Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

DevNet Associate (DEVASC) Question and Answers

DevNet Associate (DEVASC)

Last Update Apr 19, 2024
Total Questions : 406

We are offering FREE 200-901 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 200-901 free exam questions and then go for complete pool of DevNet Associate (DEVASC) test questions that will help you more.

200-901 pdf

200-901 PDF

$44  $109.99
200-901 Engine

200-901 Testing Engine

$52  $129.99
200-901 PDF + Engine

200-901 PDF + Testing Engine

$68  $169.99
Questions 1

Refer to the exhibit. The YAML shown contains an object "param0" that is equal to "Workflow1", a second object "param1" that contains an object called "list" which contains an array of two objects, "name" (equal to "VLAN_ID") and "value" (equal to a text value "198"), and finally a third object "param2" that is equal to "0". What is the equivalent message in JSON data format?

Options:

A.  

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

B.  

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

C.  

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

D.  

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

Discussion 0
Questions 2

What is a characteristic of the Cisco Finesse platform?

Options:

A.  

Applications allow services to be invoked on a network triggered event.

B.  

The platform provides a ready-to-go platform for HD video and audio conferencing.

C.  

Applications are added to the platform from the desktop remotely.

D.  

The platform includes an enterprise-class IM engine.

Discussion 0
Questions 3

During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?

Options:

A.  

integration

B.  

deployment

C.  

development

D.  

testing

Discussion 0
Questions 4

Refer to the exhibit.

While developing a Cisco Webex bot, an application reaches the public IP address of the firewall, but traffic is forwarded to the IP address of server 1 instead of the IP address of server 2. What causes this issue?

Options:

A.  

The proxy server that rewrites traffic is misconfigured.

B.  

The router is sending the traffic to server 1 instead of server 2.

C.  

The switch is forwarding IP traffic to the wrong VLAN.

D.  

NAT is misconfigured on the firewall.

Discussion 0
Questions 5

Refer to the exhibit. Which HTTP code is returned after the RESTCONF query is executed?

Options:

A.  

201

B.  

204

C.  

302

D.  

304

Discussion 0
Questions 6

Refer to the exhibit.

A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?

Options:

A.  

enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

B.  

enable_function(‘iana-if-type:softwareLoopback’, Loopback1, true,)

C.  

def enable_function(‘iana-if-type:softwareLoopback’, Loopback1, false,)

D.  

def enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

Discussion 0
Questions 7

Which tool provides a testing environment to run tests on network devices and perform network automation scenarios?

Options:

A.  

Visual Studio Code

B.  

Cisco VIRL

C.  

pyATS

D.  

Cisco Packet Tracer

Discussion 0
Questions 8

What is a benefit of a CI/CD pipeline for infrastructure?

Options:

A.  

removes manual errors

B.  

enables manual steps

C.  

removes the need for operations

D.  

provides variety for deployments

Discussion 0
Questions 9

A developer is running an application that connects to the Cisco website and collects data. The application will be hosted in a local data center and the data will need to be collected on a frequent basis. The application client requires certain environmental variables to be set before the run. Which Bash command sets the environmental variables for a Linux system?

Options:

A.  

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

B.  

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

C.  

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

D.  

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

Discussion 0
Questions 10

Refer to the exhibit.

A network engineer uses model-driven programmability to monitor and perform changes on the network. The network engineer decides to use the NETCONF RPC message to complete one of their tasks. What is accomplished by sending the RPC message?

Options:

A.  

The running-config of the device is returned.

B.  

The name of each interface is reset to a default name.

C.  

All the YANG capabilities supported by the device are returned.

D.  

A list of interface names is returned.

Discussion 0
Questions 11

Refer to the exhibit. An engineer prepares a script to automate workflow by using Cisco DNA Center APIs to display:

total count of devices

list of the network devices

information of one device with a hostname filter

What is displayed in the final step after the Python script is executed?

Options:

A.  

information about a device of type C9500-40x.

B.  

filtered results by the hostname and the platformld C9500-40X

C.  

information about the test devices

D.  

list of devices with platformId C9500-40x

Discussion 0
Questions 12

Refer to the exhibit.

A developer can access the TLS REST API on server A, but cannot access the API on server B. The developer can ping server B. When the developer performs a packet capture on the TLS REST API port on server B, the capture shows that the packet arrived and the server responded. What causes the issue?

Options:

A.  

Port 80 is blocked on the outgoing interface of firewall B.

B.  

Port 443 is blocked on the outgoing interface of firewall A.

C.  

Port 443 is blocked on the incoming interface of firewall B.

D.  

Port 80 is blocked on the incoming interface of firewall A.

Discussion 0
Questions 13

Refer to the exhibit.

An engineer sends the request to collect data over Cisco AMP for Endpoints API. The Engineer must list guide and hostname data for all computers, but the first request returns only 500 items out of 2,000. Then, the engineer adds the loop to collect all the data. What must be added to the script where the code is missing to complete the requests?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 14

An engineer deploys a Cisco CSR 1000 V instance to a virtual machine. The engineer must output the device configuration in JSON format. Which protocol is used for this task?

Options:

A.  

YANG

B.  

NETCONF

C.  

SNMP

D.  

RESTCONF

Discussion 0
Questions 15

Refer to the exhibit.

What does the command marked (2) do when it is run?

Options:

A.  

It duplicates the test" branch.

B.  

It deletes the "test" branch only if a new branch is created.

C.  

It deletes the "test" branch.

D.  

It does not delete the branch until it is merged.

Discussion 0
Questions 16

When a Cisco IOS XE networking device is configured by using RESTCONF, what is the default data encoding method?

Options:

A.  

application/yaml-data+json

B.  

application/yang-data+json

C.  

application/xml-data+json

D.  

application/json-data+xml

Discussion 0
Questions 17

Drag and drop the code from the bottom onto the box where the code is missing to complete the error path scenario. Not all options are used.

Options:

Discussion 0
Questions 18

Which standard supported by Cisco IOS XE and Cisco NX-OS is used for automating the configuration of multiple devices across a network?

Options:

A.  

SNMP – YANG

B.  

SYSLOG – YANG

C.  

CLI – YANG

D.  

NETCONF – YANG

Discussion 0
Questions 19

Drag and drop the API characteristics from the left onto the categories on the right.

Options:

Discussion 0
Questions 20

Refer to the exhibit. A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?

Options:

A.  

cp ./PROD/current.txt ./TEST/config.txt

B.  

cp ./TESTi/current.txt ./PROD/config.txt

C.  

cp ./PROD/config.txt ./TEST/current.txt

D.  

cp ./TEST/config.txt ./PROD/current.txt

Discussion 0
Questions 21

Refer to the exhibit.

An engineer must check the admin rights of users on a database regularly and prepares

the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?

Options:

A.  

They must be stored in configuration files if there is a possibility of leakage.

B.  

They must be Base64-encoded if stored in the user database.

C.  

They must be encrypted if stored in the user database.

D.  

They must be stored in configuration files if no authentication will be used.

Discussion 0
Questions 22

Refer to the exhibit.

Which device limits traffic between server 1 and server 2?

Options:

A.  

Device B

B.  

Device C

C.  

Device D

D.  

Device E

Discussion 0
Questions 23

In test-driven development, what are two of the green bar patterns? (Choose two.)

Options:

A.  

another test

B.  

break

C.  

triangulate

D.  

starter test

E.  

fake it

Discussion 0
Questions 24

Refer to the exhibit.

A Python script must delete all Cisco Catayst 9300 Series switches that have an uptime that is greater than 90 days The script must also query for the status of all the other devices Drag and drop the code from the bottom onto the bottom box the code is missing to complete the script Not at options are used

Options:

Discussion 0
Questions 25

Which platform is used to programmatically create a space and invite users for collaboration?

Options:

A.  

Cisco Intersight

B.  

Cisco Finesse

C.  

Cisco Webex

D.  

Cisco UCM

Discussion 0
Questions 26

Which protocol must be allowed on the firewall so that NTP services work properly?

Options:

A.  

ICMP

B.  

BGP

C.  

UDP

D.  

TCP

Discussion 0
Questions 27

Which API must an engineer use to change a netmask on a Cisco IOS XE device?

Options:

A.  

Meraki

B.  

RESTCONF/YANG

C.  

SD-WAN

D.  

DNAC

Discussion 0
Questions 28

Which two commands download and execute an Apache web server container in Docker with a port binding 8080 in the container to 80 on the host? (Choose two.)

Options:

A.  

docker pull apache

B.  

docker run -p 8080:80 httpd

C.  

docker run -p 80:8080 httpd

D.  

docker pull httpd

E.  

docker pull https

Discussion 0
Questions 29

Which configuration management tool has an agentless capability?

Options:

A.  

Chef

B.  

Puppet

C.  

Ansible

D.  

CFEngine

Discussion 0
Questions 30

A company deploys an application via containers in its local data center. As soon as the application goes into production, it starts to crash at specific hours of the day. After investigation, it is concluded that the crashes are due to too many users accessing the application simultaneously. The spikes must be addressed and allow for future growth without discarding the investment already made. Which deployment model must be used?

Options:

A.  

hybrid cloud

B.  

edge

C.  

private cloud

D.  

public cloud

Discussion 0
Questions 31

A developer is creating a script to interact with a REST API service which requires basic authentication. The credentials are "devnet:391665405" and the Base64 encoding of the credentials is "GV2bmV0dXNlcjpDaXNj=". Which payload and header combination must be used for authentication?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 32

What are two key capabilities of Cisco Finesse? (Choose two.)

Options:

A.  

Finesse includes an RPC API that enables the development of custom gadgets.

B.  

Agents access Finesse from a browser without needing to install or configure anything on the client machine.

C.  

Finesse automatically collects telemetry data

D.  

An OpenDNS utility is preconfigured and ready to use on Finesse.

E.  

Gadget containers provide a seamless experience in a single user interface.

Discussion 0
Questions 33

Which HTTP code group is issued when a request is received successfully, understood, and processed?

Options:

A.  

2xx

B.  

3xx

C.  

4xx

D.  

5xx

Discussion 0
Questions 34

A developer needs a list of clients connected to a specific device in a Meraki network. After making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet resource should be used to identify the meaning of the response code?

Options:

A.  

API documentation

B.  

Sandbox

C.  

Learning Labs

D.  

Code Exchange

Discussion 0
Questions 35

A developer creates a script that configured multiple Cisco IOS XE devices in a corporate infrastructure. The internal test environment is unavailable, and no maintenance window is available to test on a low-priority production environment. Which resource is used to test the code before it is applied to the production environment?

Options:

A.  

Code Exchange

B.  

Cisco DevNet Learning Labs

C.  

Cisco DevNet Sandbox

D.  

Cisco Support

Discussion 0
Questions 36

Drag and drop the code from the bottom onto the box where the code is missing in the Bash script to complete the missing assignment.

Options:

Discussion 0
Questions 37

Why is refactoring done during test-driven development?

Options:

A.  

to enable larger objects and longer methods

B.  

to improve maintainability and readability

C.  

to ensure that the previous uses of the objects are explained

D.  

to ensure the duplication of essential code

Discussion 0
Questions 38

Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:

• MySQL database that stores data about customers

• HTML5 and JavaScript UI that runs on Apache

• REST API written in Python

What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)

Options:

A.  

to enable multiple views of the same data to be presented to different groups of users

B.  

to provide separation between the view and the model by ensuring that all logic is separated out into the controller

C.  

to ensure data consistency, which requires that changes to the view are also made to the model

D.  

to ensure that only one instance of the data model can be created

E.  

to provide only a single view of the data to ensure consistency

Discussion 0
Questions 39

Refer to the exhibit.

A Python code has been written to query a device. The executed code results in the error shown. Which action resolves the problem?

Options:

A.  

import json

B.  

requests("GET", base_url + request_url, cookles=cookies)

C.  

pip install requests

D.  

import requests

Discussion 0
Questions 40

Drag and drop the Dockerfile instructions from the left onto the descriptions on the right. Not at options are used.

Options:

Discussion 0
Questions 41

Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.

Options:

Discussion 0
Questions 42

In python, which expression checks whether the script returns a success status code when the Requests library is used?

Options:

A.  

response.status_code== requests.ok

B.  

response.status_code== requests.codes.ok

C.  

response.code== requests.codes.ok

D.  

response.status_code ! == requests.codes.ok

Discussion 0
Questions 43

Refer to the exhibit.

Drag and Drop the code from the bottom onto the box where the code is missing on the Meraki Python script to create a new network

Options:

Discussion 0
Questions 44

A Company is looking for cloud deployment which will use the on-premise infrastructure, is user self-service, and easy to scale. Which cloud solution should be selected for these requirements?

Options:

A.  

multi

B.  

public

C.  

private

D.  

hybrid

Discussion 0
Questions 45

Fill in the blanks to complete the python script to request a service ticket using the APIC-EM rest API for the user “devnetuser”.

Options:

Discussion 0
Questions 46

Users cannot access a webserver and after the traffic is captured. the capture tool shows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?

Options:

A.  

A router along the path is misrouting the packets in a wrong direction.

B.  

A router along the path has the wrong time.

C.  

The server is too far away and the packets require too much time to reach it

D.  

The server is too loaded and the connection could not be handled in time

Discussion 0
Questions 47

Which two items are Cisco DevNet resources? (Choose two.)

Options:

A.  

TAC support

B.  

Bitbucket

C.  

Sandbox

D.  

Software research

E.  

API Documentation

Discussion 0
Questions 48

What is an example of a network interface hardware address?

Options:

A.  

domain name

B.  

IP address

C.  

workstation name

D.  

MAC address

Discussion 0
Questions 49

Refer to the exhibit.

Which JSON is equivalent to the XML –encoded data?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 50

Which REST architectural constraint indicates that no client context should be stored on the server between requests?

Options:

A.  

stateless

B.  

uniform interface

C.  

cacheable

D.  

client-server

Discussion 0
Questions 51

Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.

Options:

Discussion 0
Questions 52

Which platform is run directly using a hypervisor?

Options:

A.  

bare metal systems

B.  

containers

C.  

virtual machines

D.  

applications

Discussion 0
Questions 53

What are two security benefits of a Docker-based application?

Options:

A.  

easier to patch because Docker containers include only dependencies that the application requires

B.  

prevents information leakage that can occur when unhandled exceptions are returned in HTTP responses

C.  

allows for separation of application that traditionally run in the same host

D.  

natively secures access to secrets that are used by the running application

E.  

guarantees container images are secured and free of vulnerabilities

Discussion 0
Questions 54

A developer is reviewing a code that was written by a colleague. It runs fine, but there are many lines of code to do a seemingly simple task repeatedly. Which action organizes the code?

Options:

A.  

Refactor the code by removing any unnecessary tests

B.  

Using functions, rewrite any pieces of code that are repeated

C.  

Reverse engineer and rewrite the code logic

D.  

Modify the code to use loops

Discussion 0
Questions 55

What is the first development task in test-driven development?

Options:

A.  

Write code that implements a desired function.

B.  

Write a failing test case for a desired function.

C.  

Write a passing test case for existing code.

D.  

Reverse engineer the code for a desired function.

Discussion 0
Questions 56

Which two concepts describe test-driven development? (Choose two.)

Options:

A.  

It enables code refactoring.

B.  

Write a test before writing code.

C.  

Implementation is driven by incremental testing of release candidates.

D.  

User acceptance testers development the test requirements.

E.  

Tests are created when code is ready for release.

Discussion 0
Questions 57

Drag and drop the function on the left onto the type of plane that handles the function on the right.

Options:

Discussion 0
Questions 58

An application calls a REST API and expects a result set of more than 550 records, but each time the call is made, only 25 are returned. Which feature limits the amount of data that is returned by the API?

Options:

A.  

pagination

B.  

payload limit

C.  

rate limiting

D.  

service timeouts

Discussion 0
Questions 59

Users cannot access a webserver and after the traffic is captured, the capture too* shows an ICMP packet that reports "communication administratively prohibited" What Is the cause of this webserver access Issue?

Options:

A.  

An access list along the path is blocking the traffic

B.  

The traffic is not allowed to be translated with NAT and dropped.

C.  

Users must authenticate on the webserver to access It

D.  

A router along the path is overloaded and thus dropping traffic

Discussion 0
Questions 60

On which network plane is routing protocol traffic handled?

Options:

A.  

data plane

B.  

management plane

C.  

authentication plane

D.  

control plane

Discussion 0