Month End Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

200-901 PDF

$42

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

200-901 PDF + Testing Engine

$57

$189.99

3 Months Free Update

  • Exam Name: DevNet Associate (DEVASC)
  • Last Update: May 25, 2025
  • Questions and Answers: 467
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

200-901 Engine

$48

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

200-901 Practice Exam Questions with Answers DevNet Associate (DEVASC) Certification

Question # 6

Refer to the exhibit.

200-901 question answer

The server.js Node.js script runs after the Dockerfile creates its container. What is the working directory of the application inside the container?

A.

/source

B.

/app

C.

/app/source

D.

/app/produclion

Full Access
Question # 7

Which RFC 1918 address space includes a subnet of 172.16.0.0 that uses a mask of 255.255.0.0?

A.

class A

B.

class B

C.

class C

D.

class D

Full Access
Question # 8

200-901 question answer

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script by using the Cisco SDK. Not all options are used.

200-901 question answer

Full Access
Question # 9

A lead engineer is managing the development of a web application with a team of remote developers using Git as the version control system. What is the advantage of a version Control system that allows developers to pick code from any part of the project and perform updates on it?

A.

efficient handling of projects

B.

linear development

C.

build automation

D.

nonlinear development

Full Access
Question # 10

What is the purpose of running tests before writing code in test-driven development?

A.

to find unexpected failures in the tests

B.

to demonstrate that the tests fail for expected reasons

C.

to ensure that the tests pass

D.

to provide proof of the work carried out

Full Access
Question # 11

200-901 question answer

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.

200-901 question answer

Full Access
Question # 12

What is a characteristic of the Cisco Finesse platform?

A.

Applications allow services to be invoked on a network triggered event.

B.

The platform provides a ready-to-go platform for HD video and audio conferencing.

C.

Applications are added to the platform from the desktop remotely.

D.

The platform includes an enterprise-class IM engine.

Full Access
Question # 13

Drag and drop the steps from the left into order on the right to create a common CI/CD pipeline process. Not all options are used.

200-901 question answer

Full Access
Question # 14

A network engineer makes several API calls lo Cisco Prime to retrieve a list of all devices. Each time a response is received, only a subset of the devices is returned. The engineer :ices that HTTP code 429 is returned instead of 200 for some API calls. Why did the response exclude some of the devices?

A.

The API applied an offset that was indicated In the request.

B.

The API failed to identify how many items to retrieve.

C.

The API timed out the request.

D.

The API rate limited the request

Full Access
Question # 15

What is a capability of model-driven programmability for infrastructure automation?

A.

compatibility with any networking device

B.

automatic version control

C.

generic APIs that are compatible with multiple platforms

D.

a single data model acr oss the network

Full Access
Question # 16

Refer to the exhibit.

200-901 question answer

Which workflow does the script automate?

A.

retrieves a media server that is being monitored

B.

updates a media server that is being monitored

C.

adds a media server to be monitored

D.

deletes a media server that is being monitored

Full Access
Question # 17

Which IP service is used to monitor the performance of network devices?

A.

SNMP

B.

DHCP

C.

DNS

D.

NTP

Full Access
Question # 18

What is a feature of a MAC address?

A.

It consists of 6 hexadecimal numbers.

B.

It consists of 24 bits.

C.

It consists of 38 bits.

D.

It consists of 12 hexadecimal numbers.

Full Access
Question # 19

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right.

200-901 question answer

Full Access
Question # 20

200-901 question answer

Refer to the exhibit. A network engineer must configure new interfaces on a set of devices and is planning to use an Ansible playbook for the task. All devices support SSH and NETCONF protocol, and the interface variables are unique per device. In which directory are the YAML files including variables hosted to automate the task with the netconf_config module?

A.

current working directory

B.

host_vars directory

C.

group_vars directory

D.

home directory

Full Access
Question # 21

Refer to the exhibit.

200-901 question answer

Fill in the blank to complete the query parameter and value so that the result set is returned in reverse chronological order (most recent first) based on when message were entered.

200-901 question answer

Full Access
Question # 22

Which device is used to transport traffic from one broadcast domain to another broadcast domain?

A.

load balancer

B.

layer 2 switch

C.

router

D.

proxy server

Full Access
Question # 23

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. (Not all Options are used)

200-901 question answer

Full Access
Question # 24

Which network device monitors incoming and outgoing traffic and decides whether to allow or block specific traffic based on a defined set of rules?

A.

switch

B.

load balancer

C.

reverse proxy

D.

firewall

Full Access
Question # 25

Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose two.)

A.

Cisco Intersight API interactions can be encoded in XML or JSON and require an APIs key in the HTTP header for authentication.

B.

USC Director API interactions can be XML- or JSON-encoded and require an APLs key in the HTTP header for authentication.

C.

UCS manager API interactions are XML-encoded and require a cookie in the method for authentication.

D.

Cisco Intersight uses XML to encoded API interactions and requires an API key pair for authentication.

E.

UCS manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the HTTP header for authentication.

Full Access
Question # 26

Fill in the blanks to complete the python script to request a service ticket using the APIC-EM rest API for the user “devnetuser”.

200-901 question answer

Full Access
Question # 27

Which description of a default gateway if true?

A.

It is a device that receives IP packets that have no explicit next-hop in the routing table.

B.

It is a feature that translates between public and private addresses.

C.

It is a security feature that denies certain traffic.

D.

It is a device that receives Layer 2 frames with an unknown destination address.

Full Access
Question # 28

Refer to the exhibit.

200-901 question answer

What caused the error in this API request?

A.

The API resource does not support the POST operation.

B.

The API resource does not support JSON format payloads.

C.

The submitted JSON payload includes a field that is not supported by the API resources.

D.

The submitted JSON payload has a formatting issue.

Full Access
Question # 29

What is the Git command to delete a local branch named “experiment” without a warning?

A.

git branch –n experiment

B.

git branch –rm experiment

C.

git branch –f experiment

D.

git branch –D experiment

Full Access
Question # 30

Refer to the exhibit.

200-901 question answer

What is the value of the node defined by this YANG structure?

200-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 31

An application calls a REST API and expects a result set of more than 550 records, but each time the call is made, only 25 are returned. Which feature limits the amount of data that is returned by the API?

A.

pagination

B.

payload limit

C.

rate limiting

D.

service timeouts

Full Access
Question # 32

What is an example of a network interface hardware address?

A.

domain name

B.

IP address

C.

workstation name

D.

MAC address

Full Access
Question # 33

Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.)

A.

Processor

B.

Codec

C.

Listener

D.

Receiver

E.

Transaction monitor

Full Access
Question # 34

Drag and drop elements of the RESTCONF protocol stack from the left onto the correct description on the right. Not all elements on the left are used.

200-901 question answer

Full Access
Question # 35

What is a function of the default gateway in a network?

A.

to drop traffic that is destined to the default gateway

B.

to drop traffic that is not destined to the default gateway

C.

to forward traffic to the same subnet

D.

to forward traffic to different subnets

Full Access
Question # 36

Which REST architectural constraint indicates that no client context should be stored on the server between requests?

A.

stateless

B.

uniform interface

C.

cacheable

D.

client-server

Full Access
Question # 37

Which product provides network controller-level management features?

A.

Cisco DNA Center

B.

Cisco NX-OS

C.

Cisco UCS Manager

D.

Cisco ISE

Full Access
Question # 38

A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without error and the bundles are produced. However, when the script is run during business hours, report poor voice quality of phones calls. What explains this behavior?

A.

The application is running in the Voice VLAN and causes delays and jitter in the subnet.

B.

The speed and duplex settings in Cisco DNA Center are sot incorrectly, which causes the transfer to be too slow.

C.

9 The script is written in a low-level programming language where there is no memory safety. This causes a buffer overflow and disruption on the network.

D.

Generating the logs causes the CPU on the network controller to spike, which causes delays m forwarding the voice IP packets.

Full Access
Question # 39

Refer to Exhibit.

200-901 question answer

Which JSON is equivalent to the XML-encoded data.

A)

200-901 question answer

B)

200-901 question answer

C)

200-901 question answer

D)

200-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 40

What operation is performed with YANG model-driven programmability in NX-OS?

A.

configure a device with native and OpenConfig-based models

B.

send CLI commands to a device and retrieve output in JSON format

C.

run Linux commands natively on the device

D.

bootstrap a device that has a factory-default configuration

Full Access
Question # 41

Which response status code is used by a RESTful interface to indicate successful execution of a request?

A.

200

B.

404

C.

405

D.

500

Full Access
Question # 42

Drag and Drop the GIT commands from the left onto the right that add modified local files to a remote repository. Not all options are used

200-901 question answer

Full Access
Question # 43

What is the purpose of a firewall in application deployment?

A.

adds TLS support to an application that does not support it natively

B.

forwards traffic to a pool of instances of the application

C.

provides translation for an application's hostname to its IP address

D.

limits traffic to only ports required by the application

Full Access
Question # 44

Which two elements are foundational principles of DevOps? (Choose two.)

A.

designing applications as microservices

B.

encouraging containers for the deployment of applications

C.

organizing cross-functional teams over organizational silos

D.

optimizing the cost of infrastructures

E.

automating over documenting

Full Access
Question # 45

Refer to the exhibit.

200-901 question answer

The JSON data in the exhibit has been parsed and stored in a variable, “data”. What returns the value “172.16.0.11” ?

A.

data['items'][0]['host']['value']

B.

data['items']['1']['host']['value']

C.

data['items']['host'][1]

D.

data['items']['host']['value']

Full Access
Question # 46

Which API is used to obtain data voicemail ports?

A.

Finesse gadgets

B.

Cisco Unified Communications manager

C.

Webex devices

D.

Webex teams

Full Access
Question # 47

In DNS, which record specifies an alias that refers to another name that ultimately resolves to an IP address?

A.

AAA

B.

SOA

C.

NS

D.

CNAME

Full Access
Question # 48

Which two query types does a client make to a DNS server? (Choose Two)

A.

AAAA

B.

ACK

C.

DISCOVER

D.

Inverse

E.

PTR

Full Access
Question # 49

Users cannot access a webserver and after the traffic is captured. the capture tool shows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?

A.

A router along the path is misrouting the packets in a wrong direction.

B.

A router along the path has the wrong time.

C.

The server is too far away and the packets require too much time to reach it

D.

The server is too loaded and the connection could not be handled in time

Full Access
Question # 50

The project is migrated to a new codebase, the “old_project” directory must be deleted. The directory has multiple read-only files, and it must be deleted recursively without prompting for confirmation. Which bash command must be used?

A.

rm -rf old_project

B.

rm -r old_project

C.

rmdir -p old_project

D.

rmdir old_project

Full Access
Question # 51

Drag and drop the requests from the left into the correct order on the right to create and check the path trace between two devices using Cisco DNA center API.

200-901 question answer

Full Access
Question # 52

Which statement describes the benefit of using functions in programming?

A.

Functions allow problems to be split into simpler, smaller groups, and reduce code repetition, which makes the code easier to read.

B.

Functions ensure that a developer understands the inner logic contained before using them as part of a script or application.

C.

Functions create the implementation of secret and encrypted algorithms.

D.

Functions store mutable values within a script 01 application.

Full Access
Question # 53

Which is an advantage of using network programmability?

A.

It removes CLI access for devices.

B.

It provides for more scalable and replicable network provisioning.

C.

Manual configuration is faster.

D.

No cloud abstraction occurs.

Full Access
Question # 54

What are two security benefits of a Docker-based application?

A.

easier to patch because Docker containers include only dependencies that the application requires

B.

prevents information leakage that can occur when unhandled exceptions are returned in HTTP responses

C.

allows for separation of application that traditionally run in the same host

D.

natively secures access to secrets that are used by the running application

E.

guarantees container images are secured and free of vulnerabilities

Full Access
Question # 55

Which model-driven programmability protocol does Cisco IOS XE Software support?

A.

CORBA

B.

SSH

C.

gNMI

D.

SOAP

Full Access
Question # 56

A REST API service requires authentication based on the username and password. The user “john” has the password “384279060” and the Base64 encoding of those credentials is “am9objowMTIzNDU2Nzg=”. Which method completes an authentication request?

A.

The header must include:

Authorization: Bearer am9obJowMTlzNDU2Nzg=

B.

The payload must include:

Authorization: Bearer am9objowMTIzNDU2Nzg=

C.

The payload must include.

Authorization: Basic am9objowMTlzNDU2Nzg=

D.

The header must include:

Authorization: Basic am9objowMTlzNDU2Nzg=

Full Access
Question # 57

Which service provides a directory lookup for IP addresses and host names?

A.

DNS

B.

DHCP

C.

SNMP

D.

NAT

Full Access
Question # 58

Refer to the exhibit.

200-901 question answer

A REST API retune this JSON output for a GET HTTP request, Which has assigned to a variable called “vegetables” Using python, which output is the result of this command?

200-901 question answer

A.

Lettuce

B.

Kiwi

C.

[‘kiwi’, ‘grape’]

D.

{‘color’: ‘green’, ‘items’: [‘kiwi’, ‘grape’]

Full Access
Question # 59

Fill in the blanks to complete the Bash script in which each file in a directory is renamed to Its SHA256 hash?

200-901 question answer

Full Access
Question # 60

Which mechanism is used to consume a RESTful API design when large amounts of data are returned?

A.

Data sets

B.

Scrolling

C.

Blobs

D.

Pagination

Full Access
Question # 61

A Company is looking for cloud deployment which will use the on-premise infrastructure, is user self-service, and easy to scale. Which cloud solution should be selected for these requirements?

A.

multi

B.

public

C.

private

D.

hybrid

Full Access
Question # 62

What should a CI/CD pipeline aim to achieve?

A.

to allow manual testing before deployment

B.

to require minimal manual interaction

C.

to support new deployments on a fixed monthly schedule

D.

to provide a documented process for feedback

Full Access
Question # 63

Which principle is a value from the manifesto for Agile software development?

A.

adhering to a plan over responding to requirements

B.

detailed documentation over working software

C.

processes and tools over teams and inter actions

D.

customer collaboration over contract negotiation

Full Access
Question # 64

Fill in the blanks to complete the Python script to update the Webex Teams membership of a room using the Python requests library import requests

200-901 question answer

Full Access
Question # 65

Drag and drop the capability on the left onto the Cisco compute management platform that supports the capability on the right.

200-901 question answer

Full Access
Question # 66

How is a branch called "my-bug-fix" started to develop a fix needed in a product?

A.

git branch -b my-bug-fix

B.

git checkout -b my-bug-fix

C.

git checkout my-bug-fix

D.

git branch my-bug-fix

Full Access
Question # 67

A developer is working on a new feature in a branch named 'newfeat123456789' and the current working primary branch is named 'prim987654321'. The developer requires a merge commit during a fast forward merge for record-keeping purposes. Which Git command must be used?

A.

git merge --no-ff newfeat123456789

B.

git commit --no-ff newfeat123456789

C.

git add --commit-ff newfeat123456789

D.

git reset --commit-ff newfeat123456789

Full Access
Question # 68

Refer to the exhibit.

200-901 question answer

While developing a Cisco Webex bot, an application reaches the public IP address of the firewall, but traffic is forwarded to the IP address of server 1 instead of the IP address of server 2. What causes this issue?

A.

The proxy server that rewrites traffic is misconfigured.

B.

The router is sending the traffic to server 1 instead of server 2.

C.

The switch is forwarding IP traffic to the wrong VLAN.

D.

NAT is misconfigured on the firewall.

Full Access
Question # 69

Refer to the exhibit.

200-901 question answer

A developer cannot reach the web application behind an NGINX load balancer. The developer sends a request to an application FQDN with cURL but gets an HTTP 502 response. Which action solves the problem?

A.

Fix errors in the server configuration, which is behind the load balancer.

B.

Bring up the load balancer to the active state.

C.

Fix errors in the cURL request sent by the client.

D.

Change the default gateway on the load balancer to an active one.

Full Access
Question # 70

What is a characteristic of RPC APIs compared to REST APIs?

A.

Authentication is done over provisions for the service caller and vice versa for RPC API, and REST API uses HTTP headers for authentication.

B.

All communications between the client and server must be stateless for RPC API, and REST API is stateful.

C.

The architecture model for RPC API is resource-focused, and REST API is procedure-focused.

D.

The data payload must be in JSON format for RPC API, and REST API allows JSON and XML formats.

Full Access
Question # 71

Refer to the exhibit.

200-901 question answer

Which XML snippet has interface information that conforms to the YANG model?

A)

200-901 question answer

B)

200-901 question answer

C)

200-901 question answer

D)

200-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 72

A developer creates an application that must provide an encrypted connection or API keys. The keys will be used to communicate with a REST API. Which command must be used for the secure connection?

A.

curl –X PUSH ‘http://username.app.com/endpoint/?api_key=12345abcdef’

B.

curl –v ‘ftp://username.app.com/endpoint/?api_key=12345abcdef’

C.

curl –X GET ‘https://username.app.com/endpoint/?api_key=12345abcdef’

D.

curl –X GET ‘http://username.app.com/endpoint/?api_key=12345abcdef’

Full Access
Question # 73

An engineer must run tests on several Cisco controllers. Due to the nature of the task, the infrastructure must be running at all times and have access to APIs. Which Cisco DevNet source must the engineer use?

A.

DevNet Learning Labs

B.

DevNet Code Exchange

C.

DevNet Sandbox

D.

DevNet API documentation

Full Access
Question # 74

What is a function of the default gateway in a network?

A.

to drop traffic that is destined to the default gateway

B.

to forward traffic to different subnets

C.

to forward traffic to the same subnet

D.

to drop traffic that is not destined to the default gateway

Full Access
Question # 75

200-901 question answer

Refer to the exhibit. Drag and drop the Dockerfile contents from the left onto the functions on the right that create a container image to run traceroute to track network path to specific targets. Not all options are used.

200-901 question answer

Full Access
Question # 76

200-901 question answer

Refer to the exhibit. An engineer runs a network that consists of Cisco Nexus devices. The network is distributed between data centers in different locations. The switches are configured using standalone connections and a single point of failure. Which process is being automated by the Ansible playbook?

A.

enabling HSRP on the nxos_rtr inventory host

B.

enabling HSRP on the rtr-1a inventory host

C.

executing HSRP configuration from the Ansible controller node

D.

executing HSRP configuration from the srv-1a inventory host

Full Access
Question # 77

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python script to retrieve a list of network devices from Cisco DNA Center. Not all options are used.

200-901 question answer

Full Access
Question # 78

A developer checks the performance of a web application. The application is in the local data center and uses a REST-based API. Based on the API logs, it is discovered that many its abandon API requests. Also, the response is taking too long to get back. What is the reason for this issue?

A.

Pagination is not implemented

B.

Token-based authentication is enabled.

C.

Rate limiting is not implemented.

D.

Token-based authentication is disabled

Full Access
Question # 79

Refer to the exhibit.

200-901 question answer

A developer uses a REST API to retrieve information about wireless access points. The API returns an HTTP 403 error when making a GET request. Which ion resolves this Issue?

A.

Provide the developer with the correct user access rights.

B.

Change the request HTTP method from GET to POST.

C.

Change the request timeout in the client software.

D.

Include a username/password request header.

Full Access
Question # 80

Refer to the exhibit.

200-901 question answer

A network engineer must improve the fabric discovery process in a data center. The engineer wants to check current ACI scripts in the myproject repository and clone them to a folder named aci. The engineer will optimize the scripts from the new folder. Which command performs this task on the Git repository?

A)

200-901 question answer

B)

200-901 question answer

C)

200-901 question answer

D)

200-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 81

Drag and drop the common API styles from the left onto the requirement on the right.

200-901 question answer

Full Access
Question # 82

An engineer is creating an API to automatically obtain specific zones from Cisco Meraki MV cameras. The data that is provided when the API runs must represent the current analytic zones that are configured on the cameras. The API must start automatically at 6 p.m. every day and save the data on a server for further processing. Which part of the HTTP request must be configured to meet these requirements?

A.

request body with Status Code set to "302"

B.

request header with Content-Type set to "application/json"

C.

request header with Content-Encoding set to "application/xml"

D.

request body with Content-Type set to "application/xml"

Full Access
Question # 83

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

200-901 question answer

Full Access
Question # 84

200-901 question answer

Refer to the exhibit.

Which type of YANG object is "interfaces"?

A.

node

B.

subitem

C.

item

D.

container

Full Access
Question # 85

How does edge computing analyze sensitive data in the context of privacy control?

A.

locally instead of sending the data to the cloud for analysis

B.

locally or on the cloud depending on the configuration

C.

all at once by sending the data to the cloud

D.

locally on each node, and then sends the data to the cloud

Full Access
Question # 86

What is the purpose of Infrastructure as Code?

A.

to provide the ability of independent development process

B.

to manually configure and manage infrastructure at scale

C.

to apply new practices on the development process

D.

to use development engineering practices on the infrastructure

Full Access
Question # 87

200-901 question answer

Refer to the exhibit. A script must output details of all the Cisco Meraki MS220-BP switches across all organizations and networks. Drag and drop the code snippets from the bottom onto the boxes in the code to complete the script. Not all options are used.

200-901 question answer

Full Access
Question # 88

A customer's cloud services must:

Migrate services to another data center on demand.

Save the operational state of the machine on demand.

Support Windows and Linux GUIs.

Maximize hardware utilization.

Which type of deployment meets these requirements?

A.

bare metal

B.

container

C.

virtual machine

D.

Kubernetes

Full Access
Question # 89

What is the impact on an application from having a large distance between a client device and a host server?

A.

jitter

B.

latency

C.

loss of connectivity

D.

increased bandwidth

Full Access
Question # 90

What is a component of the first stage of an application development CI/CD pipeline?

A.

developer writing the initial lines of code

B.

triggering of the automated build phase

C.

commitment and pushing of code into a version control system

D.

triggering of the automated testing phase

Full Access
Question # 91

Drag and drop the code from the bottom onto the box where the code is missing to enable ports on a switch by using RESTCONF. Not all options are used.

200-901 question answer

Full Access
Question # 92

A development team needs to containerize an application named 'cust475605674\ A Dockerfile has been created and now the docker build command needs to be run using the current folder to find the Dockerfile. build the image and create a local repository named 'cust321453857-rep' that points to that image. Which command must be used?

A.

docker build -t cust321453857-rep -f Dockerfile

B.

docker build cust321453857-rep -f Dockerfile.txt

C.

docker build cust321453857-rep Dockerfile

D.

docker build -t cust321453857-rep Dockerfile.txt

Full Access
Question # 93

200-901 question answer

Refer to the exhibit. An engineer must authorize a REST API call. The API password is "Cisco123!". Which Bash command must be placed in the code to authorize the call?

A.

mkdir API_PASSWORD=Cisco123!

B.

set API_PASSWORD=Cisco123!

C.

cp API_PASSWORD=Cisco123!

D.

export API_PASSWORD=Cisco123!

Full Access
Question # 94

An engineer needs to collect information about 20,000 Bluetooth clients using the Cisco Meraki API. The API returns only 1,000 results. One of the HTTP response headers has the data:

Link: https://api.meraki.com.info/api/v0/networks/ABC/bluetoothClients?perPage=1000 &startingAfter=1000>;rel=“next”

Which RFC is implemented by the API to apply the restriction?

A.

RFC 5988 – Web Linking

B.

RFC 5890 – Response Constraints

C.

RFC 5005 – Feed Paging and Archiving

D.

RFC 5446 – Content Limits

Full Access
Question # 95

What is a benefit of model-driven programmability?

A.

It addresses the static architecture of traditional networks being decentralized and complex.

B.

By modeling data, it ensures that vast quantities of data are usable for monitoring.

C.

It provides a programmatic and standards-based way of writing configurations to any network device.

D.

It simplifies management and operations by decoupling the networking hardware from its control mechanism.

Full Access
Question # 96

What is a benefit of organizing code into modules?

A.

improves overall performance

B.

reduces the length of code

C.

enables code to be multifunctional

D.

enables the reuse of code

Full Access
Question # 97

What is the purpose of the first three pairs of digits in a MAC address?

A.

defines a routing identifier for the client

B.

indicates the IP address of the client in Hex

C.

defines packet forwarding priority sent or received by the adapter

D.

indicates vendor of the network card or adapter

Full Access
Question # 98

Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?

A.

100

B.

204

C.

302

D.

402

Full Access
Question # 99

Refer to the exhibit.

200-901 question answer

A developer needs to upload a local file by using the REST API. The developer gathers information according to the documentation and sends the request by using the cURL command in the exhibit but gets an error code. Which action should be followed to get valid response?

A.

change content type as JSON

B.

add the authorization header with the access token

C.

add a username-password combination to request command

D.

change request method as GET

Full Access
Question # 100

Why is refactoring done during test-driven development?

A.

to enable larger objects and longer methods

B.

to improve maintainability and readability

C.

to ensure that the previous uses of the objects are explained

D.

to ensure the duplication of essential code

Full Access
Question # 101

A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?

A.

Communication between the application and the services is not encrypted.

B.

The database credentials should be stored in the configuration files so that they are secured on the same server.

C.

The API keys are stored in the configuration files but should be stored in the vault service.

D.

The synchronization logs should be encrypted and not stored in a relational database.

Full Access
Question # 102

What is a benefit of organizing into modules?

A.

improves collaboration of the development team

B.

makes it easier to deal with large and complex systems

C.

enables the code to be broken down into layers

D.

enables the inclusion of more programming languages in the code

Full Access
Question # 103

Refer to the exhibit.

200-901 question answer

Which JSON snippet configures a new interface according to YANG model?

A)

200-901 question answer

B)

200-901 question answer

C)

200-901 question answer

D)

200-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 104

What is the difference between YAML and JSON data structure?

A.

YAML uses spaces; JSON uses parentheses

B.

YAML uses indentation; JSON uses brackets and braces

C.

YAML uses brackets and braces; JSON uses indentation

D.

YAML uses parentheses; JSON uses spaces

Full Access
Question # 105

200-901 question answer

Refer to the exhibit. A developer is creating a Python script to obtain a list of HTTP servers on a network named office_east by using the Cisco Meraki API. The request has these requirements:

• Must time out if the response is not received within 2 seconds.

• Must utilize client certificates and SSL certificate verification.

• Must utilize basic authentication that uses a username of admin and a password of cisco.

• Must save the response to an object named response.

Drag and drop the code snippets from the bottom onto the blanks in the code to meet the requirements. Not all options are used.

200-901 question answer

Full Access
Question # 106

Drag and drop the code snippets from the bottom to the blanks in the code to test the API response through the Python unittest library. Not all options are used.

200-901 question answer

Full Access
Question # 107

Refer to the exhibit.

200-901 question answer

An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the 'get_all_interfaces' API call is used?

A.

times out

B.

rate limit

C.

pagination

D.

invalid password

Full Access
Question # 108

What are two properties of private IP addresses? (Choose two.)

A.

They can be used to access the Internet directly.

B.

They are more secure than public IP addresses.

C.

They are not globally unique.

D.

They can be repeated within the same local network.

E.

They are controlled globally by an IP address registry.

Full Access
Question # 109

What is a difference between a synchronous API and an asynchronous API?

A.

An asynchronous API can make offline calls while synchronous APIs do not have this capability.

B.

Synchronous API calls are returned immediately while asynchronous calls do not guarantee an immediate response.

C.

Synchronous API calls require an authentication header to be sent while asynchronous calls do not require authentication.

D.

An asynchronous API can make a larger number of calls in a specified time period than a synchronous API.

Full Access
Question # 110

Drag and drop the code from the bottom onto the box where the code is missing in the Bash script to complete the missing assignment.

200-901 question answer

Full Access
Question # 111

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

200-901 question answer

Full Access
Question # 112

Refer to the exhibit.

200-901 question answer

An engineer must configure a load balancer server. The engineer prepares a script to automate workflow by using Bash. The script install the nginx package, moves to the /optAtginx directory, and reads the sites M We (or further processing Based on the script workflow, which process is being automated within the loop by using the information mi sites txt?

A.

creating a new Me Based on template .conf in the /etc/ngin/sites_enabled directory for each lie in the sites txt file. and then changing the file execution permission.

B.

creating a Me per each the in sites txt with the information in template conf. creating a link for the previously created file. and then changing the ownership of the created files

C.

using the content of the file to create the template conf file. creating a Iink from the created file to the /etc/nginx/files.enabled. and then changing the file execution permissions.

D.

using the information in the file to create a set of empty files in the /etchginx/sites_enabled directory and then assigning the owner of the file.

Full Access
Question # 113

200-901 question answer

Refer to the exhibit. A network engineer must collect information from the network. The engineer prepares a script to automate workflow by using Cisco Meraki API. The script must run over nested loops to collect organization and network information and uses the collected data for final collection. Which process is being automated by using the Python script?

A.

Gather the IDs of the ACME organization, the BLDG21 network, and the dents on the network

B.

Provide the BLDG21 network information if it is part of the ACME organization

C.

Collect the IDs of the clients on the BLDG21 network

D.

List the IDs from the ACME organization

Full Access
Question # 114

Refer to the exhibit.

200-901 question answer

A developer wants to create a room named cisco through Webex API. The developer prepares the request by putting an API token inside the authorization header; however, the given HTTP call returns error code 400. How must the call parameters be changed to ensure a valid response?

A.

Replace the team body parameter with the name body parameter.

B.

Replace cisco with a valid name for a team.

C.

Change the token in the header with the authorization token.

D.

Change the HTTP method of the call to PUT.

Full Access
Question # 115

How does a synchronous API request differ from an asynchronous API request?

A.

clients receive responses with a task id for further processing

B.

clients subscribe to a webhook for operation results

C.

clients are able to access the results immediately

D.

clients poll for the status of the execution of operations

Full Access
Question # 116

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code,

which resource must be used to verify that the code works correctly?

A.

Cisco NX-OS SDK

B.

Cisco Learning Labs

C.

Cisco Code Exchange

D.

Cisco Modeling Labs

Full Access
Question # 117

Refer to the exhibit.

200-901 question answer

A network engineer must manage the network devices. The engineer prepares a Python scripts to authenticate to the Cisco to DNA Center API and request a device list. The device request fails and returns errors code 401. Which action solves the problem?

A.

Update the API URL. which matched the API endpoint for device list.

B.

Send the request to another network in case there are reachability Issues.

C.

Send the Authentication header In the request with a valid configuration.

D.

Update the credentials that are already supplied and retry the request

Full Access
Question # 118

Refer to the exhibit.

200-901 question answer

Which function does the EXPOSE line perform when building an image from this Dockerfile?

A.

Local port 8080 of the container that launched with this docker image is accessible from co-hosted containers and external clients.

B.

Local port 8080 is not reachable at all because no IP address is specified along with the EXPOSE command of the Dockerfile.

C.

Local port 8080 is accessible from other containers running on the same docker host as the container that launched with this docker image.

D.

Local port 8080 of the container that launched with this docker image is accessible to external clients.

Full Access
Question # 119

A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:

$ docker tag 84fe411926287 local/app:0.4

Which command must be executed next to build the Docker image using the tag?

A.

$ docker build -p local/app:0.4

B.

$ docker run -t local/app:0.4

C.

$ docker run -p local/app:0.4

D.

$ docker build -t local/app:0.4

Full Access
Question # 120

Which tool is used to block all traffic to the domain by using a single API call?

A.

Cisco ISE

B.

Cisco Firepower

C.

Cisco AMP

D.

Cisco Umbrella

Full Access
Question # 121

What is a benefit of a model-driven approach for infrastructure automation?

A.

enforces the generation of all automation scripts through the modeling environment

B.

provides a small learning curve and helps system administrators with limited coding experience

C.

ensures that system administrators gain a good understanding of coding and expand their experience and capabilities

D.

enables a user to understand a declarative language to translate the model into an actionable script

Full Access
Question # 122

Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:

• MySQL database that stores data about customers

• HTML5 and JavaScript UI that runs on Apache

• REST API written in Python

What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)

A.

to enable multiple views of the same data to be presented to different groups of users

B.

to provide separation between the view and the model by ensuring that all logic is separated out into the controller

C.

to ensure data consistency, which requires that changes to the view are also made to the model

D.

to ensure that only one instance of the data model can be created

E.

to provide only a single view of the data to ensure consistency

Full Access
Question # 123

How does a developer create and switch to a new branch called "my-bug-fix" to develop a product fix?

A.

git checkout -b my-bug-fix

B.

git branch -b my-bug-fix

C.

git branch my-bug-fix

D.

git checkout my-bug-fix

Full Access
Question # 124

Which API must an engineer use to change a netmask on a Cisco IOS XE device?

A.

Meraki

B.

RESTCONF/YANG

C.

SD-WAN

D.

DNAC

Full Access
Question # 125

In the test-driven development model, what is changed after a test fails?

A.

test

B.

schedule

C.

project requirements

D.

code

Full Access
Question # 126

Refer to the exhibit.

200-901 question answer

Which command, including arguments, is executed when the container starts?

A.

/bin/sh -c "/bin/sleep 30 && nginx -g 'daemon off;'"

B.

/bin/sh -c "/bin/sleep 10 && nginx -g 'daemon off;'"

C.

/bin/bash -c "/bin/sleep 30 && nginx -g 'daemon off;'"

D.

/bin/sh -c "/bin/sleep 30" && nginx -g 'daemon off;'

Full Access
Question # 127

A developer needs a list of clients connected to a specific device in a Meraki network. After making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet resource should be used to identify the meaning of the response code?

A.

API documentation

B.

Sandbox

C.

Learning Labs

D.

Code Exchange

Full Access
Question # 128

Where is an IP packet routed if the packet does not match any routes in the routing table?

A.

firewall

B.

load balancer

C.

central switch

D.

default gateway

Full Access
Question # 129

Which protocol runs over TCP port 22?

A.

SSH

B.

HTTP

C.

Telnet

D.

NETCONF

Full Access
Question # 130

Refer to the exhibit.

200-901 question answer

An API call is constructed to retrieve the inventory in XML format by using the API. The response to the call is 401 Unauthorized. Which two headers must be added to the API call? (Choose two.)

200-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 131

Which Cisco platform provides organization-wide automation, security, policy enforcement, any agility across wired and wireless networks?

A.

Cisco ACI

B.

Cisco DNA Center

C.

Cisco Umbrella

D.

Cisco SD-WAN

Full Access
Question # 132

A company wants to accelerate the adoption of technologies that will simplify its operations. Staff have different skill levels and are looking for a single site to find easy-to-consume beginner, intermediate, and advanced multidomain use cases. Which site should be used?

A.

DevNet Ecosystem Exchange

B.

DevNet Automation Exchange

C.

DevNet Creations

D.

DevNet Support Forum

Full Access
Question # 133

Refer to the exhibit.

200-901 question answer

A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?

A.

verifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages

B.

verifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version

C.

uninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version

D.

installing nginx, uninstalling apache2, and then verifying that the package repository is at the latest version

Full Access
Question # 134

How are load balancers used in modern application deployment?

A.

Allow traffic to continue as new compute units are brought up and old compute units are taken down.

B.

Allow http and https traffic to continue as old compute units are discontinued before new units are brought up.

C.

Turn off traffic and take down compute units, then update and bring the compute units back up.

D.

Bring up new compute units, test the compute units, and switch the traffic from old units to new units.

Full Access
Question # 135

What is a benefit of test-driven development?

A.

early customer involvement

B.

increased code quality

C.

faster releases that have minimal features

D.

strict adherence to product requirements

Full Access
Question # 136

While developing a real-Time VoIP application on a Cisco Webex platform, users report that their voice gets chopped or parts of the conversation drop out. Which network constraint is impacting the application?

A.

latency

B.

jitter

C.

capacity

D.

delay

Full Access
Question # 137

Refer to the exhibit.

200-901 question answer

A Python script must delete all Cisco Catayst 9300 Series switches that have an uptime that is greater than 90 days The script must also query for the status of all the other devices Drag and drop the code from the bottom onto the bottom box the code is missing to complete the script Not at options are used

200-901 question answer

Full Access
Question # 138

200-901 question answer

Refer to the exhibit. What does the load balancer enable in the network topology?

A.

hosted application to access Internet services

B.

external requests to be routed to the application servers

C.

workstations to access the Internet

D.

application to access the database server

Full Access
Question # 139

Refer to the exhibit.

200-901 question answer

Which two files are being edited in the unified diff? (Choose two.)

A.

README.md

B.

setup.py

C.

axl.py

D.

ciscoaxl.py

E.

index.py

Full Access
Question # 140

What is the main purpose of a code review?

A.

To provide the technical lead visibility into all code

B.

To identify and review errors with the team

C.

To ensure that all code is checked in simultaneously

D.

To detect logical errors

Full Access