DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Cisco Certified DevNet Associate Exam with Real 200-901 DEVASC Questions | Online Practice Tests

Prepare for success in the Cisco Certified DevNet Associate (200-901 DEVASC) exam with our comprehensive exam preparation resources. Our practice tests and practice exam materials are designed to help you ace the exam with confidence. We provide real exam questions and answers, along with sample questions, to ensure that you are well-prepared for the actual test. Our study material covers all the key topics tested in the 200-901 DEVASC exam, including software development and design, APIs, automation, and security. With our exam resources, you can effectively prepare for the exam and increase your chances of successfully passing the Cisco Certified DevNet Associate certification. Don't leave your success to chance. Prepare for the 200-901 DEVASC exam with our exam preparation materials and achieve your certification goals.
Take other online exams

Question #1
Which two concepts describe test-driven development? (Choose two.)
A. reating test scenarios based on continuous development
B. riting code without committing any coding violations
C. efactoring code that is covered by existing tests
D. esting existing software before developing new code
View answer
Correct Answer: CD

View The Updated 200-901 Exam Questions

SPOTO Provides 100% Real 200-901 Exam Questions for You to Pass Your 200-901 Exam!

Question #2
Which task is performed because the test-driven development approach is being used?
A. rite code that implements a desired function
B. rite a failing test case for a desired function
C. everse engineer the code for a desired function
D. rite a passing test case for existing code
View answer
Correct Answer: D
Question #3
In the test-driven development model, what is changed after a test fails?
A. chedule
B. roject requirements
C. ode
D. est
View answer
Correct Answer: C
Question #4
What is a benefit of test-driven development?
A. trict adherence to product requirements
B. aster releases that have minimal features
C. arly customer involvement
D. ncreased code quality
View answer
Correct Answer: A
Question #5
Before which process is code review performed when version control is used?
A. heckout of code
B. erge of code
C. ommitting code
D. ranching code
View answer
Correct Answer: B
Question #6
What is an advantage of a version control system?
A. acilitates resolving conflicts when merging code
B. nsures that unit tests are written
C. revents over-writing code or configuration files
D. orces the practice of trunk-based development
View answer
Correct Answer: A
Question #7
Refer to the exhibit.Which Python data structure does my_json contain?
A. ap
B. ist
C. son
D. ict
View answer
Correct Answer: D
Question #8
When a Cisco IOS XE networking device is configured using RESTCONF, what is the default data-encoding method?
A. SON
B. AML
C. ML
D. -form-encoding
View answer
Correct Answer: C
Question #9
Fill in the blanks to complete the Python script to request a service ticket using the APIC-EM REST API for the user “devnetuser”.import requestsimport jsoncontroller = ‘devnetapi.cisco.com/sandbox/apic_em’url = “https://” + controller + “api/va/ticket”payload = {‘username’: ‘_________________’, ‘password’: ‘370940885’}header = {‘Content-type’: ‘application.json’}response = _______________________.post(url, data=json.dumps(payload), \headers= ______________________, verify=False)r_json = response.json()prin
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #10
Which two statements about JSON and XML are true? (Choose two.)
A. unctions ensure that a developer understands the inner logic contained before using them as part of a script or application
B. unctions create the implementation of secret and encrypted algorithms
C. unctions allow problems to be split into simpler, smaller groups, and reduce code repetition, which makes the code easier to read
D. unctions store mutable values within a script or application
View answer
Correct Answer: CE
Question #11
Refer to the exhibit.The output of a unified diff when comparing two versions of a Python script is shown. Which two “single_request_timeout()” functions are defined in fish.py and cat.py? (Choose two.)
A. nables the code to be broken down into layers
B. mproves collaboration of the development team
C. akes it easier to deal with large and complex systems
D. nables the inclusion of more programming languages in the code
View answer
Correct Answer: AB
Question #12
What is a benefit of organizing code into modules?
A. nables the code to be broken down into layers
B. mproves collaboration of the development team
C. akes it easier to deal with large and complex systems
D. nables the inclusion of more programming languages in the code
View answer
Correct Answer: B
Question #13
What is a benefit of organizing code into modules?
A. it branch –rm experiment
B. it branch –n experiment
C. it branch –f experiment
D. it branch –D experiment
View answer
Correct Answer: B
Question #14
What are two benefits of managing network configuration via APIs? (Choose two.)
A. reates a local copy of a repository called “my-project”
B. nitiates a new Git repository called “my-project”
C. reates a copy of a branch called “my-project”
D. reates a new branch called “my-project”
View answer
Correct Answer: DE
Question #15
What is the outcome of executing this command?git clone ssh:/john@example.com/path/to/my-project.git
A. ombine multiple sequences of commits into one unified history
B. ush changes to the remote repository
C. reate, list, rename, and delete branches
D. witch between branches
View answer
Correct Answer: A
Question #16
Which action does the Git command git merge allow the developer to perform?
A. it checkout -b my-bug-fix
B. it branch -b my-bug-fix
C. it branch my-bug-fix
D. it checkout my-bug-fix
View answer
Correct Answer: A
Question #17
Drag and drop the Git commands from the left onto the right that add modified local files to a remote repository.Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #18
A developer needs to prepare the file README.md in the working tree for the next commit operation using Git. Which command needs to be used to accomplish this?
A. it -a README
B. it add README
C. it add README
D. it commit README
View answer
Correct Answer: B
Question #19
A developer is reviewing a code that was written by a colleague. It runs fine, but there are many lines of code to do a seemingly simple task repeatedly. Which action organizes the code?
A. efactor the code by removing any unnecessary tests
B. everse engineer and rewrite the code logic
C. sing functions, rewrite any pieces of code that are repeated
D. odify the code to use loops
View answer
Correct Answer: A
Question #20
Which principle is a value from the manifesto for Agile software development?
A. rocesses and tools over teams and interactions
B. etailed documentation over working software
C. dhering to a plan over responding to requirements
D. ustomer collaboration over contract negotiation
View answer
Correct Answer: D
Question #21
Which advantage does the agile process offer compared to waterfall software development?
A. o add or update features with incremental delivery
B. o view the full scope of end-to-end work
C. o have each phase end before the next begins
D. o fix any issues at the end of the development cycle
View answer
Correct Answer: A
Question #22
How do XML and JSON compare regarding functionality?
A. ML provides support for mapping data structures into host languages than JSON
B. ML provides more human readability than JSON
C. SON provides support for data types than XML
D. SON natively supports arrays and XML does not natively support arrays
View answer
Correct Answer: D
Question #23
Refer to the exhibit. The JSON data in the exhibit has been parsed and stored into a variable “data”. What returns the value “172.16.0.11”?
A. ata[‘items’][‘host’][‘value’]
B. ata[‘items’][1][‘host’][‘value’]
C. ata[‘items’][0][‘host’][‘value’]
D. ata[‘items’][‘host’][1]
View answer
Correct Answer: C
Question #24
Refer to the exhibit.What does the Python function do?
A. t returns HTTP Basic Authentication
B. t returns DNAC user and password
C. t reads a token from a local JSON file and posts the token to the DNAC URL
D. t returns an authorization token
View answer
Correct Answer: A
Question #25
Package updates from a local server fail to download. However, the same updates work when a much slower external repository is used. Why are local updates failing?
A. he server is running out of disk space
B. he Internet connection is too slow
C. he Internet is down at the moment, which causes the local server to not be able to respond
D. he update utility is trying to use a proxy to access the internal resource
View answer
Correct Answer: D
Question #26
What is a functionality of the Waterfall method as compared to the Agile method for software development?
A. aterfall increases agility to implement faster while Agile promotes reliability
B. phase begins after the previous phase has ended in Waterfall while Agile phases run in parallel
C. ustomers get feedback during the process in Waterfall while they can see the result at the end in Agile
D. equirements can be updated in Waterfall while in Agile it should be gathered in the beginning
View answer
Correct Answer: B
Question #27
What is a benefit of using functions in the code for the development process?
A. etter user experience in the end product
B. mproves code performance
C. asier to compile the code
D. aster code development
View answer
Correct Answer: D
Question #28
What is the difference between YAML and JSON data structure?
A. AML uses spaces; JSON uses parentheses
B. AML uses indentation; JSON uses brackets and braces
C. AML uses brackets and braces; JSON uses indentation
D. AML uses parentheses; JSON uses spaces
View answer
Correct Answer: B
Question #29
A developer is working on a feature for a new application. The changes in the existing branch named 'feat00304' must be integrated into a single commit with the current working primary branch named 'prodapp411926287'. Which git command must be used?
A. it rebase --merge feat00304
B. it merge --squash feat00304
C. it push --rebase feat00304
D. it checkout --squash feat00304
View answer
Correct Answer: B
Question #30
A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?
A. it update
B. it merge
C. it add
D. it rebase
View answer
Correct Answer: C
Question #31
Into which type of Python data structure should common data formats be parsed?
A. equence
B. et
C. ictionary
D. ist
View answer
Correct Answer: C
Question #32
Refer to the exhibit. Which XML snippet has interface information that conforms to the YANG model?
A. revents two users from working on the same file
B. eeps track of all changes to the files
C. revents the sharing of files
D. eeps the list of data types used in the files
View answer
Correct Answer: A
Question #33
Refer to the exhibit. What does the command marked (2) do when it is run?
A. t duplicates the “test” branch
B. t duplicates the “test” branch
C. t deletes the “test” branch
D. t does not delete the branch until it is merged
View answer
Correct Answer: C
Question #34
What is a comparison of YAML and JSON?
A. AML has a more consistent approach to representing data compared to JSON
B. SON does not support comments and YAML does
C. AML is a more verbose data structure compared to JSON
D. SON has more common usage in configuration management tools compared to YAML
View answer
Correct Answer: B
Question #35
Which status code is used by a REST API to indicate that the submitted payload is incorrect?
A. 00
B. 03
C. 05
D. 29
View answer
Correct Answer: A
Question #36
Refer to the exhibits.Drag and drop the code from the left onto the item numbers on the right to complete the Meraki Python scriptshown in the exhibit.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #37
An application calls a REST API and expects a result set of more than 550 records, but each time the call is made, only 25 are returned. Which feature limits the amount of data that is returned by the API?
A. agination
B. ayload limit
C. ervice timeouts
D. ate limiting
View answer
Correct Answer: A
Question #38
A developer is writing an application that uses a REST API and the application requires a valid response from the API. Which element of the response is used in the conditional check?
A. ody
B. eaders
C. ink
D. RL
E. tatus code
View answer
Correct Answer: B
Question #39
Refer to the exhibit. A REST API returns this JSON output for a GET HTTP request, which has been assigned to a variable called “vegetables”. Using Python, which output is the result of this command?print(filter(lambda 1: 1[‘type’] == ‘fruit’, vegetables) [0][‘items’][0][‘items’] [0])
A. ‘color’: ‘green’, ‘items’: [‘kiwi’, ‘grape’]}
B. ‘kiwi’, ‘grape’]
C. ettuce
D. iwi
View answer
Correct Answer: D
Question #40
DRAG DROP (Drag and Drop is not supported)Drag and drop the Python code from the left onto the correct step on the right to call a REST API.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #41
A 401 HTTP response code is returned when calling a REST API. What is the error state identified by this response code?
A. he server cannot process the request as it has detected an issue in the request syntax or body
B. he request has not been accepted because it requires authentication
C. he sever accepted the request but the client is not authorized for this content
D. he server cannot find the requested resource because the path specified is incorrect
View answer
Correct Answer: B
Question #42
A developer needs a list of clients connected to a specific device in a Meraki network. After making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet resource should be used to identify the meaning of the response code?
A. PI documentation
B. ode Exchange
C. earning Labs
D. andbox
View answer
Correct Answer: A
Question #43
A developer is trying to retrieve data over a REST API. The API server responds with an HTTP client error response code. After investigating the response the developer realizes the response has a Retry-After header. What is the root cause of this error?
A. n appliance limited the rate of requests to the transport layer
B. he REST service is unreachable at the time of the REST request
C. oo many requests were sent to the REST service in a given amount of time
D. n appliance limited the rate of requests to the application layer
View answer
Correct Answer: C
Question #44
Refer to the exhibit. A developer needs to upload a local file by using the REST API. The developer gathers information according to the documentation and sends the request by using the cURL command in the exhibit but gets an error code. Which action should be followed to get a valid response?
A. hange content-type as JSON
B. dd the authorization header with the access token
C. nd a username-password combination to request command
D. hange request method as GET
View answer
Correct Answer: B
Question #45
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit.Drag and drop the descriptors from the left onto the corresponding parts of the API request and response on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #46
Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve a configuration statement using RESTCONF on a CSR 1000V?
A. hange the HTTP method to PUT
B. heck the MIME types in the HTTP headers
C. hange the transport protocol to HTTPS
D. heck the authentication credentials
View answer
Correct Answer: D
Question #47
Which HTTP response status code means “Forbidden”?
A. 00
B. 01
C. 03
D. 02
View answer
Correct Answer: C
Question #48
Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?
A. 00
B. 04
C. 02
D. 02
View answer
Correct Answer: B
Question #49
Refer to the exhibit. Which data is specified in the response header?
A. ontent-Type
B. TTP/1
C. ''?type'''?: '''?switch'''?
D. '''?id'''?: '''?a123456bcde'''?, HTTP/1
View answer
Correct Answer: B
Question #50
In which two ways is an application characterized when interacting with a webhook? (Choose two.)
A. lients receive responses with a task id for further processing
B. lients subscribe to a webhook for operation results
C. lients poll for the status of the execution of operations
D. lients can access the results immediately
View answer
Correct Answer: AE
Question #51
How does requesting a synchronous API operation differ from requesting an asynchronous API operation?
A. ee Explanation section for answer
View answer
Correct Answer: B
Question #52
DRAG DROP (Drag and Drop is not supported)Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.Select and Place:
A. n an environment variable unique to the system database
B. ncrypted in a configuration file that is separate from the code
C. lain text in the code as a constant
D. ncrypted in the code in a function
View answer
Correct Answer: A
Question #53
FILL BLANKFill in the blanks to complete the statement.Given a username of “devnet” and a password of “cisco123”, applications must create a base64 encoding of the string “________________” when sending HTTP requests to an API that uses _______________ authentication.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #54
Refer to the exhibit.An administrator attempts to perform a GET using the Cisco IOS XE RESTCONF API to return the hostname of a device. The sequence diagram illustrates the HTTP messages observed. Which change to the API request resolves the issue?
A. emove the –H ‘Accept: application/yang-data+json’ HTTP header because it is not required
B. dd –‘u cisco:cisco’ in the end of the cURL command
C. hange the request method from –X “GET” to –X “POST”
D. dd Content-Type HTTP header with ‘application/yang-data+json’ using –H ‘Content-Type: application/ yang-data+json’
View answer
Correct Answer: B
Question #55
What are two benefits of managing network configuration via APIs? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: DE
Question #56
Which Cisco DevNet resource allows access to products in a development lab to explore, learn, and build applications that use Cisco APIs?
A. evNet Code Exchange
B. evNet Sandbox
C. evNet Communities
D. evNet Automation Exchange
View answer
Correct Answer: B
Question #57
Refer to the exhibits.A developer is troubleshooting an API with the given API documentation and cURL command. What is the cause of this problem?
A. he authorization header is missing or incomplete
B. he request body is missing or incomplete
C. he API token specified is expired
D. he user is not allowed to post messages from their account
View answer
Correct Answer: C
Question #58
Which two statements describe the traits of an asynchronous API call? (Choose two.)
A. ata sets
B. crolling
C. agination
D. lobs
View answer
Correct Answer: BC
Question #59
Refer to the exhibit. What caused the error in this API request?
A. he API resource does not support the POST operation
B. he submitted JSON payload has a formatting issue
C. he API resource does not support JSON format payloads
D. he submitted JSON payload includes a field that is not supported by the API resource
View answer
Correct Answer: B
Question #60
Which two use cases are supported by Meraki APIs? (Choose two.)
A. ebex Teams
B. isco Unified Communications Manager
C. inesse Gadgets
D. ebex Devices
View answer
Correct Answer: BC
Question #61
Which API is used to obtain data about voicemail ports?
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #62
What is a difference between a synchronous API and an asynchronous API?
A. ynchronous API calls require an authentication header to be sent while asynchronous calls do not require authentication
B. ynchronous API calls are returned immediately while asynchronous calls do not guarantee an immediate response
C. n asynchronous API can make offline calls while synchronous APIs do not have this capability
D. n asynchronous API can make a larger number of calls in a specified time period than a synchronous API
View answer
Correct Answer: B
Question #63
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit. Drag and drop the code from the bottom onto the blanks in the code to construct a cURL command using the Cisco DNA Center API, which will provide the details of a WLAN controller with Id ab123456789. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #64
Refer to the exhibit. A network engineer must manage the network devices. The engineer prepares a Python script to authenticate to the Cisco DNA Center API and request a device list. The device request fails and returns error code 401. Which action solves the problem?
A. pdate the credentials that are already supplied and retry the request
B. end the request to another network in case there are reachability issues
C. end the Authentication header in the request with a valid configuration
D. pdate the API URL, which matched the API endpoint for device list
View answer
Correct Answer: A
Question #65
Refer to the exhibit. Which command needs to be placed on the box where the code is missing to output the value of page_id in the Python 3.7 script?
A. rint(items
B. rint(items
C. rint(items''?items'''?]''?page_id'''?]
D. rint(items''?items'''?]''?page_id'''?])
View answer
Correct Answer: A
Question #66
Refer to the exhibit. A developer creates a Python script that queries Cisco Webex. When the script is executed, a 401 code is returned. After troubleshooting, the developer discovers that the service is missing privileges. Which change to the header in line 4 of the script results in the code 200?
A. eader = {'''?Authentication'''?: '''?Bearer YOUR_TOKEN'''?}
B. eader = {'''?Authentication Bearer'''? : '''?YOUR_TOKEN'''?
C. eader = {'''?Authorization Bearer'''? : '''?YOUR_TOKEN'''?}
D. eader = {'''?Authorization'''? : '''?Bearer YOUR_TOKEN'''?}
View answer
Correct Answer: D
Question #67
DRAG DROP (Drag and Drop is not supported)Drag and drop the HTTP methods from the left onto their generally accepted corresponding create, read, update, and delete operations on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #68
DRAG DROP (Drag and Drop is not supported)Refer to the exhibits.Drag and drop the code from the left onto the item numbers on the right to complete the Meraki code to obtain a list of clients which have used this network.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #69
In Python, which expression checks whether the script returns a success status code when the Requests library is used?
A. esponse
B. esponse
C. esponse
D. esponse
View answer
Correct Answer: A
Question #70
Refer to the exhibit. The script returns an output of 401. To use the supplied URL, an HTTP GET request must be sent with an Authorization header. The header value is a base64 encoded concatenation of the username and password. Which action must be taken to return an output of 200?
A. hange the verify=False setting in the request to verify=True to enable HTTP Basic authentication
B. erify that the username and password values imported from the configuration file are still valid
C. nsert an Authorization header with the values username:password from the supplied configuration file
D. odify the method from LOGIN to GET and supply the username:password value as JSON payload
View answer
Correct Answer: B
Question #71
Refer to the exhibit. A Python code has been written to query a device. The executed code results in the error shown. Which action resolves the problem?
A. mport json
B. equests('''?GET'''?, base_url + request_url, cookies=cookies)
C. ip install requests
D. mport requests
View answer
Correct Answer: D
Question #72
Which REST architectural constraint indicates that no client context should be stored on the server between requests?
A. acheable
B. tateless
C. niform interface
D. lient-server
View answer
Correct Answer: B
Question #73
Which HTTP code group is issued when a request is received successfully, understood, and processed?
A. xx
B. xx
C. xx
D. xx
View answer
Correct Answer: A
Question #74
A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?
A. ommunication between the application and the services is not encrypted
B. he database credentials should be stored in the configuration files so that they are secured on the same server
C. he API keys are stored in the configuration files but should be stored in the vault service
D. he synchronization logs should be encrypted and not stored in a relational database
View answer
Correct Answer: A
Question #75
Refer to the exhibit. An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the 'get_all_interfaces' API call is used?
A. imes out
B. ate limit
C. agination
D. nvalid password
View answer
Correct Answer: C
Question #76
DRAG DROP (Drag and Drop is not supported)Drag and drop the code snippets from the bottom into the Python script to write API output to a csv file. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #77
DRAG DROP (Drag and Drop is not supported)Drag and drop the code snippets from the bottom to the blanks in the code to test the API response through the Python unittest library. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #78
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit. A developer is creating a Python script to obtain a list of HTTP servers on a network named office_east by using the Cisco Meraki API. The request has these requirements:-Must time out if the response is not received within 2 seconds. -Must utilize client certificates and SSL certificate verification.-Must utilize basic authentication that uses a username of admin and a password of cisco. -Must save the response to an object named response.Drag
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #79
DRAG DROP (Drag and Drop is not supported)Drag and drop the code snippets from the bottom to the blanks in the code to complete the HTTP response. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #80
Refer to the exhibit. A collaboration engineer has developed a script to automate the gathering of information by providing the email address of the individual. When the engineer tests the script, a 401 error is received. Which command fixes the script?
A. dd “Authorization”: “Bearer ” to the headers
B. dd “Authentication”: “Basic ” in the base_url after “https://”
C. dd “:@” in the base_url after “https://”
D. dd “Authentication”: “Bearer ” to the headers
View answer
Correct Answer: A
Question #81
A developer is attempting to retrieve all the messages from a Cisco Webex space. The server responds by sending the first 1,000 messages. The developer must make additional requests to retrieve the rest of the messages. Which API constraint is described in this scenario?
A. ayload limiting
B. hrottling
C. agination
D. ate limiting
View answer
Correct Answer: C
Question #82
Refer to the exhibit. A developer just finished testing a Python script and wants to save the list of packages and versions installed on the current machine. The developer must make sure that it will not cause any issues if tested on another device due to different library versions. Which line of code needs to be placed on the snippet where the code is missing?
A. ip freeze 2> requirements
B. ip freeze > requirements
C. ip freeze => requirements
D. ip freeze | requirements
View answer
Correct Answer: B
Question #83
A developer pushes an application to production. The application receives a webhook over HTTPS without a secret. The webhook information contains credentials to service in cleartext. When the information is received, it is stored in the database with an SHA-256 hash. Credentials to the database are accessed at runtime through the use of a vault service. While troubleshooting, the developer sets the logging to debug to view the message from the webhook. What is the security issue in this scenario?
A. atabase credentials should be accessed by using environment variables defined at runtime
B. uring the transport of webhook messages, the credentials could be unencrypted and leaked
C. uring logging, debugging should be disabled for the webhook message
D. ashing the credentials in the database is not secure enough; the credentials should be encrypted
View answer
Correct Answer: B
Question #84
Refer to the exhibit. A developer cannot reach the web application behind an NGINX load balancer. The developer sends a request to an application FQDN with cURL but gets an HTTP 502 response. Which action solves the problem?
A. ix errors in the server configuration, which is behind the load balancer
B. ring up the load balancer to the active state
C. ix errors in the cURL request sent by the client
D. hange the default gateway on the load balancer to an active one
View answer
Correct Answer: D
Question #85
Refer to the exhibit. A network engineer wants to use an API to update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which line of code needs to be placed in the snippet where the code is missing?
A. 'Content-Type': 'application/yang
Accept': 'application/yang. ata+xml'}
B. 'Content-Type': 'application/yang
Accept': 'application/yang. ata+yaml'}
C. 'Content-Type': 'application/restconf
Accept': 'application/ restconf. ata+json'}
D. 'Content-Type': 'application/yang
Accept': 'application/ restconf. ata+utf8'}
View answer
Correct Answer: C
Question #86
Which action do webhooks enable an application to perform?
A. ncrease the request rate limit
B. opulate the application with restricted data
C. eceive real-time data
D. mplement a push model
View answer
Correct Answer: D
Question #87
Refer to the exhibit. A developer can access the TLS REST API on server A, but cannot access the API on server B. The developer can ping server B. When the developer performs a packet capture on the TLS REST API port on server B, the capture shows that the packet arrived and the server responded. What causes the issue?
A. ort 80 is blocked on the outgoing interface of firewall B
B. ort 443 is blocked on the outgoing interface of firewall A
C. ort 443 is blocked on the incoming interface of firewall B
D. ort 80 is blocked on the incoming interface of firewall A
View answer
Correct Answer: C
Question #88
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #89
DRAG DROP (Drag and Drop is not supported)Drag and drop the API characteristics from the left onto the categories on the right.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #90
How are operations on REST APIs performed as compared to RPC APIs
A. n a REST API, operations are performed on an object (node) that is identified by a URL, but RPC APIs are operation-oriented
B. n a REST API, operations are performed on an external resource that is defined on the API, but the RCP APIs are resource-oriented
C. n a REST API, operations are performed on a platform that is identified by the URL, but RPC APIs are platform-oriented
D. n a REST API, operations are performed on an internal resource that is defined on the API, but RPC APIs are resource-oriented
View answer
Correct Answer: A
Question #91
Which HTTP error code series relates to redirection?
A. 00
B. 00
C. 00
D. 00
View answer
Correct Answer: D
Question #92
Which platform has an API that can be used to obtain a list of vulnerable software on user devices?
A. isco Umbrella
B. isco Firepower
C. isco Identity Services Engine
D. isco Advanced Malware Protection
View answer
Correct Answer: D
Question #93
Which two items are Cisco DevNet resources? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: CE
Question #94
FILL BLANKFill in the blanks to complete the Python script to update the Webex Teams membership of a room using the Python requests library.import requestsurl = “https://api.ciscospark.com/v1/memberships/Y2lzY29zcGFyazov379971079INISVAvOTJiM2RkOWEtNjc1ZC00YTQxLThjNDEtMmFiZGY4OWY0NGY0OjExNzJkNmYwLTJIYzMtMTFIOS1iOWI3LWNmMjg3MTJhYTkzNw”my_token = “AbCdEf123456”payload = “{\n \”isModerator\”: true\n}”headers = {‘Authorization’: ‘Bearer’ + my_token,‘Content-Type’: ‘application/json’}response = requests. ________
A. itter
B. apacity
C. elay
D. atency
View answer
Correct Answer: A
Question #95
While developing a real-time VoIP application on a Cisco Webex Teams platform, users report that their voice gets chopped or parts of the conversation drops out. Which network constraint is impacting the application?
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #96
A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without error and the log bundles are produced. However, when the script is run during business hours, people report poor voice quality of phone calls. What explains this behavior?
A. he script is written in a low-level programming language where there is no memory safety
B. he speed and duplex settings in Cisco DNA Center are set incorrectly, which causes the transfer to be too slow
C. he script is running in the Voice VLAN and causes delays and jitter in the subnet
D. enerating the logs causes the CPU on the network controller to spike, which causes delays in forwarding the voice IP packets
View answer
Correct Answer: B
Question #97
FILL BLANKFill in the blanks to complete the statement.Given a username of “devnet” and a password of “cisco123”, applications must create a base64 encoding of the string “________________” when sending HTTP requests to an API that uses _______________ authentication.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #98
FILL BLANKFill in the blanks to complete the Python script to retrieve a list of network devices using the Cisco DNA Center API.my_token=‘eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzl1NiJ9.ey.JzdWliOil1ZDE0OWZkMjhlZTY2MmQ3NGM5YzE5ZTliLmYzMClslmV4cCI6MTU3MjM3ODE5MCwidXNlcm5hbWUiOiJraXN370940885.zhK5LPQd501ZUpZI0IH_qrgOXttlNbxSFFF7JOEtRls’import requestsurl = “https://myDNAserver/dna/intent/api/v1/network-device”payload = {}headers = {‘x-auth-token’: my_token}response = requests.request( _______________________ , url,heade
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #99
DRAG DROP (Drag and Drop is not supported)Drag and drop the requests from the left into the order on the right to create and check the path trace between two devices using Cisco DNA center API.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #100
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit. A Python script must delete all Cisco Catalyst 9300 Series switches that have an uptime that is greater than 90 days. The script must also query for the status of all the other devices. Drag and drop the code from the bottom onto the box where the code is missing to complete the script. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #101
Refer to the exhibits. The Python interpreter and the Cisco Python SDK are available by default in the Cisco NX-OS Software. The SDK documentation shows how the clid() API can be used when working with JSON and XML. What are two effects of running the script? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: AD
Question #102
What are two key capabilities of Cisco Finesse? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: AC
Question #103
Which two statements are true about Cisco UCS Manager, Cisco UCS Director, or Cisco Intersight APIs? (Choose two.)
A. NMI
B. OAP
C. SH
D. ORBA
View answer
Correct Answer: BD
Question #104
Which operation is performed with YANG model-driven programmability in NX-OS?
A. onfigure a device with native and OpenConfig-based models
B. ootstrap a device that has a factory-default configuration
C. end CLI commands to a device and retrieve output in JSON format
D. un Linux commands natively on the device
View answer
Correct Answer: A
Question #105
What are two benefits of model-driven programmability? (Choose two.)
A. t provides a programmatic and standards-based way of writing configurations to any network device
B. y modeling data, it ensures that vast quantities of data are usable for monitoring
C. t simplifies management and operations by decoupling the networking hardware from its control mechanism
D. t addresses the static architecture of traditional networks being decentralized and complex
View answer
Correct Answer: CE
Question #106
What is a benefit of model-driven programmability?
A. TTP POST
B. TTP GET
C. TTP HEAD
D. TTP PUT
View answer
Correct Answer: A
Question #107
Refer to the exhibit. The Cisco Meraki API manages two organizations. In each organization, two independent networks are defined. How many calls to the /organizations/{orgId}/networks endpoint will be run parallel by the GetAllNetworks function of the API client?
A.
B.
C.
D.
View answer
Correct Answer: C
Question #108
Refer to the exhibit. The definition of the YANG module and a RESTCONF query sent to a Cisco IOS XE device is shown. Why does the RESTCONF interface respond with a 204 status code?
A. he query retrieved the logging severity level
B. he query updated the logging severity level or created it if not present on the device
C. he query failed at retrieving the logging severity level
D. he query failed to set the logging severity level due to an invalid path
View answer
Correct Answer: B
Question #109
Which statement about authenticating a RESTCONF API session with a router that runs Cisco IOS XE Software is true?
A. o authentication is required
B. Auth must be used
C. token must be retrieved and the associated string must be embedded in the X-Auth-Token header
D. asic authentication must be used
View answer
Correct Answer: D
Question #110
Which API must an engineer use to change a netmask on a Cisco IOS XE device?
A. eraki
B. D-WAN
C. ESTCONF/YANG
D. NAC
View answer
Correct Answer: C
Question #111
A developer creates a script that configured multiple Cisco IOS XE devices in a corporate infrastructure. The internal test environment is unavailable, and no maintenance window is available to test on a low-priority production environment. Which resource is used to test the code before it is applied to the production environment?
A. ode Exchange
B. isco Support
C. isco DevNet Learning Labs
D. isco DevNet Sandbox
View answer
Correct Answer: D
Question #112
Which tool is used to block all traffic to the domain by using a single API call?
A. isco Firepower
B. isco AMP
C. isco Umbrella
D. isco ISE
View answer
Correct Answer: A
Question #113
Why is refactoring done during test-driven development?
A. o enable larger objects and longer methods
B. o improve maintainability and readability
C. o ensure that the previous uses of the objects are explained
D. o ensure the duplication of essential code
View answer
Correct Answer: B
Question #114
Refer to the exhibit. A network engineer must change the configuration on devices daily. The Python script must collect CLI arguments from the user, organize data according to the Cisco-IOS-XE-native YANG model, and utilize Cisco REST APIs to make the configuration. Which workflow is being automated by the Python script?
A. pdating an existing route on the device
B. dding a new route to a device
C. ncluding a route on the device and overwriting the current routes
D. eleting the route that is passed through the command-line variables
View answer
Correct Answer: A
Question #115
Which platform is used to programmatically create a space and invite users for collaboration?
A. isco Intersight
B. isco Finesse
C. isco Webex
D. isco UCM
View answer
Correct Answer: C
Question #116
Refer to the exhibit. A developer wants to create a room named cisco through Webex API. The developer prepares the request by putting an API token inside the authorization header; however, the given HTTP call returns error code 400. How must the call parameters be changed to ensure a valid response?
A. eplace the team body parameter with the name body parameter
B. eplace cisco with a valid name for a team
C. hange the token in the header with the authorization token
D. hange the HTTP method of the call to PUT
View answer
Correct Answer: A
Question #117
Refer to the exhibit. Which line must be included in the Bash script for the Python code to succeed?
A. efine WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here
B. xport WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here
C. et WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here
D. EBEX_TEAMS_ACCESS_TOKEN=your_access_token_here
View answer
Correct Answer: B
Question #118
What is a capability of the NETCONF protocol?
A. llows Python scripts to be executed externally from a network device
B. ses JSON to encode data in its content layer
C. llows XML messages to be exchanged via the SSH protocol
D. xposes a web-based interface
View answer
Correct Answer: C
Question #119
Refer to the exhibit. A network engineer uses model-driven programmability to monitor and perform changes on the network. The network engineer decides to use the NETCONF RPC message to complete one of their tasks. What is accomplished by sending the RPC message?
A. he running-config of the device is returned
B. he name of each interface is reset to a default name
C. ll the YANG capabilities supported by the device are returned
D. list of interface names is returned
View answer
Correct Answer: D
Question #120
DRAG DROP (Drag and Drop is not supported)Drag and drop the code from the bottom onto the box where the code is missing in the Python script to complete a function to return all the clients on a network by using the Cisco Meraki Dashboard API. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #121
Refer to the exhibit. A developer creates a script to obtain a list of devices by using the Cisco DNA Center API. The remote server authorizes the request only if an authentication token is supplied in the headers. A function named get_auth_token() must retrieve a valid token by using HTTP Basic Authentication. Which code must be added to complete the get_auth_token() function?
A. esp = requests
B. esp = requests
C. esp = http
D. esp = http
View answer
Correct Answer: A
Question #122
DRAG DROP (Drag and Drop is not supported)Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request to find the Cisco DNA Center switch count. Not all options are used.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #123
Refer to the exhibit. A network engineer wants to use an API to update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which line of code needs to be placed in the snippet where the code is missing?
A. 'Content-Type': 'application/yang
Accept': 'application/yang. ata+xml'}
B. 'Content-Type': 'application/yang
Accept': 'application/yang. ata+yaml'}
C. 'Content-Type': 'application/restconf
Accept': 'application/ restconf. ata+json'}
D. 'Content-Type': 'application/yang
Accept': 'application/ restconf. ata+utf8'}
View answer
Correct Answer: A
Question #124
Refer to the exhibit. A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?
A. ompilation and configuration of the Cisco DevNet application so that it must be started manually
B. ompilation, installation, and configuration of the Cisco DevNet application so that it starts automatically
C. ompilation and installation of the Cisco DevNet application for an autonomous deployment model
D. nstallation and configuration of the Cisco DevNet application so that it starts manually
View answer
Correct Answer: B

View The Updated CCNA Exam Questions

SPOTO Provides 100% Real CCNA Exam Questions for You to Pass Your CCNA Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: