Cisco 200-901 Practice Test - Questions Answers, Page 28
List of questions
Related questions
DRAG DROP
Drag and drop the API characteristics from the left onto the categories on the right.
Refer to the exhibit.
Which XML snippet has interface information that conforms to the YANG model?
What is a benefit of version control?
prevents two users from working on the same file
keeps track of all changes to the files
prevents the sharing of files
keeps the list of data types used in the files
Refer to the exhibit.
What does the command marked (2) do when it is run?
It duplicates the test" branch.
It deletes the "test" branch only if a new branch is created.
It deletes the "test" branch.
It does not delete the branch until it is merged.
What is a comparison of YAML and JSON?
YAML has a more consistent approach to representing data compared to JSON.
JSON does not support comments and YAML does.
YAML is a more verbose data structure compared to JSON.
JSON has more common usage in configuration management tools compared to YAML.
Refer to the exhibit.
A collaboration engineer has developed a script to automate the gathering of information by providing the email address of the individual. When the engineer tests the script, a 401 error is received. Which command fixes the script?
Add "Authorization": "Bearer <WEBEX_TOKEN>" to the headers
Add "Authentication": "Basic <WEBEX_TOKEN>" in the base_url after "https://".
Add "<Authorization>:<password>@" in the base_url after "https://".
Add "Authentication": "Bearer <WEBEX TOKEN>" to the headers
A developer is attempting to retrieve all the messages from a Cisco Webex space. The server responds by sending the first 1,000 messages. The developer must make additional requests to retrieve the rest of the messages. Which API constraint is described in this scenario?
payload limiting
throttling
pagination
rate limiting
Refer to the exhibit.
A developer just finished testing a Python script and wants to save the list of packages and versions installed on the current machine. The developer must make sure that it will not cause any issues if tested on another device due to different library versions. Which line of code needs to be placed on the snippet where the code is missing?
pip freeze 2> requirements.txt
pip freeze > requirements.txt
pip freeze => requirements.txt
pip freeze | requirements.txt
A developer pushes an application to production. The application receives a webhook over HTTPSwithout a secret. The webhook information contains credentials to service in cleartext. When theinformation is received, it is stored in the database with an SHA-256 hash. Credentials to thedatabase are accessed at runtime through the use of a vault service. While troubleshooting, thedeveloper sets the logging to debug to view the message from the webhook. What is the securityissue in this scenario?
Database credentials should be accessed by using environment variables defined at runtime.
During the transport of webhook messages, the credentials could be unencrypted and leaked.
During logging, debugging should be disabled for the webhook message.
Hashing the credentials in the database is not secure enough; the credentials should be encrypted.
Refer to the exhibit.
A developer cannot reach the web application behind an NGINX load balancer. The developer sends a request to an application FQDN with cURL but gets an HTTP 502 response. Which action solves the problem?
Fix errors in the server configuration, which is behind the load balancer.
Bring up the load balancer to the active state.
Fix errors in the cURL request sent by the client.
Change the default gateway on the load balancer to an active one.
Question