ExamGecko
Home Home / Cisco / 200-901

Cisco 200-901 Practice Test - Questions Answers, Page 27

Question list
Search
Search

What is a procedural component of CI/CD pipelines?

A.

Bundled artifacts must be generated.

A.

Bundled artifacts must be generated.

Answers
B.

Every test must pass for the pipeline to continue its execution.

B.

Every test must pass for the pipeline to continue its execution.

Answers
C.

Some tests fall without stopping the pipeline execution.

C.

Some tests fall without stopping the pipeline execution.

Answers
D.

The release label that identifies the build is optional.

D.

The release label that identifies the build is optional.

Answers
Suggested answer: A

Which OWASP threat occurs when untrusted data is supplied as input to an interpreter as part of a command or query?

A.

broken authentication

A.

broken authentication

Answers
B.

data exposure

B.

data exposure

Answers
C.

injection

C.

injection

Answers
D.

cross-site scripting

D.

cross-site scripting

Answers
Suggested answer: C

Explanation:


Reference: https://owasp.org/www-community/Injection_Theory

Refer to the exhibit. What are two characteristics of the NETCONF response? (Choose two.)

A.

ospf is defined by the ietf-ospf module.

A.

ospf is defined by the ietf-ospf module.

Answers
B.

ietf-ospf imports ietf-routing.

B.

ietf-ospf imports ietf-routing.

Answers
C.

redistribution is a module of type cisco-ospf.

C.

redistribution is a module of type cisco-ospf.

Answers
D.

routing protocols is a list.

D.

routing protocols is a list.

Answers
E.

The main module is routing.

E.

The main module is routing.

Answers
Suggested answer: B, C

A business needs to create a simulated environment that mimics a production infrastructure to make changes to the OSPF process and analyze the impact. What should be used?

A.

Cisco VIRL / Cisco CML

A.

Cisco VIRL / Cisco CML

Answers
B.

Cisco DevNet Sandbox labs

B.

Cisco DevNet Sandbox labs

Answers
C.

pyATS

C.

pyATS

Answers
D.

Puppet

D.

Puppet

Answers
Suggested answer: A

What is a benefit of a CI/CD pipeline for infrastructure?

A.

removes manual errors

A.

removes manual errors

Answers
B.

enables manual steps

B.

enables manual steps

Answers
C.

removes the need for operations

C.

removes the need for operations

Answers
D.

provides variety for deployments

D.

provides variety for deployments

Answers
Suggested answer: A

During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?

A.

integration

A.

integration

Answers
B.

deployment

B.

deployment

Answers
C.

development

C.

development

Answers
D.

testing

D.

testing

Answers
Suggested answer: A

Explanation:


Reference: https://www.opsmx.com/blog/what-is-a-ci-cd-pipeline/

Refer to the exhibit. Which workflow does the script automate?

A.

retrieves a media server that is being monitored

A.

retrieves a media server that is being monitored

Answers
B.

updates a media server that is being monitored

B.

updates a media server that is being monitored

Answers
C.

adds a media server to be monitored

C.

adds a media server to be monitored

Answers
D.

deletes a media server that is being monitored

D.

deletes a media server that is being monitored

Answers
Suggested answer: B

Which two details are captured from the subnet mask? (Choose two.)

A.

portion of an IP address that refers to the subnet

A.

portion of an IP address that refers to the subnet

Answers
B.

default gateway of the host

B.

default gateway of the host

Answers
C.

unique number ID assigned to the host

C.

unique number ID assigned to the host

Answers
D.

part of an IP address that refers to the host

D.

part of an IP address that refers to the host

Answers
E.

network connection of a host or interface

E.

network connection of a host or interface

Answers
Suggested answer: A, D

Refer to the exhibit. While developing a Cisco Webex bot, an application reaches the public IP address of the firewall, but traffic is forwarded to the IP address of server 1 instead of the IP address of server 2. What causes this issue?

A.

The proxy server that rewrites traffic is misconfigured.

A.

The proxy server that rewrites traffic is misconfigured.

Answers
B.

The router is sending the traffic to server 1 instead of server 2.

B.

The router is sending the traffic to server 1 instead of server 2.

Answers
C.

The switch is forwarding IP traffic to the wrong VLAN.

C.

The switch is forwarding IP traffic to the wrong VLAN.

Answers
D.

NAT is misconfigured on the firewall.

D.

NAT is misconfigured on the firewall.

Answers
Suggested answer: D

DRAG DROP

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.


Question 270
Correct answer: Question 270
Total 471 questions
Go to page: of 48