Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

200-901 Questions and Answers

Question # 6

What is an example of a network interface hardware address?

A.

domain name

B.

IP address

C.

workstation name

D.

MAC address

Full Access
Question # 7

Drag and Drop the Bash commands from the left onto the correct actions on the right.

Full Access
Question # 8

What is the outcome of executing this command?

git clone ssh://john@exmaple.com/path/to/my-project_git

A.

Creates a local copy of a repository called “my project”

B.

Creates a copy of a branch called “my project”

C.

Initiates a new Git repository called “my project”

D.

Creates a new branch called “my project”

Full Access
Question # 9

Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco DNA center API.

Full Access
Question # 10

Fill in the blanks to complete the statement.

Cisco DNA provide the capability to send an HTTP _______________ request to the API endpoint https://DNA-c_API_ADDRESS/api/vi/network-device/ and receive the network __________ list in __________ format.

Full Access
Question # 11

What should a CI/CD pipeline aim to achieve?

A.

to allow manual testing before deployment

B.

to require minimal manual interaction

C.

to support new deployments on a fixed monthly schedule

D.

to provide a documented process for feedback

Full Access
Question # 12

A 401 HTTP response code is returned when calling a REST API. What is the error state identified by this response code?

A.

The server cannot process the request as it has detected an issue in the request syntax or body.

B.

The server accepted the request but the client is not authorized for this content.

C.

The request has not been accepted because it requires authentication.

D.

The server cannot find the requested resource because the path specified is incorrect.

Full Access
Question # 13

A REST API service requires authentication based on the username and password. The user “john” has the password “384279060” and the Base64 encoding of those credentials is “am9objowMTIzNDU2Nzg=”. Which method completes an authentication request?

A.

The header must include:

Authorization: Bearer am9obJowMTlzNDU2Nzg=

B.

The payload must include:

Authorization: Bearer am9objowMTIzNDU2Nzg=

C.

The payload must include.

Authorization: Basic am9objowMTlzNDU2Nzg=

D.

The header must include:

Authorization: Basic am9objowMTlzNDU2Nzg=

Full Access
Question # 14

Users cannot access a webserver and after the traffic is captured, the capture too* shows an ICMP packet that reports "communication administratively prohibited" What Is the cause of this webserver access Issue?

A.

An access list along the path is blocking the traffic

B.

The traffic is not allowed to be translated with NAT and dropped.

C.

Users must authenticate on the webserver to access It

D.

A router along the path is overloaded and thus dropping traffic

Full Access
Question # 15

The project is migrated to a new codebase, the “old_project” directory must be deleted. The directory has multiple read-only files, and it must be deleted recursively without prompting for confirmation. Which bash command must be used?

A.

rm -rf old_project

B.

rm -r old_project

C.

rmdir -p old_project

D.

rmdir old_project

Full Access
Question # 16

An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen from different clients. Which networking device mut be at fault?

A.

Laptop on which the script is running

B.

Router

C.

Switch

D.

Load balancer

Full Access
Question # 17

Refer to the exhibit.

The output of a unified diff when comparing two versions of a python script is shown. Which two “single_request _timeout ()”

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 18

In python, which expression checks whether the script returns a success status code when the Requests library is used?

A.

response.status_code== requests.ok

B.

response.status_code== requests.codes.ok

C.

response.code== requests.codes.ok

D.

response.status_code ! == requests.codes.ok

Full Access
Question # 19

Refer to the exhibit.

What is the effect of this Ansible playbook on an IOS router?

A.

A new running configuration is pushed to the IOS router.

B.

The current running configuration of the IOS router is backed up.

C.

The start-up configuration of the IOS router is copied to a local folder.

D.

A new start-up configuration is copied to the IOS router.

Full Access
Question # 20

Before which process is code review performed when version control is used?

A.

committing code

B.

branching code

C.

merge of code

D.

checkout of code

Full Access
Question # 21

Refer to the exhibit.

A process on the host wants to access the service running inside this Docker container. Which port is used to make a connection?

A.

only outbound connections between 3000 and 5000 are possible

B.

port 3000

C.

any port between 3000 and 5000

D.

port 5000

Full Access
Question # 22

Fill in the blanks to complete the Python script to update the Webex Teams membership of a room using the Python requests library import requests

Full Access
Question # 23

How is a branch called "my-bug-fix" started to develop a fix needed in a product?

A.

git branch -b my-bug-fix

B.

git checkout -b my-bug-fix

C.

git checkout my-bug-fix

D.

git branch my-bug-fix

Full Access
Question # 24

Refer to the exhibit.

The JSON data in the exhibit has been parsed and stored in a variable, “data”. What returns the value “172.16.0.11” ?

A.

data['items'][0]['host']['value']

B.

data['items']['1']['host']['value']

C.

data['items']['host'][1]

D.

data['items']['host']['value']

Full Access
Question # 25

Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.

Full Access
Question # 26

Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve statement using RESTCONF on a CSR 1000V?

A.

Change the HTTP method to PUT.

B.

Change the transport protocol to HTTPS.

C.

Check the MIMF types in the HTTP headers.

D.

Check the authentication credentials.

Full Access
Question # 27

On which port does NETCONF operate by default?

A.

23

B.

443

C.

822

D.

830

Full Access
Question # 28

Drag and drop the element of the Finesse API on the left onto the description of its functionally on the right.

Full Access
Question # 29

How does requesting a synchronous API operation differ from requesting an asynchronous API operation?

A.

clients poll for the status of the execution of operations

B.

clients subscribe to a webhook for operation results

C.

clients can access the results immediately

D.

clients receive responses with a task id for further processing

Full Access
Question # 30

Refer to the exhibit.

Drag and drop the variables from the left onto the item numbers on the right that match the missing assignments in the exhibit.

Full Access
Question # 31

Which two types of NAT are used in a network? (Choose two.)

A.

Static NAT

B.

Normal NAT

C.

Multicast NAT

D.

Dynamic NAT

E.

Router NAT

Full Access
Question # 32

A developer needs to prepare the file README.md in the working tree for the next commit operation using Git. Which command needs to be used to accomplish this?

A.

git add README.md staging

B.

git -a README.md

C.

git add README.md

D.

git commit README.md

Full Access
Question # 33

Refer to the exhibit.

Which python data structure does my_json contain?

A.

List

B.

Json

C.

Map

D.

Dict

Full Access
Question # 34

Which platform has an API that be used to obtain a list of vulnerable software on user devices?

A.

Cisco Umbrella

B.

Cisco Firepower

C.

Cisco Identity Services Engine

D.

Cisco Advanced Malware Protection

Full Access
Question # 35

In which situation would an edge computing solution be used?

A.

where low latency is needed

B.

where high CPU throughput is needed

C.

where fast memory is needed

D.

where high disk space is needed

Full Access
Question # 36

Drag and drop the capability on the left onto the Cisco compute management platform that supports the capability on the right.

Full Access
Question # 37

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. Not all options are used.

Full Access
Question # 38

Drag and drop the characteristics from the left onto the corresponding software development methodologies on the right?

Full Access
Question # 39

Refer to the exhibit.

What is the value of the node defined by this YANG structure?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 40

Refer to the exhibit.

What is the action of the Bash script that is shown?

A.

The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory.

B.

The script goes into the directory called “$ndir” and makes a new directory called “$ndir”

C.

The script waits unit input is entered, then it goes into the directory entered and creates a new directory with the same name.

D.

For all directories in the current folder. The script goes into directory and makes a new directory.

Full Access
Question # 41

On which network plane is routing protocol traffic handled?

A.

data plane

B.

management plane

C.

authentication plane

D.

control plane

Full Access
Question # 42

Refer to the exhibit.

Which JSON is equivalent to the XML –encoded data?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 43

Which HTTP status Code means that the server cannot or will not process the request because of perceived client error?

A.

100

B.

203

C.

303

D.

400

Full Access
Question # 44

Which two elements are foundational principles of DevOps? (Choose two.)

A.

designing applications as microservices

B.

encouraging containers for the deployment of applications

C.

organizing cross-functional teams over organizational silos

D.

optimizing the cost of infrastructures

E.

automating over documenting

Full Access
Question # 45

Drag and Drop the GIT commands from the left onto the right that add modified local files to a remote repository. Not all options are used

Full Access
Question # 46

Drag and drop the Docker file instructions from the onto correct descriptions on the right. Not all options are used.

Full Access
Question # 47

Refer to the exhibit.

Which two statements about the network diagram are true? (Choose two.)

A.

PC-A and PC-B are in the same subnet.

B.

One of the routers has two connected serial interfaces.

C.

The subnet of PC-C can contain 256 hosts.

D.

R1 and R3 are in the same subnet.

E.

The subnet address of PC-B has 18 bits dedicated to the network portion.

Full Access
Question # 48

What is used in JSON to represent a Python Tuple?

A.

Object

B.

Array

C.

Dict

D.

Collection

Full Access
Question # 49

Which HTTP code group is issued when a request is received successfully, understood, and processed?

A.

2xx

B.

3xx

C.

4xx

D.

5xx

Full Access
Question # 50

What are two functions of a routing table on a network device? (Choose two.)

A.

It lists entries more than two hops away.

B.

It lists the routes to a particular destination.

C.

It lists the routes to drop traffic.

D.

It lists hosts that are one hop away.

E.

It lists the static and dynamic entries.

Full Access
Question # 51

Refer to the exhibit.

A Python script must delete all Cisco Catayst 9300 Series switches that have an uptime that is greater than 90 days The script must also query for the status of all the other devices Drag and drop the code from the bottom onto the bottom box the code is missing to complete the script Not at options are used

Full Access
Question # 52

Refer to the exhibit.

An engineer must check the admin rights of users on a database regularly and prepares

the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?

A.

They must be stored in configuration files if there is a possibility of leakage.

B.

They must be Base64-encoded if stored in the user database.

C.

They must be encrypted if stored in the user database.

D.

They must be stored in configuration files if no authentication will be used.

Full Access
Question # 53

In which two ways is an application characterized when interacting with a webhook? (Choose two.)

A.

codec

B.

receiver

C.

transaction monitor

D.

processor

E.

listener

Full Access
Question # 54

How does a developer create and switch to a new branch called "my-bug-fix" to develop a product fix?

A.

git checkout -b my-bug-fix

B.

git branch -b my-bug-fix

C.

git branch my-bug-fix

D.

git checkout my-bug-fix

Full Access
Question # 55

Which tool is used to block all traffic to the domain by using a single API call?

A.

Cisco ISE

B.

Cisco Firepower

C.

Cisco AMP

D.

Cisco Umbrella

Full Access
Question # 56

Refer to the exhibit.

A network engineer wants to use an API to update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which line of code needs to be placed in the snippet where the code is missing?

A.

{'Content-Type': 'application/yang.data+xml', 'Accept': 'application/yang.data

+xml'}

B.

{'Content-Type': 'application/yang.data+yaml', 'Accept': 'application/yang.data

+yaml'}

C.

{'Content-Type': 'application/restconf.data+json', 'Accept': 'application/

restconf.data+json'}

D.

{'Content-Type': 'application/yang.data+utf8', 'Accept': 'application/

restconf.data+utf8'}

Full Access
Question # 57

Refer to the exhibit.

A network engineer wants to automate the port enable/disable process on specific Cisco switches. The engineer creates a script to send a request through RESTCONF and uses ietf as the YANG model and JSON as payload. Which command enables an interface named Loopback1?

A.

enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

B.

enable_function(‘iana-if-type:softwareLoopback’, Loopback1, true,)

C.

def enable_function(‘iana-if-type:softwareLoopback’, Loopback1, false,)

D.

def enable_function(Loopback1, true, ‘iana-if-type:softwareLoopback’)

Full Access
Question # 58

A developer is working on a feature for a new application. The changes in the existing branch named 'feat00304' must be integrated into a single commit with the current working primary branch named 'prodapp411926287'. Which git command must be used?

A.

git rebase --merge feat00304

B.

git merge --squash feat00304

C.

git push --rebase feat00304

D.

git checkout --squash feat00304

Full Access
Question # 59

Refer to the exhibit.

A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?

A.

verifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages

B.

verifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version

C.

uninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version

D.

installing nginx, uninstalling apache2, and then verifying that the package repository is at the latest version

Full Access
Question # 60

Refer to the exhibit.

An engineer must configure a load balancer server. The engineer prepares a script to automate workflow by using Bash. The script install the nginx package, moves to the /optAtginx directory, and reads the sites M We (or further processing Based on the script workflow, which process is being automated within the loop by using the information mi sites txt?

A.

creating a new Me Based on template .conf in the /etc/ngin/sites_enabled directory for each lie in the sites txt file. and then changing the file execution permission.

B.

creating a Me per each the in sites txt with the information in template conf. creating a link for the previously created file. and then changing the ownership of the created files

C.

using the content of the file to create the template conf file. creating a Iink from the created file to the /etc/nginx/files.enabled. and then changing the file execution permissions.

D.

using the information in the file to create a set of empty files in the /etchginx/sites_enabled directory and then assigning the owner of the file.

Full Access
Question # 61

What is a benefit of model-driven programmability?

A.

It addresses the static architecture of traditional networks being decentralized and complex.

B.

By modeling data, it ensures that vast quantities of data are usable for monitoring.

C.

It provides a programmatic and standards-based way of writing configurations to any network device.

D.

It simplifies management and operations by decoupling the networking hardware from its control mechanism.

Full Access
Question # 62

Several teams at a company are developing a new CRM solution to track customer interactions with a goal of improving customer satisfaction and driving higher revenue. The proposed solution contains these components:

• MySQL database that stores data about customers

• HTML5 and JavaScript UI that runs on Apache

• REST API written in Python

What are two advantages of applying the MVC design pattern to the development of the solution? (Choose two.)

A.

to enable multiple views of the same data to be presented to different groups of users

B.

to provide separation between the view and the model by ensuring that all logic is separated out into the controller

C.

to ensure data consistency, which requires that changes to the view are also made to the model

D.

to ensure that only one instance of the data model can be created

E.

to provide only a single view of the data to ensure consistency

Full Access
Question # 63

A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time.

Which area of the CALMS framework must the company target for improvement?

A.

Collaboration

B.

Lean

C.

Sharing

D.

Measurement

Full Access
Question # 64

Refer to the exhibit.

Which infrastructure automation method is shown?

A.

Waterfall

B.

CI/CD pipeline

C.

Agile

D.

Lean

Full Access
Question # 65

How does a synchronous API request differ from an asynchronous API request?

A.

clients receive responses with a task id for further processing

B.

clients subscribe to a webhook for operation results

C.

clients are able to access the results immediately

D.

clients poll for the status of the execution of operations

Full Access
Question # 66

Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.

Full Access
Question # 67

Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)

A.

22

B.

23

C.

80

D.

443

E.

880

Full Access
Question # 68

What is a requirement when authenticating a RESTCONF API session with a router that runs Cisco IOS XE Software?

A.

No authentication is required.

B.

OAuth must be used.

C.

Basic authentication must be used.

D.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

Full Access
Question # 69

Which data is specified in the response header?

A.

{

"id": "y123987jdkl". HTTP/1.1 200 OK

"status: "online",

"type": "switch"

}

B.

HTTP/1.1 200 OK

C.

''type'', ''switch''

D.

Content-Type

Full Access
Question # 70

Refer to the exhibit. What does the load balancer enable in the network topology?

A.

hosted application to access Internet services

B.

external requests to be routed to the application servers

C.

workstations to access the Internet

D.

application to access the database server

Full Access
Question # 71

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NX-OS REST API to configure the devices by using an Ansible playbook. Before running the code,

which resource must be used to verify that the code works correctly?

A.

Cisco NX-OS SDK

B.

Cisco Learning Labs

C.

Cisco Code Exchange

D.

Cisco Modeling Labs

Full Access
Question # 72

Refer to the exhibit.

An engineer writes a Python script that uses two different API calls to query Cisco DNA Center for the number of interfaces on a device. The engineer notices that the two API calls produce different results. Why are fewer interfaces returned for the same device when the 'get_all_interfaces' API call is used?

A.

times out

B.

rate limit

C.

pagination

D.

invalid password

Full Access
Question # 73

Refer to the exhibit.

A developer creates a script to obtain a list of devices by using the Cisco DNA Center API. The remote server authorizes the request only if an authentication token is supplied in the headers. A function named get_auth_token() must retrieve a valid token by using HTTP Basic Authentication. Which code must be added to complete the get_auth_token() function?

A.

resp = requests.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

B.

resp = requests.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json ()['Token']

return token

C.

resp = http.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

D.

resp = http.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

Full Access
Question # 74

Why is refactoring done during test-driven development?

A.

to enable larger objects and longer methods

B.

to improve maintainability and readability

C.

to ensure that the previous uses of the objects are explained

D.

to ensure the duplication of essential code

Full Access
Question # 75

Which protocol runs over TCP port 22?

A.

SSH

B.

HTTP

C.

Telnet

D.

NETCONF

Full Access
Question # 76

Refer to the exhibit.

A developer needs to upload a local file by using the REST API. The developer gathers information according to the documentation and sends the request by using the cURL command in the exhibit but gets an error code. Which action should be followed to get valid response?

A.

change content type as JSON

B.

add the authorization header with the access token

C.

add a username-password combination to request command

D.

change request method as GET

Full Access
Question # 77

Refer to the exhibit.

A Python code has been written to query a device. The executed code results in the error shown. Which action resolves the problem?

A.

import json

B.

requests("GET", base_url + request_url, cookles=cookies)

C.

pip install requests

D.

import requests

Full Access
Question # 78

Refer to the exhibit.

The documentation outlines how to use credentials for the AMP API Which script successfully performs an API call using basic authentication?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 79

What is a benefit of test-driven development?

A.

early customer involvement

B.

increased code quality

C.

faster releases that have minimal features

D.

strict adherence to product requirements

Full Access
Question # 80

What is the main purpose of a code review?

A.

To provide the technical lead visibility into all code

B.

To identify and review errors with the team

C.

To ensure that all code is checked in simultaneously

D.

To detect logical errors

Full Access
Question # 81

Refer to the exhibit.

An API call is constructed to retrieve the inventory in XML format by using the API. The response to the call is 401 Unauthorized. Which two headers must be added to the API call? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 82

Refer to the exhibit.

Which line must be included in the Bash script for the Python code to succeed?

A.

define WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

B.

export WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

C.

set WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

D.

WEBEX_TEAMS_ACCESS_TOKEN=your_access_token_here

Full Access
Question # 83

A developer is creating a script to interact with a REST API service which requires basic authentication. The credentials are "devnet:391665405" and the Base64 encoding of the credentials is "GV2bmV0dXNlcjpDaXNj=". Which payload and header combination must be used for authentication?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 84

Refer to the exhibit.

Which device limits traffic between server 1 and server 2?

A.

Device B

B.

Device C

C.

Device D

D.

Device E

Full Access
Question # 85

What is a benefit of organizing into modules?

A.

improves collaboration of the development team

B.

makes it easier to deal with large and complex systems

C.

enables the code to be broken down into layers

D.

enables the inclusion of more programming languages in the code

Full Access
Question # 86

How do XML and JSON compare regarding functionality?

A.

JSON natively supports arrays and XML does not natively support arrays.

B.

XML provides support for mapping data structures into host languages than JSON.

C.

XML provides more human readability than JSON.

D.

JSON provides support for data types than XML.

Full Access
Question # 87

A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?

A.

Communication between the application and the services is not encrypted.

B.

The database credentials should be stored in the configuration files so that they are secured on the same server.

C.

The API keys are stored in the configuration files but should be stored in the vault service.

D.

The synchronization logs should be encrypted and not stored in a relational database.

Full Access
Question # 88

Refer to the exhibit.

Which function does the EXPOSE line perform when building an image from this Dockerfile?

A.

Local port 8080 of the container that launched with this docker image is accessible from co-hosted containers and external clients.

B.

Local port 8080 is not reachable at all because no IP address is specified along with the EXPOSE command of the Dockerfile.

C.

Local port 8080 is accessible from other containers running on the same docker host as the container that launched with this docker image.

D.

Local port 8080 of the container that launched with this docker image is accessible to external clients.

Full Access
Question # 89

What is a benefit of a model-driven approach for infrastructure automation?

A.

enforces the generation of all automation scripts through the modeling environment

B.

provides a small learning curve and helps system administrators with limited coding experience

C.

ensures that system administrators gain a good understanding of coding and expand their experience and capabilities

D.

enables a user to understand a declarative language to translate the model into an actionable script

Full Access
Question # 90

Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?

A.

100

B.

204

C.

302

D.

402

Full Access
Question # 91

Which Cisco platform provides organization-wide automation, security, policy enforcement, any agility across wired and wireless networks?

A.

Cisco ACI

B.

Cisco DNA Center

C.

Cisco Umbrella

D.

Cisco SD-WAN

Full Access
Question # 92

Refer to the exhibit. A developer is creating a Python script to obtain a list of HTTP servers on a network named office_east by using the Cisco Meraki API. The request has these requirements:

• Must time out if the response is not received within 2 seconds.

• Must utilize client certificates and SSL certificate verification.

• Must utilize basic authentication that uses a username of admin and a password of cisco.

• Must save the response to an object named response.

Drag and drop the code snippets from the bottom onto the blanks in the code to meet the requirements. Not all options are used.

Full Access
Question # 93

Which advantage does the agile process offer compared to waterfall software development?

A.

to view the full scope of end-to-end work

B.

to have each phase end before the next begins

C.

to fix any issues at the end of the development cycle

D.

to add or update features with incremental delivery

Full Access
Question # 94

A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?

A.

git update

B.

git merge

C.

git add

D.

git rebase

Full Access
Question # 95

A developer attempts to refactor and improve the application code. It is noticed that the code contains several pieces of key information that could be a security threat if this code is accessible by those who are not

authorized to this data. Which approach addresses the security concerns noticed by the developer?

A.

Host the application code on a machine located in a secure data center.

B.

Utilize environment variables for username and password details.

C.

Rely on the security teams’ goodwill to not give access to those who do not need it.

D.

Move the hardware that the application is deployed on to a secure location.

Full Access
Question # 96

What is a benefit of using model-driven programmability for infrastructure automation?

A.

connected user tracking

B.

infrastructure resource optimization

C.

multiple device control protocols

D.

device performance monitoring

Full Access
Question # 97

What is a principle of a code review process?

A.

Changes are made after the code is submitted to source control.

B.

It must not prevent code from getting into production as quickly as possible.

C.

Naming standards must be consistent.

D.

A technical lead must sign off on the review.

Full Access
Question # 98

A customer's cloud services must:

Migrate services to another data center on demand.

Save the operational state of the machine on demand.

Support Windows and Linux GUIs.

Maximize hardware utilization.

Which type of deployment meets these requirements?

A.

bare metal

B.

container

C.

virtual machine

D.

Kubernetes

Full Access
Question # 99

Refer to the exhibit.

An engineer must add new users and set privileges for executing a few Python scripts. The engineer prepares a Bash script to automate this task. The script ds a user and a group from the command-line arguments, creates a directory, and copies the Python scripts to it. The script then changes to the directory and lists the scripts, used on the script workflow, which process is being automated within the loop by using the list of Python scripts?

A.

removing the files that are not Python, listing the Python files, and assigning execution privileges to the initially created user and group.

B.

assigning execution privileges to everyone and changing the ownership to the initially created user and group

C.

assigning execution privileges to the owner, setting the user and group owner to the scripts that were initially created, and storing the script names in a file.

D.

creating a file with the content of all the files, assigning execution permissions to each script, and then changing ownership to the initially created user and group.

Full Access
Question # 100

Which HTTP response code is returned from a successful REST API call to create a new resource?

A.

201

B.

204

C.

302

D.

429

Full Access
Question # 101

Refer to the exhibit.

What are two results of running the RESTCONF query? (Choose two.)

A.

Interfaces are created as containers.

B.

The module letf-interfaces:interfaces is created.

C.

GigabitEthemet2 becomes shut down.

D.

GigabitEthernetl becomes shut down.

E.

Descriptions for two interfaces are applied.

Full Access
Question # 102

Which tool provides a testing environment to run tests on network devices and perform network automation scenarios?

A.

Visual Studio Code

B.

Cisco VIRL

C.

pyATS

D.

Cisco Packet Tracer

Full Access
Question # 103

A developer completed the creation of a script using Git. Before delivering it to the customer, the developer wants to be sure about all untracked files, without losing any information. Which command gathers this information?

A.

git clean –n

B.

git rm –f

C.

git clean –r

D.

git rm *

Full Access
Question # 104

Refer to the exhibit. An engineer runs a network that consists of Cisco Nexus devices. The network is distributed between data centers in different locations. The switches are configured using standalone connections and a single point of failure. Which process is being automated by the Ansible playbook?

A.

enabling HSRP on the nxos_rtr inventory host

B.

enabling HSRP on the rtr-1a inventory host

C.

executing HSRP configuration from the Ansible controller node

D.

executing HSRP configuration from the srv-1a inventory host

Full Access
Question # 105

What is a benefit of using a code review process in application development?

A.

accelerates the deployment of new features in an existing application

B.

provides version control during code development

C.

enables the quick deployment of new code

D.

eliminates common mistakes during development

Full Access
Question # 106

Refer to the exhibit.

Up to which device does the communication server 1 and server 2 go?

A.

device B

B.

device C

C.

device D

D.

device E

Full Access
Question # 107

When a Cisco IOS XE networking device is configured by using RESTCONF, what is the default data encoding method?

A.

application/yaml-data+json

B.

application/yang-data+json

C.

application/xml-data+json

D.

application/json-data+xml

Full Access
Question # 108

Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.

Full Access
Question # 109

Developer is working on a new feature and made changes on a branch named ‘branch-413667549a-new’. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?

A.

git merge -no-edit

B.

git merge -commit

C.

git merge -revert

D.

git merge -abort

Full Access
Question # 110

A resource named /item is protected by oAuth2 authentication. An endpoint named /login must request authentication. Which method must be used to access the resource by using the REST API?

A.

Make a GET call to /login that includes the username and password, and retrieve a token to insert into the /item call.

B.

Make a POST call to /login including the user credentials in the message, and retrieve a token to insert into the authorization header of the /item call.

C.

Make a GET call to /item, then make a call to /login that includes the username and password in the body of the message, and wait for the authorization code.

D.

Make a POST call to /item that includes the username and password in the body of the request message, and submit it to request access.

Full Access
Question # 111

Refer to the exhibit.

A.

It deletes some device configurations.

B.

It deletes all the device configurations.

C.

It shuts off the device.

D.

It adds a new device configuration

Full Access
Question # 112

What is a capability of Ansible playbooks?

A.

They execute scheduled tasks regularly.

B.

They define the state for a device configuration.

C.

They collect SNMP logs from networking devices.

D.

They utilize the target device agent to execute.

Full Access
Question # 113

Drag and drop the code from the bottom onto the box where the code is missing to complete the error path scenario. Not all options are used.

Full Access
Question # 114

Which command reverses the last commit without changing the index file or the working tree position?

A.

git revert HEAD

B.

git reset --hard HEAD~3

C.

git reset --soft HEAD^

D.

git revert

Full Access
Question # 115

Which protocol is used for clock synchronization between network devices?

A.

FTP

B.

NNTP

C.

BGP

D.

NTP

Full Access
Question # 116

Drag and drop characteristics from the left onto the infrastructure management methodologies on the right.

Full Access
Question # 117

Which IP service synchronizes the time across devices?

A.

DNS

B.

NTP

C.

SNMP

D.

NAT

Full Access
Question # 118

A developer is attempting to retrieve all the messages from a Cisco Webex space. The server responds by sending the first 1,000 messages. The developer must make additional requests to retrieve the rest of the messages. Which API constraint is described in this scenario?

A.

payload limiting

B.

throttling

C.

pagination

D.

rate limiting

Full Access
Question # 119

Refer to the exhibit.

An administrator attempts to perform a GET operation by using the Cisco IOS XE RESTCONF API to return the hostname of a device. The sequence diagram in the exhibit illustrates the HTTP messages observed. Which change to the API request resolves the issue?

A.

Remove the -H 'Accept: application/yang-data+json’ header.

B.

Replace -u cisco:cisco parameter with -u ‘cisco:cisco’.

C.

Change the request method from -X ‘GET’ to -X ‘POST’.

D.

Add the -H ‘Content-Type: application/yang-data+json’ header.

Full Access
Question # 120

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Full Access
Question # 121

Refer to the exhibit. A developer writes a script to create a new network by using the Cisco DNA Center API. After running the script for the first time, the developer observes that HTTP code 404 is printed to the console. Which action resolves the problem?

A.

The x-auth-token value must be changed to a valid token.

B.

The API URL must be changed with a valid URL.

C.

The requested payload must be fixed to include missing parts.

D.

Internal errors on the code of API server must be fixed.

Full Access
Question # 122

Which Python function is used to parse a string that contains JSON data into a Python dictionary?

A.

json.dumps()

B.

json.to_json()

C.

json.parse()

D.

json.loads()

Full Access
Question # 123

Refer to the exhibit.

A developer can access the TLS REST API on server A, but cannot access the API on server B. The developer can ping server B. When the developer performs a packet capture on the TLS REST API port on server B, the capture shows that the packet arrived and the server responded. What causes the issue?

A.

Port 80 is blocked on the outgoing interface of firewall B.

B.

Port 443 is blocked on the outgoing interface of firewall A.

C.

Port 443 is blocked on the incoming interface of firewall B.

D.

Port 80 is blocked on the incoming interface of firewall A.

Full Access
Question # 124

What is a characteristic of RPC APIs compared to REST APIs?

A.

Authentication is done over provisions for the service caller and vice versa for RPC API, and REST API uses HTTP headers for authentication.

B.

All communications between the client and server must be stateless for RPC API, and REST API is stateful.

C.

The architecture model for RPC API is resource-focused, and REST API is procedure-focused.

D.

The data payload must be in JSON format for RPC API, and REST API allows JSON and XML formats.

Full Access
Question # 125

Which IP service is used to monitor the performance of network devices?

A.

SNMP

B.

DHCP

C.

DNS

D.

NTP

Full Access
Question # 126

A company deploys an application via containers in its local data center. As soon as the application goes into production, it starts to crash at specific hours of the day. After investigation, it is concluded that the crashes are due to too many users accessing the application simultaneously. The spikes must be addressed and allow for future growth without discarding the investment already made. Which deployment model must be used?

A.

hybrid cloud

B.

edge

C.

private cloud

D.

public cloud

Full Access
Question # 127

Refer to the exhibit. An engineer prepares a script to automate workflow by using Cisco DNA Center APIs to display:

total count of devices

list of the network devices

information of one device with a hostname filter

What is displayed in the final step after the Python script is executed?

A.

information about a device of type C9500-40x.

B.

filtered results by the hostname and the platformld C9500-40X

C.

information about the test devices

D.

list of devices with platformId C9500-40x

Full Access
Question # 128

Drag and drop the characteristics from the left onto the software development methodologies on the right.

Full Access
Question # 129

Refer to the exhibit. Which code snippet represents the sequence.

A.

B.

C.

D.

Full Access
Question # 130

Refer to the exhibit. A network engineer makes a RESTCONF API call to Cisco IOS XE to retrieve information. Which HTTP method and URL does the engineer use to make the ..call?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 131

An engineer clones a repository that contains a Python script from GitLab to a laptop. After modifying the code, the engineer wants to validate the changes. Which command starts … CI/CD pipeline and runs the automated tests?

Full Access
Question # 132

What is a capability of Cisco Webex?

A.

Join preconfigured or new spaces with fixed user rights.

B.

Configure devices at scale via automation scripts or by manual execution.

C.

Initiate or respond to calls automatically via automation.

D.

Get space history or notified in real time when new messages are posted.

Full Access
Question # 133

Refer to the exhibit. A developer creates a Python script by using the Cisco Meraki API. The solution must:

• Obtain a list of HTTP servers for a network named "netl".

• Print the response body if the HTTP status code is 200.

• Handle the timeout requests as exceptions, and print Timeout Error next to the exception to stdout.

Which block of code completes the script?

A)

B)

A.

Option A

B.

Option B

Full Access
Question # 134

Drag and drop the code from the bottom onto the box where the code is missing to enable ports on a switch by using RESTCONF. Not all options are used.

Full Access
Question # 135

Why would a developer compare a current version of code to a previous version?

A.

to provide the single source of truth

B.

to troubleshoot code failures

C.

to track who made a change

D.

to aid in collaboration

Full Access
Question # 136

Which standard supported by Cisco IOS XE and Cisco NX-OS is used for automating the configuration of multiple devices across a network?

A.

SNMP – YANG

B.

SYSLOG – YANG

C.

CLI – YANG

D.

NETCONF – YANG

Full Access
Question # 137

Which RFC 1918 address space includes a subnet of 172.16.0.0 that uses a mask of 255.255.0.0?

A.

class A

B.

class B

C.

class C

D.

class D

Full Access
Question # 138

Drag and drop the code snippets from the bottom onto the blanks in the code to complete the happy path scenario. Not all options are used.

Full Access
Question # 139

What is a feature of a MAC address?

A.

It consists of 6 hexadecimal numbers.

B.

It consists of 24 bits.

C.

It consists of 38 bits.

D.

It consists of 12 hexadecimal numbers.

Full Access
Question # 140

Drag and drop the functions from the left onto the networking devices on the right.

Full Access