DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CCNA 200-901 Exam Questions | Real Practice Tests & Study Material

The CCNA 200-901 exam, also known as the Cisco DevNet Associate exam, tests your knowledge of software development, automation, and Cisco platforms. To ensure you're well-prepared, our CCNA 200-901 exam questions and answers provide you with real exam insights. Our practice exams and certification practice tests allow you to simulate the actual exam environment, helping you gain confidence before the big day. We offer a range of exam preparation materials, covering essential exam topics to help you understand every detail. With test questions and answers that reflect the actual exam, you can focus on areas that need improvement. By practicing with exam practice questions and taking advantage of free practice tests, you’ll be equipped to tackle the real exam questions. Our study material ensures you’re fully prepared for success in the CCNA 200-901 certification.
Take other online exams

Question #1
What is a characteristic of a VLAN?
A.
B.
C.
D.
View answer
Correct Answer: A
Question #2
A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?
A.
B.
C.
D.
View answer
Correct Answer: D
Question #3
Which Python data type resembles JSON data structures?
A. uple
B. ist
C. ictionary
D. trin
View answer
Correct Answer: C
Question #4
A team of developers is responsible for a network orchestration application in the company. The responsibilities also include:developing and improving the application in a continuous mannerdeployment of the application and management of CI/CD frameworksmonitoring the usage and problems and managing the performance improvements Which principle best describes this DevOps practice?
A. nd-to-end responsibility
B. uality assurance checks
C. utomation of processes
D. esponsible for IT operation
View answer
Correct Answer: C
Question #5
Which type of HTTP method is used by the Meraki and Webex APIs to send webhook notifications?
A. TTP GET
B. TTP PUT
C. TTP HEAD
D. TTP POS
View answer
Correct Answer: D
Question #6
Which API is used to change the configuration of a device group that contains Cisco Catalyst 9000 Series Switches?
A. isco IOS XE
B. API
C. TAPI
D. isco Finess
View answer
Correct Answer: A
Question #7
A developer creates a new application, but the application must be tested before being released to a customer. When a mobile phone that uses 4G is used to access the application, the request fails. Why does the connection to the application fail?
A.
B.
C.
D.
View answer
Correct Answer: D
Question #8
An executive team wants to reduce subscription costs. An application that currently uses cloud hosting services has been identified as a candidate to migrate to internal infrastructure. A detailed proof of concept has been requested from the development team to compare the components of bare metal deployments. Which two attributes are used to identify the required application deployment on bare metal servers?
A. osting infrastructure is distributed as a single tenant
B. esources scaled up quickly to meet demand
C. t provides direct access to physical resources for the operating systems
D. t has lower resource consumption than other deployment types
E. t performs on top of an existing virtualized environment
View answer
Correct Answer: AC
Question #9
Which Cisco product has deployment options of software or purpose-built platforms to provide network security and traffic management in an integrated suite?
A.
B.
C.
D.
View answer
Correct Answer: B
Question #10
Which application should be used to externally access all applications deployed in the same host machine with a single public IP address and port, when each application listens on different local ports?
A.
B.
C.
D.
View answer
Correct Answer: B
Question #11
Which platform has an API that has the capability to obtain a list of vulnerable software on user devices?
A.
B.
C.
D.
View answer
Correct Answer: D
Question #12
What are two considerations when selecting the "best route" for a network device to reach its destination?
A. etrics
B. ubnet mask
C. P address
D. AC address
E. dministrative distanc
View answer
Correct Answer: AE
Question #13
What is the first development task in test-driven development?
A. rite a passing test case for existing code
B. everse engineer the code for a desired function
C. rite code that implements a desired function
D. rite a failing test case for a desired function
View answer
Correct Answer: D
Question #14
An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer will use an Ansible playbook to configure devices through Cisco NX REST API. Before the code is run, which resource must be used to verify that the REST API requests work as expected?
A. isco Code Exchange for Nexus
B. isco Learning Labs
C. isco Open NX-OS
D. isco NX-OS SD
View answer
Correct Answer: B
Question #15
Which command reverses the last commit without changing the index file or the working tree position?
A. it reset --soft HEAD^
B. it reset --hard HEAD~3
C. it revert HEAD
D. it rever
View answer
Correct Answer: A
Question #16
A new application is being developed that must be hardware independent. The application includes an administrative component which is accessed using a Windows desktop GUI. Installation and management of the environment must be fully automated. Which application deployment type meets the requirements?
A. are metal
B. irtual Python environment
C. ontainer
D. irtual machin
View answer
Correct Answer: C
Question #17
When a developer sends an HTTP request to an API, which two elements are expected in an HTTP response?
A. tatus code
B. eaders
C. OST request
D. ET request
E. cript
View answer
Correct Answer: AB
Question #18
A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?
A. ommunication between the application and the services is not encrypted
B. he database credentials should be stored in the configuration files so that they are secured on the same server
C. he synchronization logs should be encrypted and not stored in a relational database
D. he API keys are stored in the configuration files but should be stored in the vault service
View answer
Correct Answer: D
Question #19
Users cannot access a webserver and after the traffic is captured, the capture tool shows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?
A. he server is overloaded and the connection was not able to be processed in time
B. router along the path has the wrong time
C. he large distance between the server and the users means that the packets require too much time to reach the destination
D. router along the path is misrouting the packets in a wrong direction
View answer
Correct Answer: D
Question #20
To which stage of development do Infrastructure as Code principles relate?
A.
B.
C.
D.
View answer
Correct Answer: B
Question #21
What are two benefits of using version control?
A. t provides a complete long-term change history of every file of an application
B. t executes tests and reveals compilation errors before the code is committed
C. t enables multiple team members to work on the same project simultaneously
D. t provides automation of the build and deployment process out of the box
E. t improves code availability by distributing the data across different machines
View answer
Correct Answer: AC
Question #22
What is a comparison of YAML and JSON?
A. SON has more common usage in configuration management tools compared to YAML
B. AML has a more consistent approach to representing data compared to JSON
C. SON does not support comments and YAML does
D. AML is a more verbose data structure compared to JSON
View answer
Correct Answer: C
Question #23
A company needs a solution to back up data that is generated by a Java application to a local disk. The data must be transferred from on-premises to cloud storage by using SCP. A security policy requires the encryption of the data in transit and at rest. Which two configurations must be implemented to meet the security policy requirements?
A. PN for the Java application
B. ncryption of the remote filesystem
C. Psec for the Java application
D. LS for the Java application
E. ncryption of the local filesyste
View answer
Correct Answer: BD
Question #24
Calling a REST API returns a 404 error. What does this code represent?
A. he URI being requested is incorrect
B. query parameter is missing
C. header is missing
D. he payload is formatted incorrectly
View answer
Correct Answer: A
Question #25
What is a benefit of using functions in the code for the development process?
A. etter user experience in the end product
B. asier to compile the code
C. aster code development
D. mproves code performanc
View answer
Correct Answer: C
Question #26
What is a capability of the NETCONF protocol?
A. llows XML messages to be exchanged via the SSH protocol
B. xposes a web-based interface
C. llows Python scripts to be executed externally from a network device
D. ses JSON to encode data in its content laye
View answer
Correct Answer: A
Question #27
An HTTP request to a REST API gets a response with a 401 status code. What does this mean?
A. ccess to that API resource is forbidden
B. ncorrect authentication credentials were provided
C. he API backend had an unhandled exception
D. he requested URI does not exis
View answer
Correct Answer: B
Question #28
Which configuration management tool has an agentless capability?
A.
B.
C.
D.
View answer
Correct Answer: A
Question #29
A company needs to migrate internal applications to the cloud to optimize scalability and reliability as well as to reduce the effort of managing the infrastructure. The company plans to host the infrastructure on private dedicated servers that are rented from a cloud provider. The servers must be accessible only from the company network. The company also plans to temporarily scale the infrastructure out to non-dedicated servers of a cloud provider. Which application deployment model must the organization i
A. dge computing
B. ublic cloud
C. ybrid cloud
D. rivate clou
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: