DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Cisco 200-901 Exam Questions | Exam Prep Resources Online

Ace the Cisco Certified DevNet Associate (DEVASC) 200-901 exam with our comprehensive exam resources. Our practice tests and study materials provide authentic 200-901 exam questions and answers, allowing you to simulate the real exam environment. Access verified sample questions and practice exams to identify your strengths and weaknesses, ensuring thorough exam preparation. Our up-to-date study materials cover all exam objectives, equipping you with the knowledge and skills needed to successfully pass the DEVASC certification exam. Boost your confidence and increase your chances of acing the 200-901 exam with our reliable exam resources and rigorous practice.
Take other online exams

Question #1
A company wants to accelerate the adoption of technologies that will simplify its operations. Staff have different skill levels and are looking for a single site to find easy-to-consume beginner, intermediate, and advanced multidomain use cases. Which site should be used?
A. evNet Ecosystem Exchange
B. evNet Automation Exchange
C. evNet Creations
D. evNet Support Forum
View answer
Correct Answer: D
Question #2
Which Cisco product provides malware and content filtering through DNS?
A. isco ASA Firepower module
B. isco AMP
C. isco ISE
D. isco Umbrella
View answer
Correct Answer: D
Question #3
Which Cisco platform provides organization-wide automation, security, policy enforcement, and agility across wired and wireless networks?
A. isco SD-WAN
B. isco DNA Center
C. isco ACI
D. isco Umbrella
View answer
Correct Answer: B
Question #4
What is a characteristic of the Cisco Finesse platform?
A. pplications allow services to be invoked on a network triggered event
B. he platform provides a ready-to-go platform for HD video and audio conferencing
C. pplications are added to the platform from the desktop remotely
D. he platform includes an enterprise-class IM engine
View answer
Correct Answer: C
Question #5
An engineer needs to retrieve a list of locally available Firepower Threat Defense upgrade packages by using the Firepower Management Center REST API. The engineer uses a GET request with the URL:/api/fmc_platform/v1/updates/upgradepackages/f413afeb-e6f6-75f4-9169-6d9bd49s625eWhat does “f413afeb-e6f6-75f4-9169-6d9bd49s625e” represent?
A. ontainer UUID
B. ackage UUID
C. omain UUID
D. bject UUID
View answer
Correct Answer: B
Question #6
Refer to the exhibit.A process running on the host wants to access the service running inside this Docker container. Which port or ports are used to make a connection?
A. nly outbound connections between 3000 and 5000 are possible
B. ort 3000
C. ny port between 3000 and 5000
D. ort 5000
View answer
Correct Answer: B
Question #7
DRAG DROP (Drag and Drop is not supported)Drag and drop the Dockerfile instructions from the left onto the descriptions on the right. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #8
What are two security benefits of a Docker-based application? (Choose two.)
A. ocker build -p 8080:80 alpine:latest
B. ocker exec -p 8080:80 alpine:latest
C. ocker start -p 8080:80 alpine:latest
D. ocker run -p 8080:80 alpine:latest
View answer
Correct Answer: AB
Question #9
A local Docker alpine image has been created with an image ID of a391665405fe and tagged as “latest”. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?
A. ocal port 8080 of the container that launched with this docker image is accessible from co-hosted containers and external clients
B. ocal port 8080 is not reachable at all because no IP address is specified along with the EXPOSE command of the Dockerfile
C. ocal port 8080 is accessible from other containers running on the same docker host as the container that launched with this docker image
D. ocal port 8080 of the container that launched with this docker image is accessible to external clients
View answer
Correct Answer: D
Question #10
Which two elements are foundational principles of DevOps? (Choose two.)
A. are metal systems
B. irtual machines
C. ontainers
D. pplications
View answer
Correct Answer: AD
Question #11
Which platform is run directly on top of a hypervisor?
A. irtual machine
B. irtual Python environment
C. ontainer
D. are metal
View answer
Correct Answer: B
Question #12
DRAG DROP (Drag and Drop is not supported)Drag and drop the code from the bottom onto the box where the code is missing in the Bash script to complete the missing assignments.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #13
Refer to the exhibit. What is the action of the Bash script that is shown?
A. or all directories in the current folder, the script goes into the directory and makes a new directory
B. he script waits until input is entered
C. he script waits until input is entered, then it goes into the directory entered and creates a new directory with the same name
D. he script goes into the directory called “$ndir” and makes a new directory called “$ndir”
View answer
Correct Answer: B
Question #14
When using the Bash shell, how is the output of the devnet command saved to a file named “output.txt”?
A. evnet > output
B. evnet | output
C. evnet < output
D. evnet & output
View answer
Correct Answer: A
Question #15
DRAG DROP (Drag and Drop is not supported)Drag and drop the Bash commands from the left onto the related actions on the right. Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #16
FILL BLANKFill in the blanks to complete the Bash script in which each file in a directory is renamed to its SHA256 hash?TARGET_DIR=/usr/local/certsfor f in '__________ __________'; do __________ $f' openssl sha -sha256 -r < $f | cut -f1 -cl' ''
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #17
After a project is migrated to a new codebase, the “old_project” directory must be deleted. This directory has multiple read-only flies, and it must be deleted recursively without prompting for confirmation. Which Bash command must be used?
A. mdir -p old_project
B. m -rf old_project
C. m -r old_project
D. mdir old_project
View answer
Correct Answer: B
Question #18
What is a benefit of using edge computing in an IoT implementation?
A. igh speed in data processing
B. ow network design complexity
C. ow cost in network design
D. igh availability for network components
View answer
Correct Answer: D
Question #19
What is the benefit of edge computing?
A. t reduces network latency by moving processing closer to the data source
B. t reduces data velocity from devices or other data sources
C. t simplifies security as devices and processing are brought closer together
D. t removes the need for centralized data processing
View answer
Correct Answer: A
Question #20
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit.Drag and drop the variables from the left onto the item numbers on the right that match the missing assignments in the exhibit.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #21
DRAG DROP (Drag and Drop is not supported)Drag and drop the descriptions from the left onto the correct application deployment models on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #22
Which type of threat occurs when an attacker can send hostile data to an interpreter within an application?
A. ensitive data exposure
B. roken authentication
C. ross-site scripting
D. njection
View answer
Correct Answer: D
Question #23
A company is looking for a cloud deployment which will only use the on-premise infrastructure, is user self- service, and is easy to scale. Which cloud solution should be selected for these requirements?
A. ulti
B. rivate
C. ybrid
D. ublic
View answer
Correct Answer: B
Question #24
Refer to the exhibit.Which OWASP threat does this example demonstrate?
A. roken access control
B. ross-site scripting
C. QL injection
D. an-in-the-middle
View answer
Correct Answer: B
Question #25
What should a CI/CD pipeline aim to achieve?
A. o require minimal manual interaction
B. o allow manual testing before deployment
C. o support new deployments on a fixed monthly schedule
D. o provide a documented process for feedback
View answer
Correct Answer: B
Question #26
A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time. Which area of the CALMS framework must the company target for improvement?
A. ollaboration
B. ean
C. haring
D. easurement
View answer
Correct Answer: B
Question #27
Refer to the exhibit. Which command, including arguments, is executed when the container starts?
A. bin/sh -c "/bin/sleep 30 && nginx -g \'daemon off;\'"
B. bin/sh -c "/bin/sleep 10 && nginx -g \'daemon off;\'"
C. bin/bash -c "/bin/sleep 30 && nginx -g \'daemon off;\'"
D. bin/sh -c "/bin/sleep 30" && nginx -g \'daemon off;\'
View answer
Correct Answer: A
Question #28
A developer created a new secure API and is testing the functionality locally. The API was added to a container for further testing, and other team members and applications need to connect to the API. Which command exposes the API in the container as port 8443 and allows connections external to the host?
A. ocker run -p 127
B. ocker run -p 0
C. ocker run -p 0
D. ocker run -p 127
View answer
Correct Answer: C
Question #29
A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:$ docker tag 84fe411926287 local/app:0.4Which command must be executed next to build the Docker image using the tag?
A. docker build -p local/app:0
B. docker run -t local/app:0
C. docker run -p local/app:0
D. docker build -t local/app:0
View answer
Correct Answer: D
Question #30
Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)
A. ccelerates the deployment of new features in an existing application
B. rovides version control during code development
C. nables the quick deployment of new code
D. liminates common mistakes during development
View answer
Correct Answer: AD
Question #31
What is a benefit of using a code review process in application development?
A. hishing
B. oS
C. rute force attack
D. SRF
View answer
Correct Answer: D
Question #32
Which OWASP threat takes advantage of a web application that the user has already authenticated to execute an attack?
A. ybrid
B. irtual machines
C. ontainers
D. are metal
View answer
Correct Answer: D
Question #33
What is a benefit of a distributed version control system?
A. ncourages users to commit small places of work to the system more frequently
B. nsures that all code meets minimum standards before being committed to the system
C. llows users to work on the codebase even when not connected to the Internet
D. nsures that all code is tested before being committed to the system
View answer
Correct Answer: C
Question #34
A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing? The data contains sensitive information, so specialist encryption tools must be used to secure the data. Which application deployment model meets the requirements?
A. dge
B. rivate cloud
C. ublic cloud
D. ybrid cloud
View answer
Correct Answer: B
Question #35
What is a procedural component of CI/CD pipelines?
A. undled artifacts must be generated
B. very test must pass for the pipeline to continue its execution
C. ome tests fall without stopping the pipeline execution
D. he release label that identifies the build is optional
View answer
Correct Answer: A
Question #36
Which OWASP threat occurs when untrusted data is supplied as input to an interpreter as part of a command or query?
A. roken authentication
B. ata exposure
C. njection
D. ross-site scripting
View answer
Correct Answer: C
Question #37
Which product provides network controller-level management features?
A. isco ISE
B. isco DNA Center
C. isco UCS Manager
D. isco NX-OS
View answer
Correct Answer: B
Question #38
What is the purpose of the Cisco VIRL software tool?
A. o verify configurations against compliance standards
B. o automate API workflows
C. o simulate and model networks
D. o test performance of an application
View answer
Correct Answer: C
Question #39
Refer to the exhibit.What is represented in this YANG module?
A. nterface management
B. GP
C. penFlow
D. opology
View answer
Correct Answer: A
Question #40
Which CI/CD tool is an automation tool used to build, test, and deploy software?
A. it
B. radle
C. agios
D. enkins
View answer
Correct Answer: D
Question #41
An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device must be at fault?
A. oad balancer
B. aptop on which the script is running
C. witch
D. outer
View answer
Correct Answer: A
Question #42
Refer to the exhibit. Which infrastructure automation method is shown?
A. I/CD pipeline
B. ean
C. gile
D. aterfall
View answer
Correct Answer: A
Question #43
Refer to the exhibit. An engineer must configure a load balancer server. The engineer prepares a script to automate workflow by using Bash. The script installs the nginx package, moves to the /opt/nginx directory, and reads the sites.txt file for further processing. Based on the script workflow, which process is being automated within the loop by using the information in sites.txt?
A. reating a file per each line in sites
B. sing the content of the file to create the template
C. reating a new file based on template
D. sing the information in the file to create a set of empty files in the /etc/nginx/sites_enabled directory, andthen assigning the owner of the file
View answer
Correct Answer: A
Question #44
Refer to the exhibit. A network engineer must collect information from the network. The engineer prepares a script to automate workflow by using Cisco Meraki API. The script must run over nested loops to collect organization and network information and uses the collected data for final collection. Which process is being automated by using the Python script?
A. ollect the IDs of the clients on the BLDG21 network
B. ist the IDs from the ACME organization
C. rovide the BLDG21 network information if it is part of the ACME organization
D. ather the IDs of the ACME organization, the BLDG21 network, and the clients on the network
View answer
Correct Answer: D
Question #45
Refer to the exhibit.What is the function of the Python script?
A. oop through the returned list of network devices and, for each device, print the device name and management IP address
B. ount and print the total number of available devices
C. or each device that is returned, display the device type and associated management IP address
D. terate over a list of network devices and write all device names and management IP addresses to an output file
View answer
Correct Answer: A
Question #46
Refer to the exhibit. The output of the diff -u README.md-repo README.md command is shown. The original file was 165 lines long. How many lines are in the edited copy of the file?
A. 62
B. 65
C. 72
D. 73
View answer
Correct Answer: D
Question #47
Which line is an example of the start of a chunk from a unified diff?
A. @ -20191007T1200 +88,90 @@
B. @ -88,10 +88,6 @@
C. @ -90,88 +20191008T1349 @@
D. @ -20191007T1200 +20191008T1349 @@
View answer
Correct Answer: B
Question #48
DRAG DROP (Drag and Drop is not supported)Drag and drop elements of the RESTCONF Protocol stack from the left onto the correct descriptors on the right. Not all elements on the left are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #49
Refer to the exhibit.What is the result of executing this Ansible playbook?
A. he playbook copies a new start-up configuration to CISCO_ROUTER_01
B. he playbook copies a new running configuration to CISCO_ROUTER_01
C. he playbook backs up the running configuration of CISCO_ROUTER_01
D. he playbook backs up the start-up configuration of CISCO_ROUTER_01
View answer
Correct Answer: D
Question #50
Refer to the exhibit. Which two statements describe the configuration of the switch after the Ansible script is run? (Choose two.)
A. new running configuration is pushed to the IOS router
B. he start-up configuration of the IOS router is copied to a local folder
C. he current running configuration of the IOS router is backed up
D. new start-up configuration is copied to the IOS router
View answer
Correct Answer: AC
Question #51
Refer to the exhibit.What is the effect of this Ansible playbook on an IOS router?
A. uppet
B. FEngine
C. nsible
D. hef
View answer
Correct Answer: C
Question #52
Which toot allows changes to the configuration management toolset to be tested?
A. yATS
B. APALM
C. isco VIRL
D. nsible
View answer
Correct Answer: D
Question #53
Refer to the exhibit. A developer must integrate a bot with an internal communication app. The developer wants to replace the webexbot package with the teamsbot package by using Ansible and prepares a playbook. In the first two tasks, the playbook stops the webexbot and verifies that the teamsbot is installed. What is accomplished in the last task of the workflow when the developer runs the Ansible playbook?
A. ninstalls the webexbot package and removes its configuration files
B. nstalls the webexbot and retains the configuration files
C. tops the webexbot service and uninstall it and retains its configuration files
D. earches whether the purge package is available in the repository and uninstalls the webexbot package
View answer
Correct Answer: A
Question #54
DRAG DROP (Drag and Drop is not supported)Drag and drop the types of management from the left onto the levels at which they are performed on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #55
What is an advantage of using network programmability?
A. anual configuration is faster
B. o cloud abstraction occurs
C. t removes CLI access for devices
D. t provides for more scalable and replicable network provisioning
View answer
Correct Answer: D
Question #56
What is a capability of an agentless configuration management system?
A. t requires managed hosts to have an interpreter for a high-level language such as Python or Ruby
B. t requires managed hosts to connect to a centralized host to receive updated configurations
C. t uses compiled languages as the basis of the domain-specific language to interface with managed hosts
D. t uses existing protocols to interface with the managed host
View answer
Correct Answer: D
Question #57
Refer to the exhibit. A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?
A. nable_function(Loopback1, true, '''?iana-if-type:softwareLoopback'''?)
B. nable_function('''?iana-if-type:softwareLoopback'''?, Loopback1, true,)
C. ef enable_function('''?iana-if-type:softwareLoopback'''?, Loopback1, false,)
D. ef enable_function(Loopback1, true, '''?iana-if-type:softwareLoopback'''?)
View answer
Correct Answer: A
Question #58
An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code, which resource must be used to verify that the code works correctly?
A. isco NX-OS SDK
B. isco Learning Labs
C. isco Code Exchange
D. isco Modeling Labs
View answer
Correct Answer: D
Question #59
A new application is being developed with specific platform requirements. The platform and application deployment and the ongoing platform management must be fully automated. The application includes a large database component that has significant disk I/O requirements. Which application deployment type meets the requirements?
A. ython virtual environment
B. irtual machine
C. are metal
D. ontainer
View answer
Correct Answer: B
Question #60
Refer to the exhibit. A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?
A. erifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages
B. erifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version
C. ninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version
D. nstalling nginx, uninstalling apache2, and then verifying that the package repository is at the latest version
View answer
Correct Answer: C
Question #61
Refer to the exhibit. An engineer must check the admin rights of users on a database regularly and prepares the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?
A. hey must be stored in configuration files if there is a possibility of leakage
B. hey must be Base64-encoded if stored in the user database
C. hey must be encrypted if stored in the user database
D. hey must be stored in configuration files if no authentication will be used
View answer
Correct Answer: C
Question #62
Refer to the exhibit. A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?
A. esults gathering of the show version and show ip int brief commands
B. utput of show ip int brief command on devices of type C9500-40X
C. xecution information of the show version and show ip int brief commands
D. ist of executed commands on C9500-40X and the information of show ip int brief command
View answer
Correct Answer: B
Question #63
Refer to the exhibit. Which two files are being edited in the unified diff? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: BC
Question #64
DRAG DROP (Drag and Drop is not supported) Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.Select and Place:
A. ll the calls are optional
B. ll the calls are asynchronous
C. ll the calls are synchronous
D. ll the calls depend on the catalog
View answer
Correct Answer: A
Question #65
A business needs to create a simulated environment that mimics a production infrastructure to make changes to the OSPF process and analyze the impact. What should be used?
A. isco VIRL / Cisco CML
B. isco DevNet Sandbox labs
C. yATS
D. uppet
View answer
Correct Answer: A
Question #66
What is a benefit of a CI/CD pipeline for infrastructure?
A. emoves manual errors
B. nables manual steps
C. emoves the need for operations
D. rovides variety for deployments
View answer
Correct Answer: A
Question #67
During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?
A. ntegration
B. eployment
C. evelopment
D. esting
View answer
Correct Answer: A
Question #68
Refer to the exhibit. Which workflow does the script automate?
A. etrieves a media server that is being monitored
B. pdates a media server that is being monitored
C. dds a media server to be monitored
D. eletes a media server that is being monitored
View answer
Correct Answer: C
Question #69
Which description of a default gateway is true?
A. t is a security feature that denies certain traffic
B. t is a device that receives IP packets that have no explicit next-hop in the routing table
C. t is a feature that translates between public and private addresses
D. t is a device that receives Layer 2 frames with an unknown destination address
View answer
Correct Answer: B
Question #70
On which port does NETCONF operate by default?
A. 3
B. 43
C. 22
D. 30
View answer
Correct Answer: D
Question #71
Which device is a system that monitors and controls incoming and outgoing network traffic based on predetermined security roles?
A. outer
B. witch
C. oad balancer
D. irewall
View answer
Correct Answer: D
Question #72
In DNS, which record specifies an alias that refers to another name that ultimately resolves to an IP address?
A. NAME
B. S
C. AA
D. OA
View answer
Correct Answer: A
Question #73
DRAG DROP (Drag and Drop is not supported)Drag and drop the network component names from the left onto the correct descriptions on the right. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #74
Which two types of NAT are used in a network? (Choose two.)
A. o uniquely identify a switch in a LAN
B. o uniquely identify a router in a LAN
C. o uniquely identify a network interface in a LAN
D. o uniquely identify a device on the Internet
View answer
Correct Answer: BE
Question #75
DRAG DROP (Drag and Drop is not supported)Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #76
Which detail is included in a routing table?
A. roadcast address
B. CP or UDP port number
C. P protocol
D. estination next hop or outgoing interface
View answer
Correct Answer: D
Question #77
What is an example of a network interface hardware address?
A. orkstation name
B. P address
C. omain name
D. AC address
View answer
Correct Answer: D
Question #78
DRAG DROP (Drag and Drop is not supported) Drag and drop the functionalities from the left onto the correct networking devices on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #79
On which network plane is routing protocol traffic handled?
A. anagement plane
B. ata plane
C. uthentication plane
D. ontrol plane
View answer
Correct Answer: D
Question #80
Which device is used to transport traffic from one broadcast domain to another broadcast domain?
A. ayer 2 switch
B. roxy server
C. outer
D. oad balancer
View answer
Correct Answer: C
Question #81
Which service provides a directory lookup for IP addresses and host names?
A. NS
B. AT
C. NMP
D. HCP
View answer
Correct Answer: A
Question #82
Users cannot access a webserver and after the traffic is captured, the capture tool shows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?
A. router along the path has the wrong time
B. router along the path is misrouting the packets in a wrong direction
C. he server is too loaded and the connection could not be handled in time
D. he server is too far away and the packets require too much time to reach it
View answer
Correct Answer: B
Question #83
What is used in Layer 2 switches to direct packet transmission to the intended recipient?
A. AC address
B. Pv6 address
C. panning tree
D. Pv4 address
View answer
Correct Answer: A
Question #84
What is the purpose of a firewall in application deployment?
A. dds TLS support to an application that does not support it natively
B. imits traffic to only ports required by the application
C. rovides translation for an application's hostname to its IP address
D. orwards traffic to a pool of instances of the application
View answer
Correct Answer: B
Question #85
A small company has 5 servers and 50 clients. What are two reasons an engineer should split this network into separate client and server subnets? (Choose two.)
A. epresents a network connection on specific devices
B. pecifies the type of traffic that is allowed to roam on a network
C. pecifies resource's location and the mechanism to retrieve it
D. epresents the unique ID that is assigned to one host on a network
View answer
Correct Answer: AB
Question #86
Where is an IP packet routed if the packet does not match any routes in the routing table?
A. irewall
B. oad balancer
C. entral switch
D. efault gateway
View answer
Correct Answer: D
Question #87
Which two query types does a client make to a DNS server? (Choose two.)
A. ifferent TCP connections to the routers
B. ncoming traffic across multiple servers
C. raffic in the network by leveraging the switch architecture
D. utgoing connections to the network
View answer
Correct Answer: BC
Question #88
Refer to the exhibit.Which Device limits traffic between Server 1 and Server 2?
A. evice B
B. evice C
C. evice D
D. evice E
View answer
Correct Answer: C
Question #89
What is the purpose of a MAC address on a network device?
A. nique network address that identifies the network interface of a device
B. nique network interlace address that is provided by the DHCP server
C. nique hardware address that identifies the network interface of a device
D. nique hardware interface address that is provided by the central switch
View answer
Correct Answer: C
Question #90
How are load balancers used in modern application deployments?
A. urn off traffic and take down compute units, then update and bring the compute units back up
B. llow traffic to continue as new compute units are brought up and old compute units are taken down
C. llow http and https traffic to continue as old compute units are discontinued before new units are brought up
D. ring up new compute units, test the compute units, and switch the traffic from old units to new units
View answer
Correct Answer: D
Question #91
Which protocol must be allowed on the firewall so that NTP services work properly?
A. CP
B. CMP
C. GP
D. DP
View answer
Correct Answer: D
Question #92
Which protocol runs over TCP port 22?
A. SH
B. ETCONF
C. TTP
D. elnet
View answer
Correct Answer: A
Question #93
What is the purpose of the first three pairs of digits in a MAC address?
A. efines packet forwarding priority sent or received by the adapter
B. efines a routing identifier for the client
C. ndicates vendor of the network card or adapter
D. ndicates the IP address of the client in Hex
View answer
Correct Answer: C
Question #94
Refer to the exhibit. What does the load balancer enable in the network topology?
A. osted application to access Internet services
B. xternal requests to be routed to the application servers
C. pplication to access the database server
D. orkstations to access the Internet
View answer
Correct Answer: D
Question #95
What are two considerations when selecting the “best route” for a network device to reach its destination? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: CD
Question #96
DRAG DROP (Drag and Drop is not supported)Drag and drop the function on the left onto the type of plane that handles the function on the right.Select and Place:
A. n access list along the path is blocking the traffic
B. sers must authenticate on the webserver to access it
C. router along the path is overloaded and thus dropping traffic
D. he traffic is not allowed to be translated with NAT and dropped
View answer
Correct Answer: A
Question #97
Users cannot access a webserver and after the traffic is captured, the capture tool shows an ICMP packet that reports "communication administratively prohibited". What is the cause of this webserver access issue?
A. everse proxy
B. oad balancer
C. NS
D. irewall
View answer
Correct Answer: A
Question #98
Which implementation creates a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire?
A. LAN
B. LAN
C. Psec
D. SRP
View answer
Correct Answer: B
Question #99
What are two properties of private IP addresses? (Choose two.)
A. SH
B. ETCONF
C. TTP
D. elnet
View answer
Correct Answer: BD
Question #100
Refer to the exhibit.While developing a Cisco Webex bot, an application reaches the public IP address of the firewall, but traffic is forwarded to the IP address of server 1 instead of the IP address of server 2. What causes this issue?
A. he proxy server that rewrites traffic is misconfigured
B. he router is sending the traffic to server 1 instead of server 2
C. he switch is forwarding IP traffic to the wrong VLAN
D. AT is misconfigured on the firewall
View answer
Correct Answer: D
Question #101
Developer is working on a new feature and made changes on a branch named 'branch-413667549a-new'. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?
A. it merge ג€"no-edit
B. it merge ג€"commit
C. it merge ג€"revert
D. it merge ג€"abort
View answer
Correct Answer: D
Question #102
A company wants to automate the orders processed on its website using API. The network device that supports the solution must:•support XML encoding•support distributed transactions•support YANG data models•be support software redundancyWhich requirement prevents the use of RESTCONF for the solution?
A. oftware redundancy
B. ANG data models
C. istributed transactions
D. ML encoding
View answer
Correct Answer: C
Question #103
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script by using the Cisco SDK. Not all options are used.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #104
DRAG DROP (Drag and Drop is not supported)Drag and drop the functions from the left onto the networking devices on the right.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #105
Which technology is responsible for resolving a host name to an IP address?
A. NS
B. NMP
C. HCP
D. TP
View answer
Correct Answer: A
Question #106
Refer to the exhibit. Up to which device does the communication server 1 and server 2 go?
A. evice B
B. evice C
C. evice D
D. evice E
View answer
Correct Answer: B
Question #107
Which protocol is used for clock synchronization between network devices?
A. TP
B. NTP
C. GP
D. TP
View answer
Correct Answer: D
Question #108
What is the meaning of the HTTP status code 204?
A. equest completed; new resource created
B. erver successfully processed request; no content returned
C. tandard response for successful requests
D. nvalid query parameters
View answer
Correct Answer: B
Question #109
Which two commands download and execute an Apache web server container in Docker with a port binding 8080 in the container to 80 on the host? (Choose two.)
A. ontinuous delivery
B. ersion control
C. ontinuous integration
D. ontinuous deployment
View answer
Correct Answer: CD
Question #110
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit. A script must output details of all the Cisco Meraki MS220-BP switches across all organizations and networks. Drag and drop the code snippets from the bottom onto the boxes in the code to complete the script. Not all options are used.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #111
Refer to the exhibit. Which HTTP code is returned after the RESTCONF query is executed?
A. 01
B. 04
C. 02
D. 04
View answer
Correct Answer: A
Question #112
DRAG DROP (Drag and Drop is not supported)Drag and drop the code snippets from the bottom onto the blanks in the code to complete the happy path scenario. Not all options are used.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #113
Which traffic is handled on the control plane?
A. GP
B. MB
C. TP
D. ETCONF
View answer
Correct Answer: A
Question #114
Refer to the exhibit. A network engineer must configure new interfaces on a set of devices and is planning to use an Ansible playbook for the task. All devices support SSH and NETCONF protocol, and the interface variables are unique per device. In which directory are the YAML files including variables hosted to automate the task with the netconf_config module?
A. urrent working directory
B. ost_vars directory
C. roup_vars directory
D. ome directory
View answer
Correct Answer: A
Question #115
Which standard supported by Cisco IOS XE and Cisco NX-OS is used for automating the configuration of multiple devices across a network?
A. NMP – YANG
B. YSLOG – YANG
C. LI – YANG
D. ETCONF – YANG
View answer
Correct Answer: D
Question #116
A developer has addressed a bug that was found in the production code of an application. A separate file named ‘bug427896191v_fix” has been created with the changes to the code. Which Git command must be used to incorporate the bug fix into the production code?
A. it rebase
B. it cat-file
C. it merge-file
D. it bisert
View answer
Correct Answer: C
Question #117
What is a principle of a code review process?
A. hanges are made after the code is submitted to source control
B. t must not prevent code from getting into production as quickly as possible
C. aming standards must be consistent
D. technical lead must sign off on the review
View answer
Correct Answer: D
Question #118
Why would a developer compare a current version of code to a previous version?
A. o provide the single source of truth
B. o troubleshoot code failures
C. o track who made a change
D. o aid in collaboration
View answer
Correct Answer: B
Question #119
Which Cisco platform is used to manage data center infrastructure through third-party tools and system integrations?
A. isco DNA Center
B. isco UCS Manager
C. isco Intersight
D. isco UCS Director
View answer
Correct Answer: D
Question #120
Refer to the exhibit. An engineer is managing the network of an enterprise. The network is using a distributed deployment model. The enterprise uses database to store logs. The current policy requires logs to be stored if changes are made to the infrastructure in any of the devices on the data centers. Which workflow is being automated by the Bash script?
A. eturning backup files that are older than 30 days
B. eleting backup files that are older than 30 days
C. onfiguring the directory to delete files automatically
D. utomating deletion of all backup files every 30 days
View answer
Correct Answer: B
Question #121
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python script to retrieve a list of network devices from Cisco DNA Center. Not all options are used.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #122
What is a characteristic of RPC APIs compared to REST APIs?
A. uthentication is done over provisions for the service caller and vice versa for RPC API, and REST API uses HTTP headers for authentication
B. ll communications between the client and server must be stateless for RPC API, and REST API is stateful
C. he architecture model for RPC API is resource-focused, and REST API is procedure-focused
D. he data payload must be in JSON format for RPC API, and REST API allows JSON and XML formats
View answer
Correct Answer: A
Question #123
Refer to the exhibit. A developer writes a script to create a new network by using the Cisco DNA Center API. After running the script for the first time, the developer observes that HTTP code 404 is printed to the console. Which action resolves the problem?
A. he x-auth-token value must be changed to a valid token
B. he API URL must be changed with a valid URL
C. he requested payload must be fixed to include missing parts
D. nternal errors on the code of API server must be fixed
View answer
Correct Answer: B
Question #124
A developer plans to deploy a new application that will use an API to implement automated data collection from Webex with these requirements:•The application was created by using the request library.•Requires HTTP basic authentication.•Provides data in JSON or XML formats.Which Cisco DevNet resource helps the developer with how to use the API?
A. evNet sandbox
B. PI documentation
C. orums
D. evNet code exchange
View answer
Correct Answer: B
Question #125
An engineer deploys a Cisco CSR 1000 V instance to a virtual machine. The engineer must output the device configuration in JSON format. Which protocol is used for this task?
A. ANG
B. ETCONF
C. NMP
D. ESTCONF
View answer
Correct Answer: D
Question #126
A development team is creating an application used for contactless payments. The application must:•Be web-based•Capture and process the credit card information for a purchase.Which security action must the web application use to gather and process the private customer data?
A. nable RATs to monitor the web application remotely
B. isable botnets to eliminate risks
C. isable TLS to increase the connection speed
D. nable the encryption of network traffic
View answer
Correct Answer: D
Question #127
An engineer needs to collect information about 20,000 Bluetooth clients using the Cisco Meraki API. The API returns only 1,000 results. One of the HTTP response headers has the data:Link: https://api.meraki.com.info/api/v0/networks/ABC/bluetoothClients?perPage=1000&startingAfter=1000>;rel=“next”Which RFC is implemented by the API to apply the restriction?
A. FC 5988 – Web Linking
B. FC 5890 – Response Constraints
C. FC 5005 – Feed Paging and Archiving
D. FC 5446 – Content Limits
View answer
Correct Answer: C
Question #128
What are two benefits of using classes over functions when writing applications? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: AC

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: