200-901: DevNet Associate (DEVASC) Part 2
Question #: 61
Topic #: 1
DRAG DROP –
Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.
Select and Place:
Suggestion Answer:
Question #: 62
Topic #: 1
Which method should be used to safely store the API keys?
A. in an environment variable unique to the system database
B. encrypted in a configuration file that is separate from the code
C. plain text in the code as a constant
D. encrypted in the code in a function
Selected Answer: A
Question #: 63
Topic #: 1
Refer to the exhibit.
An administrator attempts to perform a GET using the Cisco IOS XE RESTCONF API to return the hostname of a device. The sequence diagram illustrates the
HTTP messages observed. Which change to the API request resolves the issue?
A. Remove the ג€”H ‘Accept: application/yang-data+json’ HTTP header because it is not required.
B. Add ג€”‘u cisco:cisco’ in the end of the cURL command
C. Change the request method from ג€”X ג€GETג€ to ג€”X ג€POSTג€
D. Add Content-Type HTTP header with ‘application/yang-data+json’ using ג€”H ‘Content-Type: application/yang-data+json’
Selected Answer: D
Question #: 64
Topic #: 1
What are two benefits of managing network configuration via APIs? (Choose two.)
A. more security due to locking out manual device configuration
B. configuration on devices becomes less complex
C. eliminates the need of legacy management protocols like SNMP
D. reduction in network changes performed manually
E. increased scalability and consistency of network changes
Selected Answer: DE
Question #: 65
Topic #: 1
Which Cisco DevNet resource allows access to products in a development lab to explore, learn, and build applications that use Cisco APIs?
A. DevNet Code Exchange
B. DevNet Sandbox
C. DevNet Communities
D. DevNet Automation Exchange
Selected Answer: B
Question #: 66
Topic #: 1
Refer to the exhibits.
A developer is troubleshooting an API with the given API documentation and cURL command. What is the cause of this problem?
A. The authorization header is missing or incomplete.
B. The request body is missing or incomplete.
C. The API token specified is expired.
D. The user is not allowed to post messages from their account.
Selected Answer: A
Question #: 67
Topic #: 1
Which two statements describe the traits of an asynchronous API call? (Choose two.)
A. Code execution blocks or waits for the call to an API to return.
B. A callback function typically is used to process the response from an API call.
C. A call to an API does not block the code, but rather it allows application processing to continue.
D. The end user can experience latency or performance lag while waiting for the API call to return.
E. The order in which API calls return can be guaranteed.
Selected Answer: BC
Question #: 68
Topic #: 1
Which mechanism is used to consume a RESTful API design when large amounts of data are returned?
A. data sets
B. scrolling
C. pagination
D. blobs
Selected Answer: C
Question #: 69
Topic #: 1
Refer to the exhibit.
What caused the error in this API request?
A. The API resource does not support the POST operation.
B. The submitted JSON payload has a formatting issue.
C. The API resource does not support JSON format payloads.
D. The submitted JSON payload includes a field that is not supported by the API resource.
Selected Answer: B
Question #: 70
Topic #: 1
Which two use cases are supported by Meraki APIs? (Choose two.)
A. Build location-aware apps from Wi-Fi and LoRaWAN devices.
B. Build a custom Captive Portal for Mobile Apps.
C. Configure network devices via the Dashboard API.
D. Deploy applications onto the devices.
E. Retrieve live streams from a Meraki Camera.
Selected Answer: CE
Question #: 71
Topic #: 1
Which API is used to obtain data about voicemail ports?
A. Webex Teams
B. Cisco Unified Communications Manager
C. Finesse Gadgets
D. Webex Devices
Selected Answer: B
Question #: 72
Topic #: 1
DRAG DROP –
Refer to the exhibit. A developer needs to automatically retrieve all of the messages of a Webex room with the roomId of
`Y2lzY29zcGFyazovL3Vz397468502YjU5NjAtNTk0Zi0xMWVhLTk0Mj`. Using the Webex API documentation shown, drag and drop the code snippets from below onto the code to complete the Python script to list all of the messages in the room. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 73
Topic #: 1
What is a difference between a synchronous API and an asynchronous API?
A. Synchronous API calls require an authentication header to be sent while asynchronous calls do not require authentication.
B. Synchronous API calls are returned immediately while asynchronous calls do not guarantee an immediate response.
C. An asynchronous API can make offline calls while synchronous APIs do not have this capability.
D. An asynchronous API can make a larger number of calls in a specified time period than a synchronous API.
Selected Answer: B
Question #: 74
Topic #: 1
DRAG DROP –
Refer to the exhibit. Drag and drop the code from the bottom onto the blanks in the code to construct a cURL command using the Cisco DNA Center API, which will provide the details of a WLAN controller with Id ab123456789. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 75
Topic #: 1
Refer to the exhibit. A network engineer must manage the network devices. The engineer prepares a Python script to authenticate to the Cisco DNA Center API and request a device list. The device request fails and returns error code 401. Which action solves the problem?
A. Update the credentials that are already supplied and retry the request.
B. Send the request to another network in case there are reachability issues.
C. Send the Authentication header in the request with a valid configuration.
D. Update the API URL, which matched the API endpoint for device list.
Selected Answer: C
Question #: 76
Topic #: 1
Refer to the exhibit. Which command needs to be placed on the box where the code is missing to output the value of page_id in the Python 3.7 script?
A. print(items.get(‘items’)[0].get(‘page_id’))
B. print(items.get(‘items’).get(‘page_id’))
C. print(items[‘items’][‘page_id’].keys())
D. print(items[‘items’][‘page_id’])
Selected Answer: A
Question #: 77
Topic #: 1
Refer to the exhibit. A developer creates a Python script that queries Cisco Webex. When the script is executed, a 401 code is returned. After troubleshooting, the developer discovers that the service is missing privileges. Which change to the header in line 4 of the script results in the code 200?
A. header = {ג€Authenticationג€: ג€Bearer YOUR_TOKENג€}
B. header = {ג€Authentication Bearerג€ : ג€YOUR_TOKENג€
C. header = {ג€Authorization Bearerג€ : ג€YOUR_TOKENג€}
D. header = {ג€Authorizationג€ : ג€Bearer YOUR_TOKENג€}
Selected Answer: D
Question #: 78
Topic #: 1
DRAG DROP –
Drag and drop the HTTP methods from the left onto their generally accepted corresponding create, read, update, and delete operations on the right.
Select and Place:
Suggestion Answer:
Question #: 79
Topic #: 1
DRAG DROP –
Refer to the exhibit.
Drag and drop the code from the left onto the item numbers on the right to complete the Meraki code to obtain a list of clients which have used this network.
Select and Place:
Suggestion Answer:
Question #: 80
Topic #: 1
In Python, which expression checks whether the script returns a success status code when the Requests library is used?
A. response.status_code == requests.codes.ok
B. response.code == requests.codes.ok
C. response.status_code == requests.ok
D. response.status_code != requests.codes.ok
Selected Answer: A
Question #: 81
Topic #: 1
Refer to the exhibit. The script returns an output of 401. To use the supplied URL, an HTTP GET request must be sent with an Authorization header. The header value is a base64 encoded concatenation of the username and password. Which action must be taken to return an output of 200?
A. Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication.
B. Verify that the username and password values imported from the configuration file are still valid.
C. Insert an Authorization header with the values username:password from the supplied configuration file.
D. Modify the method from LOGIN to GET and supply the username:password value as JSON payload.
Selected Answer: D
Question #: 82
Topic #: 1
Refer to the exhibit. A Python code has been written to query a device. The executed code results in the error shown. Which action resolves the problem?
A. import json
B. requests(ג€GETג€, base_url + request_url, cookies=cookies)
C. pip install requests
D. import requests
Selected Answer: D
Question #: 83
Topic #: 1
Which REST architectural constraint indicates that no client context should be stored on the server between requests?
A. cacheable
B. stateless
C. uniform interface
D. client-server
Selected Answer: B
Question #: 84
Topic #: 1
Which HTTP code group is issued when a request is received successfully, understood, and processed?
A. 2xx
B. 3xx
C. 4xx
D. 5xx
Selected Answer: A
Question #: 85
Topic #: 1
A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?
A. Communication between the application and the services is not encrypted.
B. The database credentials should be stored in the configuration files so that they are secured on the same server.
C. The API keys are stored in the configuration files but should be stored in the vault service.
D. The synchronization logs should be encrypted and not stored in a relational database.
Selected Answer: C
Question #: 86
Topic #: 1
Refer to the exhibit. An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the ‘get_all_interfaces’ API call is used?
A. times out
B. rate limit
C. pagination
D. invalid password
Selected Answer: C
Question #: 87
Topic #: 1
DRAG DROP –
Drag and drop the code snippets from the bottom into the Python script to write API output to a csv file. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 88
Topic #: 1
DRAG DROP –
Drag and drop the code snippets from the bottom to the blanks in the code to test the API response through the Python unittest library. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 89
Topic #: 1
DRAG DROP –
Refer to the exhibit. A developer is creating a Python script to obtain a list of HTTP servers on a network named office_east by using the Cisco Meraki API. The request has these requirements:
* Must time out if the response is not received within 2 seconds.
* Must utilize client certificates and SSL certificate verification.
* Must utilize basic authentication that uses a username of admin and a password of cisco.
* Must save the response to an object named response.
Drag and drop the code snippets from the bottom onto the blanks in the code to meet the requirements. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 90
Topic #: 1
DRAG DROP –
Drag and drop the code snippets from the bottom to the blanks in the code to complete the HTTP response. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 91
Topic #: 1
Refer to the exhibit. A collaboration engineer has developed a script to automate the gathering of information by providing the email address of the individual.
When the engineer tests the script, a 401 error is received. Which command fixes the script?
A. Add ג€Authorizationג€: ג€Bearer ג€ to the headers.
B. Add ג€Authenticationג€: ג€Basic ג€ in the base_url after ג€https://ג€.
C. Add ג€:@ג€ in the base_url after ג€https://ג€.
D. Add ג€Authenticationג€: ג€Bearer ג€ to the headers.
Selected Answer: A
Question #: 92
Topic #: 1
A developer is attempting to retrieve all the messages from a Cisco Webex space. The server responds by sending the first 1,000 messages. The developer must make additional requests to retrieve the rest of the messages. Which API constraint is described in this scenario?
A. payload limiting
B. throttling
C. pagination
D. rate limiting
Selected Answer: C
Question #: 93
Topic #: 1
Refer to the exhibit. A developer just finished testing a Python script and wants to save the list of packages and versions installed on the current machine. The developer must make sure that it will not cause any issues if tested on another device due to different library versions. Which line of code needs to be placed on the snippet where the code is missing?
A. pip freeze 2> requirements.txt
B. pip freeze > requirements.txt
C. pip freeze => requirements.txt
D. pip freeze | requirements.txt
Selected Answer: B
Question #: 94
Topic #: 1
A developer pushes an application to production. The application receives a webhook over HTTPS without a secret. The webhook information contains credentials to service in cleartext. When the information is received, it is stored in the database with an SHA-256 hash. Credentials to the database are accessed at runtime through the use of a vault service. While troubleshooting, the developer sets the logging to debug to view the message from the webhook. What is the security issue in this scenario?
A. Database credentials should be accessed by using environment variables defined at runtime.
B. During the transport of webhook messages, the credentials could be unencrypted and leaked.
C. During logging, debugging should be disabled for the webhook message.
D. Hashing the credentials in the database is not secure enough; the credentials should be encrypted.
Selected Answer: C
Question #: 95
Topic #: 1
Refer to the exhibit. A developer cannot reach the web application behind an NGINX load balancer. The developer sends a request to an application FQDN with cURL but gets an HTTP 502 response. Which action solves the problem?
A. Fix errors in the server configuration, which is behind the load balancer.
B. Bring up the load balancer to the active state.
C. Fix errors in the cURL request sent by the client.
D. Change the default gateway on the load balancer to an active one.
Selected Answer: A
Question #: 96
Topic #: 1
Refer to the exhibit. A network engineer wants use API update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which value is suitable as the headers variable?
A. {‘Content-Type’: ‘application/yang.data+yaml’, ‘Accept’: ‘application/yang.data+yaml’}
B. {‘Content-Type’: ‘application/yang.data+json’, ‘Accept’: ‘application/yang.data+json’}
C. {‘Content-Type’: ‘application/yang.data+utf8l’, ‘Accept’: ‘application/yang.data+utf8’}
D. {‘Content-Type’: ‘application/restconf.data+txt’, ‘Accept’: ‘application/restconf.data+txt’}
Selected Answer: B
Question #: 97
Topic #: 1
Which action do webhooks enable an application to perform?
A. Increase the request rate limit.
B. Populate the application with restricted data.
C. Receive real-time data.
D. Implement a push model.
Selected Answer: C
Question #: 98
Topic #: 1
Refer to the exhibit. A developer can access the TLS REST API on server A, but cannot access the API on server B. The developer can ping server B. When the developer performs a packet capture on the TLS REST API port on server B, the capture shows that the packet arrived and the server responded. What causes the issue?
A. Port 80 is blocked on the outgoing interface of firewall B.
B. Port 443 is blocked on the outgoing interface of firewall A.
C. Port 443 is blocked on the incoming interface of firewall B.
D. Port 80 is blocked on the incoming interface of firewall A.
Selected Answer: C
Question #: 99
Topic #: 1
DRAG DROP –
Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 100
Topic #: 1
DRAG DROP –
Drag and drop the API characteristics from the left onto the categories on the right.
Select and Place:
Suggestion Answer:
Question #: 101
Topic #: 1
How are operations on REST APIs performed as compared to RPC APIs?
A. In a REST API, operations are performed on an object (node) that is identified by a URL, but RPC APIs are operation-oriented.
B. In a REST API, operations are performed on an external resource that is defined on the API, but the RCP APIs are resource-oriented.
C. In a REST API, operations are performed on a platform that is identified by the URL, but RPC APIs are platform-oriented.
D. In a REST API, operations are performed on an internal resource that is defined on the API, but RPC APIs are resource-oriented.
Selected Answer: A
Question #: 102
Topic #: 1
Which HTTP error code series relates to redirection?
A. 400
B. 500
C. 200
D. 300
Selected Answer: D
Question #: 103
Topic #: 1
Which platform has an API that can be used to obtain a list of vulnerable software on user devices?
A. Cisco Umbrella
B. Cisco Firepower
C. Cisco Identity Services Engine
D. Cisco Advanced Malware Protection
Selected Answer: D
Question #: 104
Topic #: 1
Which two items are Cisco DevNet resources? (Choose two.)
A. TAC Support
B. Software Research
C. API Documentation
D. Bitbucket
E. Sandbox
Selected Answer: CE
Question #: 105
Topic #: 1
While developing a real-time VoIP application on a Cisco Webex platform, users report that their voice gets chopped or parts of the conversation drop out. Which network constraint is impacting the application?
A. jitter
B. capacity
C. delay
D. latency
Selected Answer: B
Question #: 106
Topic #: 1
A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without error and the log bundles are produced.
However, when the script is run during business hours, people report poor voice quality of phone calls. What explains this behavior?
A. The script is written in a low-level programming language where there is no memory safety. This causes a buffer overflow and disruption on the network.
B. The speed and duplex settings in Cisco DNA Center are set incorrectly, which causes the transfer to be too slow.
C. The script is running in the Voice VLAN and causes delays and jitter in the subnet.
D. Generating the logs causes the CPU on the network controller to spike, which causes delays in forwarding the voice IP packets.
Selected Answer: C
Question #: 107
Topic #: 1
DRAG DROP –
Drag and drop the requests from the left into the order on the right to create and check the path trace between two devices using Cisco DNA center API.
Select and Place:
Suggestion Answer:
Question #: 108
Topic #: 1
DRAG DROP –
Refer to the exhibit. A Python script must delete all Cisco Catalyst 9300 Series switches that have an uptime that is greater than 90 days. The script must also query for the status of all the other devices. Drag and drop the code from the bottom onto the box where the code is missing to complete the script. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 109
Topic #: 1
Refer to the exhibits.
The Python interpreter and the Cisco Python SDK are available by default in the Cisco NX-OS Software. The SDK documentation shows how the clid() API can be used when working with JSON and XML. What are two effects of running the script? (Choose two.)
A. configure interface loopback 5
B. show details for the TABLE interface
C. issue shutdown on interface loopback 5
D. show only the interfaces in the up status
E. show only the interfaces in admin shut status
Selected Answer: AD
Question #: 110
Topic #: 1
DRAG DROP –
Drag and drop the element of the Finesse API on the left onto its functionality on the right.
Select and Place:
Suggestion Answer:
Question #: 111
Topic #: 1
What are two key capabilities of Cisco Finesse? (Choose two.)
A. Agents access Finesse from a browser without needing to install or configure anything on the client machine.
B. An OpenDNS utility is preconfigured and ready to use on Finesse.
C. Gadget containers provide a seamless experience in a single user interface.
D. Finesse automatically collects telemetry data.
E. Finesse includes an RPC API that enables the development of custom gadgets.
Selected Answer: AC
Question #: 112
Topic #: 1
Which two statements are true about Cisco UCS Manager, Cisco UCS Director, or Cisco Intersight APIs? (Choose two.)
A. UCS Manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the HTTP header for authentication.
B. UCS Director API interactions can be XML- or JSON-encoded and require an API key in the HTTP header for authentication.
C. Cisco Intersight uses XML to encode API interactions and requires an API key pair for authentication.
D. UCS Manager API interactions are XML-encoded and require a cookie in the method for authentication.
E. Cisco Intersight API interactions can be encoded in XML or JSON and require an API key in the HTTP header for authentication.
Selected Answer: BD
Question #: 113
Topic #: 1
DRAG DROP –
Drag and drop the capability on the left onto the Cisco compute management platform that supports the capability on the right.
Select and Place:
Suggestion Answer:
Question #: 114
Topic #: 1
Which model-driven programmability protocol does Cisco IOS XE Software support?
A. gNMI
B. SOAP
C. SSH
D. CORBA
Selected Answer: A
Question #: 115
Topic #: 1
Which operation is performed with YANG model-driven programmability in NX-OS?
A. configure a device with native and OpenConfig-based models
B. bootstrap a device that has a factory-default configuration
C. send CLI commands to a device and retrieve output in JSON format
D. run Linux commands natively on the device
Selected Answer: A
Question #: 116
Topic #: 1
What are two benefits of model-driven programmability? (Choose two.)
A. easier to design, deploy, and manage APIs
B. single choice of transport, protocol, and encoding
C. models decoupled from transport, protocol, and encoding
D. model-based, structured, and human friendly
E. model-driven APIs for abstraction and simplification
Selected Answer: CE
Question #: 117
Topic #: 1
What is a benefit of model-driven programmability?
A. It provides a programmatic and standards-based way of writing configurations to any network device.
B. By modeling data, it ensures that vast quantities of data are usable for monitoring.
C. It simplifies management and operations by decoupling the networking hardware from its control mechanism.
D. It addresses the static architecture of traditional networks being decentralized and complex.
Selected Answer: A
Question #: 118
Topic #: 1
Which type of HTTP method is used by the Meraki and Webex Teams APIs to send webhook notifications?
A. HTTP POST
B. HTTP GET
C. HTTP HEAD
D. HTTP PUT
Selected Answer: D
Question #: 119
Topic #: 1
Refer to the exhibit. The Cisco Meraki API manages two organizations. In each organization, two independent networks are defined. How many calls to the / organizations/{orgId}/networks endpoint will be run parallel by the GetAllNetworks function of the API client?
A. 0
B. 1
C. 2
D. 4
Selected Answer: C
Question #: 120
Topic #: 1
Refer to the exhibit.
The definition of the YANG module and a RESTCONF query sent to a Cisco IOS XE device is shown. Why does the RESTCONF interface respond with a 204 status code?
A. The query retrieved the logging severity level.
B. The query updated the logging severity level or created it if not present on the device.
C. The query failed at retrieving the logging severity level.
D. The query failed to set the logging severity level due to an invalid path.
Selected Answer: B