database.

Full Access
Question # 49

Refer to the exhibit.

A network engineer wants to use an API to update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which line of code needs to be placed in the snippet where the code is missing?

A.

{'Content-Type': 'application/yang.data+xml', 'Accept': 'application/yang.data

+xml'}

B.

{'Content-Type': 'application/yang.data+yaml', 'Accept': 'application/yang.data

+yaml'}

C.

{'Content-Type': 'application/restconf.data+json', 'Accept': 'application/

restconf.data+json'}

D.

{'Content-Type': 'application/yang.data+utf8', 'Accept': 'application/

restconf.data+utf8'}

Full Access
Question # 50

Refer to the exhibit.

An API call is constructed to retrieve the inventory in XML format by using the API. The response to the call is 401 Unauthorized. Which two headers must be added to the API call? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 51

Refer to the exhibit.

Fill in the blanks to complete the cURL command to the list of networks in the Meraki organization with an id of 384279060

Full Access
Question # 52

Which two statements describe the traits of an asynchronous API call? (Choose two.)

A.

The order in which API calls return can be guaranteed

B.

A call to an API does not block the code, but rather it allows application processing to continue

C.

The end user can experience latency or performance lag while waiting for the API call to return

D.

Code execution blocks or waits for the call to an API to return.

E.

A callback function typically is used to process the response from an API call

Full Access
Question # 53

Refer to the exhibit.

An application must be deployed on a server that has other applications installed. The server resources are to be allocated based on the deployment requirements. The OS for each application must be independent. Which type of deployment is used?

A.

hybrid

B.

virtual machines

C.

containers

D.

bare metal

Full Access
Question # 54

Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer's account?

A.

The encoded credentials were available in the source code.

B.

The application was not encrypting the communication with the server.

C.

The credentials were encrypted in the source code.

D.

An SSL certificate was used instead of the TLS protocol to authenticate.

Full Access
Question # 55

What is a capability of the AXL API?

A.

It signs a user in to a phone that is configured for extension mobility.

B.

It pulls logs for the Cisco Tomcat service.

C.

It authenticates users who exist in Cisco Unified Communications Manager.

D.

It provides support for HTTP and HTTPS communications.

Full Access
Question # 56

A customer's cloud services must:

Migrate services to another data center on demand.

Save the operational state of the machine on demand.

Support Windows and Linux GUIs.

Maximize hardware utilization.

Which type of deployment meets these requirements?

A.

bare metal

B.

container

C.

virtual machine

D.

Kubernetes

Full Access
Question # 57

Which solution reduces costs from MPLS, improves application performance, and simplifies operations?

A.

Cisco NSO

B.

Cisco SD-WAN

C.

Cisco ACI

D.

Cisco DNA Center

Full Access
Question # 58

Which two details are captured from the subnet mask? (Choose two.)

A.

portion of an IP address that refers to the subnet

B.

default gateway of the host

C.

unique number ID assigned to the host

D.

part of an IP address that refers to the host

E.

network connection of a host or interface

Full Access
Question # 59

Which two items are Cisco DevNet resources? (Choose two.)

A.

TAC support

B.

Bitbucket

C.

Sandbox

D.

Software research

E.

API Documentation

Full Access
Question # 60

Refer to the exhibit.

Drag and drop the variables from the left onto the item numbers on the right that match the missing assignments in the exhibit.

Full Access