Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Cisco 200-901 DevNet Associate (DEVASC) Exam Practice Test

Demo: 60 questions
Total 406 questions

DevNet Associate (DEVASC) Questions and Answers

Question 1

How is a branch called "my-bug-fix" started to develop a fix needed in a product?

Options:

A.

git branch -b my-bug-fix

B.

git checkout -b my-bug-fix

C.

git checkout my-bug-fix

D.

git branch my-bug-fix

Question 2

Drag and drop the characteristics from the left onto the corresponding software development methodologies on the right?

Options:

Question 3

Refer to the exhibit.

The output of a unified diff when comparing two versions of a python script is shown. Which two “single_request _timeout ()”

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 4

Fill in the blanks to complete the Bash script in which each file in a directory is renamed to Its SHA256 hash?

Options:

Question 5

Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.)

Options:

A.

Processor

B.

Codec

C.

Listener

D.

Receiver

E.

Transaction monitor

Question 6

In which situation would an edge computing solution be used?

Options:

A.

where low latency is needed

B.

where high CPU throughput is needed

C.

where fast memory is needed

D.

where high disk space is needed

Question 7

Which two protocols are used to apply a configuration change on a Cisco IOS XE device? (Choose two)

Options:

A.

CCX

B.

RESTCONF

C.

NETCONF

D.

HSRP

E.

CDP

Question 8

Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE software is true?

Options:

A.

OAuth must be used.

B.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

C.

Basic authentication must be used.

D.

No authentication is required.

Question 9

Drag and drop the Python code from the left onto the correct step on the right to call a REST API.

Options:

Question 10

Which device is a system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?

Options:

A.

Switch

B.

Router

C.

Firewall

D.

Load balancer

Question 11

An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device mut be at fault?

Options:

A.

Laptop on which the script is running

B.

Router

C.

Switch

D.

Load balancer

Question 12

Fill in the blanks to complete the Python script to update the Webex Teams membership of a room using the Python requests library import requests

Options:

Question 13

What are two advantages of version control software? (Choose two.)

Options:

A.

It supports tracking and comparison of changes in binary formate files.

B.

It allows old versions of packaged applications to be hosted on the Internet

C.

It provides wiki collaboration software for documentation.

D.

It supports comparisons between revisions of source code files.

E.

It allows new team members to access the current code and history.

Question 14

On which port does NETCONF operate by default?

Options:

A.

23

B.

443

C.

822

D.

830

Question 15

Drag and drop the HTTP methods from the left onto their generally accepted corresponding create, read, update, and delete operations on the right.

Options:

Question 16

Which type of threat occur when an attacker can send hostile data to an interpreter within an application?

Options:

A.

Cross-site scripting

B.

Sensitive data exposure

C.

Broken authentication

D.

Injection

Question 17

Which two statements about JSON and XML are true? (Choose two.)

Options:

A.

JSON objects are collection of key value pair.

B.

The syntax of JSON contains tags, elements, and attributes.

C.

JSON arrays are an unordered set of key value pairs.

D.

The syntax of XML contains tags, elements, and attributes.

E.

XML objects are collections of key-value pairs.

Question 18

Refer to the exhibit.

Fill in the blanks to complete the cURL command to the list of networks in the Meraki organization with an id of 384279060

Options:

Question 19

Refer to the exhibit.

Which JSON is equivalent to the XML –encoded data?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 20

Drag and drop the function on the left onto the type of plane that handles the function on the right.

Options:

Question 21

What is a benefit of model-driven programmability?

Options:

A.

It addresses the static architecture of traditional networks being decentralized and complex.

B.

By modeling data, it ensures that vast quantities of data are usable for monitoring.

C.

It provides a programmatic and standards-based way of writing configurations to any network device.

D.

It simplifies management and operations by decoupling the networking hardware from its control mechanism.

Question 22

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

Options:

Question 23

A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?

Options:

A.

Communication between the application and the services is not encrypted.

B.

The database credentials should be stored in the configuration files so that they are secured on the same server.

C.

The API keys are stored in the configuration files but should be stored in the vault service.

D.

The synchronization logs should be encrypted and not stored in a relational database.

Question 24

Refer to the exhibit.

A developer needs to upload a local file by using the REST API. The developer gathers information according to the documentation and sends the request by using the cURL command in the exhibit but gets an error code. Which action should be followed to get valid response?

Options:

A.

change content type as JSON

B.

add the authorization header with the access token

C.

add a username-password combination to request command

D.

change request method as GET

Question 25

Drag and drop the code from the bottom onto the box where the code is missing in the Bash script to complete the missing assignment.

Options:

Question 26

Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?

Options:

A.

100

B.

204

C.

302

D.

402

Question 27

What is a benefit of a model-driven approach for infrastructure automation?

Options:

A.

enforces the generation of all automation scripts through the modeling environment

B.

provides a small learning curve and helps system administrators with limited coding experience

C.

ensures that system administrators gain a good understanding of coding and expand their experience and capabilities

D.

enables a user to understand a declarative language to translate the model into an actionable script

Question 28

Refer to the exhibit.

A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?

Options:

A.

results gathering of the show version and show ip int brief commands

B.

output of show ip int brief command on devices of type C9500-40X

C.

execution information of the show version and show ip int brief commands

D.

list of executed commands on C9500-40X and the information of show ip int brief command

Question 29

Refer to the exhibit.

OWASP threat does this example demonstrate?

Options:

A.

Broken access control

B.

SQL injection

C.

Man-in-the-middle

D.

Cross-site-scripting

Question 30

A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time.

Which area of the CALMS framework must the company target for improvement?

Options:

A.

Collaboration

B.

Lean

C.

Sharing

D.

Measurement

Question 31

Which protocol runs over TCP port 22?

Options:

A.

SSH

B.

HTTP

C.

Telnet

D.

NETCONF

Question 32

Refer to the exhibit.

A developer wants to create a room named cisco through Webex API. The developer prepares the request by putting an API token inside the authorization header; however, the given HTTP call returns error code 400. How must the call parameters be changed to ensure a valid response?

Options:

A.

Replace the team body parameter with the name body parameter.

B.

Replace cisco with a valid name for a team.

C.

Change the token in the header with the authorization token.

D.

Change the HTTP method of the call to PUT.

Question 33

Which HTTP response status code means “Forbidden”?

Options:

A.

500

B.

401

C.

403

D.

502

Question 34

A new application is being developed that must be hardware independent. The application includes an administrative component which is accessed using a Windows desktop GUI. Installation and management of the environment must be fully automated. Which application deployment type meets the requirements?

Options:

A.

bare metal

B.

virtual Python environment

C.

container

D.

virtual machine

Question 35

Refer to the exhibit.

A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?

Options:

A.

verifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages

B.

verifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version

C.

uninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version

D.

installing nginx, uninstalling apache2, and then verifying that the package repository is at the latest version

Question 36

A company wants to accelerate the adoption of technologies that will simplify its operations. Staff have different skill levels and are looking for a single site to find easy-to-consume beginner, intermediate, and advanced multidomain use cases. Which site should be used?

Options:

A.

DevNet Ecosystem Exchange

B.

DevNet Automation Exchange

C.

DevNet Creations

D.

DevNet Support Forum

Question 37

Refer to the exhibit.

A network engineer wants to use an API to update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which line of code needs to be placed in the snippet where the code is missing?

Options:

A.

{'Content-Type': 'application/yang.data+xml', 'Accept': 'application/yang.data

+xml'}

B.

{'Content-Type': 'application/yang.data+yaml', 'Accept': 'application/yang.data

+yaml'}

C.

{'Content-Type': 'application/restconf.data+json', 'Accept': 'application/

restconf.data+json'}

D.

{'Content-Type': 'application/yang.data+utf8', 'Accept': 'application/

restconf.data+utf8'}

Question 38

A developer is working on a feature for a new application. The changes in the existing branch named 'feat00304' must be integrated into a single commit with the current working primary branch named 'prodapp411926287'. Which git command must be used?

Options:

A.

git rebase --merge feat00304

B.

git merge --squash feat00304

C.

git push --rebase feat00304

D.

git checkout --squash feat00304

Question 39

Refer to the exhibit.

A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?

Options:

A.

compilation and configuration of the Cisco DevNet application so that it must be started manually

B.

compilation, installation, and configuration of the Cisco DevNet application so that it starts automatically

C.

compilation and installation of the Cisco DevNet application for an autonomous deployment model

D.

installation and configuration of the Cisco DevNet application so that it starts manually

Question 40

What are two functions of a routing table on a network device? (Choose two.)

Options:

A.

It lists entries more than two hops away.

B.

It lists the routes to a particular destination.

C.

It lists the routes to drop traffic.

D.

It lists hosts that are one hop away.

E.

It lists the static and dynamic entries.

Question 41

Drag and drop the code from the bottom onto the box where the code is missing to enable ports on a switch by using RESTCONF. Not all options are used.

Options:

Question 42

What is a benefit of a CI/CD pipeline for infrastructure?

Options:

A.

removes manual errors

B.

enables manual steps

C.

removes the need for operations

D.

provides variety for deployments

Question 43

A developer creates a new application, but the application must be tested before being released to a customer. When a mobile phone that uses 4G is used to access the application, the request fails. Why does the connection to the application fail?

Options:

A.

The application is hosted on premises and VPN connectivity is required

B.

The application must be added to the production server before testing.

C.

The application must be moved to the cloud before testing is possible.

D.

The application connectivity is limited to HTTPS protocol.

Question 44

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a request that generates a security token and gets a list of network devices. Not all options are used.

Options:

Question 45

Which HTTP method is used by webhooks and notifies a listener about an event change?

Options:

A.

PUT

B.

POST

C.

PATCH

D.

GET

Question 46

What is a feature of XML compared to other data formats?

Options:

A.

It uses tags to define the structure.

B.

It uses parenthesis for key-value pairs.

C.

It uses indentation to define the structure.

D.

It uses namespaces for list representation.

Question 47

Which action do webhooks enable an application to perform?

Options:

A.

Increase the request rate limit.

B.

Populate the application with restricted data.

C.

Receive real-time data.

D.

Implement a push model.

Question 48

Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer's account?

Options:

A.

The encoded credentials were available in the source code.

B.

The application was not encrypting the communication with the server.

C.

The credentials were encrypted in the source code.

D.

An SSL certificate was used instead of the TLS protocol to authenticate.

Question 49

What is the function of an Ethernet switch in a networking environment?

Options:

A.

to switch a frame from one port to another port based on IP address

B.

to switch a frame from one port to another port based on MAC address

C.

to provide IP addressing to connected hosts

D.

to block unwanted traffic

Question 50

An engineer needs to retrieve a list of locally available Firepower Threat Defense upgrade packages by using the Firepower Management Center REST API. The engineer uses a GET request with the URL:

/api/fmc_platform/v1/updates/upgradepackages/f413afeb-e6f6-75f4-9169-6d9bd49s625e

What does “f413afeb-e6f6-75f4-9169-6d9bd49s625e” represent?

Options:

A.

container UUID

B.

package UUID

C.

domain UUID

D.

object UUID

Question 51

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script by using the Cisco SDK. Not all options are used.

Options:

Question 52

An engineer prepares a set of Python scripts to interact with network devices. To avoid network performance issues, the engineer wants to run them in a test environment. Which resource must be used to monitor the

live execution of code in an always-available environment?

Options:

A.

packet tracer

B.

learning labs

C.

sandbox

D.

code exchange

Question 53

Which command reverses the last commit without changing the index file or the working tree position?

Options:

A.

git revert HEAD

B.

git reset --hard HEAD~3

C.

git reset --soft HEAD^

D.

git revert

Question 54

An engineer must make changes on a network device through the management platform API. The engineer prepares a script to send the request and analyze the response, check headers, and read the body according to information inside response headers. Drag and drop the HTTP header values from the left onto the elements of an HTTP response on the right.

Options:

Question 55

What is the meaning of the HTTP status code 204?

Options:

A.

request completed; new resource created

B.

server successfully processed request; no content returned

C.

standard response for successful requests

D.

invalid query parameters

Question 56

An engineer deploys a Cisco CSR 1000 V instance to a virtual machine. The engineer must output the device configuration in JSON format. Which protocol is used for this task?

Options:

A.

YANG

B.

NETCONF

C.

SNMP

D.

RESTCONF

Question 57

Refer to the exhibit. Drag and drop the Dockerfile contents from the left onto the functions on the right that create a container image to run traceroute to track network path to specific targets. Not all options are used.

Options:

Question 58

What is a characteristic of the Cisco Finesse platform?

Options:

A.

Applications allow services to be invoked on a network triggered event.

B.

The platform provides a ready-to-go platform for HD video and audio conferencing.

C.

Applications are added to the platform from the desktop remotely.

D.

The platform includes an enterprise-class IM engine.

Question 59

How does edge computing analyze sensitive data in the context of privacy control?

Options:

A.

locally instead of sending the data to the cloud for analysis

B.

locally or on the cloud depending on the configuration

C.

all at once by sending the data to the cloud

D.

locally on each node, and then sends the data to the cloud

Question 60

An engineer needs to collect information about 20,000 Bluetooth clients using the Cisco Meraki API. The API returns only 1,000 results. One of the HTTP response headers has the data:

Link: https://api.meraki.com.info/api/v0/networks/ABC/bluetoothClients?perPage=1000 &startingAfter=1000>;rel=“next”

Which RFC is implemented by the API to apply the restriction?

Options:

A.

RFC 5988 – Web Linking

B.

RFC 5890 – Response Constraints

C.

RFC 5005 – Feed Paging and Archiving

D.

RFC 5446 – Content Limits

Demo: 60 questions
Total 406 questions