Cisco 200-901 Practice Test - Questions Answers, Page 27

List of questions
Question 261

What is a procedural component of CI/CD pipelines?
Question 262

Which OWASP threat occurs when untrusted data is supplied as input to an interpreter as part of a command or query?
Question 263

Refer to the exhibit. What are two characteristics of the NETCONF response? (Choose two.)
Question 264

A business needs to create a simulated environment that mimics a production infrastructure to make changes to the OSPF process and analyze the impact. What should be used?
Question 265

What is a benefit of a CI/CD pipeline for infrastructure?
Question 266

During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?
Question 267

Refer to the exhibit. Which workflow does the script automate?
Question 268

Which two details are captured from the subnet mask? (Choose two.)
Question 269

Refer to the exhibit. While developing a Cisco Webex bot, an application reaches the public IP address of the firewall, but traffic is forwarded to the IP address of server 1 instead of the IP address of server 2. What causes this issue?
Question 270

DRAG DROP
Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.
Question