ExamGecko
Home Home / Cisco / 200-901

Cisco 200-901 Practice Test - Questions Answers, Page 11

Question list
Search
Search

What are two characteristics of Bare Metal environments that are related to application deployment? (Choose two.)

A.

specifically designed for container-based workloads

A.

specifically designed for container-based workloads

Answers
B.

suitable for legacy applications that do not support virtualization

B.

suitable for legacy applications that do not support virtualization

Answers
C.

provides workloads with access to hardware features

C.

provides workloads with access to hardware features

Answers
D.

not compatible with other cloud services such as PaaS or SaaS offerings

D.

not compatible with other cloud services such as PaaS or SaaS offerings

Answers
E.

provides the hypervisor to host virtual servers

E.

provides the hypervisor to host virtual servers

Answers
Suggested answer: C, E

A new application is being developed that must be hardware independent. The application includes an administrative component which is accessed using a Windows desktop GUI. Installation and management of the environment must be fully automated. Which application deployment type meets the requirements?

A.

virtual machine

A.

virtual machine

Answers
B.

virtual Python environment

B.

virtual Python environment

Answers
C.

container

C.

container

Answers
D.

bare metal

D.

bare metal

Answers
Suggested answer: C

Refer to the exhibit.

What is the action of the Bash script that is shown?

A.

For all directories in the current folder, the script goes into the directory and makes a new directory.

A.

For all directories in the current folder, the script goes into the directory and makes a new directory.

Answers
B.

The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory.

B.

The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the same name, then it creates a new directory.

Answers
C.

The script waits until input is entered, then it goes into the directory entered and creates a new directory with the same name.

C.

The script waits until input is entered, then it goes into the directory entered and creates a new directory with the same name.

Answers
D.

The script goes into the directory called “$ndir” and makes a new directory called “$ndir”.

D.

The script goes into the directory called “$ndir” and makes a new directory called “$ndir”.

Answers
Suggested answer: B

When using the Bash shell, how is the output of the devnet command saved to a file named “output.txt”?

A.

devnet > output.txt

A.

devnet > output.txt

Answers
B.

devnet | output.txt

B.

devnet | output.txt

Answers
C.

devnet < output.txt

C.

devnet < output.txt

Answers
D.

devnet & output.txt

D.

devnet & output.txt

Answers
Suggested answer: A

Explanation:


Reference: https://askubuntu.com/questions/420981/how-do-i-save-terminal-output-to-a-file

After a project is migrated to a new codebase, the “old_project” directory must be deleted. This directory has multiple readonly flies, and it must be deleted recursively without prompting for confirmation. Which Bash command must be used?

A.

rmdir -p old_project

A.

rmdir -p old_project

Answers
B.

rm -rf old_project

B.

rm -rf old_project

Answers
C.

rm -r old_project

C.

rm -r old_project

Answers
D.

rmdir old_project

D.

rmdir old_project

Answers
Suggested answer: B

What is a benefit of using edge computing in an IoT implementation?

A.

high speed in data processing

A.

high speed in data processing

Answers
B.

low network design complexity

B.

low network design complexity

Answers
C.

low cost in network design

C.

low cost in network design

Answers
D.

high availability for network components

D.

high availability for network components

Answers
Suggested answer: D

What is the benefit of edge computing?

A.

It reduces network latency by moving processing closer to the data source.

A.

It reduces network latency by moving processing closer to the data source.

Answers
B.

It reduces data velocity from devices or other data sources.

B.

It reduces data velocity from devices or other data sources.

Answers
C.

It simplifies security as devices and processing are brought closer together.

C.

It simplifies security as devices and processing are brought closer together.

Answers
D.

It removes the need for centralized data processing.

D.

It removes the need for centralized data processing.

Answers
Suggested answer: A

Explanation:


Reference: https://blogs.cisco.com/networking/time-to-get-serious-about-edge-computing

Which type of threat occurs when an attacker can send hostile data to an interpreter within an application?

A.

sensitive data exposure

A.

sensitive data exposure

Answers
B.

broken authentication

B.

broken authentication

Answers
C.

cross-site scripting

C.

cross-site scripting

Answers
D.

injection

D.

injection

Answers
Suggested answer: D

Explanation:


Reference: https://owasp.org/www-project-top-ten/OWASP_Top_Ten_2017/Top_10-2017_A1-Injection

A company is looking for a cloud deployment which will only use the on-premise infrastructure, is user self-service, and is easy to scale. Which cloud solution should be selected for these requirements?

A.

multi

A.

multi

Answers
B.

private

B.

private

Answers
C.

hybrid

C.

hybrid

Answers
D.

public

D.

public

Answers
Suggested answer: B

Refer to the exhibit.

Which OWASP threat does this example demonstrate?

A.

broken access control

A.

broken access control

Answers
B.

cross-site scripting

B.

cross-site scripting

Answers
C.

SQL injection

C.

SQL injection

Answers
D.

man-in-the-middle

D.

man-in-the-middle

Answers
Suggested answer: B

Explanation:


Reference: https://owasp.org/www-chapter-coimbatore/assets/files/Web%20Application%20Security%20Adithyan%20AK.pdf

Total 471 questions
Go to page: of 48