ExamGecko
Home Home / Cisco / 200-901

Cisco 200-901 Practice Test - Questions Answers, Page 34

Question list
Search
Search

Which platform has an API that has the capability to obtain a list of vulnerable software on user devices?

A.

Cisco Advanced Malware Protection

A.

Cisco Advanced Malware Protection

Answers
B.

Cisco Umbrella

B.

Cisco Umbrella

Answers
C.

Cisco Identity Services Engine

C.

Cisco Identity Services Engine

Answers
D.

Cisco Firepower

D.

Cisco Firepower

Answers
Suggested answer: A

Explanation:


A developer creates an application that must provide an encrypted connection or API keys. The keys will be used to communicate with a REST API. Which command must be used for the secure connection?

A.

curl –X PUSH ‘http://username.app.com/endpoint/?api_key=12345abcdef’

A.

curl –X PUSH ‘http://username.app.com/endpoint/?api_key=12345abcdef’

Answers
B.

curl –v ‘ftp://username.app.com/endpoint/?api_key=12345abcdef’

B.

curl –v ‘ftp://username.app.com/endpoint/?api_key=12345abcdef’

Answers
C.

curl –X GET ‘https://username.app.com/endpoint/?api_key=12345abcdef’

C.

curl –X GET ‘https://username.app.com/endpoint/?api_key=12345abcdef’

Answers
D.

curl –X GET ‘http://username.app.com/endpoint/?api_key=12345abcdef’

D.

curl –X GET ‘http://username.app.com/endpoint/?api_key=12345abcdef’

Answers
Suggested answer: C

Explanation:


A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?

A.

Store the username and password in a separate configuration file.

A.

Store the username and password in a separate configuration file.

Answers
B.

Store the username and password in a vault.

B.

Store the username and password in a vault.

Answers
C.

Store the passwords in a dictionary.

C.

Store the passwords in a dictionary.

Answers
D.

Store the username and password in code.

D.

Store the username and password in code.

Answers
Suggested answer: B

Explanation:


What is a capability of the AXL API?

A.

It signs a user in to a phone that is configured for extension mobility.

A.

It signs a user in to a phone that is configured for extension mobility.

Answers
B.

It pulls logs for the Cisco Tomcat service.

B.

It pulls logs for the Cisco Tomcat service.

Answers
C.

It authenticates users who exist in Cisco Unified Communications Manager.

C.

It authenticates users who exist in Cisco Unified Communications Manager.

Answers
D.

It provides support for HTTP and HTTPS communications.

D.

It provides support for HTTP and HTTPS communications.

Answers
Suggested answer: C

Explanation:


A developer creates a program in which an object maintains a list of classes based on the observer pattern. The classes are dependent on the object. Whenever the state of the object changes, it notifies the dependent classes directly through callbacks. Which advantage of the observer pattern offers minimum dependencies and maximum flexibility between dependent objects or classes?

A.

tight coupling

A.

tight coupling

Answers
B.

cohesion

B.

cohesion

Answers
C.

mediation

C.

mediation

Answers
D.

loose coupling

D.

loose coupling

Answers
Suggested answer: D

Explanation:


What is a feature of XML compared to other data formats?

A.

It uses tags to define the structure.

A.

It uses tags to define the structure.

Answers
B.

It uses parenthesis for key-value pairs.

B.

It uses parenthesis for key-value pairs.

Answers
C.

It uses indentation to define the structure.

C.

It uses indentation to define the structure.

Answers
D.

It uses namespaces for list representation.

D.

It uses namespaces for list representation.

Answers
Suggested answer: A

Explanation:


What is a capability of Ansible playbooks?

A.

They execute scheduled tasks regularly.

A.

They execute scheduled tasks regularly.

Answers
B.

They define the state for a device configuration.

B.

They define the state for a device configuration.

Answers
C.

They collect SNMP logs from networking devices.

C.

They collect SNMP logs from networking devices.

Answers
D.

They utilize the target device agent to execute.

D.

They utilize the target device agent to execute.

Answers
Suggested answer: A

Explanation:


What is the purpose of running tests before writing code in test-driven development?

A.

to find unexpected failures in the tests

A.

to find unexpected failures in the tests

Answers
B.

to demonstrate that the tests fail for expected reasons

B.

to demonstrate that the tests fail for expected reasons

Answers
C.

to ensure that the tests pass

C.

to ensure that the tests pass

Answers
D.

to provide proof of the work carried out

D.

to provide proof of the work carried out

Answers
Suggested answer: D

Explanation:


Which port does HTTPS use by default?

A.

433

A.

433

Answers
B.

443

B.

443

Answers
C.

803

C.

803

Answers
D.

883

D.

883

Answers
Suggested answer: B

Explanation:


Which HTTP method is used by webhooks and notifies a listener about an event change?

A.

PUT

A.

PUT

Answers
B.

POST

B.

POST

Answers
C.

PATCH

C.

PATCH

Answers
D.

GET

D.

GET

Answers
Suggested answer: B

Explanation:


Total 471 questions
Go to page: of 48