ExamGecko
Home Home / Cisco / 200-901

Cisco 200-901 Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

What is a characteristic of RPC APIs compared to REST APIs?

A.

Authentication is done over provisions for the service caller and vice versa for RPC API, and REST API uses HTTP headers for authentication.

A.

Authentication is done over provisions for the service caller and vice versa for RPC API, and REST API uses HTTP headers for authentication.

Answers
B.

All communications between the client and server must be stateless for RPC API, and REST API is stateful.

B.

All communications between the client and server must be stateless for RPC API, and REST API is stateful.

Answers
C.

The architecture model for RPC API is resource-focused, and REST API is procedure-focused.

C.

The architecture model for RPC API is resource-focused, and REST API is procedure-focused.

Answers
D.

The data payload must be in JSON format for RPC API, and REST API allows JSON and XML formats.

D.

The data payload must be in JSON format for RPC API, and REST API allows JSON and XML formats.

Answers
Suggested answer: A

Explanation:


Which two situations align with infrastructure as code principles? (Choose two.)

A.

nonreplicable snowflake servers

A.

nonreplicable snowflake servers

Answers
B.

release versions to specific hardware

B.

release versions to specific hardware

Answers
C.

maximized configuration drift

C.

maximized configuration drift

Answers
D.

easily reproducible systems

D.

easily reproducible systems

Answers
E.

repeatable processes

E.

repeatable processes

Answers
Suggested answer: B, D

Explanation:


Refer to the exhibit.

Refer to the exhibit. A developer writes a script to create a new network by using the Cisco DNA Center API. After running the script for the first time, the developer observes that HTTP code 404 is printed to the console. Which action resolves the problem?

A.

The x-auth-token value must be changed to a valid token.

A.

The x-auth-token value must be changed to a valid token.

Answers
B.

The API URL must be changed with a valid URL.

B.

The API URL must be changed with a valid URL.

Answers
C.

The requested payload must be fixed to include missing parts.

C.

The requested payload must be fixed to include missing parts.

Answers
D.

Internal errors on the code of API server must be fixed.

D.

Internal errors on the code of API server must be fixed.

Answers
Suggested answer: B

Explanation:


A developer plans to deploy a new application that will use an API to implement automated data collection from Webex with these requirements:

The application was created by using the request library.

Requires HTTP basic authentication.

Provides data in JSON or XML formats.

Which Cisco DevNet resource helps the developer with how to use the API?

A.

DevNet sandbox

A.

DevNet sandbox

Answers
B.

API documentation

B.

API documentation

Answers
C.

forums

C.

forums

Answers
D.

DevNet code exchange

D.

DevNet code exchange

Answers
Suggested answer: B

Explanation:


An engineer deploys a Cisco CSR 1000 V instance to a virtual machine. The engineer must output the device configuration in JSON format. Which protocol is used for this task?

A.

YANG

A.

YANG

Answers
B.

NETCONF

B.

NETCONF

Answers
C.

SNMP

C.

SNMP

Answers
D.

RESTCONF

D.

RESTCONF

Answers
Suggested answer: D

Explanation:


What are two benefits of implementing common data structures when working with APIs in remote systems? (Choose two.)

A.

ensures that developers are limited to using one data schema type

A.

ensures that developers are limited to using one data schema type

Answers
B.

prevents multivendor interoperability

B.

prevents multivendor interoperability

Answers
C.

improves security in RESTful web services

C.

improves security in RESTful web services

Answers
D.

enforces standardized data structures

D.

enforces standardized data structures

Answers
E.

leverages code that is easily managed and reused

E.

leverages code that is easily managed and reused

Answers
Suggested answer: B, E

Explanation:


A development team is creating an application used for contactless payments. The application must:

Be web-based Capture and process the credit card information for a purchase.

Which security action must the web application use to gather and process the private customer data?

A.

Enable RATs to monitor the web application remotely.

A.

Enable RATs to monitor the web application remotely.

Answers
B.

Disable botnets to eliminate risks.

B.

Disable botnets to eliminate risks.

Answers
C.

Disable TLS to increase the connection speed.

C.

Disable TLS to increase the connection speed.

Answers
D.

Enable the encryption of network traffic.

D.

Enable the encryption of network traffic.

Answers
Suggested answer: D

Explanation:


An engineer needs to collect information about 20,000 Bluetooth clients using the Cisco Meraki API.

The API returns only 1,000 results. One of the HTTP response headers has the data:

Link:

https://api.meraki.com.info/api/v0/networks/ABC/bluetoothClients?perPage=1000&startingAfter=1000>;rel=“next”Which RFC is implemented by the API to apply the restriction?

A.

RFC 5988 – Web Linking

A.

RFC 5988 – Web Linking

Answers
B.

RFC 5890 – Response Constraints

B.

RFC 5890 – Response Constraints

Answers
C.

RFC 5005 – Feed Paging and Archiving

C.

RFC 5005 – Feed Paging and Archiving

Answers
D.

RFC 5446 – Content Limits

D.

RFC 5446 – Content Limits

Answers
Suggested answer: C

Explanation:


What are two benefits of using classes over functions when writing applications? (Choose two.)

A.

improved readability

A.

improved readability

Answers
B.

increased compatibility

B.

increased compatibility

Answers
C.

variable reusability

C.

variable reusability

Answers
D.

increased performance

D.

increased performance

Answers
E.

code organization

E.

code organization

Answers
Suggested answer: A, C

Explanation:


A developer creates a new application, but the application must be tested before being released to a customer. When a mobile phone that uses 4G is used to access the application, the request fails. Why does the connection to the application fail?

A.

The application is hosted on premises and VPN connectivity is required

A.

The application is hosted on premises and VPN connectivity is required

Answers
B.

The application must be added to the production server before testing.

B.

The application must be added to the production server before testing.

Answers
C.

The application must be moved to the cloud before testing is possible.

C.

The application must be moved to the cloud before testing is possible.

Answers
D.

The application connectivity is limited to HTTPS protocol.

D.

The application connectivity is limited to HTTPS protocol.

Answers
Suggested answer: A

Explanation:


Total 471 questions
Go to page: of 48