ExamGecko
Home Home / Cisco / 200-901

Cisco 200-901 Practice Test - Questions Answers, Page 30

Question list
Search
Search

A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing? The data contains sensitive information, so specialist encryption tools must be used to secure the dat a. Which application deployment model meets the requirements?

A.

edge

A.

edge

Answers
B.

private cloud

B.

private cloud

Answers
C.

public cloud

C.

public cloud

Answers
D.

hybrid cloud

D.

hybrid cloud

Answers
Suggested answer: D

Explanation:


A hybrid cloud combines the benefits of both a private cloud, which offers the ability to store sensitive data in a secure, dedicated environment, and a public cloud, which offers the ability to scale quickly and easily by deploying new nodes as needed. With a hybrid cloud deployment, you could use specialist encryption tools to secure the sensitive data in the private cloud, and then take advantage of the scalability and flexibility of the public cloud to handle the large volumes of log data.

What is a procedural component of CI/CD pipelines?

A.

Bundled artifacts must be generated.

A.

Bundled artifacts must be generated.

Answers
B.

Every test must pass for the pipeline to continue its execution.

B.

Every test must pass for the pipeline to continue its execution.

Answers
C.

Some tests fall without stopping the pipeline execution.

C.

Some tests fall without stopping the pipeline execution.

Answers
D.

The release label that identifies the build is optional.

D.

The release label that identifies the build is optional.

Answers
Suggested answer: B

Explanation:


In a CI/CD (Continuous Integration/Continuous Deployment) pipeline, a procedural component is a specific step or action that is carried out in a specific order as part of the pipeline process. One of the procedural components of a CI/CD pipeline is that every test must pass in order for the pipeline to continue its execution. If any test fails, the pipeline will stop and the issue must be addressed before the pipeline can continue. This is an important procedural component of a CI/CD pipeline because it ensures that the code being deployed is of high quality and meets the necessary standards before it is released.

Which OWASP threat occurs when untrusted data is supplied as input to an interpreter as part of a command or query?

A.

broken authentication

A.

broken authentication

Answers
B.

data exposure

B.

data exposure

Answers
C.

injection

C.

injection

Answers
D.

cross-site scripting

D.

cross-site scripting

Answers
Suggested answer: C

Explanation:


Refer to the exhibit.

What are two characteristics of the NETCONF response? (Choose two.)

A.

ospf is defined by the ietf-ospf module.

A.

ospf is defined by the ietf-ospf module.

Answers
B.

ietf-ospf imports ietf-routing.

B.

ietf-ospf imports ietf-routing.

Answers
C.

redistribution is a module of type cisco-ospf.

C.

redistribution is a module of type cisco-ospf.

Answers
D.

routing protocols is a list.

D.

routing protocols is a list.

Answers
E.

The main module is routing.

E.

The main module is routing.

Answers
Suggested answer: B, C

Explanation:


A business needs to create a simulated environment that mimics a production infrastructure to make changes to the OSPF process and analyze the impact. What should be used?

A.

Cisco VIRL / Cisco CML

A.

Cisco VIRL / Cisco CML

Answers
B.

Cisco DevNet Sandbox labs

B.

Cisco DevNet Sandbox labs

Answers
C.

pyATS

C.

pyATS

Answers
D.

Puppet

D.

Puppet

Answers
Suggested answer: A

Explanation:


https://www.cisco.com/c/en/us/products/cloud-systems-management/modeling-labs/index.html

What is a benefit of a CI/CD pipeline for infrastructure?

A.

removes manual errors

A.

removes manual errors

Answers
B.

enables manual steps

B.

enables manual steps

Answers
C.

removes the need for operations

C.

removes the need for operations

Answers
D.

provides variety for deployments

D.

provides variety for deployments

Answers
Suggested answer: A

Explanation:


During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?

A.

integration

A.

integration

Answers
B.

deployment

B.

deployment

Answers
C.

development

C.

development

Answers
D.

testing

D.

testing

Answers
Suggested answer: A

Explanation:


Refer to the exhibit.

Which workflow does the script automate?

A.

retrieves a media server that is being monitored

A.

retrieves a media server that is being monitored

Answers
B.

updates a media server that is being monitored

B.

updates a media server that is being monitored

Answers
C.

adds a media server to be monitored

C.

adds a media server to be monitored

Answers
D.

deletes a media server that is being monitored

D.

deletes a media server that is being monitored

Answers
Suggested answer: C

Explanation:


Which two details are captured from the subnet mask? (Choose two.)

A.

portion of an IP address that refers to the subnet

A.

portion of an IP address that refers to the subnet

Answers
B.

default gateway of the host

B.

default gateway of the host

Answers
C.

unique number ID assigned to the host

C.

unique number ID assigned to the host

Answers
D.

part of an IP address that refers to the host

D.

part of an IP address that refers to the host

Answers
E.

network connection of a host or interface

E.

network connection of a host or interface

Answers
Suggested answer: A, D

Explanation:


Refer to the exhibit.

While developing a Cisco Webex bot, an application reaches the public IP address of the firewall, but traffic is forwarded to the IP address of server 1 instead of the IP address of server 2. What causes this issue?

A.

The proxy server that rewrites traffic is misconfigured.

A.

The proxy server that rewrites traffic is misconfigured.

Answers
B.

The router is sending the traffic to server 1 instead of server 2.

B.

The router is sending the traffic to server 1 instead of server 2.

Answers
C.

The switch is forwarding IP traffic to the wrong VLAN.

C.

The switch is forwarding IP traffic to the wrong VLAN.

Answers
D.

NAT is misconfigured on the firewall.

D.

NAT is misconfigured on the firewall.

Answers
Suggested answer: D

Explanation:


Total 471 questions
Go to page: of 48