Free 200-901 DEVASC Dump

Question #320

Which port does HTTPS use by default?

  • A. 433
  • B. 443
  • C. 803
  • D. 883

Correct Answer: B

Question #321

Which HTTP method is used by webhooks and notifies a listener about an event change?

  • A. PUT
  • B. POST
  • C. PATCH
  • D. GET

Correct Answer: B

Question #322

A developer completed the creation of a script using Git. Before delivering it to the customer, the developer wants to be sure about all untracked files, without losing any information. Which command gathers this information?

  • A. git clean –n
  • B. git rm –f
  • C. git clean –r
  • D. git rm *

Correct Answer: A

Question #323

A company deploys an application via containers in its local data center. As soon as the application goes into production, it starts to crash at specific hours of the day. After investigation, it is concluded that the crashes are due to too many users accessing the application simultaneously. The spikes must be addressed and allow for future growth without discarding the investment already made. Which deployment model must be used?

  • A. hybrid cloud
  • B. edge
  • C. private cloud
  • D. public cloud

Correct Answer: A

Question #324

Which TCP port is used to connect to a network device by using Telnet?

  • A. 23
  • B. 69
  • C. 400
  • D. 830

Correct Answer: A

Question #325

Refer to the exhibit. Which action does the script perform?

  • A. It queries user credentials from Cisco IOS XE devices.
  • B. It retrieves device identification from Cisco DNA Center.
  • C. It exports SSID information from Meraki dashboard.
  • D. It collects group information from ACI.

Correct Answer: D

Question #326

What is the purpose of grouping devices in a VLAN?

  • A. Devices communicate as if they are connected on the same wire.
  • B. Multicast network traffic is limited to the VLAN connected devices.
  • C. Unicast messages are limited to the clients connected on the same VLAN.
  • D. Network traffic is load balanced between the devices connected to the VLAN.

Correct Answer: B

Question #327

Refer to the exhibit. The YAML shown contains an object “param0” that is equal to “Workflow1”, a second object “param1” that contains an object called “list” which contains an array of two objects, “name” (equal to “VLAN_ID”) and “value” (equal to a text value “198”), and finally a third object “param2” that is equal to “0”. What is the equivalent message in JSON data format?

  • A.
  • B.
  • C.
  • D.

Correct Answer: D

Question #328

An engineer prepares a set of Python scripts to interact with network devices. To avoid network performance issues, the engineer wants to run them in a test environment. Which resource must be used to monitor the live execution of code in an always-available environment?

  • A. packet tracer
  • B. learning labs
  • C. sandbox
  • D. code exchange

Correct Answer: C

Question #329

When a Cisco IOS XE networking device is configured by using RESTCONF, what is the default data encoding method?

  • A. application/yaml-data+json
  • B. application/yang-data+json
  • C. application/xml-data+json
  • D. application/json-data+xml

Correct Answer: D

Question #330

Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer’s account?

  • A. The encoded credentials were available in the source code.
  • B. The application was not encrypting the communication with the server.
  • C. The credentials were encrypted in the source code.
  • D. An SSL certificate was used instead of the TLS protocol to authenticate.

Correct Answer: A

Question #331

Which technology is responsible for matching a name to an IP address of an application running on a host?

  • A. firewall
  • B. proxy
  • C. load balancer
  • D. DNS

Correct Answer: D

Question #332

Which network constraint causes the performance of the application to decrease as the number of users accessing the application increases?

  • A. latency
  • B. loss
  • C. bandwidth
  • D. jitter

Correct Answer: C

Question #333

DRAG DROP

Refer to the exhibit. A bespoke meeting booking system must be integrated with Cisco Webex so that meetings are created automatically. Drag and drop the code from the bottom onto the box where the code is missing to create a sample meeting. Not all options are used.

Correct Answer: 

Question #334

What is a characteristic of Waterfall compared to Agile software development method?

  • A. Waterfall focuses on continuous improvement, and Agile focuses on the design phase.
  • B. Waterfall separates the project development lifecycle into sprints, and Agile does not use cycles.
  • C. Waterfall specifies requirements before development begins, and Agile responds flexibly to changes in requirements.
  • D. Waterfall uses reviews with step by step approach, and Agile uses a serially phased approach.

Correct Answer: C

Question #335

Users cannot access a webserver and after the traffic is captured, the capture tool snows an ICMP packet that reports “time exceeded in-transit”. What is the cause of this webserver access issue?

  • A. The large distance between the server and the users means that the packets require too much time to reach the destination.
  • B. A router along the path is misrouting the packets in a wrong direction.
  • C. A router along the path has the wrong time.
  • D. The server is overloaded and the connection was not able to be processed in time.

Correct Answer: B

Question #336

Refer to the exhibit. An engineer is comparing two files by using the unified diff format. Which cade snippet belongs to the new.py file?

  • A.
  • B.
  • C.
  • D.

Correct Answer: A

Question #337

DRAG DROP

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a request that generates a security token and gets a list of network devices. Not all options are used.

Correct Answer: 

Question #338

Refer to the exhibit. A network engineer executes the bash script shown. Which two things are achieved by running the script? (Choose two.)

  • A. A directory called PRODUCTION is created.
  • B. The engineer changes to the parent directory.
  • C. A YAML file is created.
  • D. A YAML file is removed.
  • E. A directory called state.yml is created.

Correct Answer: AC

Question #339

DRAG DROP

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. The Python script retrieves a list of tasks from a to-do list for effective project management purposes. Not all options are used.

Correct Answer: 

Question #340

Refer to the exhibit. Which code snippet represents the sequence.

  • A.
  • B.
  • C.
  • D.

Correct Answer: C

Question #341

A developer attempts to refactor and improve the application code. It is noticed that the code contains several pieces of key information that could be a security threat if this code is accessible by those who are not authorized to this data. Which approach addresses the security concerns noticed by the developer?

  • A. Host the application code on a machine located in a secure data center.
  • B. Utilize environment variables for username and password details.
  • C. Rely on the security teams’ goodwill to not give access to those who do not need it.
  • D. Move the hardware that the application is deployed on to a secure location.

Correct Answer: B

Question #342

DRAG DROP

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Correct Answer: 

Question #343

Which tool provides a testing environment to run tests on network devices and perform network automation scenarios?

  • A. Visual Studio Code
  • B. Cisco VIRL
  • C. pyATS
  • D. Cisco Packet Tracer

Correct Answer: B

Question #344

A developer writes an application that refines data in temporary secure file storage hosted on the public cloud. Data will be deleted after processing and does not contain any private information. What is the advantage that a public cloud deployment provides to the developer?

  • A. high security with encryption
  • B. ease in infrastructure management
  • C. flexible development
  • D. bespoke services

Correct Answer: B

Question #345

DRAG DROP

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to add a subnet to each bridge domain in the Ten1 tenant. Not all options are used.

Correct Answer: 

Question #346

Refer to the exhibit. A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?

  • A. cp ./PROD/current.txt ./TEST/config.txt
  • B. cp ./TESTi/current.txt ./PROD/config.txt
  • C. cp ./PROD/config.txt ./TEST/current.txt
  • D. cp ./TEST/config.txt ./PROD/current.txt

Correct Answer: D

Question #347

What is a benefit of using model-driven programmability for infrastructure automation?

  • A. connected user tracking
  • B. infrastructure resource optimization
  • C. multiple device control protocols
  • D. device performance monitoring

Correct Answer: C

Question #348

What is the function of an Ethernet switch in a networking environment?

  • A. to switch a frame from one port to another port based on IP address
  • B. to switch a frame from one port to another port based on MAC address
  • C. to provide IP addressing to connected hosts
  • D. to block unwanted traffic

Correct Answer: B

Question #349

DRAG DROP

Drag and drop characteristics from the left onto the infrastructure management methodologies on the right.

Correct Answer: 

Question #350

Refer to the exhibit. An engineer runs a network that consists of Cisco Nexus devices. The network is distributed between data centers in different locations. The switches are configured using standalone connections and a single point of failure. Which process is being automated by the Ansible playbook?

  • A. enabling HSRP on the nxos_rtr inventory host
  • B. enabling HSRP on the rtr-1a inventory host
  • C. executing HSRP configuration from the Ansible controller node
  • D. executing HSRP configuration from the srv-1a inventory host

Correct Answer: B

Question #351

Refer to the exhibit. A developer must use a token to collect data from Cisco DNA Center API and prepares a Python script to send requests. Which line of code needs to be placed on the snippet where the code is missing to obtain a token from the Cisco DNA Center API?

  • A. token=BasicAuth(‘user’,‘password’))
  • B. auth=BasicAuth(‘user’,‘password’))
  • C. auth=HTTPBasicAuth(user,password))
  • D. token=HTTPBasicAuth(user,password))

Correct Answer: C

Question #352

To which stage of development do Infrastructure as Code principles relate?

  • A. manual configuration
  • B. service provisioning
  • C. physical deployment
  • D. requirement collection

Correct Answer: B

Question #353

Refer to the exhibit. An engineer must authorize a REST API call. The API password is “Cisco123!”. Which Bash command must be placed in the code to authorize the call?

  • A. mkdir API_PASSWORD=Cisco123!
  • B. set API_PASSWORD=Cisco123!
  • C. cp API_PASSWORD=Cisco123!
  • D. export API_PASSWORD=Cisco123!

Correct Answer: D

Question #354

DRAG DROP

Refer to the exhibit. Drag and drop the Dockerfile contents from the left onto the functions on the right that create a container image to run traceroute to track network path to specific targets. Not all options are used.

Correct Answer: 

Question #355

Which function does a router provide to a network?

  • A. broadcast domain segmentation
  • B. unique host on a Layer 3 network
  • C. unique hardware address for every node on a LAN
  • D. broadcast domain extension

Correct Answer: B

Question #356

DRAG DROP

Drag and drop the code from the bottom onto the box where the code is missing to enable ports on a switch by using RESTCONF. Not all options are used.

Correct Answer: 

Question #357

Which IP service is used to monitor the performance of network devices?

  • A. SNMP
  • B. DHCP
  • C. DNS
  • D. NTP

Correct Answer: A

Question #358

Which IP service synchronizes the time across devices?

  • A. DNS
  • B. NTP
  • C. SNMP
  • D. NAT

Correct Answer: B

Question #359

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer will use an Ansible playbook to configure devices through Cisco NX REST API. Before the code is run, which resource must be used to verify that the REST API requests work as expected?

  • A. Cisco Open NX-OS
  • B. Cisco NX-OS SDK
  • C. Cisco Learning Labs
  • D. Cisco Code Exchange for Nexus

Correct Answer: C

Trả lời

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *

you are using free dumps!!!

Please help to click ads to support the website

DỊCH VỤ iT