ExamGecko
Home Home / Cisco / 200-901

Cisco 200-901 Practice Test - Questions Answers, Page 29

Question list
Search
Search

Which action do webhooks enable an application to perform?

A.

Increase the request rate limit.

A.

Increase the request rate limit.

Answers
B.

Populate the application with restricted data.

B.

Populate the application with restricted data.

Answers
C.

Receive real-time data.

C.

Receive real-time data.

Answers
D.

Implement a push model.

D.

Implement a push model.

Answers
Suggested answer: C

Explanation:


Simplifying the wording: Webhook enables the app to ( push or receive real time) . The clients should receive real time but the app pushes.

Simplifying the wording: Webhook enables the app to ( push or receive real time) . The clientsWebhooks enable applications to receive real-time data by providing a mechanism for oneapplication to send data to another as soon as an event happens. This is done through HTTPcallbacks, where an event in the source system triggers an HTTP POST request to a predefinedURL in the destination system. This allows the destination system to process the dataimmediately, ensuring real-time updates.

Refer to the exhibit.

A developer can access the TLS REST API on server A, but cannot access the API on server B. The developer can ping server B. When the developer performs a packet capture on the TLS REST API port on server B, the capture shows that the packet arrived and the server responded. What causes the issue?

A.

Port 80 is blocked on the outgoing interface of firewall B.

A.

Port 80 is blocked on the outgoing interface of firewall B.

Answers
B.

Port 443 is blocked on the outgoing interface of firewall A.

B.

Port 443 is blocked on the outgoing interface of firewall A.

Answers
C.

Port 443 is blocked on the incoming interface of firewall B.

C.

Port 443 is blocked on the incoming interface of firewall B.

Answers
D.

Port 80 is blocked on the incoming interface of firewall A.

D.

Port 80 is blocked on the incoming interface of firewall A.

Answers
Suggested answer: C

Explanation:


How are operations on REST APIs performed as compared to RPC APIs?

A.

In a REST API, operations are performed on an object (node) that is identified by a URL, but RPC APIs are operation-oriented.

A.

In a REST API, operations are performed on an object (node) that is identified by a URL, but RPC APIs are operation-oriented.

Answers
B.

In a REST API, operations are performed on an external resource that is defined on the API, but the RCP APIs are resource-oriented.

B.

In a REST API, operations are performed on an external resource that is defined on the API, but the RCP APIs are resource-oriented.

Answers
C.

In a REST API, operations are performed on a platform that is identified by the URL, but RPC APIs are platform-oriented.

C.

In a REST API, operations are performed on a platform that is identified by the URL, but RPC APIs are platform-oriented.

Answers
D.

In a REST API, operations are performed on an internal resource that is defined on the API, but RPC APIs are resource-oriented.

D.

In a REST API, operations are performed on an internal resource that is defined on the API, but RPC APIs are resource-oriented.

Answers
Suggested answer: A

Explanation:

REST APIs are designed around resources that are identified by URLs. Operations are performedon these resources using standard HTTP methods like GET, POST, PUT, and DELETE. In contrast,RPC (Remote Procedure Call) APIs are designed around actions or operations, where the focusis on invoking methods or functions rather than manipulating resources

Which HTTP error code series relates to redirection?

A.

400

A.

400

Answers
B.

500

B.

500

Answers
C.

200

C.

200

Answers
D.

300

D.

300

Answers
Suggested answer: D

Explanation:


1xx - Informational: The server has received the request and is continuing the process 2xx - Successful: The request was successful and the browser has received the expected information 3xx (Redirection): You have been redirected and the completion of the request requires further action 4xx (Client Error): The website or the page could not be reached, either the page is unavailable or the request contains bad syntax 5xx (Server Error): While the request appears to be valid, the server could not complete the request

What is a characteristic of the Cisco Finesse platform?

A.

Applications allow services to be invoked on a network triggered event.

A.

Applications allow services to be invoked on a network triggered event.

Answers
B.

The platform provides a ready-to-go platform for HD video and audio conferencing.

B.

The platform provides a ready-to-go platform for HD video and audio conferencing.

Answers
C.

Applications are added to the platform from the desktop remotely.

C.

Applications are added to the platform from the desktop remotely.

Answers
D.

The platform includes an enterprise-class IM engine.

D.

The platform includes an enterprise-class IM engine.

Answers
Suggested answer: A

Explanation:


A characteristic of the Cisco Finesse platform is that applications allow services to be invoked on a network triggered event. Cisco Finesse is a next-generation agent and supervisor desktop designed to provide a rich, browser-based experience for contact center agents and supervisors. It offers a flexible, open development platform that allows developers to build custom applications and integrations to meet the specific needs of their contact center. One of the key features of Cisco Finesse is the ability to trigger actions based on events within the contact center network, such as an incoming call or a change in the status of a customer's account. This allows developers to build applications that can react to real-time events and provide relevant information or services to agents as they handle customer interactions.

An engineer needs to retrieve a list of locally available Firepower Threat Defense upgrade packages by using the Firepower Management Center REST API. The engineer uses a GET request with the URL:

/api/fmc_platform/v1/updates/upgradepackages/f413afeb-e6f6-75f4-9169-6d9bd49s625e What does “f413afeb-e6f6-75f4-9169-6d9bd49s625e” represent?

A.

container UUID

A.

container UUID

Answers
B.

package UUID

B.

package UUID

Answers
C.

domain UUID

C.

domain UUID

Answers
D.

object UUID

D.

object UUID

Answers
Suggested answer: B

Explanation:


"GET upgradepackages Request Type: GET Description: Retrieves a list of locally available Firepower Threat Defense upgrade packages, including major upgrades, maintenances release upgrades, and hotfixes.

URL: /api/fmc_platform/v1/updates/upgradepackages URL for GET by ID: /api/fmc_platform/v1/updates/upgradepackages/{package_UUID}" Source:

https://www.cisco.com/c/en/us/td/docs/security/firepower/640/api/REST/Firepower_Management_Center_REST_API_Quick_Start_Guide_640/Objects_In_The_REST_API.html

What is a benefit of using a code review process in application development?

A.

accelerates the deployment of new features in an existing application

A.

accelerates the deployment of new features in an existing application

Answers
B.

provides version control during code development

B.

provides version control during code development

Answers
C.

enables the quick deployment of new code

C.

enables the quick deployment of new code

Answers
D.

eliminates common mistakes during development

D.

eliminates common mistakes during development

Answers
Suggested answer: D

Explanation:


Which OWASP threat takes advantage of a web application that the user has already authenticated to execute an attack?

A.

phishing

A.

phishing

Answers
B.

DoS

B.

DoS

Answers
C.

brute force attack

C.

brute force attack

Answers
Suggested answer:

Explanation:


Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.

https://owasp.org/www-community/attacks/csrf

Refer to the exhibit.

An application must be deployed on a server that has other applications installed. The server resources are to be allocated based on the deployment requirements. The OS for each application must be independent. Which type of deployment is used?

A.

hybrid

A.

hybrid

Answers
B.

virtual machines

B.

virtual machines

Answers
C.

containers

C.

containers

Answers
D.

bare metal

D.

bare metal

Answers
Suggested answer: B

Explanation:


What is a benefit of a distributed version control system?

A.

encourages users to commit small places of work to the system more frequently

A.

encourages users to commit small places of work to the system more frequently

Answers
B.

ensures that all code meets minimum standards before being committed to the system

B.

ensures that all code meets minimum standards before being committed to the system

Answers
C.

allows users to work on the codebase even when not connected to the Internet

C.

allows users to work on the codebase even when not connected to the Internet

Answers
D.

ensures that all code is tested before being committed to the system

D.

ensures that all code is tested before being committed to the system

Answers
Suggested answer: C

Explanation:


Reference: https://about.gitlab.com/topics/version-control/benefits-distributed-version-controlsystem/

Total 471 questions
Go to page: of 48