200-901: DevNet Associate (DEVASC) Part 3
Question #: 121
Topic #: 1
What is a requirement when authenticating a RESTCONF API session with a router that runs Cisco IOS XE Software?
A. No authentication is required.
B. OAuth must be used.
C. A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.
D. Basic authentication must be used.
Selected Answer: D
Question #: 122
Topic #: 1
Which API must an engineer use to change a netmask on a Cisco IOS XE device?
A. Meraki
B. SD-WAN
C. RESTCONF/YANG
D. DNAC
Selected Answer: C
Question #: 123
Topic #: 1
A developer creates a script that configured multiple Cisco IOS XE devices in a corporate infrastructure. The internal test environment is unavailable, and no maintenance window is available to test on a low-priority production environment. Which resource is used to test the code before it is applied to the production environment?
A. Code Exchange
B. Cisco Support
C. Cisco DevNet Learning Labs
D. Cisco DevNet Sandbox
Selected Answer: D
Question #: 124
Topic #: 1
Which tool is used to block all traffic to the domain by using a single API call?
A. Cisco Firepower
B. Cisco AMP
C. Cisco Umbrella
D. Cisco ISE
Selected Answer: C
Question #: 125
Topic #: 1
Why is refactoring done during test-driven development?
A. to enable larger objects and longer methods
B. to improve maintainability and readability
C. to ensure that the previous uses of the objects are explained
D. to ensure the duplication of essential code
Selected Answer: B
Question #: 126
Topic #: 1
Refer to the exhibit. A network engineer must change the configuration on devices daily. The Python script must collect CLI arguments from the user, organize data according to the Cisco-IOS-XE-native YANG model, and utilize Cisco REST APIs to make the configuration. Which workflow is being automated by the
Python script?
A. updating an existing route on the device
B. adding a new route to a device
C. including a route on the device and overwriting the current routes
D. deleting the route that is passed through the command-line variables
Selected Answer: B
Question #: 127
Topic #: 1
Which platform is used to programmatically create a space and invite users for collaboration?
A. Cisco Intersight
B. Cisco Finesse
C. Cisco Webex
D. Cisco UCM
Selected Answer: C
Question #: 128
Topic #: 1
Refer to the exhibit. A developer wants to create a room named cisco through Webex API. The developer prepares the request by putting an API token inside the authorization header; however, the given HTTP call returns error code 400. How must the call parameters be changed to ensure a valid response?
A. Replace the team body parameter with the name body parameter.
B. Replace cisco with a valid name for a team.
C. Change the token in the header with the authorization token.
D. Change the HTTP method of the call to PUT.
Selected Answer: A
Question #: 129
Topic #: 1
Refer to the exhibit. Which line must be included in the Bash script for the Python code to succeed?
A. define WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here
B. export WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here
C. set WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here
D. WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here
Selected Answer: B
Question #: 130
Topic #: 1
What is a capability of the NETCONF protocol?
A. allows Python scripts to be executed externally from a network device
B. uses JSON to encode data in its content layer
C. allows XML messages to be exchanged via the SSH protocol
D. exposes a web-based interface
Selected Answer: C
Question #: 131
Topic #: 1
Refer to the exhibit. A network engineer uses model-driven programmability to monitor and perform changes on the network. The network engineer decides to use the NETCONF RPC message to complete one of their tasks. What is accomplished by sending the RPC message?
A. The running-config of the device is returned.
B. The name of each interface is reset to a default name.
C. All the YANG capabilities supported by the device are returned.
D. A list of interface names is returned.
Selected Answer: D
Question #: 132
Topic #: 1
DRAG DROP –
Drag and drop the code from the bottom onto the box where the code is missing in the Python script to complete a function to return all the clients on a network by using the Cisco Meraki Dashboard API. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 133
Topic #: 1
Refer to the exhibit. A developer creates a script to obtain a list of devices by using the Cisco DNA Center API. The remote server authorizes the request only if an authentication token is supplied in the headers. A function named get_auth_token() must retrieve a valid token by using HTTP Basic Authentication. Which code must be added to complete the get_auth_token() function?
A. resp = requests.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD)) token = resp.json()[‘Token’] return token
B. resp = requests.post(url, auth=(DNAC_USER, DNAC_PASSWORD)) token = resp.json ()[‘Token’] return token
C. resp = http.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD)) token = resp.json()[‘Token’] return token
D. resp = http.post(url, auth=(DNAC_USER, DNAC_PASSWORD)) token = resp.json()[‘Token’] return token
Selected Answer: A
Question #: 134
Topic #: 1
DRAG DROP –
Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request to find the Cisco DNA Center switch count. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 135
Topic #: 1
Refer to the exhibit. A network engineer wants to use an API to update information about device interfaces. The network devices are deployed in a Cisco DevNet
Sandbox and have running interfaces. Which line of code needs to be placed in the snippet where the code is missing?
A. {‘Content-Type’: ‘application/yang.data+xml’, ‘Accept’: ‘application/yang.data+xml’}
B. {‘Content-Type’: ‘application/yang.data+yaml’, ‘Accept’: ‘application/yang.data+yaml’}
C. {‘Content-Type’: ‘application/restconf.data+json’, ‘Accept’: ‘application/restconf.data+json’}
D. {‘Content-Type’: ‘application/yang.data+utf8’, ‘Accept’: ‘application/restconf.data+utf8’}
Selected Answer: A
Question #: 136
Topic #: 1
Refer to the exhibit. A network engineer works on a Cisco DevNet application that is available for download on the Cisco DevNet website. The engineer prepares a bash script to automate operations that relate to the application. Which workflow is being automated in the bash script?
A. compilation and configuration of the Cisco DevNet application so that it must be started manually
B. compilation, installation, and configuration of the Cisco DevNet application so that it starts automatically
C. compilation and installation of the Cisco DevNet application for an autonomous deployment model
D. installation and configuration of the Cisco DevNet application so that it starts manually
Selected Answer: B
Question #: 137
Topic #: 1
A company wants to accelerate the adoption of technologies that will simplify its operations. Staff have different skill levels and are looking for a single site to find easy-to-consume beginner, intermediate, and advanced multidomain use cases. Which site should be used?
A. DevNet Ecosystem Exchange
B. DevNet Automation Exchange
C. DevNet Creations
D. DevNet Support Forum
Selected Answer: B
Question #: 138
Topic #: 1
Which Cisco product provides malware and content filtering through DNS?
A. Cisco ASA Firepower module
B. Cisco AMP
C. Cisco ISE
D. Cisco Umbrella
Selected Answer: D
Question #: 139
Topic #: 1
Which Cisco platform provides organization-wide automation, security, policy enforcement, and agility across wired and wireless networks?
A. Cisco SD-WAN
B. Cisco DNA Center
C. Cisco ACI
D. Cisco Umbrella
Selected Answer: B
Question #: 140
Topic #: 1
What is a characteristic of the Cisco Finesse platform?
A. Applications allow services to be invoked on a network triggered event.
B. The platform provides a ready-to-go platform for HD video and audio conferencing.
C. Applications are added to the platform from the desktop remotely.
D. The platform includes an enterprise-class IM engine.
Selected Answer: A
Question #: 141
Topic #: 1
An engineer needs to retrieve a list of locally available Firepower Threat Defense upgrade packages by using the Firepower Management Center REST API. The engineer uses a GET request with the URL:
/api/fmc_platform/v1/updates/upgradepackages/f413afeb-e6f6-75f4-9169-6d9bd49s625e
What does `f413afeb-e6f6-75f4-9169-6d9bd49s625e` represent?
A. container UUID
B. package UUID
C. domain UUID
D. object UUID
Selected Answer: B
Question #: 142
Topic #: 1
Refer to the exhibit.
A process running on the host wants to access the service running inside this Docker container. Which port or ports are used to make a connection?
A. only outbound connections between 3000 and 5000 are possible
B. port 3000
C. any port between 3000 and 5000
D. port 5000
Selected Answer: B
Question #: 143
Topic #: 1
DRAG DROP –
Drag and drop the Dockerfile instructions from the left onto the descriptions on the right. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 144
Topic #: 1
What are two security benefits of a Docker-based application? (Choose two.)
A. natively secures access to secrets that are used by the running application
B. guarantees container images are secured and free of vulnerabilities
C. easier to patch because Docker containers include only dependencies that the application requires
D. prevents information leakage occurring when unhandled exceptions are returned in HTTP responses
E. allows for separation of applications that traditionally run on the same host
Selected Answer: CE
Question #: 145
Topic #: 1
A local Docker alpine image has been created with an image ID of a391665405fe and tagged as `latest`. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?
A. docker build -p 8080:80 alpine:latest
B. docker exec -p 8080:80 alpine:latest
C. docker start -p 8080:80 alpine:latest
D. docker run -p 8080:80 alpine:latest
Selected Answer: D
Question #: 146
Topic #: 1
Refer to the exhibit.
Which function does the EXPOSE line perform when building an image from this Dockerfile?
A. Local port 8080 of the container that launched with this docker image is accessible from co-hosted containers and external clients.
B. Local port 8080 is not reachable at all because no IP address is specified along with the EXPOSE command of the Dockerfile.
C. Local port 8080 is accessible from other containers running on the same docker host as the container that launched with this docker image.
D. Local port 8080 of the container that launched with this docker image is accessible to external clients.
Selected Answer: C
Question #: 147
Topic #: 1
Which two elements are foundational principles of DevOps? (Choose two.)
A. organizing cross-functional teams over organizational silos
B. designing applications as microservices
C. encouraging containers for the deployment of applications
D. automating over documenting
E. optimizing the cost of infrastructures
Selected Answer: AD
Question #: 148
Topic #: 1
Which platform is run directly on top of a hypervisor?
A. bare metal systems
B. virtual machines
C. containers
D. applications
Selected Answer: B
Question #: 149
Topic #: 1
What are two characteristics of Bare Metal environments that are related to application deployment? (Choose two.)
A. specifically designed for container-based workloads
B. suitable for legacy applications that do not support virtualization
C. provides workloads with access to hardware features
D. not compatible with other cloud services such as PaaS or SaaS offerings
E. provides the hypervisor to host virtual servers
Selected Answer: BC
Question #: 150
Topic #: 1
A new application is being developed that must be hardware independent. The application includes an administrative component which is accessed using a
Windows desktop GUI. Installation and management of the environment must be fully automated. Which application deployment type meets the requirements?
A. virtual machine
B. virtual Python environment
C. container
D. bare metal
Selected Answer: A
Question #: 151
Topic #: 1
DRAG DROP –
Drag and drop the code from the bottom onto the box where the code is missing in the Bash script to complete the missing assignments.
Select and Place:
Suggestion Answer:
Question #: 152
Topic #: 1
Refer to the exhibit.
What is the action of the Bash script that is shown?
A. For all directories in the current folder, the script goes into the directory and makes a new directory.
B. The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory.
C. The script waits until input is entered, then it goes into the directory entered and creates a new directory with the same name.
D. The script goes into the directory called ג€$ndirג€ and makes a new directory called ג€$ndirג€.
Selected Answer: B
Question #: 153
Topic #: 1
When using the Bash shell, how is the output of the devnet command saved to a file named `output.txt`?
A. devnet > output.txt
B. devnet | output.txt
C. devnet < output.txt
D. devnet & output.txt
Selected Answer: A
Question #: 154
Topic #: 1
DRAG DROP –
Drag and drop the Bash commands from the left onto the related actions on the right.
Select and Place:
Suggestion Answer:
Question #: 155
Topic #: 1
After a project is migrated to a new codebase, the `old_project` directory must be deleted. This directory has multiple read-only flies, and it must be deleted recursively without prompting for confirmation. Which Bash command must be used?
A. rmdir -p old_project
B. rm -rf old_project
C. rm -r old_project
D. rmdir old_project
Selected Answer: B
Question #: 156
Topic #: 1
What is a benefit of using edge computing in an IoT implementation?
A. high speed in data processing
B. low network design complexity
C. low cost in network design
D. high availability for network components
Selected Answer: A
Question #: 157
Topic #: 1
What is the benefit of edge computing?
A. It reduces network latency by moving processing closer to the data source.
B. It reduces data velocity from devices or other data sources.
C. It simplifies security as devices and processing are brought closer together.
D. It removes the need for centralized data processing.
Selected Answer: A
Question #: 158
Topic #: 1
DRAG DROP –
Refer to the exhibit.
Drag and drop the variables from the left onto the item numbers on the right that match the missing assignments in the exhibit.
Select and Place:
Suggestion Answer:
Question #: 159
Topic #: 1
DRAG DROP –
Drag and drop the descriptions from the left onto the correct application deployment models on the right.
Select and Place:
Suggestion Answer:
Question #: 160
Topic #: 1
Which type of threat occurs when an attacker can send hostile data to an interpreter within an application?
A. sensitive data exposure
B. broken authentication
C. cross-site scripting
D. injection
Selected Answer: D
Question #: 161
Topic #: 1
A company is looking for a cloud deployment which will only use the on-premise infrastructure, is user self-service, and is easy to scale. Which cloud solution should be selected for these requirements?
A. multi
B. private
C. hybrid
D. public
Selected Answer: B
Question #: 162
Topic #: 1
Refer to the exhibit.
Which OWASP threat does this example demonstrate?
A. broken access control
B. cross-site scripting
C. SQL injection
D. man-in-the-middle
Selected Answer: C
Question #: 163
Topic #: 1
What should a CI/CD pipeline aim to achieve?
A. to require minimal manual interaction
B. to allow manual testing before deployment
C. to support new deployments on a fixed monthly schedule
D. to provide a documented process for feedback
Selected Answer: A
Question #: 164
Topic #: 1
What are two roles of an artifact repository in a CI/CD pipeline? (Choose two.)
A. stores files needed and generated during the build process
B. provides traceable, searchable, and manageable binary files
C. is required for CI/CD pipelines executed on a public cloud infrastructure
D. allows for comparing and merging changes in the source code
E. is required for managing open source software
Selected Answer: AB
Question #: 165
Topic #: 1
A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time.
Which area of the CALMS framework must the company target for improvement?
A. Collaboration
B. Lean
C. Sharing
D. Measurement
Selected Answer: B
Question #: 166
Topic #: 1
Refer to the exhibit. Which command, including arguments, is executed when the container starts?
A. /bin/sh -c “/bin/sleep 30 && nginx -g ‘daemon off;'”
B. /bin/sh -c “/bin/sleep 10 && nginx -g ‘daemon off;'”
C. /bin/bash -c “/bin/sleep 30 && nginx -g ‘daemon off;'”
D. /bin/sh -c “/bin/sleep 30” && nginx -g ‘daemon off;’
Selected Answer: A
Question #: 167
Topic #: 1
A developer created a new secure API and is testing the functionality locally. The API was added to a container for further testing, and other team members and applications need to connect to the API. Which command exposes the API in the container as port 8443 and allows connections external to the host?
A. docker run -p 127.0.0.1:80:8443/tcp myapiservice
B. docker run -p 0.0.0.0:443:8443/tcp myapiservice
C. docker run -p 0.0.0.0:8443:443/tcp myapiservice
D. docker run -p 127.0.0.1:443:8443/tcp myapiservice
Selected Answer: B
Question #: 168
Topic #: 1
A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:
$ docker tag 84fe411926287 local/app:0.4
Which command must be executed next to build the Docker image using the tag?
A. $ docker build -p local/app:0.4
B. $ docker run -t local/app:0.4
C. $ docker run -p local/app:0.4
D. $ docker build -t local/app:0.4
Selected Answer: D
Question #: 169
Topic #: 1
Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)
A. 22
B. 23
C. 80
D. 443
E. 880
Selected Answer: AD
Question #: 170
Topic #: 1
What is a benefit of using a code review process in application development?
A. accelerates the deployment of new features in an existing application
B. provides version control during code development
C. enables the quick deployment of new code
D. eliminates common mistakes during development
Selected Answer: D
Question #: 171
Topic #: 1
Which OWASP threat takes advantage of a web application that the user has already authenticated to execute an attack?
A. phishing
B. DoS
C. brute force attack
D. CSRF
Selected Answer: D
Question #: 172
Topic #: 1
Refer to the exhibit. An application must be deployed on a server that has other applications installed. The server resources are to be allocated based on the deployment requirements. The OS for each application must be independent. Which type of deployment is used?
A. hybrid
B. virtual machines
C. containers
D. bare metal
Selected Answer: B
Question #: 173
Topic #: 1
What is a benefit of a distributed version control system?
A. encourages users to commit small places of work to the system more frequently
B. ensures that all code meets minimum standards before being committed to the system
C. allows users to work on the codebase even when not connected to the Internet
D. ensures that all code is tested before being committed to the system
Selected Answer: C
Question #: 174
Topic #: 1
A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing? The data contains sensitive information, so specialist encryption tools must be used to secure the data. Which application deployment model meets the requirements?
A. edge
B. private cloud
C. public cloud
D. hybrid cloud
Selected Answer: D
Question #: 175
Topic #: 1
What is a procedural component of CI/CD pipelines?
A. Bundled artifacts must be generated.
B. Every test must pass for the pipeline to continue its execution.
C. Some tests fall without stopping the pipeline execution.
D. The release label that identifies the build is optional.
Selected Answer: B
Question #: 176
Topic #: 1
Which OWASP threat occurs when untrusted data is supplied as input to an interpreter as part of a command or query?
A. broken authentication
B. data exposure
C. injection
D. cross-site scripting
Selected Answer: C
Question #: 177
Topic #: 1
Which product provides network controller-level management features?
A. Cisco ISE
B. Cisco DNA Center
C. Cisco UCS Manager
D. Cisco NX-OS
Selected Answer: B
Question #: 178
Topic #: 1
What is the purpose of the Cisco VIRL software tool?
A. to verify configurations against compliance standards
B. to automate API workflows
C. to simulate and model networks
D. to test performance of an application
Selected Answer: C
Question #: 179
Topic #: 1
What are two advantages of the Model-View-Controller software design pattern? (Choose two.)
A. allows for multiple views of the same model
B. separates responsibilities of the code, which makes future modifications easier
C. simplifies network automation
D. makes code easier to deploy using CI/CD pipelines
E. reduces the need for error handling
Selected Answer: AB
Question #: 180
Topic #: 1
Refer to the exhibit.
What is represented in this YANG module?
A. interface management
B. BGP
C. OpenFlow
D. topology
Selected Answer: A