Month End Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

DevNet Associate (DEVASC) Question and Answers

DevNet Associate (DEVASC)

Last Update May 23, 2025
Total Questions : 467

We are offering FREE 200-901 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 200-901 free exam questions and then go for complete pool of DevNet Associate (DEVASC) test questions that will help you more.

200-901 pdf

200-901 PDF

$40.25  $114.99
200-901 Engine

200-901 Testing Engine

$47.25  $134.99
200-901 PDF + Engine

200-901 PDF + Testing Engine

$61.25  $174.99
Questions 1

Which two situations align with infrastructure as code principles? (Choose two.)

Options:

A.  

nonreplicable snowflake servers

B.  

release versions to specific hardware

C.  

maximized configuration drift

D.  

easily reproducible systems

E.  

repeatable processes

Discussion 0
Questions 2

An engineer must investigate the problems on a web application and address them to related teams. The engineer verifies the application reachability from the single public IP

dress with port and discovers that HTTPS access works to three servers of a network farm with IP 172.16.50.1 .2 and .4. but HTTPS access to the server with IP 172.16.50.3 does : work. Which problem type must be addressed as the cause for the case?

Options:

A.  

VPN connectivity

B.  

NAT

C.  

blocked transport port

D.  

proxy

Discussion 0
Questions 3

Refer to the exhibit. An engineer runs a network that consists of Cisco Nexus devices. The network is distributed between data centers in different locations. The switches are configured using standalone connections and a single point of failure. Which process is being automated by the Ansible playbook?

Options:

A.  

enabling HSRP on the nxos_rtr inventory host

B.  

enabling HSRP on the rtr-1a inventory host

C.  

executing HSRP configuration from the Ansible controller node

D.  

executing HSRP configuration from the srv-1a inventory host

Discussion 0
Questions 4

Refer to the exhibit.

A developer can access the TLS REST API on server A, but cannot access the API on server B. The developer can ping server B. When the developer performs a packet capture on the TLS REST API port on server B, the capture shows that the packet arrived and the server responded. What causes the issue?

Options:

A.  

Port 80 is blocked on the outgoing interface of firewall B.

B.  

Port 443 is blocked on the outgoing interface of firewall A.

C.  

Port 443 is blocked on the incoming interface of firewall B.

D.  

Port 80 is blocked on the incoming interface of firewall A.

Discussion 0
Questions 5

Refer to the exhibit. An engineer is comparing two files by using the unified diff format. Which cade snippet belongs to the new.py file?

Options:

A.  

B.  

C.  

D.  

Discussion 0
Questions 6

Refer to the exhibit. A network engineer makes a RESTCONF API call to Cisco IOS XE to retrieve information. Which HTTP method and URL does the engineer use to make the ..call?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 7

Which IP service is responsible for automatically assigning an IP address to a device?

Options:

A.  

DNS

B.  

DHCP

C.  

SNMP

D.  

NAT

Discussion 0
Questions 8

What is a feature of XML compared to other data formats?

Options:

A.  

It uses tags to define the structure.

B.  

It uses parenthesis for key-value pairs.

C.  

It uses indentation to define the structure.

D.  

It uses namespaces for list representation.

Discussion 0
Questions 9

Refer to the exhibit. An engineer is managing the network of an enterprise. The network is using a distributed deployment model. The enterprise uses database to store logs. The current policy requires logs to be stored if changes are made to the infrastructure in any of the devices on the data centers. Which workflow is being automated by the Bash script?

Options:

A.  

returning backup files that are older than 30 days

B.  

deleting backup files that are older than 30 days

C.  

configuring the directory to delete files automatically

D.  

automating deletion of all backup files every 30 days

Discussion 0
Questions 10

Refer to the exhibit.

A collaboration engineer has developed a script to automate the gathering of information by providing the email address of the individual. When the engineer tests the script, a 401 error is received. Which command fixes the script?

Options:

A.  

Add "Authorization": "Bearer <WEBEX_TOKEN>" to the headers

B.  

Add "Authentication": "Basic <WEBEX_TOKEN>" in the base_url after "https://".

C.  

Add "<Authorization>:<password>@" in the base_url after "https://".

D.  

Add "Authentication": "Bearer <WEBEX TOKEN>" to the headers

Discussion 0
Questions 11

Which action do webhooks enable an application to perform?

Options:

A.  

Increase the request rate limit.

B.  

Populate the application with restricted data.

C.  

Receive real-time data.

D.  

Implement a push model.

Discussion 0
Questions 12

Drag and drop the functions from the left onto the networking devices on the right.

Options:

Discussion 0
Questions 13

Drag and drop the characteristics from the left onto the corresponding categories on the right to compare RESTful and RPC APIs.

Options:

Discussion 0
Questions 14

Refer to the exhibit.

What does the command marked (2) do when it is run?

Options:

A.  

It duplicates the test" branch.

B.  

It deletes the "test" branch only if a new branch is created.

C.  

It deletes the "test" branch.

D.  

It does not delete the branch until it is merged.

Discussion 0
Questions 15

Drag and drop the code snippets from the bottom onto the blanks in the code to complete the happy path scenario. Not all options are used.

Options:

Discussion 0
Questions 16

Which HTTP method is used by webhooks and notifies a listener about an event change?

Options:

A.  

PUT

B.  

POST

C.  

PATCH

D.  

GET

Discussion 0
Questions 17

Which technology is responsible for matching a name to an IP address of an application running on a host?

Options:

A.  

firewall

B.  

proxy

C.  

load balancer

D.  

DNS

Discussion 0
Questions 18

Refer to the exhibit. A developer writes a script to create a new network by using the Cisco DNA Center API. After running the script for the first time, the developer observes that HTTP code 404 is printed to the console. Which action resolves the problem?

Options:

A.  

The x-auth-token value must be changed to a valid token.

B.  

The API URL must be changed with a valid URL.

C.  

The requested payload must be fixed to include missing parts.

D.  

Internal errors on the code of API server must be fixed.

Discussion 0
Questions 19

eating a Python script to programmatically save network device configurations. Which code snippet must be placed onto the blank in .. code?

Options:

A.  

self.save

B.  

{self.headers}

C.  

restconf

D.  

netconf

Discussion 0
Questions 20

What is a characteristic of lest-driven development?

Options:

A.  

It enables code refactoring.

B.  

User tests are created after deployment.

C.  

Infrastructure testing is done at every stage.

D.  

Large updates are applied infrequently.

Discussion 0
Questions 21

Which Python function is used to parse a string that contains JSON data into a Python dictionary?

Options:

A.  

json.dumps()

B.  

json.to_json()

C.  

json.parse()

D.  

json.loads()

Discussion 0
Questions 22

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Options:

Discussion 0
Questions 23

Which port does HTTPS use by default?

Options:

A.  

433

B.  

443

C.  

803

D.  

883

Discussion 0
Questions 24

What is a benefit of organizing code into modules?

Options:

A.  

better maintainability

B.  

reduced development costs

C.  

simplified development

D.  

compatibility with REST APIs

Discussion 0
Questions 25

A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?

Options:

A.  

Store the username and password in a separate configuration file.

B.  

Store the username and password in a vault.

C.  

Store the passwords in a dictionary.

D.  

Store the username and password in code.

Discussion 0
Questions 26

What is a benefit of version control?

Options:

A.  

application of code directly to hardware

B.  

tracking development changes

C.  

reuse of code-on-code patches

D.  

compatibility with back-end systems

Discussion 0
Questions 27

During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?

Options:

A.  

integration

B.  

deployment

C.  

development

D.  

testing

Discussion 0
Questions 28

What is a benefit of using model-driven programmability for infrastructure automation?

Options:

A.  

connected user tracking

B.  

infrastructure resource optimization

C.  

multiple device control protocols

D.  

device performance monitoring

Discussion 0
Questions 29

Developer is working on a new feature and made changes on a branch named ‘branch-413667549a-new’. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?

Options:

A.  

git merge -no-edit

B.  

git merge -commit

C.  

git merge -revert

D.  

git merge -abort

Discussion 0
Questions 30

Refer to the exhibit. The YAML shown contains an object "param0" that is equal to "Workflow1", a second object "param1" that contains an object called "list" which contains an array of two objects, "name" (equal to "VLAN_ID") and "value" (equal to a text value "198"), and finally a third object "param2" that is equal to "0". What is the equivalent message in JSON data format?

Options:

A.  

B.  

C.  

D.  

Discussion 0
Questions 31

Drag and drop the code from the bottom onto the box where the code is missing to complete the error path scenario. Not all options are used.

Options:

Discussion 0
Questions 32

What is a benefit of using Python classes?

Options:

A.  

They improve code organization by keeping data members and methods together.

B.  

They remove the concept of inheritance to improve code readability and maintainability.

C.  

They allow a Python script to import code from various independent modules.

D.  

They simplify integration by testing the classes independently from other components.

Discussion 0
Questions 33

Refer to the exhibit.

What occurs when the script runs?

Options:

A.  

The contents of both files are displayed.

B.  

The total length of the files is displayed.

C.  

The files are combined.

D.  

File differences are compared.

Discussion 0
Questions 34

What is a capability of model-driven programmability for infrastructure automation?

Options:

A.  

compatibility with any networking device

B.  

automatic version control

C.  

generic APIs that are compatible with multiple platforms

D.  

a single data model acr oss the network

Discussion 0
Questions 35

A developer plans to deploy a new application that will use an API to implement automated data collection from Webex with these requirements:

The application was created by using the request library.

Requires HTTP basic authentication.

Provides data in JSON or XML formats.

Which Cisco DevNet resource helps the developer with how to use the API?

Options:

A.  

DevNet sandbox

B.  

API documentation

C.  

forums

D.  

DevNet code exchange

Discussion 0
Questions 36

Refer to the exhibit.

An engineer is comparing two tiles by using the unified cliff format What is determined by the content in the file2.py file?

Options:

A.  

Line 16 of file2.py is auth=HTTPBasicAuth(USERNAME. PASSWORD).

B.  

Line 17 of file2.py is auth = HTTPBasicAuth{USERNAME. PASSWORD).

C.  

Line 93 of file2.py is 'DEVICE-STATS'.

D.  

Line 92 of file2.py is 'DEVICE-STATS'.

Discussion 0
Questions 37

An engineer needs to collect information about 20,000 Bluetooth clients using the Cisco Meraki API. The API returns only 1,000 results. One of the HTTP response headers has the data:

Link: https://api.meraki.com.info/api/v0/networks/ABC/bluetoothClients?perPage=1000 &startingAfter=1000>;rel=“next”

Which RFC is implemented by the API to apply the restriction?

Options:

A.  

RFC 5988 – Web Linking

B.  

RFC 5890 – Response Constraints

C.  

RFC 5005 – Feed Paging and Archiving

D.  

RFC 5446 – Content Limits

Discussion 0
Questions 38

What is a benefit of using a code review process in application development?

Options:

A.  

accelerates the deployment of new features in an existing application

B.  

provides version control during code development

C.  

enables the quick deployment of new code

D.  

eliminates common mistakes during development

Discussion 0
Questions 39

A company deploys an application via containers in its local data center. As soon as the application goes into production, it starts to crash at specific hours of the day. After investigation, it is concluded that the crashes are due to too many users accessing the application simultaneously. The spikes must be addressed and allow for future growth without discarding the investment already made. Which deployment model must be used?

Options:

A.  

hybrid cloud

B.  

edge

C.  

private cloud

D.  

public cloud

Discussion 0
Questions 40

Drag and drop the code from the bottom onto the box where the code is missing to enable ports on a switch by using RESTCONF. Not all options are used.

Options:

Discussion 0
Questions 41

Which Cisco compute management platform controls server, network, storage, and virtual resources with policy-driven management for up to 10000 physical Cisco servers?

Options:

A.  

UCS Central

B.  

Cisco Intersight

C.  

Cisco DNA Center

D.  

Cisco HyperFlex

Discussion 0
Questions 42

Which IP service is used to monitor the performance of network devices?

Options:

A.  

SNMP

B.  

DHCP

C.  

DNS

D.  

NTP

Discussion 0
Questions 43

Refer to the exhibit. Which code snippet represents the sequence.

Options:

A.  

B.  

C.  

D.  

Discussion 0
Questions 44

Which two commands download and execute an Apache web server container in Docker with a port binding 8080 in the container to 80 on the host? (Choose two.)

Options:

A.  

docker pull apache

B.  

docker run -p 8080:80 httpd

C.  

docker run -p 80:8080 httpd

D.  

docker pull httpd

E.  

docker pull https

Discussion 0
Questions 45

What is the function of an Ethernet switch in a networking environment?

Options:

A.  

to switch a frame from one port to another port based on IP address

B.  

to switch a frame from one port to another port based on MAC address

C.  

to provide IP addressing to connected hosts

D.  

to block unwanted traffic

Discussion 0
Questions 46

Which tool provides a testing environment to run tests on network devices and perform network automation scenarios?

Options:

A.  

Visual Studio Code

B.  

Cisco VIRL

C.  

pyATS

D.  

Cisco Packet Tracer

Discussion 0
Questions 47

What is a capability of the AXL API?

Options:

A.  

It signs a user in to a phone that is configured for extension mobility.

B.  

It pulls logs for the Cisco Tomcat service.

C.  

It authenticates users who exist in Cisco Unified Communications Manager.

D.  

It provides support for HTTP and HTTPS communications.

Discussion 0
Questions 48

Drag and drop the function on the left onto the type of plane that handles the function on the right.

Options:

Discussion 0
Questions 49

When a Cisco IOS XE networking device is configured using RESTCONF, what is the default data-encoding method?

Options:

A.  

XML

B.  

x-form-encoding

C.  

YANG

D.  

YAML

Discussion 0
Questions 50

Which platform is run directly using a hypervisor?

Options:

A.  

bare metal systems

B.  

containers

C.  

virtual machines

D.  

applications

Discussion 0
Questions 51

What is the Git command to delete a local branch named “experiment” without a warning?

Options:

A.  

git branch –n experiment

B.  

git branch –rm experiment

C.  

git branch –f experiment

D.  

git branch –D experiment

Discussion 0
Questions 52

Which HTTP status Code means that the server cannot or will not process the request because of perceived client error?

Options:

A.  

100

B.  

203

C.  

303

D.  

400

Discussion 0
Questions 53

Refer to the exhibit.

Drag and drop the descriptors from the left onto the correct parts of the API request and response on the right.

Options:

Discussion 0
Questions 54

Drag and Drop the GIT commands from the left onto the right that add modified local files to a remote repository. Not all options are used

Options:

Discussion 0
Questions 55

Refer to the exhibit.

OR

An administrator attempts to perform a GET using the Cisco IOS XE RESTOCNF API to return the hostname of a device. The sequence diagram illustrated the HTTP message observed. Which change to the API request resolves the issue?

Options:

A.  

Add Content-Type HTTP header with 'application/yang-data+json' using –H ‘Content-Type: application/yang-data+json’.

B.  

Use -u cisco: cisco instead of -u ‘cisco: cisco'.

C.  

Change the request method from -X "GET” to- X’ POST”.

D.  

Remove the -H ’Accept: application/yang-data^/son’ HTTP header because it is not required.

Discussion 0
Questions 56

Refer to the exhibit.

What is the effect of this Ansible playbook on an IOS router?

Options:

A.  

A new running configuration is pushed to the IOS router.

B.  

The current running configuration of the IOS router is backed up.

C.  

The start-up configuration of the IOS router is copied to a local folder.

D.  

A new start-up configuration is copied to the IOS router.

Discussion 0
Questions 57

On which port does NETCONF operate by default?

Options:

A.  

23

B.  

443

C.  

822

D.  

830

Discussion 0
Questions 58

Refer to the exhibit.

Drag and drop the code from the left onto the item numbers on the right to complete to Meraki python script shown in the exhibit.

Options:

Discussion 0
Questions 59

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. Not all options are used.

Options:

Discussion 0
Questions 60

Which two statements describe the advantages of using a version control system? (Choose two.)

Options:

A.  

It allows for branching and merging so that different tasks are worked on in isolation before they are merged into a feature or master branch.

B.  

It allows multiple engineers to work against the same code and configuration files and manage differences and conflicts.

C.  

It provides tooling to automate application builds and infrastructure provisioning.

D.  

It allows developers to write effective unit tests.

E.  

It provides a system to track User Stories and allocate to backlogs.

Discussion 0
Questions 61

Fill in the blanks to complete the Python script to update the Webex Teams membership of a room using the Python requests library import requests

Options:

Discussion 0
Questions 62

Refer to the exhibit.

Drag and drop the variables from the left onto the item numbers on the right that match the missing assignments in the exhibit.

Options:

Discussion 0
Questions 63

Refer to the exhibit.

A developer is troubleshooting an API with the given API with the given API documentation and cURL command. What is the cause of this problem?

Options:

A.  

The user is not allowed to post massages from their account

B.  

The request body is missing or incomplete

C.  

The API token specified is expired

D.  

The authorization header is missing or incomplete

Discussion 0
Questions 64

Refer to the exhibit.

Which two statements about the network diagram are true? (Choose two.)

Options:

A.  

PC-A and PC-B are in the same subnet.

B.  

One of the routers has two connected serial interfaces.

C.  

The subnet of PC-C can contain 256 hosts.

D.  

R1 and R3 are in the same subnet.

E.  

The subnet address of PC-B has 18 bits dedicated to the network portion.

Discussion 0
Questions 65

A developer is reviewing a code that was written by a colleague. It runs fine, but there are many lines of code to do a seemingly simple task repeatedly. Which action organizes the code?

Options:

A.  

Refactor the code by removing any unnecessary tests

B.  

Using functions, rewrite any pieces of code that are repeated

C.  

Reverse engineer and rewrite the code logic

D.  

Modify the code to use loops

Discussion 0
Questions 66

Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose two.)

Options:

A.  

Cisco Intersight API interactions can be encoded in XML or JSON and require an APIs key in the HTTP header for authentication.

B.  

USC Director API interactions can be XML- or JSON-encoded and require an APLs key in the HTTP header for authentication.

C.  

UCS manager API interactions are XML-encoded and require a cookie in the method for authentication.

D.  

Cisco Intersight uses XML to encoded API interactions and requires an API key pair for authentication.

E.  

UCS manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the HTTP header for authentication.

Discussion 0
Questions 67

Fill in the blanks to complete the statement.

Cisco DNA provide the capability to send an HTTP _______________ request to the API endpoint https://DNA-c_API_ADDRESS/api/vi/network-device/ and receive the network __________ list in __________ format.

Options:

Discussion 0
Questions 68

Drag and drop the Python code from the left onto the correct step on the right to call a REST API.

Options:

Discussion 0
Questions 69

A developer is writing an application that a REST API and the application requires a valid from the API which element of the response is used in the conditional check?

Options:

A.  

URL

B.  

Status code

C.  

Link

D.  

Body

E.  

Headers

Discussion 0
Questions 70

A REST API service requires authentication based on the username and password. The user “john” has the password “384279060” and the Base64 encoding of those credentials is “am9objowMTIzNDU2Nzg=”. Which method completes an authentication request?

Options:

A.  

The header must include:

Authorization: Bearer am9obJowMTlzNDU2Nzg=

B.  

The payload must include:

Authorization: Bearer am9objowMTIzNDU2Nzg=

C.  

The payload must include.

Authorization: Basic am9objowMTlzNDU2Nzg=

D.  

The header must include:

Authorization: Basic am9objowMTlzNDU2Nzg=

Discussion 0
Questions 71

Refer to the exhibit.

What caused the error in this API request?

Options:

A.  

The API resource does not support the POST operation

B.  

The API resource does not support JSON format payloads.

C.  

The submitted JSON payload includes a field that is not supported by the API resource.

D.  

The submitted JSON payload has a formatting issue

Discussion 0
Questions 72

Which two use cases are supported by Meraki APIs? (Choose two.)

Options:

A.  

Retrieve live streams from a Meraki Camera.

B.  

Build a custom Captive Portal for Mobile Apps.

C.  

Configure network devices via the Dashboard API.

D.  

Build location-aware apps from Wi-Fi and LoRaWAN devices.

E.  

Deploy applications onto the devices.

Discussion 0
Questions 73

How does requesting a synchronous API operation differ from requesting an asynchronous API operation?

Options:

A.  

clients poll for the status of the execution of operations

B.  

clients subscribe to a webhook for operation results

C.  

clients can access the results immediately

D.  

clients receive responses with a task id for further processing

Discussion 0
Questions 74

Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.)

Options:

A.  

Processor

B.  

Codec

C.  

Listener

D.  

Receiver

E.  

Transaction monitor

Discussion 0
Questions 75

A 401 HTTP response code is returned when calling a REST API. What is the error state identified by this response code?

Options:

A.  

The server cannot process the request as it has detected an issue in the request syntax or body.

B.  

The server accepted the request but the client is not authorized for this content.

C.  

The request has not been accepted because it requires authentication.

D.  

The server cannot find the requested resource because the path specified is incorrect.

Discussion 0
Questions 76

Refer to the exhibit.

What does the python function do?

Options:

A.  

It returns DNAC user and password.

B.  

It returns HTTP Basic Authentication.

C.  

It returns an authorization token.

D.  

It reads a token from a local JSON file and posts the token to the DNAC URL.

Discussion 0
Questions 77

Refer to the exhibit.

What caused the error in this API request?

Options:

A.  

The API resource does not support the POST operation.

B.  

The API resource does not support JSON format payloads.

C.  

The submitted JSON payload includes a field that is not supported by the API resources.

D.  

The submitted JSON payload has a formatting issue.

Discussion 0
Questions 78

Refer to the exhibit.

What is the function of the python script?

Options:

A.  

Count and print the total number of available devices.

B.  

Iterate over a list of network devices and write all device names and management IP addresses to an output file.

C.  

Iterate over a list of network devices and write all device type and associated management IP address.

D.  

For each device that is returned, display the device and, for each device, print the device name and management IP address.

E.  

Loop through the returned list of network devices and, for each device, print the device name management IP address.

Discussion 0
Questions 79

Refer to the exhibit.

What is the value of the node defined by this YANG structure?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 80

Refer to the exhibit.

The definition of the YANG module and a RESTCONF query sent to a Cisco IOc XE device is shown. Which statement is correct if the RESTCONF interface responds with a 204 status code?

Options:

A.  

The query failed at retrieving the logging seventy level.

B.  

The query failed to set the logging seventy level due to an invalid path.

C.  

The query retrieved the logging seventy level.

D.  

The query updated the logging seventy level or created it if not present on the device.

Discussion 0
Questions 81

Drag and drop the Docker file instructions from the onto correct descriptions on the right. Not all options are used.

Options:

Discussion 0
Questions 82

Which response status code is used by a RESTful interface to indicate successful execution of a request?

Options:

A.  

200

B.  

404

C.  

405

D.  

500

Discussion 0
Questions 83

How is a branch called "my-bug-fix" started to develop a fix needed in a product?

Options:

A.  

git branch -b my-bug-fix

B.  

git checkout -b my-bug-fix

C.  

git checkout my-bug-fix

D.  

git branch my-bug-fix

Discussion 0
Questions 84

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. (Not all Options are used)

Options:

Discussion 0
Questions 85

Fill in the blanks to complete the Bash script in which each file in a directory is renamed to Its SHA256 hash?

Options:

Discussion 0
Questions 86

Which two statements about JSON and XML are true? (Choose two.)

Options:

A.  

JSON objects are collection of key value pair.

B.  

The syntax of JSON contains tags, elements, and attributes.

C.  

JSON arrays are an unordered set of key value pairs.

D.  

The syntax of XML contains tags, elements, and attributes.

E.  

XML objects are collections of key-value pairs.

Discussion 0
Questions 87

Which REST architectural constraint indicates that no client context should be stored on the server between requests?

Options:

A.  

stateless

B.  

uniform interface

C.  

cacheable

D.  

client-server

Discussion 0
Questions 88

Refer to the exhibit.

Drag and drop the code from the left code from the left onto the item number on the right to complete the Meraki code to obtain a list of client which have used this network.

Options:

Discussion 0
Questions 89

Which mechanism is used to consume a RESTful API design when large amounts of data are returned?

Options:

A.  

Data sets

B.  

Scrolling

C.  

Blobs

D.  

Pagination

Discussion 0
Questions 90

What are two security benefits of a Docker-based application?

Options:

A.  

easier to patch because Docker containers include only dependencies that the application requires

B.  

prevents information leakage that can occur when unhandled exceptions are returned in HTTP responses

C.  

allows for separation of application that traditionally run in the same host

D.  

natively secures access to secrets that are used by the running application

E.  

guarantees container images are secured and free of vulnerabilities

Discussion 0
Questions 91

Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.

Options:

Discussion 0
Questions 92

In DNS, which record specifies an alias that refers to another name that ultimately resolves to an IP address?

Options:

A.  

AAA

B.  

SOA

C.  

NS

D.  

CNAME

Discussion 0
Questions 93

Refer to the exhibit.

The output of a unified diff when comparing two versions of a python script is shown. Which two “single_request _timeout ()”

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 94

The project is migrated to a new codebase, the “old_project” directory must be deleted. The directory has multiple read-only files, and it must be deleted recursively without prompting for confirmation. Which bash command must be used?

Options:

A.  

rm -rf old_project

B.  

rm -r old_project

C.  

rmdir -p old_project

D.  

rmdir old_project

Discussion 0
Questions 95

Drag and drop the Dockerfile instructions from the left onto the descriptions on the right. Not at options are used.

Options:

Discussion 0
Questions 96

Refer to the exhibit.

The Cisco Meraki API manages two organizations. In each organization, two independent networks are defined. How many calls to the /organizations/(orgid)networks endpoint will be run parallel by the GetAllNetwork function of the API client?

Options:

A.  

0

B.  

1

C.  

2

D.  

4

Discussion 0
Questions 97

What is a requirement when authenticating a RESTCONF API session with a router that runs Cisco IOS XE Software?

Options:

A.  

No authentication is required.

B.  

OAuth must be used.

C.  

Basic authentication must be used.

D.  

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

Discussion 0
Questions 98

Which HTTP response status code means “Forbidden”?

Options:

A.  

500

B.  

401

C.  

403

D.  

502

Discussion 0
Questions 99

Which protocol runs over TCP port 22?

Options:

A.  

SSH

B.  

HTTP

C.  

Telnet

D.  

NETCONF

Discussion 0
Questions 100

In test-driven development, what are two of the green bar patterns? (Choose two.)

Options:

A.  

another test

B.  

break

C.  

triangulate

D.  

starter test

E.  

fake it

Discussion 0
Questions 101

Refer to the exhibit.

A Python code has been written to query a device. The executed code results in the error shown. Which action resolves the problem?

Options:

A.  

import json

B.  

requests("GET", base_url + request_url, cookles=cookies)

C.  

pip install requests

D.  

import requests

Discussion 0
Questions 102

A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time.

Which area of the CALMS framework must the company target for improvement?

Options:

A.  

Collaboration

B.  

Lean

C.  

Sharing

D.  

Measurement

Discussion 0
Questions 103

A new application is being developed with specific platform requirements. The platform and application deployment and the ongoing platform management must be fully automated. The application includes a large database component that has significant disk I/O requirements. Which application deployment type meets the requirements?

Options:

A.  

Python virtual environment

B.  

virtual machine

C.  

bare metal

D.  

container

Discussion 0
Questions 104

Refer to the exhibit.

An engineer must configure a load balancer server. The engineer prepares a script to automate workflow by using Bash. The script install the nginx package, moves to the /optAtginx directory, and reads the sites M We (or further processing Based on the script workflow, which process is being automated within the loop by using the information mi sites txt?

Options:

A.  

creating a new Me Based on template .conf in the /etc/ngin/sites_enabled directory for each lie in the sites txt file. and then changing the file execution permission.

B.  

creating a Me per each the in sites txt with the information in template conf. creating a link for the previously created file. and then changing the ownership of the created files

C.  

using the content of the file to create the template conf file. creating a Iink from the created file to the /etc/nginx/files.enabled. and then changing the file execution permissions.

D.  

using the information in the file to create a set of empty files in the /etchginx/sites_enabled directory and then assigning the owner of the file.

Discussion 0
Questions 105

Which platform is used to programmatically create a space and invite users for collaboration?

Options:

A.  

Cisco Intersight

B.  

Cisco Finesse

C.  

Cisco Webex

D.  

Cisco UCM

Discussion 0
Questions 106

What are two properties of private IP addresses? (Choose two.)

Options:

A.  

They can be used to access the Internet directly.

B.  

They are more secure than public IP addresses.

C.  

They are not globally unique.

D.  

They can be repeated within the same local network.

E.  

They are controlled globally by an IP address registry.

Discussion 0
Questions 107

Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?

Options:

A.  

100

B.  

204

C.  

302

D.  

402

Discussion 0
Questions 108

Refer to the exhibit.

What do all the calls shown in the sequence diagram have in common?

Options:

A.  

All the calls are optional.

B.  

All the calls are asynchronous.

C.  

All the calls are synchronous.

D.  

All the calls depend on the catalog.

Discussion 0
Questions 109

Refer to the exhibit.

Which function does the EXPOSE line perform when building an image from this Dockerfile?

Options:

A.  

Local port 8080 of the container that launched with this docker image is accessible from co-hosted containers and external clients.

B.  

Local port 8080 is not reachable at all because no IP address is specified along with the EXPOSE command of the Dockerfile.

C.  

Local port 8080 is accessible from other containers running on the same docker host as the container that launched with this docker image.

D.  

Local port 8080 of the container that launched with this docker image is accessible to external clients.

Discussion 0
Questions 110

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

Options:

Discussion 0
Questions 111

Which protocol must be allowed on the firewall so that NTP services work properly?

Options:

A.  

ICMP

B.  

BGP

C.  

UDP

D.  

TCP

Discussion 0
Questions 112

Refer to the exhibit.

An engineer must check the admin rights of users on a database regularly and prepares

the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?

Options:

A.  

They must be stored in configuration files if there is a possibility of leakage.

B.  

They must be Base64-encoded if stored in the user database.

C.  

They must be encrypted if stored in the user database.

D.  

They must be stored in configuration files if no authentication will be used.

Discussion 0
Questions 113

What is a benefit of model-driven programmability?

Options:

A.  

It addresses the static architecture of traditional networks being decentralized and complex.

B.  

By modeling data, it ensures that vast quantities of data are usable for monitoring.

C.  

It provides a programmatic and standards-based way of writing configurations to any network device.

D.  

It simplifies management and operations by decoupling the networking hardware from its control mechanism.

Discussion 0
Questions 114

What is the function of IP address in networking?

Options:

A.  

specifies the type of traffic that is allowed to roam on a network

B.  

represents the unique ID that is assigned to one host on a network

C.  

specifies resource's location and the mechanism to retrieve it

D.  

represents a network connection on specific devices

Discussion 0
Questions 115

Refer to the exhibit.

A network engineer must manage the network devices. The engineer prepares a Python scripts to authenticate to the Cisco to DNA Center API and request a device list. The device request fails and returns errors code 401. Which action solves the problem?

Options:

A.  

Update the API URL. which matched the API endpoint for device list.

B.  

Send the request to another network in case there are reachability Issues.

C.  

Send the Authentication header In the request with a valid configuration.

D.  

Update the credentials that are already supplied and retry the request

Discussion 0
Questions 116

Drag and drop the code snippets from the bottom to the blanks in the code to complete the HTTP response. Not all options are used.

Options:

Discussion 0
Questions 117

Which Cisco platform provides organization-wide automation, security, policy enforcement, any agility across wired and wireless networks?

Options:

A.  

Cisco ACI

B.  

Cisco DNA Center

C.  

Cisco Umbrella

D.  

Cisco SD-WAN

Discussion 0
Questions 118

Refer to the exhibit.

Which command, including arguments, is executed when the container starts?

Options:

A.  

/bin/sh -c "/bin/sleep 30 && nginx -g 'daemon off;'"

B.  

/bin/sh -c "/bin/sleep 10 && nginx -g 'daemon off;'"

C.  

/bin/bash -c "/bin/sleep 30 && nginx -g 'daemon off;'"

D.  

/bin/sh -c "/bin/sleep 30" && nginx -g 'daemon off;'

Discussion 0
Questions 119

Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:

• MySQL database that stores data about customers

• HTML5 and JavaScript UI that runs on Apache

• REST API written in Python

What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)

Options:

A.  

to enable multiple views of the same data to be presented to different groups of users

B.  

to provide separation between the view and the model by ensuring that all logic is separated out into the controller

C.  

to ensure data consistency, which requires that changes to the view are also made to the model

D.  

to ensure that only one instance of the data model can be created

E.  

to provide only a single view of the data to ensure consistency

Discussion 0
Questions 120

Refer to the exhibit.

A network engineer uses model-driven programmability to monitor and perform changes on the network. The network engineer decides to use the NETCONF RPC message to complete one of their tasks. What is accomplished by sending the RPC message?

Options:

A.  

The running-config of the device is returned.

B.  

The name of each interface is reset to a default name.

C.  

All the YANG capabilities supported by the device are returned.

D.  

A list of interface names is returned.

Discussion 0
Questions 121

While developing a real-Time VoIP application on a Cisco Webex platform, users report that their voice gets chopped or parts of the conversation drop out. Which network constraint is impacting the application?

Options:

A.  

latency

B.  

jitter

C.  

capacity

D.  

delay

Discussion 0
Questions 122

What is a benefit of test-driven development?

Options:

A.  

early customer involvement

B.  

increased code quality

C.  

faster releases that have minimal features

D.  

strict adherence to product requirements

Discussion 0
Questions 123

A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?

Options:

A.  

git update

B.  

git merge

C.  

git add

D.  

git rebase

Discussion 0
Questions 124

What is the difference between YAML and JSON data structure?

Options:

A.  

YAML uses spaces; JSON uses parentheses

B.  

YAML uses indentation; JSON uses brackets and braces

C.  

YAML uses brackets and braces; JSON uses indentation

D.  

YAML uses parentheses; JSON uses spaces

Discussion 0
Questions 125

What is a capability of an agentless configuration management system?

Options:

A.  

It requires managed hosts to have an interpreter for a high-level language such as Python or Ruby.

B.  

It requires managed hosts to connect to a centralized host to receive updated configurations.

C.  

It uses compiled languages as the basis of the domain-specific language to interface with managed hosts.

D.  

It uses existing protocols to interface with the managed host.

Discussion 0
Questions 126

How do XML and JSON compare regarding functionality?

Options:

A.  

JSON natively supports arrays and XML does not natively support arrays.

B.  

XML provides support for mapping data structures into host languages than JSON.

C.  

XML provides more human readability than JSON.

D.  

JSON provides support for data types than XML.

Discussion 0
Questions 127

Refer to the exhibit.

Which command needs to be placed on the box where the code is missing to output the value of page_jd in the Python 3.7 script?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 128

Drag and drop the code snippets from the bottom to the blanks in the code to test the API response through the Python unittest library. Not all options are used.

Options:

Discussion 0
Questions 129

A company wants to accelerate the adoption of technologies that will simplify its operations. Staff have different skill levels and are looking for a single site to find easy-to-consume beginner, intermediate, and advanced multidomain use cases. Which site should be used?

Options:

A.  

DevNet Ecosystem Exchange

B.  

DevNet Automation Exchange

C.  

DevNet Creations

D.  

DevNet Support Forum

Discussion 0
Questions 130

What is the purpose of the first three pairs of digits in a MAC address?

Options:

A.  

defines a routing identifier for the client

B.  

indicates the IP address of the client in Hex

C.  

defines packet forwarding priority sent or received by the adapter

D.  

indicates vendor of the network card or adapter

Discussion 0
Questions 131

Drag and drop the code snippets from the bottom into the Python script to write API output to a csv file. Not all options are used.

Options:

Discussion 0
Questions 132

Which protocol runs over TCP port 23?

Options:

A.  

SSH

B.  

NETCONF

C.  

HTTP

D.  

Telnet

Discussion 0
Questions 133

Which Cisco product provides malware and content filtering through DNS?

Options:

A.  

Cisco ASA Firepower module

B.  

Cisco AMP

C.  

Cisco ISE

D.  

Cisco Umbrella

Discussion 0
Questions 134

A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:

$ docker tag 84fe411926287 local/app:0.4

Which command must be executed next to build the Docker image using the tag?

Options:

A.  

$ docker build -p local/app:0.4

B.  

$ docker run -t local/app:0.4

C.  

$ docker run -p local/app:0.4

D.  

$ docker build -t local/app:0.4

Discussion 0
Questions 135

Refer to the exhibit.

A Python script must delete all Cisco Catayst 9300 Series switches that have an uptime that is greater than 90 days The script must also query for the status of all the other devices Drag and drop the code from the bottom onto the bottom box the code is missing to complete the script Not at options are used

Options:

Discussion 0
Questions 136

What is a functionality of the Waterfall method as compared to the Agile method for software development?

Options:

A.  

Waterfall increases agility to implement faster while Agile promotes reliability.

B.  

A phase begins after the previous phase has ended in Waterfall while Agile phases run in parallel.

C.  

Customers get feedback during the process in Waterfall while they can see the result at the end in Agile.

D.  

Requirements can be updated in Waterfall while in Agile it should be gathered in the beginning.

Discussion 0
Questions 137

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code,

which resource must be used to verify that the code works correctly?

Options:

A.  

Cisco NX-OS SDK

B.  

Cisco Learning Labs

C.  

Cisco Code Exchange

D.  

Cisco Modeling Labs

Discussion 0
Questions 138

What is a benefit of a model-driven approach for infrastructure automation?

Options:

A.  

enforces the generation of all automation scripts through the modeling environment

B.  

provides a small learning curve and helps system administrators with limited coding experience

C.  

ensures that system administrators gain a good understanding of coding and expand their experience and capabilities

D.  

enables a user to understand a declarative language to translate the model into an actionable script

Discussion 0
Questions 139

Refer to the exhibit.

OWASP threat does this example demonstrate?

Options:

A.  

Broken access control

B.  

SQL injection

C.  

Man-in-the-middle

D.  

Cross-site-scripting

Discussion 0
Questions 140

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request to find the Cisco DNA Center switch count. Not all options are used.

Options:

Discussion 0