Cisco 200-901 Practice Test - Questions Answers, Page 25
List of questions
Related questions
Refer to the exhibit. What does the command marked (2) do when it is run?
It duplicates the “test” branch.
It deletes the “test” branch only if a new branch is created.
It deletes the “test” branch.
It does not delete the branch until it is merged.
What is a comparison of YAML and JSON?
YAML has a more consistent approach to representing data compared to JSON.
JSON does not support comments and YAML does.
YAML is a more verbose data structure compared to JSON.
JSON has more common usage in configuration management tools compared to YAML.
Refer to the exhibit. A collaboration engineer has developed a script to automate the gathering of information by providing the email address of the individual. When the engineer tests the script, a 401 error is received. Which command fixes the script?
Add “Authorization”: “Bearer ” to the headers.
Add “Authentication”: “Basic ” in the base_url after “https://”.
Add “:@” in the base_url after “https://”.
Add “Authentication”: “Bearer ” to the headers.
A developer is attempting to retrieve all the messages from a Cisco Webex space. The server responds by sending the first 1,000 messages. The developer must make additional requests to retrieve the rest of the messages. Which API constraint is described in this scenario?
payload limiting
throttling
pagination
rate limiting
Refer to the exhibit. A developer just finished testing a Python script and wants to save the list of packages and versions installed on the current machine. The developer must make sure that it will not cause any issues if tested on another device due to different library versions. Which line of code needs to be placed on the snippet where the code is missing?
pip freeze 2> requirements.txt
pip freeze > requirements.txt
pip freeze => requirements.txt
pip freeze | requirements.txt
A developer pushes an application to production. The application receives a webhook over HTTPS without a secret. The webhook information contains credentials to service in cleartext. When the information is received, it is stored in the database with an SHA-256 hash. Credentials to the database are accessed at runtime through the use of a vault service.
While troubleshooting, the developer sets the logging to debug to view the message from the webhook. What is the security issue in this scenario?
Database credentials should be accessed by using environment variables defined at runtime.
During the transport of webhook messages, the credentials could be unencrypted and leaked.
During logging, debugging should be disabled for the webhook message.
Hashing the credentials in the database is not secure enough; the credentials should be encrypted.
Refer to the exhibit. A developer cannot reach the web application behind an NGINX load balancer. The developer sends a request to an application FQDN with cURL but gets an HTTP 502 response. Which action solves the problem?
Fix errors in the server configuration, which is behind the load balancer.
Bring up the load balancer to the active state.
Fix errors in the cURL request sent by the client.
Change the default gateway on the load balancer to an active one.
Refer to the exhibit. A network engineer wants use API update information about device interfaces. The network devices are deployed in a Cisco DevNet Sandbox and have running interfaces. Which value is suitable as the headers variable?
A. {'Content-Type': 'application/yang.data+yaml', 'Accept': 'application/yang.data+yaml'}
{'Content-Type': 'application/yang.data+json',
'Accept': 'application/yang.data+json'}
{'Content-Type': 'application/yang.data+utf8l',
'Accept': 'application/yang.data+utf8'}
{'Content-Type': 'application/restconf.data+txt',
'Accept': 'application/restconf.data+txt'}
Which action do webhooks enable an application to perform?
Increase the request rate limit.
Populate the application with restricted data.
Receive real-time data.
Implement a push model.
Refer to the exhibit. A developer can access the TLS REST API on server A, but cannot access the API on server B. The developer can ping server B. When the developer performs a packet capture on the TLS REST API port on server B, the capture shows that the packet arrived and the server responded. What causes the issue?
Port 80 is blocked on the outgoing interface of firewall B.
Port 443 is blocked on the outgoing interface of firewall A.
Port 443 is blocked on the incoming interface of firewall B.
Port 80 is blocked on the incoming interface of firewall A.
Question