Cisco 200-901 Practice Test - Questions Answers, Page 27
List of questions
Question 261
What is a procedural component of CI/CD pipelines?
Question 262
Which OWASP threat occurs when untrusted data is supplied as input to an interpreter as part of a command or query?
Question 263
Refer to the exhibit. What are two characteristics of the NETCONF response? (Choose two.)
Question 264
A business needs to create a simulated environment that mimics a production infrastructure to make changes to the OSPF process and analyze the impact. What should be used?
Question 265
What is a benefit of a CI/CD pipeline for infrastructure?
Question 266
During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?
Question 267
Refer to the exhibit. Which workflow does the script automate?
Question 268
Which two details are captured from the subnet mask? (Choose two.)
Question 269
Refer to the exhibit. While developing a Cisco Webex bot, an application reaches the public IP address of the firewall, but traffic is forwarded to the IP address of server 1 instead of the IP address of server 2. What causes this issue?
Question 270
DRAG DROP
Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to complete the function that adds a new global access rule that denies traffic using the Cisco ASA REST API. Not all options are used.
        
 
                                            
Question