200-901: DevNet Associate (DEVASC) Part 4
Question #: 181
Topic #: 1
Which CI/CD tool is an automation tool used to build, test, and deploy software?
A. Git
B. Gradle
C. Nagios
D. Jenkins
Selected Answer: D
Question #: 182
Topic #: 1
An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device must be at fault?
A. load balancer
B. laptop on which the script is running
C. switch
D. router
Selected Answer: A
Question #: 183
Topic #: 1
What are two advantages of YANG-based approaches for infrastructure automation? (Choose two.)
A. multi-platform vendor abstraction
B. compiles to executables that run on network devices
C. designed to reflect networking concepts
D. directly maps to JavaScript
E. command line driven interface
Selected Answer: AC
Question #: 184
Topic #: 1
Refer to the exhibit.
Which infrastructure automation method is shown?
A. CI/CD pipeline
B. Lean
C. Agile
D. Waterfall
Selected Answer: A
Question #: 185
Topic #: 1
Refer to the exhibit. An engineer must configure a load balancer server. The engineer prepares a script to automate workflow by using Bash. The script installs the nginx package, moves to the /opt/nginx directory, and reads the sites.txt file for further processing. Based on the script workflow, which process is being automated within the loop by using the information in sites.txt?
A. creating a file per each line in sites.txt with the information in template.conf, creating a link for the previously created file, and then changing the ownership of the created files
B. using the content of the file to create the template.conf file, creating a link from the created file to the /etc/nginx/sites_enabled, and then changing the file execution permissions
C. creating a new file based on template.conf in the /etc/nginx/sites_enabled directory for each line in the sites.txt file, and then changing the file execution permissions
D. using the information in the file to create a set of empty files in the /etc/nginx/sites_enabled directory, and then assigning the owner of the file
Selected Answer: A
Question #: 186
Topic #: 1
Refer to the exhibit. A network engineer must collect information from the network. The engineer prepares a script to automate workflow by using Cisco Meraki
API. The script must run over nested loops to collect organization and network information and uses the collected data for final collection. Which process is being automated by using the Python script?
A. Collect the IDs of the clients on the BLDG21 network.
B. List the IDs from the ACME organization.
C. Provide the BLDG21 network information if it is part of the ACME organization.
D. Gather the IDs of the ACME organization, the BLDG21 network, and the clients on the network.
Selected Answer: B
Question #: 187
Topic #: 1
Refer to the exhibit.
What is the function of the Python script?
A. Loop through the returned list of network devices and, for each device, print the device name and management IP address.
B. Count and print the total number of available devices.
C. For each device that is returned, display the device type and associated management IP address.
D. Iterate over a list of network devices and write all device names and management IP addresses to an output file.
Selected Answer: A
Question #: 188
Topic #: 1
Refer to the exhibit. The output of the diff -u README.md-repo README.md command is shown. The original file was 165 lines long. How many lines are in the edited copy of the file?
A. 162
B. 165
C. 172
D. 173
Selected Answer: C
Question #: 189
Topic #: 1
Which line is an example of the start of a chunk from a unified diff?
A. @@ -20191007T1200 +88,90 @@
B. @@ -88,10 +88,6 @@
C. @@ -90,88 +20191008T1349 @@
D. @@ -20191007T1200 +20191008T1349 @@
Selected Answer: B
Question #: 190
Topic #: 1
DRAG DROP –
Drag and drop elements of the RESTCONF Protocol stack from the left onto the correct descriptors on the right. Not all elements on the left are used.
Select and Place:
Suggestion Answer:
Question #: 191
Topic #: 1
Which two NETCONF operations cover the RESTCONF GET operation? (Choose two.)
A.
B.
C.
D.
E.
Selected Answer: AB
Question #: 192
Topic #: 1
Refer to the exhibit.
What is the result of executing this Ansible playbook?
A. The playbook copies a new start-up configuration to CISCO_ROUTER_01
B. The playbook copies a new running configuration to CISCO_ROUTER_01
C. The playbook backs up the running configuration of CISCO_ROUTER_01
D. The playbook backs up the start-up configuration of CISCO_ROUTER_01
Selected Answer: C
Question #: 193
Topic #: 1
Refer to the exhibit.
Which two statements describe the configuration of the switch after the Ansible script is run? (Choose two.)
A. Traffic from ports 0/2 to 0/5 is able to flow on port 0/1 due to the trunk.
B. GigabitEthernet0/1 is left unconfigured.
C. GigabitEthernet0/2 and GigabitEthernet0/3 are access ports for VLAN 6.
D. Traffic is able to flow between ports 0/2 to 0/5 due to the trunk on port 0/1.
E. Traffic on ports 0/2 and 0/3 is connected to port 0/6.
Selected Answer: AC
Question #: 194
Topic #: 1
Refer to the exhibit.
What is the effect of this Ansible playbook on an IOS router?
A. A new running configuration is pushed to the IOS router.
B. The start-up configuration of the IOS router is copied to a local folder.
C. The current running configuration of the IOS router is backed up.
D. A new start-up configuration is copied to the IOS router.
Selected Answer: C
Question #: 195
Topic #: 1
Which configuration management tool has an agentless capability?
A. Puppet
B. CFEngine
C. Ansible
D. Chef
Selected Answer: C
Question #: 196
Topic #: 1
Which toot allows changes to the configuration management toolset to be tested?
A. pyATS
B. NAPALM
C. Cisco VIRL
D. Ansible
Selected Answer: C
Question #: 197
Topic #: 1
Refer to the exhibit. A developer must integrate a bot with an internal communication app. The developer wants to replace the webexbot package with the teamsbot package by using Ansible and prepares a playbook. In the first two tasks, the playbook stops the webexbot and verifies that the teamsbot is installed.
What is accomplished in the last task of the workflow when the developer runs the Ansible playbook?
A. uninstalls the webexbot package and removes its configuration files
B. installs the webexbot and retains the configuration files
C. stops the webexbot service and uninstall it and retains its configuration files
D. searches whether the purge package is available in the repository and uninstalls the webexbot package
Selected Answer: A
Question #: 198
Topic #: 1
DRAG DROP –
Drag and drop the types of management from the left onto the levels at which they are performed on the right.
Select and Place:
Suggestion Answer:
Question #: 199
Topic #: 1
What is an advantage of using network programmability?
A. Manual configuration is faster.
B. No cloud abstraction occurs.
C. It removes CLI access for devices.
D. It provides for more scalable and replicable network provisioning.
Selected Answer: D
Question #: 200
Topic #: 1
What is a capability of an agentless configuration management system?
A. It requires managed hosts to have an interpreter for a high-level language such as Python or Ruby.
B. It requires managed hosts to connect to a centralized host to receive updated configurations.
C. It uses compiled languages as the basis of the domain-specific language to interface with managed hosts.
D. It uses existing protocols to interface with the managed host.
Selected Answer: D
Question #: 201
Topic #: 1
Refer to the exhibit. A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?
A. enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)
B. enable_function(‘iana-if-type:softwareLoopback’, Loopback1, true,)
C. def enable_function(‘iana-if-type:softwareLoopback’, Loopback1, false,)
D. def enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)
Selected Answer: A
Question #: 202
Topic #: 1
An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code, which resource must be used to verify that the code works correctly?
A. Cisco NX-OS SDK
B. Cisco Learning Labs
C. Cisco Code Exchange
D. Cisco Modeling Labs
Selected Answer: D
Question #: 203
Topic #: 1
A new application is being developed with specific platform requirements. The platform and application deployment and the ongoing platform management must be fully automated. The application includes a large database component that has significant disk I/O requirements. Which application deployment type meets the requirements?
A. Python virtual environment
B. virtual machine
C. bare metal
D. container
Selected Answer: C
Question #: 204
Topic #: 1
Refer to the exhibit. A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?
A. verifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages
B. verifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version
C. uninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version
D. installing nginx, uninstalling apache2, and then verifying that the package repository is at the latest version
Selected Answer: C
Question #: 205
Topic #: 1
Refer to the exhibit. An engineer must check the admin rights of users on a database regularly and prepares the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?
A. They must be stored in configuration files if there is a possibility of leakage.
B. They must be Base64-encoded if stored in the user database.
C. They must be encrypted if stored in the user database.
D. They must be stored in configuration files if no authentication will be used.
Selected Answer: C
Question #: 206
Topic #: 1
Refer to the exhibit. A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with
‘platformId’ ‘C9540-x’ and then send commands to be executed. Which process is automated by the Python script?
A. results gathering of the show version and show ip int brief commands
B. output of show ip int brief command on devices of type C9500-40X
C. execution information of the show version and show ip int brief commands
D. list of executed commands on C9500-40X and the information of show ip int brief command
Selected Answer: B
Question #: 207
Topic #: 1
Refer to the exhibit. Which two files are being edited in the unified diff? (Choose two.)
A. README.md
B. setup.py
C. axl.py
D. ciscoaxl.py
E. index.py
Selected Answer: BC
Question #: 208
Topic #: 1
DRAG DROP –
Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 209
Topic #: 1
Refer to the exhibit. What do all the calls shown in the sequence diagram have in common?
A. All the calls are optional.
B. All the calls are asynchronous.
C. All the calls are synchronous.
D. All the calls depend on the catalog.
Selected Answer: B
Question #: 210
Topic #: 1
Refer to the exhibit. What are two characteristics of the NETCONF response? (Choose two.)
A. ospf is defined by the ietf-ospf module.
B. ietf-ospf imports ietf-routing.
C. redistribution is a module of type cisco-ospf.
D. routing protocols is a list.
E. The main module is routing.
Selected Answer: AB
Question #: 211
Topic #: 1
A business needs to create a simulated environment that mimics a production infrastructure to make changes to the OSPF process and analyze the impact. What should be used?
A. Cisco VIRL / Cisco CML
B. Cisco DevNet Sandbox labs
C. pyATS
D. Puppet
Selected Answer: A
Question #: 212
Topic #: 1
What is a benefit of a CI/CD pipeline for infrastructure?
A. removes manual errors
B. enables manual steps
C. removes the need for operations
D. provides variety for deployments
Selected Answer: A
Question #: 213
Topic #: 1
During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?
A. integration
B. deployment
C. development
D. testing
Selected Answer: A
Question #: 214
Topic #: 1
Refer to the exhibit. Which workflow does the script automate?
A. retrieves a media server that is being monitored
B. updates a media server that is being monitored
C. adds a media server to be monitored
D. deletes a media server that is being monitored
Selected Answer: C
Question #: 215
Topic #: 1
Which description of a default gateway is true?
A. It is a security feature that denies certain traffic.
B. It is a device that receives IP packets that have no explicit next-hop in the routing table.
C. It is a feature that translates between public and private addresses.
D. It is a device that receives Layer 2 frames with an unknown destination address.
Selected Answer: B
Question #: 216
Topic #: 1
On which port does NETCONF operate by default?
A. 23
B. 443
C. 822
D. 830
Selected Answer: D
Question #: 217
Topic #: 1
Which device is a system that monitors and controls incoming and outgoing network traffic based on predetermined security roles?
A. router
B. switch
C. load balancer
D. firewall
Selected Answer: D
Question #: 218
Topic #: 1
In DNS, which record specifies an alias that refers to another name that ultimately resolves to an IP address?
A. CNAME
B. NS
C. AAA
D. SOA
Selected Answer: A
Question #: 219
Topic #: 1
DRAG DROP –
Drag and drop the network component names from the left onto the correct descriptions on the right. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 220
Topic #: 1
Which two types of NAT are used in a network? (Choose two.)
A. routed NAT
B. static NAT
C. multicast NAT
D. normal NAT
E. dynamic NAT
Selected Answer: BE
Question #: 221
Topic #: 1
What is the purpose of a MAC address?
A. to uniquely identify a switch in a LAN
B. to uniquely identify a router in a LAN
C. to uniquely identify a network interface in a LAN
D. to uniquely identify a device on the Internet
Selected Answer: C
Question #: 222
Topic #: 1
Refer to the exhibit.
Which two statements about the network diagram are true? (Choose two.)
A. The subnet address of PC-B has 18 bits dedicated to the network portion.
B. One of the routers has two connected serial interfaces.
C. R1 and R3 are in the same subnet.
D. PC-A and PC-B are in the same subnet.
E. The subnet of PC-C can contain 256 hosts.
Selected Answer: BD
Question #: 223
Topic #: 1
DRAG DROP –
Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 224
Topic #: 1
Which detail is included in a routing table?
A. broadcast address
B. TCP or UDP port number
C. IP protocol
D. destination next hop or outgoing interface
Selected Answer: D
Question #: 225
Topic #: 1
What is an example of a network interface hardware address?
A. workstation name
B. IP address
C. domain name
D. MAC address
Selected Answer: D
Question #: 226
Topic #: 1
DRAG DROP –
Drag and drop the functionalities from the left onto the correct networking devices on the right.
Select and Place:
Suggestion Answer:
Question #: 227
Topic #: 1
On which network plane is routing protocol traffic handled?
A. management plane
B. data plane
C. authentication plane
D. control plane
Selected Answer: D
Question #: 228
Topic #: 1
Which device is used to transport traffic from one broadcast domain to another broadcast domain?
A. layer 2 switch
B. proxy server
C. router
D. load balancer
Selected Answer: C
Question #: 229
Topic #: 1
Which service provides a directory lookup for IP addresses and host names?
A. DNS
B. NAT
C. SNMP
D. DHCP
Selected Answer: A
Question #: 230
Topic #: 1
Users cannot access a webserver and after the traffic is captured, the capture tool shows an ICMP packet that reports “time exceeded in-transit”. What is the cause of this webserver access issue?
A. A router along the path has the wrong time.
B. A router along the path is misrouting the packets in a wrong direction.
C. The server is too loaded and the connection could not be handled in time.
D. The server is too far away and the packets require too much time to reach it.
Selected Answer: B
Question #: 231
Topic #: 1
What is used in Layer 2 switches to direct packet transmission to the intended recipient?
A. MAC address
B. IPv6 address
C. spanning tree
D. IPv4 address
Selected Answer: A
Question #: 232
Topic #: 1
What is the purpose of a firewall in application deployment?
A. adds TLS support to an application that does not support it natively
B. limits traffic to only ports required by the application
C. provides translation for an application’s hostname to its IP address
D. forwards traffic to a pool of instances of the application
Selected Answer: B
Question #: 233
Topic #: 1
A small company has 5 servers and 50 clients. What are two reasons an engineer should split this network into separate client and server subnets? (Choose two.)
A. Subnets will split domains to limit failures.
B. A router will limit the traffic types between the clients and servers.
C. Subnets provide more IP address space for clients and servers.
D. A router will bridge the traffic between clients and servers.
E. Internet access to the servers will be denied on the router.
Selected Answer: AB
Question #: 234
Topic #: 1
What is the function of an IP address in networking?
A. represents a network connection on specific devices
B. specifies the type of traffic that is allowed to roam on a network
C. specifies resource’s location and the mechanism to retrieve it
D. represents the unique ID that is assigned to one host on a network
Selected Answer: D
Question #: 235
Topic #: 1
Where is an IP packet routed if the packet does not match any routes in the routing table?
A. firewall
B. load balancer
C. central switch
D. default gateway
Selected Answer: D
Question #: 236
Topic #: 1
Which two query types does a client make to a DNS server? (Choose two.)
A. Inverse
B. PTR
C. AAAA
D. ACK
E. DISCOVER
Selected Answer: BC
Question #: 237
Topic #: 1
What are two functions of a routing table on a network device? (Choose two.)
A. It lists the routes to drop traffic.
B. It lists the routes to a particular destination.
C. It lists the static and dynamic entries.
D. It lists hosts that are one hop away.
E. It lists entries more than two hops away.
Selected Answer: AB
Question #: 238
Topic #: 1
What does a load balancer distribute in a network environment?
A. different TCP connections to the routers
B. incoming traffic across multiple servers
C. traffic in the network by leveraging the switch architecture
D. outgoing connections to the network
Selected Answer: B
Question #: 239
Topic #: 1
Refer to the exhibit.
Which Device limits traffic between Server 1 and Server 2?
A. Device B
B. Device C
C. Device D
D. Device E
Selected Answer: C
Question #: 240
Topic #: 1
What is the purpose of a MAC address on a network device?
A. unique network address that identifies the network interface of a device
B. unique network interlace address that is provided by the DHCP server
C. unique hardware address that identifies the network interface of a device
D. unique hardware interface address that is provided by the central switch
Selected Answer: C