ExamGecko
Home / Cisco / 200-901 / List of questions
Ask Question

Cisco 200-901 Practice Test - Questions Answers, Page 11

List of questions

Question 101

Report Export Collapse

What are two characteristics of Bare Metal environments that are related to application deployment? (Choose two.)

specifically designed for container-based workloads

specifically designed for container-based workloads

suitable for legacy applications that do not support virtualization

suitable for legacy applications that do not support virtualization

provides workloads with access to hardware features

provides workloads with access to hardware features

not compatible with other cloud services such as PaaS or SaaS offerings

not compatible with other cloud services such as PaaS or SaaS offerings

provides the hypervisor to host virtual servers

provides the hypervisor to host virtual servers

Suggested answer: C, E
asked 07/10/2024
Francesco Pignalosa
42 questions

Question 102

Report Export Collapse

A new application is being developed that must be hardware independent. The application includes an administrative component which is accessed using a Windows desktop GUI. Installation and management of the environment must be fully automated. Which application deployment type meets the requirements?

virtual machine

virtual machine

virtual Python environment

virtual Python environment

container

container

bare metal

bare metal

Suggested answer: C
asked 07/10/2024
Salman Hashmi
46 questions

Question 103

Report Export Collapse

Refer to the exhibit.

Cisco 200-901 image Question 103 110578 10072024004458000000

What is the action of the Bash script that is shown?

For all directories in the current folder, the script goes into the directory and makes a new directory.

For all directories in the current folder, the script goes into the directory and makes a new directory.

The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory.

The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory.

The script waits until input is entered, then it goes into the directory entered and creates a new directory with the same name.

The script waits until input is entered, then it goes into the directory entered and creates a new directory with the same name.

The script goes into the directory called “$ndir” and makes a new directory called “$ndir”.

The script goes into the directory called “$ndir” and makes a new directory called “$ndir”.

Suggested answer: B
asked 07/10/2024
Wislon Pereira
41 questions

Question 104

Report Export Collapse

When using the Bash shell, how is the output of the devnet command saved to a file named “output.txt”?

devnet > output.txt

devnet > output.txt

devnet | output.txt

devnet | output.txt

devnet < output.txt

devnet < output.txt

devnet & output.txt

devnet & output.txt

Suggested answer: A
Explanation:


Reference: https://askubuntu.com/questions/420981/how-do-i-save-terminal-output-to-a-file

asked 07/10/2024
Kurt Woodfin
50 questions

Question 105

Report Export Collapse

After a project is migrated to a new codebase, the “old_project” directory must be deleted. This directory has multiple readonly flies, and it must be deleted recursively without prompting for confirmation. Which Bash command must be used?

rmdir -p old_project

rmdir -p old_project

rm -rf old_project

rm -rf old_project

rm -r old_project

rm -r old_project

rmdir old_project

rmdir old_project

Suggested answer: B
asked 07/10/2024
Siraj Moosa
41 questions

Question 106

Report Export Collapse

What is a benefit of using edge computing in an IoT implementation?

high speed in data processing

high speed in data processing

low network design complexity

low network design complexity

low cost in network design

low cost in network design

high availability for network components

high availability for network components

Suggested answer: D
asked 07/10/2024
P B
42 questions

Question 107

Report Export Collapse

What is the benefit of edge computing?

It reduces network latency by moving processing closer to the data source.

It reduces network latency by moving processing closer to the data source.

It reduces data velocity from devices or other data sources.

It reduces data velocity from devices or other data sources.

It simplifies security as devices and processing are brought closer together.

It simplifies security as devices and processing are brought closer together.

It removes the need for centralized data processing.

It removes the need for centralized data processing.

Suggested answer: A
Explanation:


Reference: https://blogs.cisco.com/networking/time-to-get-serious-about-edge-computing

asked 07/10/2024
Francesco Pugliese
40 questions

Question 108

Report Export Collapse

Which type of threat occurs when an attacker can send hostile data to an interpreter within an application?

sensitive data exposure

sensitive data exposure

broken authentication

broken authentication

cross-site scripting

cross-site scripting

injection

injection

Suggested answer: D
Explanation:


Reference: https://owasp.org/www-project-top-ten/OWASP_Top_Ten_2017/Top_10-2017_A1-Injection

asked 07/10/2024
Min Soe Aye
44 questions

Question 109

Report Export Collapse

A company is looking for a cloud deployment which will only use the on-premise infrastructure, is user self-service, and is easy to scale. Which cloud solution should be selected for these requirements?

multi

multi

private

private

hybrid

hybrid

public

public

Suggested answer: B
asked 07/10/2024
David Miller
35 questions

Question 110

Report Export Collapse

Refer to the exhibit.
Cisco 200-901 image Question 110 110585 10072024004843000000

Which OWASP threat does this example demonstrate?

broken access control

broken access control

cross-site scripting

cross-site scripting

SQL injection

SQL injection

man-in-the-middle

man-in-the-middle

Suggested answer: B
Explanation:


Reference: https://owasp.org/www-chapter-coimbatore/assets/files/Web%20Application%20Security%20Adithyan%20AK.pdf

asked 07/10/2024
Juan Garrido Soler
38 questions
Total 471 questions
Go to page: of 48

Related questions