DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Dominate CCNA 200-901 Mock Tests & Study Materials, Cisco Certified DevNet Associate | SPOTO

Elevate your certification preparation with our extensive collection of CCNA 200-901 mock tests designed to help you excel in the CCNA CCNA 200-901 DEVASC exam. Our mock exams cover all essential topics including Software Development and Design, Understanding and Using APIs, and Cisco Platforms and Development. Access our exam materials to reinforce your understanding and enhance your exam practice. Utilize our exam simulator to simulate real exam conditions and familiarize yourself with the exam format. Whether you need sample questions, exam dumps, or exam answers, SPOTO provides comprehensive resources to support your exam preparation journey. With our tailored exam questions and answers, you'll be well-prepared to tackle the exam confidently and achieve your DevNet Associate certification goals.

Take other online exams

Question #1
A developer has created a new image to use in a Docker build and has added a tag for the image by using the command: $ docker tag 84fe411926287 local/app:0.4 Which command must be executed next to build the Docker image using the tag?
A. $ docker build -p local/app:0
B. $ docker run -t local/app:0
C. $ docker run -p local/app:0
D. $ docker build -t local/app:0
View answer
Correct Answer: C
Question #2
What is a benefit of test-driven development?
A. early customer involvement
B. increased code quality
C. faster releases that have minimal features
D. strict adherence to product requirements
View answer
Correct Answer: C
Question #3
Drag and drop the capabilities from the left onto the Cisco Network Management Platforms that support the capabilities on the right.
A. Mastered
B. Not Mastered
View answer
Correct Answer: D
Question #4
What is the difference between YAML and JSON data structure?
A. YAML uses spaces; JSON uses parentheses
B. YAML uses indentation; JSON uses brackets and braces
C. YAML uses brackets and braces; JSON uses indentation
D. YAML uses parentheses; JSON uses spaces
View answer
Correct Answer: D
Question #5
What is a principle of a code review process?
A. Changes are made after the code is submitted to source control
B. It must not prevent code from getting into production as quickly as possible
C. Naming standards must be consistent
D. A technical lead must sign off on the review
View answer
Correct Answer: C
Question #6
The output of the diff-u README.md-repo README.md command is shown. The original file was 165 lines long How many lines are in the edited copy of the file?
A. 162
B. 165
C. 172
D. 173
View answer
Correct Answer: D
Question #7
A developer is trying to retrieve data over a REST API. The API server responds with an HTTP client error response code. After investigating the response the developer realizes the realizes the response has a Retry-After header. What is the root cause of this error?
A. The REST service is unreachable at the time of the REST request
B. Too many requests were sent to the REST service in a given amount of time
C. An appliance limited the rate of requests to the transport layer
D. An appliance limited the rate of requests to the application layer
View answer
Correct Answer: C
Question #8
Which Cisco platform is used to manage data center infrastructure through third-party tools and system integrations?
A. Cisco DNA Center
B. Cisco UCS Manager
C. Cisco Intersight
D. Cisco UCS Director
View answer
Correct Answer: D
Question #9
Refer to the exhibit. Drag and drop the actions from the left that the contents of this Dockerfile accomplish onto the right. Not all options are used.
A. Mastered
B. Not Mastered
View answer
Correct Answer: A
Question #10
A company wants to accelerate the adoption of technologies that will simplify its operations. Staff have different skill levels and are looking for a single site to find easy-to-consume beginner, intermediate, and advanced multidomain use cases. Which site should be used?
A. DevNet Ecosystem Exchange
B. DevNet Automation Exchange
C. DevNet Creations
D. DevNet Support Forum
View answer
Correct Answer: CE
Question #11
Which API must an engineer use to change a netmask on a Cisco IOS XE device?
A. Meraki
B. RESTCONF/YANG
C. SD-WAN
D. DNAC
View answer
Correct Answer: C
Question #12
How are load balancers used in modern application deployment?
A. Allow traffic to continue as new compute units are brought up and old compute units are taken down
B. Allow http and https traffic to continue as old compute units are discontinued before new units are brought up
C. Turn off traffic and take down compute units, then update and bring the compute units back up
D. Bring up new compute units, test the compute units, and switch the traffic from old units to new units
View answer
Correct Answer: A
Question #13
How are operations on REST APIs performed as compared to RPC APIs?
A. In a REST API, operations are performed on an object (node) that is identified by a URL, but RPC APIs are operation-oriented
B. In a REST API, operations are performed on an external resource that is defined on the API, but the RCP APIs are resource-oriented
C. In a REST API, operations are performed on a platform that is identified by the URL, but RPC APIs are platform-oriented
D. In a REST API, operations are performed on an internal resource that is defined on the API, but RPC APIs are resource-oriented
View answer
Correct Answer: D
Question #14
What is a capability of the NETCONF protocol?
A. allows Python scripts to be executed externally from a network device
B. uses JSON to encode data in its content layer
C. allows XML messages to be exchanged via the SSH protocol
D. exposes a web-based interface
View answer
Correct Answer: C
Question #15
Drag and drop the code from the bottom onto the box where the code is missing to authenticate with the Cisco DNA Center REST API by using basic authentication. Then generate a token for later use. Not all options are used.
A. Mastered
B. Not Mastered
View answer
Correct Answer: D
Question #16
Which infrastructure automation method is shown?
A. Waterfall
B. CI/CD pipeline
C. Agile
D. Lean
View answer
Correct Answer: D
Question #17
A development team is creating an application used for contactless payments. The application must: Be web-based Capture and process the credit card information for a purchase. Which security action must the web application use to gather and process the private customer data?
A. Enable RATs to monitor the web application remotely
B. Disable botnets to eliminate risks
C. Disable TLS to increase the connection speed
D. Enable the encryption of network traffic
View answer
Correct Answer: B
Question #18
Which traffic is handled on the control plane?
A. BGP
B. SMB
C. NTP
D. NETCONF
View answer
Correct Answer: A
Question #19
Which function does the EXPOSE line perform when building an image from this Dockerfile?
A. Local port 8080 of the container that launched with this docker image is accessible from co-hosted containers and external clients
B. Local port 8080 is not reachable at all because no IP address is specified along with the EXPOSE command of the Dockerfile
C. Local port 8080 is accessible from other containers running on the same docker host as the container that launched with this docker image
D. Local port 8080 of the container that launched with this docker image is accessible to external clients
View answer
Correct Answer: BE
Question #20
An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer will use an Ansible playbook to configure devices through Cisco NX REST API. Before the code is run, which resource must be used to verify that the REST API requests work as expected?
A. Cisco Open NX-OS
B. Cisco NX-OS SDK
C. Cisco Learning Labs
D. Cisco Code Exchange for Nexus
View answer
Correct Answer: C
Question #21
Into which type of Python data structure should common data formats be parsed?
A. sequence
B. set
C. dictionary
D. list
View answer
Correct Answer: D
Question #22
Which advantage does the agile process offer compared to waterfall software development?
A. to view the full scope of end-to-end work
B. to have each phase end before the next begins
C. to fix any issues at the end of the development cycle
D. to add or update features with incremental delivery
View answer
Correct Answer: B
Question #23
A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?
A. cp
B. cp
C. cp
D. cp
View answer
Correct Answer: D
Question #24
What is the purpose of running tests before writing code in test-driven development?
A. to find unexpected failures in the tests
B. to demonstrate that the tests fail for expected reasons
C. to ensure that the tests pass
D. to provide proof of the work carried out
View answer
Correct Answer: A
Question #25
Before which process is code review performed when version control is used?
A. Branching code
B. Merge of code
C. Checkout of code
D. Committing code
View answer
Correct Answer: D
Question #26
Drag and drop the API characteristics from the left onto the categories on the right.
A. Mastered
B. Not Mastered
View answer
Correct Answer: A
Question #27
The script returns an output of 401. To use the supplied URL. an HTTP GET request must Be sent with an Authorization header. The header value is a BaseG4 encoded concatenation of the username and password. Which action must be taken to return an output of 200?
A. Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication
B. Modify the method from LOGIN to GET and supply the username ;password value as JSON payload
C. Verify that the username and password values imported from the configuration file ate still valid
D. Insert an Authorization header with the values username password from the supplied configuration file
View answer
Correct Answer: B
Question #28
Which OWASP threat takes advantage of a web application that the user has already authenticated to execute an attack?
A. phishing
B. DoS
C. brute force attack
D. CSRF
View answer
Correct Answer: A
Question #29
Which solution reduces costs from MPLS, improves application performance, and simplifies operations?
A. Cisco NSO
B. Cisco SD-WAN
C. Cisco ACI
D. Cisco DNA Center
View answer
Correct Answer: C
Question #30
What is a functionality of the Waterfall method as compared to the Agile method for software development?
A. Waterfall increases agility to implement faster while Agile promotes reliability
B. A phase begins after the previous phase has ended in Waterfall while Agile phases run in parallel
C. Customers get feedback during the process in Waterfall while they can see the result at the end in Agile
D. Requirements can be updated in Waterfall while in Agile it should be gathered in the beginning
View answer
Correct Answer: B
Question #31
What is used in JSON to represent a Python Tuple?
A. Object
B. Array
C. Dict
D. Collection
View answer
Correct Answer: A
Question #32
A developer is attempting to retrieve all the messages from a Cisco Webex space. The server responds by sending the first 1,000 messages. The developer must make additional requests to retrieve the rest of the messages. Which API constraint is described in this scenario?
A. payload limiting
B. throttling
C. pagination
D. rate limiting
View answer
Correct Answer: A
Question #33
A developer completed the creation of a script using Git. Before delivering it to the customer, the developer wants to be sure about all untracked files, without losing any information. Which command gathers this information?
A. git clean –n
B. git rm –f
C. git clean –r
D. git rm *
View answer
Correct Answer: A
Question #34
Refer to the exhibit. A developer must use a token to collect data from Cisco DNA Center API and prepares a Python script to send requests. Which line of code needs to be placed on the snippet where the code is missing to obtain a token from the Cisco DNA Center API?
A. token=BasicAuth(‘user’,‘password’))
B. auth=BasicAuth(‘user’,‘password’))
C. auth=HTTPBasicAuth(user,password))
D. token=HTTPBasicAuth(user,password))
View answer
Correct Answer: D
Question #35
Which platform is used to programmatically create a space and invite users for collaboration?
A. Cisco Intersight
B. Cisco Finesse
C. Cisco Webex
D. Cisco UCM
View answer
Correct Answer: D
Question #36
Which tool provides a testing environment to run tests on network devices and perform network automation scenarios?
A. Visual Studio Code
B. Cisco VIRL
C. pyATS
D. Cisco Packet Tracer
View answer
Correct Answer: A
Question #37
In test-driven development, what are two of the green bar patterns? (Choose two.)
A. another test
B. break
C. triangulate
D. starter test
E. fake it
View answer
Correct Answer: B
Question #38
What is a benefit of a CI/CD pipeline for infrastructure?
A. removes manual errors
B. enables manual steps
C. removes the need for operations
D. provides variety for deployments
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: