Cisco 200-901 Practice Test - Questions Answers, Page 36
List of questions
Related questions
Which network constraint causes the performance of the application to decrease as the number of users accessing the application increases?
latency
loss
bandwidth
jitter
What is a characteristic of Waterfall compared to Agile software development method?
Waterfall focuses on continuous improvement, and Agile focuses on the design phase.
Waterfall separates the project development lifecycle into sprints, and Agile does not use cycles.
Waterfall specifies requirements before development begins, and Agile responds flexibly to changes in requirements.
Waterfall uses reviews with step by step approach, and Agile uses a serially phased approach.
Users cannot access a webserver and after the traffic is captured, the capture tool snows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?
The large distance between the server and the users means that the packets require too much time to reach the destination.
A router along the path is misrouting the packets in a wrong direction.
A router along the path has the wrong time.
The server is overloaded and the connection was not able to be processed in time.
Refer to the exhibit. An engineer is comparing two files by using the unified diff format. Which cade snippet belongs to the new.py file?
Refer to the exhibit.
Refer to the exhibit. A network engineer executes the bash script shown. Which two things are achieved by running the script? (Choose two.)
A directory called PRODUCTION is created.
The engineer changes to the parent directory.
A YAML file is created.
A YAML file is removed.
A directory called state.yml is created.
Refer to the exhibit.
Refer to the exhibit. Which code snippet represents the sequence.
A developer attempts to refactor and improve the application code. It is noticed that the code contains several pieces of key information that could be a security threat if this code is accessible by those who are not authorized to this dat a.
Which approach addresses the security concerns noticed by the developer?
Host the application code on a machine located in a secure data center.
Utilize environment variables for username and password details.
Rely on the security teams’ goodwill to not give access to those who do not need it.
Move the hardware that the application is deployed on to a secure location.
Which tool provides a testing environment to run tests on network devices and perform network automation scenarios?
Visual Studio Code
Cisco VIRL
pyATS
Cisco Packet Tracer
A developer writes an application that refines data in temporary secure file storage hosted on the public cloud. Data will be deleted after processing and does not contain any private information.
What is the advantage that a public cloud deployment provides to the developer?
high security with encryption
ease in infrastructure management
flexible development
bespoke services
Refer to the exhibit.
Refer to the exhibit. A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?
cp ./PROD/current.txt ./TEST/config.txt
cp ./TESTi/current.txt ./PROD/config.txt
cp ./PROD/config.txt ./TEST/current.txt
cp ./TEST/config.txt ./PROD/current.txt
Question