Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! 200-901 DevNet Associate (DEVASC) is now Stable and With Pass Result

200-901 Practice Exam Questions and Answers

DevNet Associate (DEVASC)

Last Update 23 hours ago
Total Questions : 406

200-901 is stable now with all latest exam questions are added 23 hours ago. Just download our Full package and start your journey with Cisco DevNet Associate (DEVASC) certification. All these Cisco 200-901 practice exam questions are real and verified by our Experts in the related industry fields.

200-901 PDF

200-901 PDF (Printable)
$53.2
$132.99

200-901 Testing Engine

200-901 PDF (Printable)
$58
$144.99

200-901 PDF + Testing Engine

200-901 PDF (Printable)
$72.8
$181.99
Question # 1

What are two characteristics of Bare Metal environments that are related to application deployment? (Choose two.)

Options:

A.  

Provide the hypervisor to host virtual servers

B.  

Specifically designed for container-based workloads.

C.  

Provides workloads with access to hardware features

D.  

Suitable for legacy application that do not support virtualization

E.  

Not compatible with other cloud services such as PaaS or SaaS offerings.

Discussion 0
Question # 2

Refer to the exhibit.

Question # 2

What is the function of the python script?

Options:

A.  

Count and print the total number of available devices.

B.  

Iterate over a list of network devices and write all device names and management IP addresses to an output file.

C.  

Iterate over a list of network devices and write all device type and associated management IP address.

D.  

For each device that is returned, display the device and, for each device, print the device name and management IP address.

E.  

Loop through the returned list of network devices and, for each device, print the device name management IP address.

Discussion 0
Question # 3

Which two elements are foundational principles of DevOps? (Choose two.)

Options:

A.  

designing applications as microservices

B.  

encouraging containers for the deployment of applications

C.  

organizing cross-functional teams over organizational silos

D.  

optimizing the cost of infrastructures

E.  

automating over documenting

Discussion 0
Question # 4

Which two NETCONF operations cover the RESTCONF GET operation? (Choose two.)

Options:

A.  

B.  

C.  

D.  

E.  

Discussion 0
Question # 5

Fill in the blanks to complete the Bash script in which each file in a directory is renamed to Its SHA256 hash?

Question # 5

Options:

Discussion 0
Question # 6

Refer to the exhibit.

Question # 6

OR

Question # 6

An administrator attempts to perform a GET using the Cisco IOS XE RESTOCNF API to return the hostname of a device. The sequence diagram illustrated the HTTP message observed. Which change to the API request resolves the issue?

Options:

A.  

Add Content-Type HTTP header with 'application/yang-data+json' using –H ‘Content-Type: application/yang-data+json’.

B.  

Use -u cisco: cisco instead of -u ‘cisco: cisco'.

C.  

Change the request method from -X "GET” to- X’ POST”.

D.  

Remove the -H ’Accept: application/yang-data^/son’ HTTP header because it is not required.

Discussion 0
Question # 7

What is the outcome of executing this command?

git clone ssh://john@exmaple.com/path/to/my-project_git

Options:

A.  

Creates a local copy of a repository called “my project”

B.  

Creates a copy of a branch called “my project”

C.  

Initiates a new Git repository called “my project”

D.  

Creates a new branch called “my project”

Discussion 0
Question # 8

What should a CI/CD pipeline aim to achieve?

Options:

A.  

to allow manual testing before deployment

B.  

to require minimal manual interaction

C.  

to support new deployments on a fixed monthly schedule

D.  

to provide a documented process for feedback

Discussion 0
Question # 9

Refer to the exhibit.

Question # 9

A process on the host wants to access the service running inside this Docker container. Which port is used to make a connection?

Options:

A.  

only outbound connections between 3000 and 5000 are possible

B.  

port 3000

C.  

any port between 3000 and 5000

D.  

port 5000

Discussion 0
Question # 10

Refer to the exhibit.

Question # 10

What is the action of the Bash script that is shown?

Options:

A.  

The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory.

B.  

The script goes into the directory called “$ndir” and makes a new directory called “$ndir”

C.  

The script waits unit input is entered, then it goes into the directory entered and creates a new directory with the same name.

D.  

For all directories in the current folder. The script goes into directory and makes a new directory.

Discussion 0
Question # 11

Which two types of NAT are used in a network? (Choose two.)

Options:

A.  

Static NAT

B.  

Normal NAT

C.  

Multicast NAT

D.  

Dynamic NAT

E.  

Router NAT

Discussion 0
Question # 12

Refer to the exhibit.

Question # 12

Which JSON is equivalent to the XML –encoded data?

Question # 12

Question # 12

Question # 12

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 13

Refer to the exhibit.

Question # 13

What caused the error in this API request?

Options:

A.  

The API resource does not support the POST operation.

B.  

The API resource does not support JSON format payloads.

C.  

The submitted JSON payload includes a field that is not supported by the API resources.

D.  

The submitted JSON payload has a formatting issue.

Discussion 0
Question # 14

What is the purpose of a MAC address?

Options:

A.  

To uniquely identify a router in a LAN

B.  

To uniquely identify a network interface in a LAN

C.  

To uniquely identify a device on the internet

D.  

To uniquely identify a switch in a LAN

Discussion 0
Question # 15

Which is an advantage of using network programmability?

Options:

A.  

It removes CLI access for devices.

B.  

It provides for more scalable and replicable network provisioning.

C.  

Manual configuration is faster.

D.  

No cloud abstraction occurs.

Discussion 0
Question # 16

Which two concepts describe test-driven development? (Choose two.)

Options:

A.  

It enables code refactoring.

B.  

Write a test before writing code.

C.  

Implementation is driven by incremental testing of release candidates.

D.  

User acceptance testers development the test requirements.

E.  

Tests are created when code is ready for release.

Discussion 0
Question # 17

Drag and drop the characteristics from the left onto the corresponding software development methodologies on the right?

Question # 17

Options:

Discussion 0
Question # 18

Which model-driven programmability protocol does Cisco IOS XE Software support?

Options:

A.  

CORBA

B.  

SSH

C.  

gNMI

D.  

SOAP

Discussion 0
Question # 19

Which platform is run directly using a hypervisor?

Options:

A.  

bare metal systems

B.  

containers

C.  

virtual machines

D.  

applications

Discussion 0
Question # 20

What is a benefit of organizing code into modules?

Options:

A.  

improves overall performance

B.  

reduces the length of code

C.  

enables code to be multifunctional

D.  

enables the reuse of code

Discussion 0
Question # 21

Refer to the exhibit.

Question # 21

A network engineer uses model-driven programmability to monitor and perform changes on the network. The network engineer decides to use the NETCONF RPC message to complete one of their tasks. What is accomplished by sending the RPC message?

Options:

A.  

The running-config of the device is returned.

B.  

The name of each interface is reset to a default name.

C.  

All the YANG capabilities supported by the device are returned.

D.  

A list of interface names is returned.

Discussion 0
Question # 22

Which product provides network controller-level management features?

Options:

A.  

Cisco DNA Center

B.  

Cisco NX-OS

C.  

Cisco UCS Manager

D.  

Cisco ISE

Discussion 0
Question # 23

What are two functions of a routing table on a network device? (Choose two.)

Options:

A.  

It lists entries more than two hops away.

B.  

It lists the routes to a particular destination.

C.  

It lists the routes to drop traffic.

D.  

It lists hosts that are one hop away.

E.  

It lists the static and dynamic entries.

Discussion 0
Question # 24

Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)

Options:

A.  

22

B.  

23

C.  

80

D.  

443

E.  

880

Discussion 0
Question # 25

What are two benefits of using VLANs? (Choose two.)

Options:

A.  

limits the devices that can join the network

B.  

segments the broadcast domain

C.  

extends the broadcast domain

D.  

allows all network devices to be accessible from any host on the network

E.  

enables the logical grouping of devices that belong to different Layer 2 devices

Discussion 0
Question # 26

While developing a real-Time VoIP application on a Cisco Webex platform, users report that their voice gets chopped or parts of the conversation drop out. Which network constraint is impacting the application?

Options:

A.  

latency

B.  

jitter

C.  

capacity

D.  

delay

Discussion 0
Question # 27

What is the purpose of a MAC address on a network device?

Options:

A.  

unique network address that identifies the network interface of a device

B.  

unique network interlace address that is provided by the DHCP server

C.  

unique hardware address that identifies the network interface of a device

D.  

unique hardware interface address that is provided by the central switch

Discussion 0
Question # 28

Refer to the exhibit.

Question # 28

The Cisco Meraki API manages two organizations. In each organization, two independent networks are defined. How many calls to the /organizations/(orgid)networks endpoint will be run parallel by the GetAllNetwork function of the API client?

Options:

A.  

0

B.  

1

C.  

2

D.  

4

Discussion 0
Question # 29

How does a synchronous API request differ from an asynchronous API request?

Options:

A.  

clients receive responses with a task id for further processing

B.  

clients subscribe to a webhook for operation results

C.  

clients are able to access the results immediately

D.  

clients poll for the status of the execution of operations

Discussion 0
Question # 30

Refer to the exhibit.

Question # 30

Which JSON snippet configures a new interface according to YANG model?

A)

Question # 30

B)

Question # 30

C)

Question # 30

D)

Question # 30

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 31

Question # 31

Refer to the exhibit. A network engineer must collect information from the network. The engineer prepares a script to automate workflow by using Cisco Meraki API. The script must run over nested loops to collect organization and network information and uses the collected data for final collection. Which process is being automated by using the Python script?

Options:

A.  

Gather the IDs of the ACME organization, the BLDG21 network, and the dents on the network

B.  

Provide the BLDG21 network information if it is part of the ACME organization

C.  

Collect the IDs of the clients on the BLDG21 network

D.  

List the IDs from the ACME organization

Discussion 0
Question # 32

A developer created a new secure API and is testing the functionality locally. The API was added to a container for further testing, and other team members and applications need to connect to the API. Which command exposes the API in the container as port 8443 and allows connections external to the host?

Options:

A.  

docker run -p 127.0.0.1:80:8443/tcp myapiservice

B.  

docker run -p 0.0.0.0:443:8443/tcp myapiservice

C.  

docker run -p 0.0.0.0:8443:443/tcp myapiservice

D.  

docker run -p 127.0.0.1:443:8443/tcp myapiservice

Discussion 0
Question # 33

Refer to the exhibit.

Question # 33

An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the 'get_all_interfaces' API call is used?

Options:

A.  

times out

B.  

rate limit

C.  

pagination

D.  

invalid password

Discussion 0
Question # 34

What is a benefit of test-driven development?

Options:

A.  

early customer involvement

B.  

increased code quality

C.  

faster releases that have minimal features

D.  

strict adherence to product requirements

Discussion 0
Question # 35

What are two properties of private IP addresses? (Choose two.)

Options:

A.  

They can be used to access the Internet directly.

B.  

They are more secure than public IP addresses.

C.  

They are not globally unique.

D.  

They can be repeated within the same local network.

E.  

They are controlled globally by an IP address registry.

Discussion 0
Question # 36

What is a benefit of using edge computing in an IoT implementation?

Options:

A.  

low cost in network design

B.  

low network design complexity

C.  

high availability for network components

D.  

high speed in data processing

Discussion 0
Question # 37

What is a requirement when authenticating a RESTCONF API session with a router that runs Cisco IOS XE Software?

Options:

A.  

No authentication is required.

B.  

OAuth must be used.

C.  

Basic authentication must be used.

D.  

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

Discussion 0
Question # 38

Which HTTP code group is issued when a request is received successfully, understood, and processed?

Options:

A.  

2xx

B.  

3xx

C.  

4xx

D.  

5xx

Discussion 0
Question # 39

What is the function of IP address in networking?

Options:

A.  

specifies the type of traffic that is allowed to roam on a network

B.  

represents the unique ID that is assigned to one host on a network

C.  

specifies resource's location and the mechanism to retrieve it

D.  

represents a network connection on specific devices

Discussion 0
Question # 40

Question # 40

Refer to the exhibit. An engineer must authorize a REST API call. The API password is "Cisco123!". Which Bash command must be placed in the code to authorize the call?

Options:

A.  

mkdir API_PASSWORD=Cisco123!

B.  

set API_PASSWORD=Cisco123!

C.  

cp API_PASSWORD=Cisco123!

D.  

export API_PASSWORD=Cisco123!

Discussion 0
Question # 41

Refer to the exhibit.

Question # 41

A network engineer wants to use an API to update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which line of code needs to be placed in the snippet where the code is missing?

Options:

A.  

{'Content-Type': 'application/yang.data+xml', 'Accept': 'application/yang.data

+xml'}

B.  

{'Content-Type': 'application/yang.data+yaml', 'Accept': 'application/yang.data

+yaml'}

C.  

{'Content-Type': 'application/restconf.data+json', 'Accept': 'application/

restconf.data+json'}

D.  

{'Content-Type': 'application/yang.data+utf8', 'Accept': 'application/

restconf.data+utf8'}

Discussion 0
Question # 42

A developer attempts to refactor and improve the application code. It is noticed that the code contains several pieces of key information that could be a security threat if this code is accessible by those who are not

authorized to this data. Which approach addresses the security concerns noticed by the developer?

Options:

A.  

Host the application code on a machine located in a secure data center.

B.  

Utilize environment variables for username and password details.

C.  

Rely on the security teams’ goodwill to not give access to those who do not need it.

D.  

Move the hardware that the application is deployed on to a secure location.

Discussion 0
Question # 43

Question # 43

Refer to the exhibit. An engineer is managing the network of an enterprise. The network is using a distributed deployment model. The enterprise uses database to store logs. The current policy requires logs to be stored if changes are made to the infrastructure in any of the devices on the data centers. Which workflow is being automated by the Bash script?

Options:

A.  

returning backup files that are older than 30 days

B.  

deleting backup files that are older than 30 days

C.  

configuring the directory to delete files automatically

D.  

automating deletion of all backup files every 30 days

Discussion 0
Question # 44

Which tool provides a testing environment to run tests on network devices and perform network automation scenarios?

Options:

A.  

Visual Studio Code

B.  

Cisco VIRL

C.  

pyATS

D.  

Cisco Packet Tracer

Discussion 0
Question # 45

A file in a local Git repository has been updated and issued the git add . command. The git diff command has been run to compare the changes to the previous commit, but nothing shows. Which action identifies the problem?

Options:

A.  

Run the git add . command again in the correct subdirectory to ensure changes added to the staging area.

B.  

Run the git commit command before the differences are compared to receive the end state of the code.

C.  

Run the git status command to see the differences between current and previous code review stages.

D.  

Run the git diff --staged command to compare the code added to the staging area.

Discussion 0
Question # 46

What is a procedural component of CI/CD pipelines?

Options:

A.  

Bundled artifacts must be generated.

B.  

Every test must pass for the pipeline to continue its execution.

C.  

Some tests fall without stopping the pipeline execution.

D.  

The release label that identifies the build is optional.

Discussion 0
Question # 47

Drag and drop characteristics from the left onto the infrastructure management methodologies on the right.

Question # 47

Options:

Discussion 0
Question # 48

Drag and drop the steps from the left into order on the right to create a common CI/CD pipeline process. Not all options are used.

Question # 48

Options:

Discussion 0
Question # 49

Why would a developer compare a current version of code to a previous version?

Options:

A.  

to provide the single source of truth

B.  

to troubleshoot code failures

C.  

to track who made a change

D.  

to aid in collaboration

Discussion 0
Question # 50

Which function does a router provide to a network?

Options:

A.  

broadcast domain segmentation

B.  

unique host on a Layer 3 network

C.  

unique hardware address for every node on a LAN

D.  

broadcast domain extension

Discussion 0
Question # 51

Which Cisco platform is used to manage data center infrastructure through third-party tools and system integrations?

Options:

A.  

Cisco DNA Center

B.  

Cisco UCS Manager

C.  

Cisco Intersight

D.  

Cisco UCS Director

Discussion 0
Question # 52

A company deploys an application via containers in its local data center. As soon as the application goes into production, it starts to crash at specific hours of the day. After investigation, it is concluded that the crashes are due to too many users accessing the application simultaneously. The spikes must be addressed and allow for future growth without discarding the investment already made. Which deployment model must be used?

Options:

A.  

hybrid cloud

B.  

edge

C.  

private cloud

D.  

public cloud

Discussion 0
Question # 53

What is a characteristic of Waterfall compared to Agile software development method?

Options:

A.  

Waterfall focuses on continuous improvement, and Agile focuses on the design phase.

B.  

Waterfall separates the project development lifecycle into sprints, and Agile does not use cycles.

C.  

Waterfall specifies requirements before development begins, and Agile responds flexibly to changes in requirements.

D.  

Waterfall uses reviews with step by step approach, and Agile uses a serially phased approach.

Discussion 0
Question # 54

A developer creates a new application, but the application must be tested before being released to a customer. When a mobile phone that uses 4G is used to access the application, the request fails. Why does the connection to the application fail?

Options:

A.  

The application is hosted on premises and VPN connectivity is required

B.  

The application must be added to the production server before testing.

C.  

The application must be moved to the cloud before testing is possible.

D.  

The application connectivity is limited to HTTPS protocol.

Discussion 0
Question # 55

Question # 55

Refer to the exhibit. A developer must use a token to collect data from Cisco DNA Center API and prepares a Python script to send requests. Which line of code needs to be placed on the snippet where the code is missing to obtain a token from the Cisco DNA Center API?

Options:

A.  

token=BasicAuth(‘user’,‘password’))

B.  

auth=BasicAuth(‘user’,‘password’))

C.  

auth=HTTPBasicAuth(user,password))

D.  

token=HTTPBasicAuth(user,password))

Discussion 0
Question # 56

A developer plans to deploy a new application that will use an API to implement automated data collection from Webex with these requirements:

The application was created by using the request library.

Requires HTTP basic authentication.

Provides data in JSON or XML formats.

Which Cisco DevNet resource helps the developer with how to use the API?

Options:

A.  

DevNet sandbox

B.  

API documentation

C.  

forums

D.  

DevNet code exchange

Discussion 0
Question # 57

A company wants to automate the orders processed on its website using API. The network device that supports the solution must:

  • support XML encoding
  • support distributed transactions
  • support YANG data models
  • be support software redundancy

Which requirement prevents the use of RESTCONF for the solution?

Options:

A.  

software redundancy

B.  

YANG data models

C.  

distributed transactions

D.  

XML encoding

Discussion 0
Question # 58

What is a feature of XML compared to other data formats?

Options:

A.  

It uses tags to define the structure.

B.  

It uses parenthesis for key-value pairs.

C.  

It uses indentation to define the structure.

D.  

It uses namespaces for list representation.

Discussion 0
Question # 59

A developer is attempting to retrieve all the messages from a Cisco Webex space. The server responds by sending the first 1,000 messages. The developer must make additional requests to retrieve the rest of the messages. Which API constraint is described in this scenario?

Options:

A.  

payload limiting

B.  

throttling

C.  

pagination

D.  

rate limiting

Discussion 0
Question # 60

Question # 60

Refer to the exhibit. Drag and drop the Dockerfile contents from the left onto the functions on the right that create a container image to run traceroute to track network path to specific targets. Not all options are used.

Question # 60

Options:

Discussion 0
Get 200-901 dumps and pass your exam in 24 hours!

Free Exams Sample Questions