ExamGecko
Home Home / Cisco / 200-901

Cisco 200-901 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer enables the Cisco NXOS REST API to configure the devices by using an Ansible playbook.

Before running the code, which resource must be used to verify that the code works correctly?

A.

Cisco NX-OS SDK

A.

Cisco NX-OS SDK

Answers
B.

Cisco Learning Labs

B.

Cisco Learning Labs

Answers
C.

Cisco Code Exchange

C.

Cisco Code Exchange

Answers
D.

Cisco Modeling Labs

D.

Cisco Modeling Labs

Answers
Suggested answer: A

A new application is being developed with specific platform requirements. The platform and application deployment and the ongoing platform management must be fully automated. The application includes a large database component that has significant disk I/O requirements. Which application deployment type meets the requirements?

A.

Python virtual environment

A.

Python virtual environment

Answers
B.

virtual machine

B.

virtual machine

Answers
C.

bare metal

C.

bare metal

Answers
D.

container

D.

container

Answers
Suggested answer: B

Refer to the exhibit.

A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?

A.

verifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages

A.

verifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages

Answers
B.

verifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version

B.

verifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version

Answers
C.

uninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version

C.

uninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version

Answers
D.

installing nginx, uninstalling apache2, and then verifying that the package repository is at the latest version

D.

installing nginx, uninstalling apache2, and then verifying that the package repository is at the latest version

Answers
Suggested answer: B

Refer to the exhibit.

An engineer must check the admin rights of users on a database regularly and prepares the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?

A.

They must be stored in configuration files if there is a possibility of leakage.

A.

They must be stored in configuration files if there is a possibility of leakage.

Answers
B.

They must be Base64-encoded if stored in the user database.

B.

They must be Base64-encoded if stored in the user database.

Answers
C.

They must be encrypted if stored in the user database.

C.

They must be encrypted if stored in the user database.

Answers
D.

They must be stored in configuration files if no authentication will be used.

D.

They must be stored in configuration files if no authentication will be used.

Answers
Suggested answer: D

Refer to the exhibit.

A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?

A.

results gathering of the show version and show ip int brief commands

A.

results gathering of the show version and show ip int brief commands

Answers
B.

output of show ip int brief command on devices of type C9500-40X

B.

output of show ip int brief command on devices of type C9500-40X

Answers
C.

execution information of the show version and show ip int brief commands

C.

execution information of the show version and show ip int brief commands

Answers
D.

list of executed commands on C9500-40X and the information of show ip int brief command

D.

list of executed commands on C9500-40X and the information of show ip int brief command

Answers
Suggested answer: B

Refer to the exhibit.

Which two files are being edited in the unified diff? (Choose two.)

A.

README.md

A.

README.md

Answers
B.

setup.py

B.

setup.py

Answers
C.

axl.py

C.

axl.py

Answers
D.

ciscoaxl.py

D.

ciscoaxl.py

Answers
E.

index.py

E.

index.py

Answers
Suggested answer: B, C

Refer to the exhibit.

What do all the calls shown in the sequence diagram have in common?

A.

All

A.

All

Answers
B.

All the calls are optional. the calls are asynchronous.

B.

All the calls are optional. the calls are asynchronous.

Answers
C.

All the calls are synchronous.

C.

All the calls are synchronous.

Answers
D.

All the calls depend on the catalog.

D.

All the calls depend on the catalog.

Answers
Suggested answer: D

Which application should be used to externally access all applications deployed in the same host machine with a single public IP address and port, when each application listens on different local ports?

A.

reverse proxy

A.

reverse proxy

Answers
B.

load balancer

B.

load balancer

Answers
C.

DNS

C.

DNS

Answers
D.

firewall

D.

firewall

Answers
Suggested answer: D

Which implementation creates a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire?

A.

WLAN

A.

WLAN

Answers
B.

VLAN

B.

VLAN

Answers
C.

IPsec

C.

IPsec

Answers
D.

HSRP

D.

HSRP

Answers
Suggested answer: B

What are two properties of private IP addresses? (Choose two.)

A.

They can be used to access the Internet directly.

A.

They can be used to access the Internet directly.

Answers
B.

They are more secure than public IP addresses.

B.

They are more secure than public IP addresses.

Answers
C.

They are not globally unique.

C.

They are not globally unique.

Answers
D.

They can be repeated within the same local network.

D.

They can be repeated within the same local network.

Answers
E.

They are controlled globally by an IP address registry.

E.

They are controlled globally by an IP address registry.

Answers
Suggested answer: B, D
Total 471 questions
Go to page: of 48