200-901: DevNet Associate (DEVASC) Part 5
Question #: 241
Topic #: 1
How are load balancers used in modern application deployments?
A. Turn off traffic and take down compute units, then update and bring the compute units back up.
B. Allow traffic to continue as new compute units are brought up and old compute units are taken down.
C. Allow HTTP and HTTPS traffic to continue as old compute units are discontinued before new units are brought up.
D. Bring up new compute units, test the compute units, and switch the traffic from old units to new units.
Selected Answer: B
Question #: 242
Topic #: 1
Which protocol must be allowed on the firewall so that NTP services work properly?
A. TCP
B. ICMP
C. BGP
D. UDP
Selected Answer: D
Question #: 243
Topic #: 1
Which protocol runs over TCP port 22?
A. SSH
B. NETCONF
C. HTTP
D. Telnet
Selected Answer: A
Question #: 244
Topic #: 1
What is the purpose of the first three pairs of digits in a MAC address?
A. defines packet forwarding priority sent or received by the adapter
B. defines a routing identifier for the client
C. indicates vendor of the network card or adapter
D. indicates the IP address of the client in Hex
Selected Answer: C
Question #: 245
Topic #: 1
Refer to the exhibit. What does the load balancer enable in the network topology?
A. hosted application to access Internet services
B. external requests to be routed to the application servers
C. application to access the database server
D. workstations to access the Internet
Selected Answer: B
Question #: 246
Topic #: 1
What are two benefits of using VLANs? (Choose two.)
A. limits the devices that can join the network
B. enables the logical grouping of devices that belong to different Layer 2 devices
C. segments the broadcast domain
D. allows all network devices to be accessible from any host on the network
E. extends the broadcast domain
Selected Answer: BE
Question #: 247
Topic #: 1
What are two considerations when selecting the `best route` for a network device to reach its destination? (Choose two.)
A. MAC address
B. IP address
C. metrics
D. administrative distance
E. subnet mask
Selected Answer: DE
Question #: 248
Topic #: 1
DRAG DROP –
Drag and drop the function on the left onto the type of plane that handles the function on the right.
Select and Place:
Suggestion Answer:
Question #: 249
Topic #: 1
Users cannot access a webserver and after the traffic is captured, the capture tool shows an ICMP packet that reports “communication administratively prohibited”. What is the cause of this webserver access issue?
A. An access list along the path is blocking the traffic.
B. Users must authenticate on the webserver to access it.
C. A router along the path is overloaded and thus dropping traffic.
D. The traffic is not allowed to be translated with NAT and dropped.
Selected Answer: A
Question #: 250
Topic #: 1
Which application should be used to externally access all applications deployed in the same host machine with a single public IP address and port, when each application listens on different local ports?
A. reverse proxy
B. load balancer
C. DNS
D. firewall
Selected Answer: D
Question #: 251
Topic #: 1
Which implementation creates a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire?
A. WLAN
B. VLAN
C. IPsec
D. HSRP
Selected Answer: B
Question #: 252
Topic #: 1
What are two properties of private IP addresses? (Choose two.)
A. They can be used to access the Internet directly.
B. They are more secure than public IP addresses.
C. They are not globally unique.
D. They can be repeated within the same local network.
E. They are controlled globally by an IP address registry.
Selected Answer: BC
Question #: 253
Topic #: 1
Which protocol runs over TCP port 23?
A. SSH
B. NETCONF
C. HTTP
D. Telnet
Selected Answer: D
Question #: 254
Topic #: 1
Which two details are captured from the subnet mask? (Choose two.)
A. portion of an IP address that refers to the subnet
B. default gateway of the host
C. unique number ID assigned to the host
D. part of an IP address that refers to the host
E. network connection of a host or interface
Selected Answer: AD
Question #: 255
Topic #: 1
Refer to the exhibit. While developing a Cisco Webex bot, an application reaches the public IP address of the firewall, but traffic is forwarded to the IP address of server 1 instead of the IP address of server 2. What causes this issue?
A. The proxy server that rewrites traffic is misconfigured.
B. The router is sending the traffic to server 1 instead of server 2.
C. The switch is forwarding IP traffic to the wrong VLAN.
D. NAT is misconfigured on the firewall.
Selected Answer: D
Question #: 256
Topic #: 1
Developer is working on a new feature and made changes on a branch named ‘branch-413667549a-new’. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?
A. git merge ג€”no-edit
B. git merge ג€”commit
C. git merge ג€”revert
D. git merge ג€”abort
Selected Answer: D
Question #: 257
Topic #: 1
A company wants to automate the orders processed on its website using API. The network device that supports the solution must:
• support XML encoding
• support distributed transactions
• support YANG data models
• be support software redundancy
Which requirement prevents the use of RESTCONF for the solution?
A. software redundancy
B. YANG data models
C. distributed transactions
D. XML encoding
Selected Answer: C
Question #: 258
Topic #: 1
DRAG DROP
–
Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script by using the Cisco SDK. Not all options are used.
Suggestion Answer:
Question #: 259
Topic #: 1
DRAG DROP
–
Drag and drop the functions from the left onto the networking devices on the right.
Suggestion Answer:
Question #: 260
Topic #: 1
Which technology is responsible for resolving a host name to an IP address?
A. DNS
B. SNMP
C. DHCP
D. NTP
Selected Answer: A
Question #: 261
Topic #: 1
Refer to the exhibit. Up to which device does the communication server 1 and server 2 go?
A. device B
B. device C
C. device D
D. device E
Selected Answer: C
Question #: 262
Topic #: 1
Refer to the exhibit. An engineer sends the request to collect data over Cisco AMP for Endpoints API. The Engineer must list guide and hostname data for all computers, but the first request returns only 500 items out of 2,000. Then, the engineer adds the loop to collect all the data. What must be added to the script where the code is missing to complete the requests?
A.
B.
C.
D.
Selected Answer: A
Question #: 263
Topic #: 1
Which protocol is used for clock synchronization between network devices?
A. FTP
B. NNTP
C. BGP
D. NTP
Selected Answer: D
Question #: 264
Topic #: 1
What is the meaning of the HTTP status code 204?
A. request completed; new resource created
B. server successfully processed request; no content returned
C. standard response for successful requests
D. invalid query parameters
Selected Answer: B
Question #: 265
Topic #: 1
Which two commands download and execute an Apache web server container in Docker with a port binding 8080 in the container to 80 on the host? (Choose two.)
A. docker pull apache
B. docker run –p 8080:80 httpd
C. docker run –p 80:8080 httpd
D. docker pull httpd
E. docker pull https
Selected Answer: CD
Question #: 266
Topic #: 1
A group of software developers wants to improve its collaboration with the operations team. The group wants to deliver release-ready code that merges code changes back to the main branch and runs the automated testing as often as possible. Which DevOps concept does this scenario represent?
A. continuous delivery
B. version control
C. continuous integration
D. continuous deployment
Selected Answer: C
Question #: 267
Topic #: 1
A developer is running an application that connects to the Cisco website and collects data. The application will be hosted in a local data center and the data will need to be collected on a frequent basis. The application client requires certain environmental variables to be set before the run. Which Bash command sets the environmental variables for a Linux system?
A.
B.
C.
D.
Selected Answer: D
Question #: 268
Topic #: 1
DRAG DROP
–
Refer to the exhibit. A script must output details of all the Cisco Meraki MS220-BP switches across all organizations and networks. Drag and drop the code snippets from the bottom onto the boxes in the code to complete the script. Not all options are used.
Suggestion Answer:
Question #: 269
Topic #: 1
Refer to the exhibit. Which HTTP code is returned after the RESTCONF query is executed?
A. 201
B. 204
C. 302
D. 304
Selected Answer: A
Question #: 270
Topic #: 1
DRAG DROP
–
Drag and drop the code snippets from the bottom onto the blanks in the code to complete the happy path scenario. Not all options are used.
Suggestion Answer:
Question #: 271
Topic #: 1
Which traffic is handled on the control plane?
A. BGP
B. SMB
C. NTP
D. NETCONF
Selected Answer: A
Question #: 272
Topic #: 1
Refer to the exhibit. A network engineer must configure new interfaces on a set of devices and is planning to use an Ansible playbook for the task. All devices support SSH and NETCONF protocol, and the interface variables are unique per device. In which directory are the YAML files including variables hosted to automate the task with the netconf_config module?
A. current working directory
B. host_vars directory
C. group_vars directory
D. home directory
Selected Answer: B
Question #: 273
Topic #: 1
Which standard supported by Cisco IOS XE and Cisco NX-OS is used for automating the configuration of multiple devices across a network?
A. SNMP – YANG
B. SYSLOG – YANG
C. CLI – YANG
D. NETCONF – YANG
Selected Answer: D
Question #: 274
Topic #: 1
A developer has addressed a bug that was found in the production code of an application. A separate file named ‘bug427896191v_fix” has been created with the changes to the code. Which Git command must be used to incorporate the bug fix into the production code?
A. git rebase
B. git cat-file
C. git merge-file
D. git bisert
Selected Answer: C
Question #: 275
Topic #: 1
What is a principle of a code review process?
A. Changes are made after the code is submitted to source control.
B. It must not prevent code from getting into production as quickly as possible.
C. Naming standards must be consistent.
D. A technical lead must sign off on the review.
Selected Answer: C
Question #: 276
Topic #: 1
Why would a developer compare a current version of code to a previous version?
A. to provide the single source of truth
B. to troubleshoot code failures
C. to track who made a change
D. to aid in collaboration
Selected Answer: B
Question #: 277
Topic #: 1
Which Cisco platform is used to manage data center infrastructure through third-party tools and system integrations?
A. Cisco DNA Center
B. Cisco UCS Manager
C. Cisco Intersight
D. Cisco UCS Director
Selected Answer: C
Question #: 278
Topic #: 1
Refer to the exhibit. Which RESTCONF request results in this response?
A.
B.
C.
D.
Selected Answer: C
Question #: 279
Topic #: 1
Refer to the exhibit. An engineer is managing the network of an enterprise. The network is using a distributed deployment model. The enterprise uses database to store logs. The current policy requires logs to be stored if changes are made to the infrastructure in any of the devices on the data centers. Which workflow is being automated by the Bash script?
A. returning backup files that are older than 30 days
B. deleting backup files that are older than 30 days
C. configuring the directory to delete files automatically
D. automating deletion of all backup files every 30 days
Selected Answer: B
Question #: 280
Topic #: 1
DRAG DROP
–
Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python script to retrieve a list of network devices from Cisco DNA Center. Not all options are used.
Suggestion Answer:
Question #: 281
Topic #: 1
What is a characteristic of RPC APIs compared to REST APIs?
A. Authentication is done over provisions for the service caller and vice versa for RPC API, and REST API uses HTTP headers for authentication.
B. All communications between the client and server must be stateless for RPC API, and REST API is stateful.
C. The architecture model for RPC API is resource-focused, and REST API is procedure-focused.
D. The data payload must be in JSON format for RPC API, and REST API allows JSON and XML formats.
Selected Answer: A
Question #: 282
Topic #: 1
Which two situations align with infrastructure as code principles? (Choose two.)
A. nonreplicable snowflake servers
B. release versions to specific hardware
C. maximized configuration drift
D. easily reproducible systems
E. repeatable processes
Selected Answer: DE
Question #: 283
Topic #: 1
Refer to the exhibit. A developer writes a script to create a new network by using the Cisco DNA Center API. After running the script for the first time, the developer observes that HTTP code 404 is printed to the console. Which action resolves the problem?
A. The x-auth-token value must be changed to a valid token.
B. The API URL must be changed with a valid URL.
C. The requested payload must be fixed to include missing parts.
D. Internal errors on the code of API server must be fixed.
Selected Answer: B
Question #: 284
Topic #: 1
A developer plans to deploy a new application that will use an API to implement automated data collection from Webex with these requirements:
• The application was created by using the request library.
• Requires HTTP basic authentication.
• Provides data in JSON or XML formats.
Which Cisco DevNet resource helps the developer with how to use the API?
A. DevNet sandbox
B. API documentation
C. forums
D. DevNet code exchange
Selected Answer: A
Question #: 285
Topic #: 1
An engineer deploys a Cisco CSR 1000 V instance to a virtual machine. The engineer must output the device configuration in JSON format. Which protocol is used for this task?
A. YANG
B. NETCONF
C. SNMP
D. RESTCONF
Selected Answer: D
Question #: 286
Topic #: 1
What are two benefits of implementing common data structures when working with APIs in remote systems? (Choose two.)
A. ensures that developers are limited to using one data schema type
B. prevents multivendor interoperability
C. improves security in RESTful web services
D. enforces standardized data structures
E. leverages code that is easily managed and reused
Selected Answer: DE
Question #: 287
Topic #: 1
A development team is creating an application used for contactless payments. The application must:
• Be web-based
• Capture and process the credit card information for a purchase.
Which security action must the web application use to gather and process the private customer data?
A. Enable RATs to monitor the web application remotely.
B. Disable botnets to eliminate risks.
C. Disable TLS to increase the connection speed.
D. Enable the encryption of network traffic.
Selected Answer: D
Question #: 288
Topic #: 1
An engineer needs to collect information about 20,000 Bluetooth clients using the Cisco Meraki API. The API returns only 1,000 results. One of the HTTP response headers has the data:
Link: https://api.meraki.com.info/api/v0/networks/ABC/bluetoothClients?perPage=1000&startingAfter=1000>;rel=“next”
Which RFC is implemented by the API to apply the restriction?
A. RFC 5988 – Web Linking
B. RFC 5890 – Response Constraints
C. RFC 5005 – Feed Paging and Archiving
D. RFC 5446 – Content Limits
Selected Answer: C
Question #: 289
Topic #: 1
What are two benefits of using classes over functions when writing applications? (Choose two.)
A. improved readability
B. increased compatibility
C. variable reusability
D. increased performance
E. code organization
Selected Answer: AE
Question #: 290
Topic #: 1
DRAG DROP
–
Drag and drop the steps from the left into order on the right to create a common CI/CD pipeline process. Not all options are used.
Suggestion Answer:
Question #: 291
Topic #: 1
DRAG DROP
–
Drag and drop the code from the bottom onto the box where the code is missing to obtain a list of network devices by using the Cisco Meraki API. Not all options are used.
Suggestion Answer:
Question #: 292
Topic #: 1
A developer creates a new application, but the application must be tested before being released to a customer. When a mobile phone that uses 4G is used to access the application, the request fails. Why does the connection to the application fail?
A. The application is hosted on premises and VPN connectivity is required
B. The application must be added to the production server before testing.
C. The application must be moved to the cloud before testing is possible.
D. The application connectivity is limited to HTTPS protocol.
Selected Answer: A
Question #: 293
Topic #: 1
Which platform has an API that has the capability to obtain a list of vulnerable software on user devices?
A. Cisco Advanced Malware Protection
B. Cisco Umbrella
C. Cisco Identity Services Engine
D. Cisco Firepower
Selected Answer: A
Question #: 294
Topic #: 1
A developer creates an application that must provide an encrypted connection or API keys. The keys will be used to communicate with a REST API. Which command must be used for the secure connection?
A. curl –X PUSH ‘http://username.app.com/endpoint/?api_key=12345abcdef’
B. curl –v ‘ftp://username.app.com/endpoint/?api_key=12345abcdef’
C. curl –X GET ‘https://username.app.com/endpoint/?api_key=12345abcdef’
D. curl –X GET ‘http://username.app.com/endpoint/?api_key=12345abcdef’
Selected Answer: C
Question #: 295
Topic #: 1
A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?
A. Store the username and password in a separate configuration file.
B. Store the username and password in a vault.
C. Store the passwords in a dictionary.
D. Store the username and password in code.
Selected Answer: B
Question #: 296
Topic #: 1
What is a capability of the AXL API?
A. It signs a user in to a phone that is configured for extension mobility.
B. It pulls logs for the Cisco Tomcat service.
C. It authenticates users who exist in Cisco Unified Communications Manager.
D. It provides support for HTTP and HTTPS communications.
Selected Answer: C
Question #: 297
Topic #: 1
A developer creates a program in which an object maintains a list of classes based on the observer pattern. The classes are dependent on the object. Whenever the state of the object changes, it notifies the dependent classes directly through callbacks. Which advantage of the observer pattern offers minimum dependencies and maximum flexibility between dependent objects or classes?
A. tight coupling
B. cohesion
C. mediation
D. loose coupling
Selected Answer: D
Question #: 298
Topic #: 1
What is a feature of XML compared to other data formats?
A. It uses tags to define the structure.
B. It uses parenthesis for key-value pairs.
C. It uses indentation to define the structure.
D. It uses namespaces for list representation.
Selected Answer: A
Question #: 299
Topic #: 1
DRAG DROP
–
Refer to the exhibit. Drag and drop the actions from the left that the contents of this Dockerfile accomplish onto the right. Not all options are used.
Suggestion Answer:
Question #: 300
Topic #: 1
What is a capability of Ansible playbooks?
A. They execute scheduled tasks regularly.
B. They define the state for a device configuration.
C. They collect SNMP logs from networking devices.
D. They utilize the target device agent to execute.
Selected Answer: B