ExamGecko
Home Home / Cisco / 200-901

Cisco 200-901 Practice Test - Questions Answers, Page 28

Question list
Search
Search

List of questions

Search

DRAG DROP

Drag and drop the API characteristics from the left onto the categories on the right.


Question 271
Correct answer: Question 271

Refer to the exhibit.

Which XML snippet has interface information that conforms to the YANG model?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

Explanation:


https://datatracker.ietf.org/doc/id/draft-ietf-netmod-interfaces-cfg-01.txt <adminstatus>up</admin-status>

What is a benefit of version control?

A.

prevents two users from working on the same file

A.

prevents two users from working on the same file

Answers
B.

keeps track of all changes to the files

B.

keeps track of all changes to the files

Answers
C.

prevents the sharing of files

C.

prevents the sharing of files

Answers
D.

keeps the list of data types used in the files

D.

keeps the list of data types used in the files

Answers
Suggested answer: B

Explanation:


Refer to the exhibit.

What does the command marked (2) do when it is run?

A.

It duplicates the test" branch.

A.

It duplicates the test" branch.

Answers
B.

It deletes the "test" branch only if a new branch is created.

B.

It deletes the "test" branch only if a new branch is created.

Answers
C.

It deletes the "test" branch.

C.

It deletes the "test" branch.

Answers
D.

It does not delete the branch until it is merged.

D.

It does not delete the branch until it is merged.

Answers
Suggested answer: C

Explanation:


What is a comparison of YAML and JSON?

A.

YAML has a more consistent approach to representing data compared to JSON.

A.

YAML has a more consistent approach to representing data compared to JSON.

Answers
B.

JSON does not support comments and YAML does.

B.

JSON does not support comments and YAML does.

Answers
C.

YAML is a more verbose data structure compared to JSON.

C.

YAML is a more verbose data structure compared to JSON.

Answers
D.

JSON has more common usage in configuration management tools compared to YAML.

D.

JSON has more common usage in configuration management tools compared to YAML.

Answers
Suggested answer: B

Explanation:


Reference: https://stackoverflow.com/questions/244777/can-comments-be-used-in-jsonCan I use comments in JSON? No, JSON is a data-only format. Comments in the form //, #, or /* */,which are used in popular programming languages, are not allowed in JSON. You can add commentsto JSON as custom JSON elements that will hold your comments, but these elements will still bedata.

Refer to the exhibit.

A collaboration engineer has developed a script to automate the gathering of information by providing the email address of the individual. When the engineer tests the script, a 401 error is received. Which command fixes the script?

A.

Add "Authorization": "Bearer <WEBEX_TOKEN>" to the headers

A.

Add "Authorization": "Bearer <WEBEX_TOKEN>" to the headers

Answers
B.

Add "Authentication": "Basic <WEBEX_TOKEN>" in the base_url after "https://".

B.

Add "Authentication": "Basic <WEBEX_TOKEN>" in the base_url after "https://".

Answers
C.

Add "<Authorization>:<password>@" in the base_url after "https://".

C.

Add "<Authorization>:<password>@" in the base_url after "https://".

Answers
D.

Add "Authentication": "Bearer <WEBEX TOKEN>" to the headers

D.

Add "Authentication": "Bearer <WEBEX TOKEN>" to the headers

Answers
Suggested answer: A

Explanation:


A developer is attempting to retrieve all the messages from a Cisco Webex space. The server responds by sending the first 1,000 messages. The developer must make additional requests to retrieve the rest of the messages. Which API constraint is described in this scenario?

A.

payload limiting

A.

payload limiting

Answers
B.

throttling

B.

throttling

Answers
C.

pagination

C.

pagination

Answers
D.

rate limiting

D.

rate limiting

Answers
Suggested answer: C

Explanation:


https://developer.atlassian.com/server/confluence/pagination-in-the-rest-api/

Refer to the exhibit.

A developer just finished testing a Python script and wants to save the list of packages and versions installed on the current machine. The developer must make sure that it will not cause any issues if tested on another device due to different library versions. Which line of code needs to be placed on the snippet where the code is missing?

A.

pip freeze 2> requirements.txt

A.

pip freeze 2> requirements.txt

Answers
B.

pip freeze > requirements.txt

B.

pip freeze > requirements.txt

Answers
C.

pip freeze => requirements.txt

C.

pip freeze => requirements.txt

Answers
D.

pip freeze | requirements.txt

D.

pip freeze | requirements.txt

Answers
Suggested answer: B

Explanation:

pip freeze requirements.txt ile ilgili görsel sonucu The most common command is pip freeze > requirements. txt , which records an environment's current package list into requirements. txt. If you want to install the dependencies in a virtual environment, create and activate that environment first, then use the Install from requirements.

A developer pushes an application to production. The application receives a webhook over HTTPSwithout a secret. The webhook information contains credentials to service in cleartext. When theinformation is received, it is stored in the database with an SHA-256 hash. Credentials to thedatabase are accessed at runtime through the use of a vault service. While troubleshooting, thedeveloper sets the logging to debug to view the message from the webhook. What is the securityissue in this scenario?

A.

Database credentials should be accessed by using environment variables defined at runtime.

A.

Database credentials should be accessed by using environment variables defined at runtime.

Answers
B.

During the transport of webhook messages, the credentials could be unencrypted and leaked.

B.

During the transport of webhook messages, the credentials could be unencrypted and leaked.

Answers
C.

During logging, debugging should be disabled for the webhook message.

C.

During logging, debugging should be disabled for the webhook message.

Answers
D.

Hashing the credentials in the database is not secure enough; the credentials should be encrypted.

D.

Hashing the credentials in the database is not secure enough; the credentials should be encrypted.

Answers
Suggested answer: B

Explanation:


Refer to the exhibit.

A developer cannot reach the web application behind an NGINX load balancer. The developer sends a request to an application FQDN with cURL but gets an HTTP 502 response. Which action solves the problem?

A.

Fix errors in the server configuration, which is behind the load balancer.

A.

Fix errors in the server configuration, which is behind the load balancer.

Answers
B.

Bring up the load balancer to the active state.

B.

Bring up the load balancer to the active state.

Answers
C.

Fix errors in the cURL request sent by the client.

C.

Fix errors in the cURL request sent by the client.

Answers
D.

Change the default gateway on the load balancer to an active one.

D.

Change the default gateway on the load balancer to an active one.

Answers
Suggested answer: A

Explanation:


The HyperText Transfer Protocol (HTTP) 502 Bad Gateway server error response code indicates thatthe server, while acting as a gateway or proxy, received an invalid response from the upstream server.

https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/502#:~:text=The%20HyperText%20Transfer%20Protocol%20(HTTP,response%20from%20the%20upstream%20server

Total 471 questions
Go to page: of 48