Cisco 200-901 Practice Test - Questions Answers, Page 35

List of questions
Question 341

A developer completed the creation of a script using Git. Before delivering it to the customer, the developer wants to be sure about all untracked files, without losing any information. Which command gathers this information?
Question 342

A company deploys an application via containers in its local data center. As soon as the application goes into production, it starts to crash at specific hours of the day. After investigation, it is concluded that the crashes are due to too many users accessing the application simultaneously. The spikes must be addressed and allow for future growth without discarding the investment already made. Which deployment model must be used?
Question 343

Which TCP port is used to connect to a network device by using Telnet?
Question 344

Refer to the exhibit.
Refer to the exhibit. Which action does the script perform?
Question 345

What is the purpose of grouping devices in a VLAN?
Question 346

Refer to the exhibit.
Refer to the exhibit. The YAML shown contains an object "param0" that is equal to "Workflow1", a second object "param1" that contains an object called "list" which contains an array of two objects, "name" (equal to "VLAN_ID") and "value" (equal to a text value "198"), and finally a third object "param2" that is equal to "0". What is the equivalent message in JSON data format?
Question 347

An engineer prepares a set of Python scripts to interact with network devices. To avoid network performance issues, the engineer wants to run them in a test environment. Which resource must be used to monitor the live execution of code in an always-available environment?
Question 348

When a Cisco IOS XE networking device is configured by using RESTCONF, what is the default data encoding method?
Question 349

Refer to the exhibit.
Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer's account?
Question 350

Which technology is responsible for matching a name to an IP address of an application running on a host?
Question