Special Summer Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > Cisco Certified DevNet Associate > 200-901

200-901 DevNet Associate (DEVASC) Question and Answers

Question # 4

Which API must an engineer use to change a netmask on a Cisco IOS XE device?

A.

Meraki

B.

RESTCONF/YANG

C.

SD-WAN

D.

DNAC

Full Access
Question # 5

A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?

A.

git update

B.

git merge

C.

git add

D.

git rebase

Full Access
Question # 6

A developer is trying to retrieve data over a REST API. The API server responds with an HTTP client error response code. After investigating the response the developer realizes the realizes the response has a Retry-After header. What is the root cause of this error?

A.

The REST service is unreachable at the time of the REST request

B.

Too many requests were sent to the REST service in a given amount of time.

C.

An appliance limited the rate of requests to the transport layer.

D.

An appliance limited the rate of requests to the application layer

Full Access
Question # 7

What is the purpose of the first three pairs of digits in a MAC address?

A.

defines a routing identifier for the client

B.

indicates the IP address of the client in Hex

C.

defines packet forwarding priority sent or received by the adapter

D.

indicates vendor of the network card or adapter

Full Access
Question # 8

What is a benefit of organizing code into modules?

A.

improves overall performance

B.

reduces the length of code

C.

enables code to be multifunctional

D.

enables the reuse of code

Full Access
Question # 9

Refer to the exhibit.

Which two files are being edited in the unified diff? (Choose two.)

A.

README.md

B.

setup.py

C.

axl.py

D.

ciscoaxl.py

E.

index.py

Full Access
Question # 10

What are two functions of a routing table on a network device? (Choose two.)

A.

It lists entries more than two hops away.

B.

It lists the routes to a particular destination.

C.

It lists the routes to drop traffic.

D.

It lists hosts that are one hop away.

E.

It lists the static and dynamic entries.

Full Access
Question # 11

Refer to the exhibit.

A developer must integrate a bot with an internal communication app. The developer wants to replace the webexbot package with the teamsbot package by using Ansible and prepares a playbook In the first two tasks, the playbook stops the webexbot and verifies that the teamsbot is installed. What is accomplished in the last task of the workflow when the developer runs the Ansible playbook?

A.

stops the webexbot service and uninstals it and retains its configuration files

B.

installs the webexbot and retains the configuration files

C.

uninstalls the webexbot package and removes its configuration files

D.

searches whether the purge package is available in the repository and uninstalls the webexbot package

Full Access
Question # 12

Which HTTP response status code means “Forbidden”?

A.

500

B.

401

C.

403

D.

502

Full Access
Question # 13

Refer to the exhibit.

A network engineer uses model-driven programmability to monitor and perform changes on the network. The network engineer decides to use the NETCONF RPC message to complete one of their tasks. What is accomplished by sending the RPC message?

A.

The running-config of the device is returned.

B.

The name of each interface is reset to a default name.

C.

All the YANG capabilities supported by the device are returned.

D.

A list of interface names is returned.

Full Access
Question # 14

Refer to the exhibit.

A Python script must delete all Cisco Catayst 9300 Series switches that have an uptime that is greater than 90 days The script must also query for the status of all the other devices Drag and drop the code from the bottom onto the bottom box the code is missing to complete the script Not at options are used

Full Access
Question # 15

A local Docker alpine image has been created with an image ID of a391665405fe and tagged as “latest”. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?

A.

docker build -p 8080:80 alpine:latest

B.

docker exec -p 8080:80 alpine:latest

C.

docker start -p 8080:80 alpine:latest

D.

docker run -p 8080:80 alpine:latest

Full Access
Question # 16

Refer to the exhibit.

A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?

A.

verifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages

B.

verifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version

C.

uninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version

D.

installing nginx, uninstalling apache2, and then verifying that the package repository is at the latest version

Full Access
Question # 17

Refer to the exhibit.

A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?

A.

enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

B.

enable_function(‘iana-if-type:softwareLoopback’, Loopback1, true,)

C.

def enable_function(‘iana-if-type:softwareLoopback’, Loopback1, false,)

D.

def enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

Full Access
Question # 18

A developer needs a list of clients connected to a specific device in a Meraki network. After making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet resource should be used to identify the meaning of the response code?

A.

API documentation

B.

Sandbox

C.

Learning Labs

D.

Code Exchange

Full Access
Question # 19

Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.

Full Access
Question # 20

Refer to the exhibit.

Which function does the EXPOSE line perform when building an image from this Dockerfile?

A.

Local port 8080 of the container that launched with this docker image is accessible from co-hosted containers and external clients.

B.

Local port 8080 is not reachable at all because no IP address is specified along with the EXPOSE command of the Dockerfile.

C.

Local port 8080 is accessible from other containers running on the same docker host as the container that launched with this docker image.

D.

Local port 8080 of the container that launched with this docker image is accessible to external clients.

Full Access
Question # 21

Refer to the exhibit.

A developer wants to create a room named cisco through Webex API. The developer prepares the request by putting an API token inside the authorization header; however, the given HTTP call returns error code 400. How must the call parameters be changed to ensure a valid response?

A.

Replace the team body parameter with the name body parameter.

B.

Replace cisco with a valid name for a team.

C.

Change the token in the header with the authorization token.

D.

Change the HTTP method of the call to PUT.

Full Access
Question # 22

Refer to the exhibit.

An API call is constructed to retrieve the inventory in XML format by using the API. The response to the call is 401 Unauthorized. Which two headers must be added to the API call? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 23

In test-driven development, what are two of the green bar patterns? (Choose two.)

A.

another test

B.

break

C.

triangulate

D.

starter test

E.

fake it

Full Access
Question # 24

Refer to the exhibit.

The script returns an output of 401. To use the supplied URL. an HTTP GET request must Be sent with an Authorization header. The header value is a BaseG4 encoded concatenation of the username and password. Which action must be taken to return an output of 200?

A.

Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication

B.

Modify the method from LOGIN to GET and supply the username ;password value as JSON payload

C.

Verify that the username and password values imported from the configuration file ate still valid.

D.

Insert an Authorization header with the values username password from the supplied configuration file.

Full Access
Question # 25

A developer is working on a feature for a new application. The changes in the existing branch named 'feat00304' must be integrated into a single commit with the current working primary branch named 'prodapp411926287'. Which git command must be used?

A.

git rebase --merge feat00304

B.

git merge --squash feat00304

C.

git push --rebase feat00304

D.

git checkout --squash feat00304

Full Access
Question # 26

Refer to the exhibit.

A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?

A.

compilation and configuration of the Cisco DevNet application so that it must be started manually

B.

compilation, installation, and configuration of the Cisco DevNet application so that it starts automatically

C.

compilation and installation of the Cisco DevNet application for an autonomous deployment model

D.

installation and configuration of the Cisco DevNet application so that it starts manually

Full Access
Question # 27

Why is refactoring done during test-driven development?

A.

to enable larger objects and longer methods

B.

to improve maintainability and readability

C.

to ensure that the previous uses of the objects are explained

D.

to ensure the duplication of essential code

Full Access
Question # 28

Drag and drop the Dockerfile instructions from the left onto the descriptions on the right. Not at options are used.

Full Access
Question # 29

Into which type of Python data structure should common data formats be parsed?

A.

sequence

B.

set

C.

dictionary

D.

list

Full Access
Question # 30

Refer to the exhibit.

A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?

A.

results gathering of the show version and show ip int brief commands

B.

output of show ip int brief command on devices of type C9500-40X

C.

execution information of the show version and show ip int brief commands

D.

list of executed commands on C9500-40X and the information of show ip int brief command

Full Access
Question # 31

How does a synchronous API request differ from an asynchronous API request?

A.

clients receive responses with a task id for further processing

B.

clients subscribe to a webhook for operation results

C.

clients are able to access the results immediately

D.

clients poll for the status of the execution of operations

Full Access
Question # 32

Refer to the exhibit.

Which infrastructure automation method is shown?

A.

Waterfall

B.

CI/CD pipeline

C.

Agile

D.

Lean

Full Access
Question # 33

Refer to the exhibit.

Which line must be included in the Bash script for the Python code to succeed?

A.

define WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

B.

export WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

C.

set WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

D.

WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

Full Access
Question # 34

Refer to the exhibit.

The documentation outlines how to use credentials for the AMP API Which script successfully performs an API call using basic authentication?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 35

Refer to the exhibit.

An engineer must configure a load balancer server. The engineer prepares a script to automate workflow by using Bash. The script install the nginx package, moves to the /optAtginx directory, and reads the sites M We (or further processing Based on the script workflow, which process is being automated within the loop by using the information mi sites txt?

A.

creating a new Me Based on template .conf in the /etc/ngin/sites_enabled directory for each lie in the sites txt file. and then changing the file execution permission.

B.

creating a Me per each the in sites txt with the information in template conf. creating a link for the previously created file. and then changing the ownership of the created files

C.

using the content of the file to create the template conf file. creating a Iink from the created file to the /etc/nginx/files.enabled. and then changing the file execution permissions.

D.

using the information in the file to create a set of empty files in the /etchginx/sites_enabled directory and then assigning the owner of the file.

Full Access
Question # 36

What are two considerations when selecting the "best route" for a network device to reach its destination? (Choose two.)

A.

MAC address

B.

metrics

C.

administrative distance

D.

IP address

E.

subnet mask

Full Access
Question # 37

Which protocol runs over TCP port 22?

A.

SSH

B.

HTTP

C.

Telnet

D.

NETCONF

Full Access
Question # 38

Which application should be used to externally access all applications deployed in the same host machine with a single public IP address and port, when each application listens on different local ports?

A.

reverse proxy

B.

load balancer

C.

DNS

D.

firewall

Full Access
Question # 39

Refer to the exhibit.

A Python code has been written to query a device. The executed code results in the error shown. Which action resolves the problem?

A.

import json

B.

requests("GET", base_url + request_url, cookles=cookies)

C.

pip install requests

D.

import requests

Full Access
Question # 40

Refer to the exhibit.

Which JSON snippet configures a new interface according to YANG model?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 41

Which protocol runs over TCP port 23?

A.

SSH

B.

NETCONF

C.

HTTP

D.

Telnet

Full Access
Question # 42

A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:

$ docker tag 84fe411926287 local/app:0.4

Which command must be executed next to build the Docker image using the tag?

A.

$ docker build -p local/app:0.4

B.

$ docker run -t local/app:0.4

C.

$ docker run -p local/app:0.4

D.

$ docker build -t local/app:0.4

Full Access
Question # 43

A developer is creating a script to interact with a REST API service which requires basic authentication. The credentials are "devnet:391665405" and the Base64 encoding of the credentials is "GV2bmV0dXNlcjpDaXNj=". Which payload and header combination must be used for authentication?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 44

What is a benefit of a model-driven approach for infrastructure automation?

A.

enforces the generation of all automation scripts through the modeling environment

B.

provides a small learning curve and helps system administrators with limited coding experience

C.

ensures that system administrators gain a good understanding of coding and expand their experience and capabilities

D.

enables a user to understand a declarative language to translate the model into an actionable script

Full Access
Question # 45

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

Full Access
Question # 46

Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)

A.

22

B.

23

C.

80

D.

443

E.

880

Full Access
Question # 47

Refer to the exhibit.

Which command needs to be placed on the box where the code is missing to output the value of page_jd in the Python 3.7 script?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 48

What is a procedural component of CI/CD pipelines?

A.

Bundled artifacts must be generated.

B.

Every test must pass for the pipeline to continue its execution.

C.

Some tests fall without stopping the pipeline execution.

D.

The release label that identifies the build is optional.

Full Access
Question # 49

Which IP service is used to monitor the performance of network devices?

A.

SNMP

B.

DHCP

C.

DNS

D.

NTP

Full Access
Question # 50

What is a benefit of version control?

A.

prevents two users from working on the same file

B.

keeps track of all changes to the files

C.

prevents the sharing of files

D.

keeps the list of data types used in the files

Full Access
Question # 51

An engineer must review and clean up a code repository. During the review, the engineer finds a file named config.json that contains API URLs, shared keys, and other application configurations. Which two methods, according to best practice, must be used to protect secrets? (Choose two.)

A.

Store in plaintext if they are not stored in a code repository.

B.

Store as plaintext when the server is secured physically.

C.

Never appear in plaintext at rest or in transit.

D.

Make them long, secure strings that include numbers with special characters.

E.

Always store in a secure vault.

Full Access
Question # 52

Which Cisco platform is used to manage data center infrastructure through third-party tools and system integrations?

A.

Cisco DNA Center

B.

Cisco UCS Manager

C.

Cisco Intersight

D.

Cisco UCS Director

Full Access
Question # 53

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Full Access
Question # 54

What is a comparison of YAML and JSON?

A.

YAML has a more consistent approach to representing data compared to JSON.

B.

JSON does not support comments and YAML does.

C.

YAML is a more verbose data structure compared to JSON.

D.

JSON has more common usage in configuration management tools compared to YAML.

Full Access
Question # 55

A team of developers is responsible for a network orchestration application in the company. The responsibilities also include:

developing and improving the application in a continuous manner

deployment of the application and management of CI/CD frameworks

monitoring the usage and problems and managing the performance improvements

Which principle best describes this DevOps practice?

A.

responsible for IT operations

B.

automation of processes

C.

end-to-end responsibility

D.

quality assurance checks

Full Access
Question # 56

A customer's cloud services must:

Migrate services to another data center on demand.

Save the operational state of the machine on demand.

Support Windows and Linux GUIs.

Maximize hardware utilization.

Which type of deployment meets these requirements?

A.

bare metal

B.

container

C.

virtual machine

D.

Kubernetes

Full Access
Question # 57

How are operations on REST APIs performed as compared to RPC APIs?

A.

In a REST API, operations are performed on an object (node) that is identified by a URL, but RPC APIs are operation-oriented.

B.

In a REST API, operations are performed on an external resource that is defined on the API, but the RCP APIs are resource-oriented.

C.

In a REST API, operations are performed on a platform that is identified by the URL, but RPC APIs are platform-oriented.

D.

In a REST API, operations are performed on an internal resource that is defined on the API, but RPC APIs are resource-oriented.

Full Access
Question # 58

Refer to the exhibit. Drag and drop the actions from the left that the contents of this Dockerfile accomplish onto the right. Not all options are used.

Full Access
Question # 59

Refer to the exhibit. An engineer prepares a script to automate workflow by using Cisco DNA Center APIs to display:

total count of devices

list of the network devices

information of one device with a hostname filter

What is displayed in the final step after the Python script is executed?

A.

information about a device of type C9500-40x.

B.

filtered results by the hostname and the platformld C9500-40X

C.

information about the test devices

D.

list of devices with platformId C9500-40x

Full Access
Question # 60

Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.

Full Access
Question # 61

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python script to retrieve a list of network devices from Cisco DNA Center. Not all options are used.

Full Access
Question # 62

A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?

A.

Store the username and password in a separate configuration file.

B.

Store the username and password in a vault.

C.

Store the passwords in a dictionary.

D.

Store the username and password in code.

Full Access
Question # 63

Refer to the exhibit.

An engineer needs to retrieve all the organizations in a Cisco UCS Manager deployment. Drag and drop the code snippets from the bottom onto the blanks in.. Python script to print the information to standard output. Some options may be used more than once. Not all options are used.

Full Access
Question # 64

A developer creates a new application, but the application must be tested before being released to a customer. When a mobile phone that uses 4G is used to access the application, the request fails. Why does the connection to the application fail?

A.

The application is hosted on premises and VPN connectivity is required

B.

The application must be added to the production server before testing.

C.

The application must be moved to the cloud before testing is possible.

D.

The application connectivity is limited to HTTPS protocol.

Full Access
Question # 65

Refer to the exhibit.

Which XML snippet has interface information that conforms to the YANG model?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 66

Refer to the exhibit.

An administrator attempts to perform a GET operation by using the Cisco IOS XE RESTCONF API to return the hostname of a device. The sequence diagram in the exhibit illustrates the HTTP messages observed. Which change to the API request resolves the issue?

A.

Remove the -H 'Accept: application/yang-data+json’ header.

B.

Replace -u cisco:cisco parameter with -u ‘cisco:cisco’.

C.

Change the request method from -X ‘GET’ to -X ‘POST’.

D.

Add the -H ‘Content-Type: application/yang-data+json’ header.

Full Access
Question # 67

Which two commands download and execute an Apache web server container in Docker with a port binding 8080 in the container to 80 on the host? (Choose two.)

A.

docker pull apache

B.

docker run -p 8080:80 httpd

C.

docker run -p 80:8080 httpd

D.

docker pull httpd

E.

docker pull https

Full Access
Question # 68

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to add a subnet to each bridge domain in the Ten1 tenant. Not all options are used.

Full Access
Question # 69

Refer to the exhibit. A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?

A.

cp ./PROD/current.txt ./TEST/config.txt

B.

cp ./TESTi/current.txt ./PROD/config.txt

C.

cp ./PROD/config.txt ./TEST/current.txt

D.

cp ./TEST/config.txt ./PROD/current.txt

Full Access
Question # 70

Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer's account?

A.

The encoded credentials were available in the source code.

B.

The application was not encrypting the communication with the server.

C.

The credentials were encrypted in the source code.

D.

An SSL certificate was used instead of the TLS protocol to authenticate.

Full Access
Question # 71

When a Cisco IOS XE networking device is configured by using RESTCONF, what is the default data encoding method?

A.

application/yaml-data+json

B.

application/yang-data+json

C.

application/xml-data+json

D.

application/json-data+xml

Full Access
Question # 72

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.

Full Access
Question # 73

What is the purpose of Infrastructure as Code?

A.

to provide the ability of independent development process

B.

to manually configure and manage infrastructure at scale

C.

to apply new practices on the development process

D.

to use development engineering practices on the infrastructure

Full Access
Question # 74

What is the function of an Ethernet switch in a networking environment?

A.

to switch a frame from one port to another port based on IP address

B.

to switch a frame from one port to another port based on MAC address

C.

to provide IP addressing to connected hosts

D.

to block unwanted traffic

Full Access
Question # 75

Refer to the exhibit. A developer must use a token to collect data from Cisco DNA Center API and prepares a Python script to send requests. Which line of code needs to be placed on the snippet where the code is missing to obtain a token from the Cisco DNA Center API?

A.

token=BasicAuth(‘user’,‘password’))

B.

auth=BasicAuth(‘user’,‘password’))

C.

auth=HTTPBasicAuth(user,password))

D.

token=HTTPBasicAuth(user,password))

Full Access
Question # 76

Developer is working on a new feature and made changes on a branch named ‘branch-413667549a-new’. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?

A.

git merge -no-edit

B.

git merge -commit

C.

git merge -revert

D.

git merge -abort

Full Access
Question # 77

Which type of OWASP threat forges a malicious HTTP request into an application?

A.

Clickjacking

B.

SQL Injection

C.

CSRF

D.

XSS

Full Access
Question # 78

What is a capability of Cisco Webex?

A.

Join preconfigured or new spaces with fixed user rights.

B.

Configure devices at scale via automation scripts or by manual execution.

C.

Initiate or respond to calls automatically via automation.

D.

Get space history or notified in real time when new messages are posted.

Full Access
Question # 79

Which two details are captured from the subnet mask? (Choose two.)

A.

portion of an IP address that refers to the subnet

B.

default gateway of the host

C.

unique number ID assigned to the host

D.

part of an IP address that refers to the host

E.

network connection of a host or interface

Full Access
Question # 80

What is a characteristic of RPC APIs compared to REST APIs?

A.

Authentication is done over provisions for the service caller and vice versa for RPC API, and REST API uses HTTP headers for authentication.

B.

All communications between the client and server must be stateless for RPC API, and REST API is stateful.

C.

The architecture model for RPC API is resource-focused, and REST API is procedure-focused.

D.

The data payload must be in JSON format for RPC API, and REST API allows JSON and XML formats.

Full Access
Question # 81

Drag and drop characteristics from the left onto the infrastructure management methodologies on the right.

Full Access
Question # 82

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Full Access
Question # 83

Refer to the exhibit.

The server.js Node.js script runs after the Dockerfile creates its container. What is the working directory of the application inside the container?

A.

/source

B.

/app

C.

/app/source

D.

/app/produclion

Full Access
Question # 84

A developer plans to deploy a new application that will use an API to implement automated data collection from Webex with these requirements:

The application was created by using the request library.

Requires HTTP basic authentication.

Provides data in JSON or XML formats.

Which Cisco DevNet resource helps the developer with how to use the API?

A.

DevNet sandbox

B.

API documentation

C.

forums

D.

DevNet code exchange

Full Access
Question # 85

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a request that generates a security token and gets a list of network devices. Not all options are used.

Full Access
Question # 86

Which RFC 1918 address space includes a subnet of 172.16.0.0 that uses a mask of 255.255.0.0?

A.

class A

B.

class B

C.

class C

D.

class D

Full Access
Question # 87

Drag and drop the characteristics from the left onto the software development methodologies on the right.

Full Access
Question # 88

What is a characteristic of the Cisco Finesse platform?

A.

Applications allow services to be invoked on a network triggered event.

B.

The platform provides a ready-to-go platform for HD video and audio conferencing.

C.

Applications are added to the platform from the desktop remotely.

D.

The platform includes an enterprise-class IM engine.

Full Access
Question # 89

What is the purpose of running tests before writing code in test-driven development?

A.

to find unexpected failures in the tests

B.

to demonstrate that the tests fail for expected reasons

C.

to ensure that the tests pass

D.

to provide proof of the work carried out

Full Access
Question # 90

Refer to the exhibit.

An engineer is comparing two tiles by using the unified cliff format What is determined by the content in the file2.py file?

A.

Line 16 of file2.py is auth=HTTPBasicAuth(USERNAME. PASSWORD).

B.

Line 17 of file2.py is auth = HTTPBasicAuth{USERNAME. PASSWORD).

C.

Line 93 of file2.py is 'DEVICE-STATS'.

D.

Line 92 of file2.py is 'DEVICE-STATS'.

Full Access
Question # 91

Drag and drop the common API styles from the left onto the requirement on the right.

Full Access
Question # 92

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script by using the Cisco SDK. Not all options are used.

Full Access
Question # 93

Which network component enables communication between broadcast domains?

A.

load balancer

B.

switch

C.

router

D.

firewall

Full Access
Question # 94

An engineer must investigate the problems on a web application and address them to related teams. The engineer verifies the application reachability from the single public IP

dress with port and discovers that HTTPS access works to three servers of a network farm with IP 172.16.50.1 .2 and .4. but HTTPS access to the server with IP 172.16.50.3 does : work. Which problem type must be addressed as the cause for the case?

A.

VPN connectivity

B.

NAT

C.

blocked transport port

D.

proxy

Full Access
Question # 95

Which REST architectural constraint indicates that no client context should be stored on the server between requests?

A.

stateless

B.

uniform interface

C.

cacheable

D.

client-server

Full Access
Question # 96

Refer to the exhibit.

The output of a unified diff when comparing two versions of a python script is shown. Which two “single_request _timeout ()”

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 97

Which two types of NAT are used in a network? (Choose two.)

A.

Static NAT

B.

Normal NAT

C.

Multicast NAT

D.

Dynamic NAT

E.

Router NAT

Full Access
Question # 98

Which principle is a value from the manifesto for Agile software development?

A.

adhering to a plan over responding to requirements

B.

detailed documentation over working software

C.

processes and tools over teams and inter actions

D.

customer collaboration over contract negotiation

Full Access
Question # 99

Refer to the exhibit.

Drag and drop the code from the left onto the item numbers on the right to complete to Meraki python script shown in the exhibit.

Full Access
Question # 100

What is the first development task in test-driven development?

A.

Write code that implements a desired function.

B.

Write a failing test case for a desired function.

C.

Write a passing test case for existing code.

D.

Reverse engineer the code for a desired function.

Full Access
Question # 101

Which network device monitors incoming and outgoing traffic and decides whether to allow or block specific traffic based on a defined set of rules?

A.

switch

B.

load balancer

C.

reverse proxy

D.

firewall

Full Access
Question # 102

What is used in Layer 2 switches to direct packet transmission to the intended recipient?

A.

spanning tree

B.

IPv4 address

C.

IPv6 address

D.

MAC address

Full Access
Question # 103

Drag and drop the functionalities from the left onto correct networking devices on the right.

Full Access
Question # 104

Which product provides network controller-level management features?

A.

Cisco DNA Center

B.

Cisco NX-OS

C.

Cisco UCS Manager

D.

Cisco ISE

Full Access
Question # 105

A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without error and the bundles are produced. However, when the script is run during business hours, report poor voice quality of phones calls. What explains this behavior?

A.

The application is running in the Voice VLAN and causes delays and jitter in the subnet.

B.

The speed and duplex settings in Cisco DNA Center are sot incorrectly, which causes the transfer to be too slow.

C.

9 The script is written in a low-level programming language where there is no memory safety. This causes a buffer overflow and disruption on the network.

D.

Generating the logs causes the CPU on the network controller to spike, which causes delays m forwarding the voice IP packets.

Full Access
Question # 106

Which Cisco DevNet resource allows access to products in a development lab to explore, learn, and build application that use Cisco APLs?

A.

DevNet communities

B.

DevNet code Exchange

C.

DevNet Automation Exchange

D.

DevNet sandbox

Full Access
Question # 107

A small company has 5 servers and 50 clients. What are two reasons an engineer should spilt this network into separate client and server subnets? (Choose two)

A.

Internet access to the servers will be denied on the router.

B.

A router will limit the traffic types between the clients and servers.

C.

Subnets will split domains to limit failures.

D.

A router will bridge the traffic between clients and servers.

E.

Subnets provide more IP address space for clients and servers.

Full Access
Question # 108

What is the benefit of edge computing?

A.

It reduces network latency by moving processing closer to the data source.

B.

It simplifies security as devices and processing are brought closer together

C.

It removes the need for centralized data processing.

D.

It reduces data velocity from devices or other data sources.

Full Access
Question # 109

: 19 DRAG DROP

Drag and drop the HTTP methods from the left onto their generally accepted corresponding create, read, update, and delete operations on the right.

Full Access
Question # 110

What is the outcome of executing this command?

git clone ssh://john@exmaple.com/path/to/my-project_git

A.

Creates a local copy of a repository called “my project”

B.

Creates a copy of a branch called “my project”

C.

Initiates a new Git repository called “my project”

D.

Creates a new branch called “my project”

Full Access
Question # 111

Refer to the exhibit.

Which python data structure does my_json contain?

A.

List

B.

Json

C.

Map

D.

Dict

Full Access
Question # 112

Refer to the exhibit.

A REST API retune this JSON output for a GET HTTP request, Which has assigned to a variable called “vegetables” Using python, which output is the result of this command?

A.

Lettuce

B.

Kiwi

C.

[‘kiwi’, ‘grape’]

D.

{‘color’: ‘green’, ‘items’: [‘kiwi’, ‘grape’]

Full Access
Question # 113

A 401 HTTP response code is returned when calling a REST API. What is the error state identified by this response code?

A.

The server cannot process the request as it has detected an issue in the request syntax or body.

B.

The server accepted the request but the client is not authorized for this content.

C.

The request has not been accepted because it requires authentication.

D.

The server cannot find the requested resource because the path specified is incorrect.

Full Access
Question # 114

Which task is performed because the test-driven development approach is being used?

A.

testing existing software before developing new code

B.

refactoring code that is covered by existing tests

C.

writing code without committing any coding violations

D.

creating test scenarios based on continuous development

Full Access
Question # 115

Which statement describes the benefit of using functions in programming?

A.

Functions allow problems to be split into simpler, smaller groups, and reduce code repetition, which makes the code easier to read.

B.

Functions ensure that a developer understands the inner logic contained before using them as part of a script or application.

C.

Functions create the implementation of secret and encrypted algorithms.

D.

Functions store mutable values within a script 01 application.

Full Access
Question # 116

Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.

Full Access
Question # 117

Which description of a default gateway if true?

A.

It is a device that receives IP packets that have no explicit next-hop in the routing table.

B.

It is a feature that translates between public and private addresses.

C.

It is a security feature that denies certain traffic.

D.

It is a device that receives Layer 2 frames with an unknown destination address.

Full Access
Question # 118

Which type of threat occur when an attacker can send hostile data to an interpreter within an application?

A.

Cross-site scripting

B.

Sensitive data exposure

C.

Broken authentication

D.

Injection

Full Access
Question # 119

What operation is performed with YANG model-driven programmability in NX-OS?

A.

configure a device with native and OpenConfig-based models

B.

send CLI commands to a device and retrieve output in JSON format

C.

run Linux commands natively on the device

D.

bootstrap a device that has a factory-default configuration

Full Access
Question # 120

Which platform is run directly using a hypervisor?

A.

bare metal systems

B.

containers

C.

virtual machines

D.

applications

Full Access
Question # 121

Refer to the exhibit.

The definition of the YANG module and a RESTCONF query sent to a Cisco IOc XE device is shown. Which statement is correct if the RESTCONF interface responds with a 204 status code?

A.

The query failed at retrieving the logging seventy level.

B.

The query failed to set the logging seventy level due to an invalid path.

C.

The query retrieved the logging seventy level.

D.

The query updated the logging seventy level or created it if not present on the device.

Full Access
Question # 122

What are two advantages of YANG-based approaches for infrastructure automation? (Choose two.)

A.

directly maps to JavaScript

B.

multi-platform vendor abstraction

C.

designed to reflect networking concepts

D.

compiles to executables that run on network devices

E.

command line driven interface

Full Access
Question # 123

Which platform has an API that be used to obtain a list of vulnerable software on user devices?

A.

Cisco Umbrella

B.

Cisco Firepower

C.

Cisco Identity Services Engine

D.

Cisco Advanced Malware Protection

Full Access
Question # 124

Refer to the exhibit.

Drag and drop the descriptors from the left onto the correct parts of the API request and response on the right.

Full Access
Question # 125

A REST API service requires authentication based on the username and password. The user “john” has the password “384279060” and the Base64 encoding of those credentials is “am9objowMTIzNDU2Nzg=”. Which method completes an authentication request?

A.

The header must include:

Authorization: Bearer am9obJowMTlzNDU2Nzg=

B.

The payload must include:

Authorization: Bearer am9objowMTIzNDU2Nzg=

C.

The payload must include.

Authorization: Basic am9objowMTlzNDU2Nzg=

D.

The header must include:

Authorization: Basic am9objowMTlzNDU2Nzg=

Full Access
Question # 126

What is the purpose of a firewall in application deployment?

A.

adds TLS support to an application that does not support it natively

B.

forwards traffic to a pool of instances of the application

C.

provides translation for an application's hostname to its IP address

D.

limits traffic to only ports required by the application

Full Access
Question # 127

Which response status code is used by a RESTful interface to indicate successful execution of a request?

A.

200

B.

404

C.

405

D.

500

Full Access
Question # 128

What is an example of a network interface hardware address?

A.

domain name

B.

IP address

C.

workstation name

D.

MAC address

Full Access
Question # 129

What is the purpose of a MAC address?

A.

To uniquely identify a router in a LAN

B.

To uniquely identify a network interface in a LAN

C.

To uniquely identify a device on the internet

D.

To uniquely identify a switch in a LAN

Full Access
Question # 130

What is a tenet of test-driven development?

A.

write documentation for tests

B.

write tests after adding new blocks of code

C.

write and run tests before writing new code

D.

run tests after writing new code

Full Access
Question # 131

Fill in the blanks to complete the statement.

Cisco DNA provide the capability to send an HTTP _______________ request to the API endpoint https://DNA-c_API_ADDRESS/api/vi/network-device/ and receive the network __________ list in __________ format.

Full Access
Question # 132

Which two query types does a client make to a DNS server? (Choose Two)

A.

AAAA

B.

ACK

C.

DISCOVER

D.

Inverse

E.

PTR

Full Access
Question # 133

What are two roles of an artifact repository in a CI/CD pipeline? (Choose two.)

A.

is required for CI/CD pipelines executed on a public cloud infrastructure

B.

is required for managing open source software

C.

stores files needed and generated during the build process

D.

allows for comparing and merging changes in the source code

E.

provides traceability, search, and management of binary files

Full Access
Question # 134

Which two elements are foundational principles of DevOps? (Choose two.)

A.

designing applications as microservices

B.

encouraging containers for the deployment of applications

C.

organizing cross-functional teams over organizational silos

D.

optimizing the cost of infrastructures

E.

automating over documenting

Full Access
Question # 135

Drag and drop the descriptions from the left onto correct application deployment models on the right.

Full Access
Question # 136

An application calls a REST API and expects a result set of more than 550 records, but each time the call is made, only 25 are returned. Which feature limits the amount of data that is returned by the API?

A.

pagination

B.

payload limit

C.

rate limiting

D.

service timeouts

Full Access
Question # 137

Refer to the exhibit.

The python interpreter and the Cisco python SDK are available by default in the Cisco NX-OS software. The SDK documentation shows how the cild() API can be used when working with working with JSON and XML. What are two effect of running the script? (Choose two.)

A.

configure interlace loopback 5

B.

issue shutdown on interface loopback 5

C.

show only the interfaces In the up status

D.

show only the interfaces in admin shut status

E.

show details for the TABLE interface

Full Access
Question # 138

What should a CI/CD pipeline aim to achieve?

A.

to allow manual testing before deployment

B.

to require minimal manual interaction

C.

to support new deployments on a fixed monthly schedule

D.

to provide a documented process for feedback

Full Access
Question # 139

Refer to the exhibit.

Given the API documentation for the UCS SDK python class, UcsHandle, which code snippet creates a handle instance?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 140

Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?

A.

OAuth must be used.

B.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

C.

Basic authentication must be used.

D.

No authentication is required.

Full Access