ExamGecko
Home Home / Cisco / 200-901

Cisco 200-901 Practice Test - Questions Answers, Page 26

Question list
Search
Search

How are operations on REST APIs performed as compared to RPC APIs?

A.

In a REST API, operations are performed on an object (node) that is identified by a URL, but RPC APIs are operation-oriented.

A.

In a REST API, operations are performed on an object (node) that is identified by a URL, but RPC APIs are operation-oriented.

Answers
B.

In a REST API, operations are performed on an external resource that is defined on the API, but the RCP APIs are resource-oriented.

B.

In a REST API, operations are performed on an external resource that is defined on the API, but the RCP APIs are resource-oriented.

Answers
C.

In a REST API, operations are performed on a platform that is identified by the URL, but RPC APIs are platform-oriented.

C.

In a REST API, operations are performed on a platform that is identified by the URL, but RPC APIs are platform-oriented.

Answers
D.

In a REST API, operations are performed on an internal resource that is defined on the API, but RPC APIs are resource-oriented.

D.

In a REST API, operations are performed on an internal resource that is defined on the API, but RPC APIs are resource-oriented.

Answers
Suggested answer: A

Which HTTP error code series relates to redirection?

A.

400

A.

400

Answers
B.

500

B.

500

Answers
C.

200

C.

200

Answers
D.

300

D.

300

Answers
Suggested answer: D

Explanation:


Reference: https://moz.com/learn/seo/http-status-codes

Which Cisco platform provides organization-wide automation, security, policy enforcement, and agility across wired and wireless networks?

A.

Cisco SD-WAN

A.

Cisco SD-WAN

Answers
B.

Cisco DNA Center

B.

Cisco DNA Center

Answers
C.

Cisco ACI

C.

Cisco ACI

Answers
D.

Cisco Umbrella

D.

Cisco Umbrella

Answers
Suggested answer: B

What is a characteristic of the Cisco Finesse platform?

A.

Applications allow services to be invoked on a network triggered event.

A.

Applications allow services to be invoked on a network triggered event.

Answers
B.

The platform provides a ready-to-go platform for HD video and audio conferencing.

B.

The platform provides a ready-to-go platform for HD video and audio conferencing.

Answers
C.

Applications are added to the platform from the desktop remotely.

C.

Applications are added to the platform from the desktop remotely.

Answers
D.

The platform includes an enterprise-class IM engine.

D.

The platform includes an enterprise-class IM engine.

Answers
Suggested answer: C

Explanation:


Reference: https://developer.cisco.com/docs/finesse/#!finesse-overview/what-are-the-business-benefits

An engineer needs to retrieve a list of locally available Firepower Threat Defense upgrade packages by using the Firepower Management Center REST API. The engineer uses a GET request with the URL:

/api/fmc_platform/v1/updates/upgradepackages/f413afeb-e6f6-75f4-9169-6d9bd49s625e What does “f413afeb-e6f6-75f4-9169-6d9bd49s625e” represent?

A.

container UUID

A.

container UUID

Answers
B.

package UUID

B.

package UUID

Answers
C.

domain UUID

C.

domain UUID

Answers
D.

object UUID

D.

object UUID

Answers
Suggested answer: B

Explanation:


Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/640/api/REST/Firepower_Management_Center_REST_API_Quick_Start_Guide_640.html

What is a benefit of using a code review process in application development?

A.

accelerates the deployment of new features in an existing application

A.

accelerates the deployment of new features in an existing application

Answers
B.

provides version control during code development

B.

provides version control during code development

Answers
C.

enables the quick deployment of new code

C.

enables the quick deployment of new code

Answers
D.

eliminates common mistakes during development

D.

eliminates common mistakes during development

Answers
Suggested answer: D

Which OWASP threat takes advantage of a web application that the user has already authenticated to execute an attack?

A.

phishing

A.

phishing

Answers
B.

DoS

B.

DoS

Answers
C.

brute force attack

C.

brute force attack

Answers
D.

CSRF

D.

CSRF

Answers
Suggested answer: D

Refer to the exhibit. An application must be deployed on a server that has other applications installed. The server resources are to be allocated based on the deployment requirements. The OS for each application must be independent.

Which type of deployment is used?

A.

hybrid

A.

hybrid

Answers
B.

virtual machines

B.

virtual machines

Answers
C.

containers

C.

containers

Answers
D.

bare metal

D.

bare metal

Answers
Suggested answer: B

What is a benefit of a distributed version control system?

A.

encourages users to commit small places of work to the system more frequently

A.

encourages users to commit small places of work to the system more frequently

Answers
B.

ensures that all code meets minimum standards before being committed to the system

B.

ensures that all code meets minimum standards before being committed to the system

Answers
C.

allows users to work on the codebase even when not connected to the Internet

C.

allows users to work on the codebase even when not connected to the Internet

Answers
D.

ensures that all code is tested before being committed to the system

D.

ensures that all code is tested before being committed to the system

Answers
Suggested answer: C

Explanation:


Reference: https://about.gitlab.com/topics/version-control/benefits-distributed-version-control-system/

A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing?

The data contains sensitive information, so specialist encryption tools must be used to secure the data. Which application deployment model meets the requirements?

A.

edge

A.

edge

Answers
B.

private cloud

B.

private cloud

Answers
C.

public cloud

C.

public cloud

Answers
D.

hybrid cloud

D.

hybrid cloud

Answers
Suggested answer: B

Explanation:


Reference: https://www.simform.com/blog/cloud-deployment-models/

Total 471 questions
Go to page: of 48