Cisco 200-901 Practice Test - Questions Answers, Page 35
List of questions
Related questions
A developer completed the creation of a script using Git. Before delivering it to the customer, the developer wants to be sure about all untracked files, without losing any information. Which command gathers this information?
git clean –n
git rm –f
git clean –r
git rm *
A company deploys an application via containers in its local data center. As soon as the application goes into production, it starts to crash at specific hours of the day. After investigation, it is concluded that the crashes are due to too many users accessing the application simultaneously. The spikes must be addressed and allow for future growth without discarding the investment already made. Which deployment model must be used?
hybrid cloud
edge
private cloud
public cloud
Which TCP port is used to connect to a network device by using Telnet?
23
69
400
830
Refer to the exhibit.
Refer to the exhibit. Which action does the script perform?
It queries user credentials from Cisco IOS XE devices.
It retrieves device identification from Cisco DNA Center.
It exports SSID information from Meraki dashboard.
It collects group information from ACI.
What is the purpose of grouping devices in a VLAN?
Devices communicate as if they are connected on the same wire.
Multicast network traffic is limited to the VLAN connected devices.
Unicast messages are limited to the clients connected on the same VLAN.
Network traffic is load balanced between the devices connected to the VLAN.
Refer to the exhibit.
Refer to the exhibit. The YAML shown contains an object "param0" that is equal to "Workflow1", a second object "param1" that contains an object called "list" which contains an array of two objects, "name" (equal to "VLAN_ID") and "value" (equal to a text value "198"), and finally a third object "param2" that is equal to "0". What is the equivalent message in JSON data format?
An engineer prepares a set of Python scripts to interact with network devices. To avoid network performance issues, the engineer wants to run them in a test environment. Which resource must be used to monitor the live execution of code in an always-available environment?
packet tracer
learning labs
sandbox
code exchange
When a Cisco IOS XE networking device is configured by using RESTCONF, what is the default data encoding method?
application/yaml-data+json
application/yang-data+json
application/xml-data+json
application/json-data+xml
Refer to the exhibit.
Refer to the exhibit. A developer is part of a team that is working on an open-source project in which source code is hosted in a public GitHub repository. While the application was built, security concerns were addressed by encrypting the credentials on the server. After a few months, the developer realized that a hacker managed to gain access to the account. The exhibit contains part of the source code for the login process. Why was the attacker able to access the developer's account?
The encoded credentials were available in the source code.
The application was not encrypting the communication with the server.
The credentials were encrypted in the source code.
An SSL certificate was used instead of the TLS protocol to authenticate.
Which technology is responsible for matching a name to an IP address of an application running on a host?
firewall
proxy
load balancer
DNS
Question