Labour Day - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

200-901 DevNet Associate (DEVASC) Questions and Answers

Questions 4

Which Cisco platform provides organization-wide automation, security, policy enforcement, any agility across wired and wireless networks?

Options:

A.

Cisco ACI

B.

Cisco DNA Center

C.

Cisco Umbrella

D.

Cisco SD-WAN

Buy Now
Questions 5

Refer to Exhibit.

200-901 Question 5

Which JSON is equivalent to the XML-encoded data.

A)

200-901 Question 5

B)

200-901 Question 5

C)

200-901 Question 5

D)

200-901 Question 5

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 6

On which network plane is routing protocol traffic handled?

Options:

A.

data plane

B.

management plane

C.

authentication plane

D.

control plane

Buy Now
Questions 7

What is a tenet of test-driven development?

Options:

A.

write documentation for tests

B.

write tests after adding new blocks of code

C.

write and run tests before writing new code

D.

run tests after writing new code

Buy Now
Questions 8

Fill in the blanks to complete the statement.

Cisco DNA provide the capability to send an HTTP _______________ request to the API endpoint https://DNA-c_API_ADDRESS/api/vi/network-device/ and receive the network __________ list in __________ format.

Options:

Buy Now
Questions 9

Which two statements about JSON and XML are true? (Choose two.)

Options:

A.

JSON objects are collection of key value pair.

B.

The syntax of JSON contains tags, elements, and attributes.

C.

JSON arrays are an unordered set of key value pairs.

D.

The syntax of XML contains tags, elements, and attributes.

E.

XML objects are collections of key-value pairs.

Buy Now
Questions 10

Which CI/CD tool is an automation tool used to build, test, and deploy software?

Options:

A.

Nagios

B.

Gradle

C.

Jenkins

D.

Git

Buy Now
Questions 11

What should a CI/CD pipeline aim to achieve?

Options:

A.

to allow manual testing before deployment

B.

to require minimal manual interaction

C.

to support new deployments on a fixed monthly schedule

D.

to provide a documented process for feedback

Buy Now
Questions 12

What does a load balancer distribute in a network environment?

Options:

A.

outgoing connections to the network

B.

incoming traffic across multiple servers

C.

different TCP connections to the routers

D.

traffic in the network by leveraging the switch architecture

Buy Now
Questions 13

Where is an IP packet routed if the packet does not match any routes in the routing table?

Options:

A.

firewall

B.

load balancer

C.

central switch

D.

default gateway

Buy Now
Questions 14

Which HTTP code group is issued when a request is received successfully, understood, and processed?

Options:

A.

2xx

B.

3xx

C.

4xx

D.

5xx

Buy Now
Questions 15

Which protocol runs over TCP port 22?

Options:

A.

SSH

B.

HTTP

C.

Telnet

D.

NETCONF

Buy Now
Questions 16

A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time.

Which area of the CALMS framework must the company target for improvement?

Options:

A.

Collaboration

B.

Lean

C.

Sharing

D.

Measurement

Buy Now
Questions 17

Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)

Options:

A.

22

B.

23

C.

80

D.

443

E.

880

Buy Now
Questions 18

Refer to the exhibit.

200-901 Question 18

Which command needs to be placed on the box where the code is missing to output the value of page_jd in the Python 3.7 script?

A)

200-901 Question 18

B)

200-901 Question 18

C)

200-901 Question 18

D)

200-901 Question 18

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 19

Refer to the exhibit.

200-901 Question 19

A Python script must delete all Cisco Catayst 9300 Series switches that have an uptime that is greater than 90 days The script must also query for the status of all the other devices Drag and drop the code from the bottom onto the bottom box the code is missing to complete the script Not at options are used

200-901 Question 19

Options:

Buy Now
Questions 20

Refer to the exhibit.

200-901 Question 20

A developer creates a script to obtain a list of devices by using the Cisco DNA Center API. The remote server authorizes the request only if an authentication token is supplied in the headers. A function named get_auth_token() must retrieve a valid token by using HTTP Basic Authentication. Which code must be added to complete the get_auth_token() function?

Options:

A.

resp = requests.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

B.

resp = requests.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json ()['Token']

return token

C.

resp = http.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

D.

resp = http.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

Buy Now
Questions 21

Refer to the exhibit.

200-901 Question 21

While developing a Cisco Webex bot, an application reaches the public IP address of the firewall, but traffic is forwarded to the IP address of server 1 instead of the IP address of server 2. What causes this issue?

Options:

A.

The proxy server that rewrites traffic is misconfigured.

B.

The router is sending the traffic to server 1 instead of server 2.

C.

The switch is forwarding IP traffic to the wrong VLAN.

D.

NAT is misconfigured on the firewall.

Buy Now
Questions 22

200-901 Question 22

Refer to the exhibit. Which code snippet represents the sequence.

Options:

A.

200-901 Question 22 Option 1C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

B.

22C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

C.

22C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

D.

22C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

Buy Now
Questions 23

What is a principle of a code review process?

Options:

A.

Changes are made after the code is submitted to source control.

B.

It must not prevent code from getting into production as quickly as possible.

C.

Naming standards must be consistent.

D.

A technical lead must sign off on the review.

Buy Now
Questions 24

Which command reverses the last commit without changing the index file or the working tree position?

Options:

A.

git revert HEAD

B.

git reset --hard HEAD~3

C.

git reset --soft HEAD^

D.

git revert

Buy Now
Questions 25

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

200-901 Question 25

Options:

Buy Now
Questions 26

Refer to the exhibit.

200-901 Question 26

200-901 Question 26

Drag and drop the code from the left onto the item numbers on the right to complete to Meraki python script shown in the exhibit.

200-901 Question 26

Options:

Buy Now
Questions 27

How are load balancers used in modern application deployment?

Options:

A.

Allow traffic to continue as new compute units are brought up and old compute units are taken down.

B.

Allow http and https traffic to continue as old compute units are discontinued before new units are brought up.

C.

Turn off traffic and take down compute units, then update and bring the compute units back up.

D.

Bring up new compute units, test the compute units, and switch the traffic from old units to new units.

Buy Now
Questions 28

A developer creates a script that configured multiple Cisco IOS XE devices in a corporate infrastructure. The internal test environment is unavailable, and no maintenance window is available to test on a low-priority production environment. Which resource is used to test the code before it is applied to the production environment?

Options:

A.

Code Exchange

B.

Cisco DevNet Learning Labs

C.

Cisco DevNet Sandbox

D.

Cisco Support

Buy Now
Questions 29

What are two functions of a routing table on a network device? (Choose two.)

Options:

A.

It lists entries more than two hops away.

B.

It lists the routes to a particular destination.

C.

It lists the routes to drop traffic.

D.

It lists hosts that are one hop away.

E.

It lists the static and dynamic entries.

Buy Now
Questions 30

What is a capability of an agentless configuration management system?

Options:

A.

It requires managed hosts to have an interpreter for a high-level language such as Python or Ruby.

B.

It requires managed hosts to connect to a centralized host to receive updated configurations.

C.

It uses compiled languages as the basis of the domain-specific language to interface with managed hosts.

D.

It uses existing protocols to interface with the managed host.

Buy Now
Questions 31

What is the purpose of the first three pairs of digits in a MAC address?

Options:

A.

defines a routing identifier for the client

B.

indicates the IP address of the client in Hex

C.

defines packet forwarding priority sent or received by the adapter

D.

indicates vendor of the network card or adapter

Buy Now
Questions 32

Refer to the exhibit.

200-901 Question 32

A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?

Options:

A.

verifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages

B.

verifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version

C.

uninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version

D.

installing nginx, uninstalling apache2, and then verifying that the package repository is at the latest version

Buy Now
Questions 33

What are two properties of private IP addresses? (Choose two.)

Options:

A.

They can be used to access the Internet directly.

B.

They are more secure than public IP addresses.

C.

They are not globally unique.

D.

They can be repeated within the same local network.

E.

They are controlled globally by an IP address registry.

Buy Now
Questions 34

Which statement describes the benefit of using functions in programming?

Options:

A.

Functions allow problems to be split into simpler, smaller groups, and reduce code repetition, which makes the code easier to read.

B.

Functions ensure that a developer understands the inner logic contained before using them as part of a script or application.

C.

Functions create the implementation of secret and encrypted algorithms.

D.

Functions store mutable values within a script 01 application.

Buy Now
Questions 35

Which platform is run directly using a hypervisor?

Options:

A.

bare metal systems

B.

containers

C.

virtual machines

D.

applications

Buy Now
Questions 36

What is the outcome of executing this command?

git clone ssh://john@exmaple.com/path/to/my-project_git

Options:

A.

Creates a local copy of a repository called “my project”

B.

Creates a copy of a branch called “my project”

C.

Initiates a new Git repository called “my project”

D.

Creates a new branch called “my project”

Buy Now
Questions 37

Which platform has an API that be used to obtain a list of vulnerable software on user devices?

Options:

A.

Cisco Umbrella

B.

Cisco Firepower

C.

Cisco Identity Services Engine

D.

Cisco Advanced Malware Protection

Buy Now
Questions 38

Which API is used to obtain data voicemail ports?

Options:

A.

Finesse gadgets

B.

Cisco Unified Communications manager

C.

Webex devices

D.

Webex teams

Buy Now
Questions 39

A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing? The data contains sensitive information, so specialist encryption tools must be used to secure the data. Which application deployment model meets the requirements?

Options:

A.

edge

B.

private cloud

C.

public cloud

D.

hybrid cloud

Buy Now
Questions 40

Which function does a router provide to a network?

Options:

A.

broadcast domain segmentation

B.

unique host on a Layer 3 network

C.

unique hardware address for every node on a LAN

D.

broadcast domain extension

Buy Now
Questions 41

What is a feature of XML compared to other data formats?

Options:

A.

It uses tags to define the structure.

B.

It uses parenthesis for key-value pairs.

C.

It uses indentation to define the structure.

D.

It uses namespaces for list representation.

Buy Now
Questions 42

200-901 Question 42

Refer to the exhibit. A network engineer must configure new interfaces on a set of devices and is planning to use an Ansible playbook for the task. All devices support SSH and NETCONF protocol, and the interface variables are unique per device. In which directory are the YAML files including variables hosted to automate the task with the netconf_config module?

Options:

A.

current working directory

B.

host_vars directory

C.

group_vars directory

D.

home directory

Buy Now
Questions 43

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. The Python script retrieves a list of tasks from a to-do list for effective project management purposes. Not all options are used.

200-901 Question 43

Options:

Buy Now
Questions 44

Which HTTP error code series relates to redirection?

Options:

A.

400

B.

500

C.

200

D.

300

Buy Now
Questions 45

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer will use an Ansible playbook to configure devices through Cisco NX REST API. Before the code is run, which resource must be used to verify that the REST API requests work as expected?

Options:

A.

Cisco Open NX-OS

B.

Cisco NX-OS SDK

C.

Cisco Learning Labs

D.

Cisco Code Exchange for Nexus

Buy Now
Questions 46

Which HTTP method is used by webhooks and notifies a listener about an event change?

Options:

A.

PUT

B.

POST

C.

PATCH

D.

GET

Buy Now
Questions 47

Developer is working on a new feature and made changes on a branch named ‘branch-413667549a-new’. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?

Options:

A.

git merge -no-edit

B.

git merge -commit

C.

git merge -revert

D.

git merge -abort

Buy Now
Questions 48

A function my_func() returns True when it executes normally. Which python snippet tests my_func()?

200-901 Question 48

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 49

Which technology is responsible for matching a name to an IP address of an application running on a host?

Options:

A.

firewall

B.

proxy

C.

load balancer

D.

DNS

Buy Now
Questions 50

A developer has addressed a bug that was found in the production code of an application. A separate file named ‘bug427896191v_fix” has been created with the changes to the code. Which Git command must be used to incorporate the bug fix into the production code?

Options:

A.

git rebase

B.

git cat-file

C.

git merge-file

D.

git bisert

Buy Now
Questions 51

A developer pushes an application to production. The application receives a webhook over HTTPS without a secret. The webhook information contains credentials to service in cleartext. When the information is received, it is stored in the database with an SHA-256 hash. Credentials to the database are accessed at runtime through the use of a vault service. While troubleshooting, the developer sets the logging to debug to view the message from the webhook. What is the security issue in this scenario?

Options:

A.

Database credentials should be accessed by using environment variables defined at runtime.

B.

During the transport of webhook messages, the credentials could be unencrypted and leaked.

C.

During logging, debugging should be disabled for the webhook message.

D.

Hashing the credentials in the database is not secure enough; the credentials should be encrypted.

Buy Now
Questions 52

What is a function of the default gateway in a network?

Options:

A.

to drop traffic that is destined to the default gateway

B.

to forward traffic to different subnets

C.

to forward traffic to the same subnet

D.

to drop traffic that is not destined to the default gateway

Buy Now
Questions 53

Which traffic is handled on the control plane?

Options:

A.

BGP

B.

SMB

C.

NTP

D.

NETCONF

Buy Now
Questions 54

Which platform has an API that has the capability to obtain a list of vulnerable software on user devices?

Options:

A.

Cisco Advanced Malware Protection

B.

Cisco Umbrella

C.

Cisco Identity Services Engine

D.

Cisco Firepower

Buy Now
Questions 55

Which technology is responsible for resolving a host name to an IP address?

Options:

A.

DNS

B.

SNMP

C.

DHCP

D.

NTP

Buy Now
Questions 56

Refer to the exhibit.

200-901 Question 56

What is the action of the Bash script that is shown?

Options:

A.

The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory.

B.

The script goes into the directory called “$ndir” and makes a new directory called “$ndir”

C.

The script waits unit input is entered, then it goes into the directory entered and creates a new directory with the same name.

D.

For all directories in the current folder. The script goes into directory and makes a new directory.

Buy Now
Questions 57

A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without error and the bundles are produced. However, when the script is run during business hours, report poor voice quality of phones calls. What explains this behavior?

Options:

A.

The application is running in the Voice VLAN and causes delays and jitter in the subnet.

B.

The speed and duplex settings in Cisco DNA Center are sot incorrectly, which causes the transfer to be too slow.

C.

9 The script is written in a low-level programming language where there is no memory safety. This causes a buffer overflow and disruption on the network.

D.

Generating the logs causes the CPU on the network controller to spike, which causes delays m forwarding the voice IP packets.

Buy Now
Questions 58

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. (Not all Options are used)

200-901 Question 58

Options:

Buy Now
Questions 59

What are two roles of an artifact repository in a CI/CD pipeline? (Choose two.)

Options:

A.

is required for CI/CD pipelines executed on a public cloud infrastructure

B.

is required for managing open source software

C.

stores files needed and generated during the build process

D.

allows for comparing and merging changes in the source code

E.

provides traceability, search, and management of binary files

Buy Now
Questions 60

Drag and drop the functionalities from the left onto correct networking devices on the right.

200-901 Question 60

Options:

Buy Now
Exam Code: 200-901
Exam Name: DevNet Associate (DEVASC)
Last Update: Apr 23, 2024
Questions: 406

PDF + Testing Engine

$59.5  $169.99

Testing Engine

$45.5  $129.99
buy now 200-901 testing engine

PDF (Q&A)

$38.5  $109.99
buy now 200-901 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 28 Apr 2024