ExamGecko
Home Home / Cisco / 200-901

Cisco 200-901 Practice Test - Questions Answers, Page 36

Question list
Search
Search

List of questions

Search

Which network constraint causes the performance of the application to decrease as the number of users accessing the application increases?

A.

latency

A.

latency

Answers
B.

loss

B.

loss

Answers
C.

bandwidth

C.

bandwidth

Answers
D.

jitter

D.

jitter

Answers
Suggested answer: C

Explanation:


What is a characteristic of Waterfall compared to Agile software development method?

A.

Waterfall focuses on continuous improvement, and Agile focuses on the design phase.

A.

Waterfall focuses on continuous improvement, and Agile focuses on the design phase.

Answers
B.

Waterfall separates the project development lifecycle into sprints, and Agile does not use cycles.

B.

Waterfall separates the project development lifecycle into sprints, and Agile does not use cycles.

Answers
C.

Waterfall specifies requirements before development begins, and Agile responds flexibly to changes in requirements.

C.

Waterfall specifies requirements before development begins, and Agile responds flexibly to changes in requirements.

Answers
D.

Waterfall uses reviews with step by step approach, and Agile uses a serially phased approach.

D.

Waterfall uses reviews with step by step approach, and Agile uses a serially phased approach.

Answers
Suggested answer: C

Explanation:


Users cannot access a webserver and after the traffic is captured, the capture tool snows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?

A.

The large distance between the server and the users means that the packets require too much time to reach the destination.

A.

The large distance between the server and the users means that the packets require too much time to reach the destination.

Answers
B.

A router along the path is misrouting the packets in a wrong direction.

B.

A router along the path is misrouting the packets in a wrong direction.

Answers
C.

A router along the path has the wrong time.

C.

A router along the path has the wrong time.

Answers
D.

The server is overloaded and the connection was not able to be processed in time.

D.

The server is overloaded and the connection was not able to be processed in time.

Answers
Suggested answer: A

Explanation:

An ICMP 'time exceeded in-transit' message indicates that the TTL (Time to Live) of a packet hasexpired. The TTL value is a counter that decreases by one each time the packet passes througha router. When the TTL reaches zero, the packet is discarded, and an ICMP 'time exceeded'message is sent back to the sender. This typically happens when the packet takes too manyhops or the destination is too far away, causing the TTL to expire before reaching thedestination.

Refer to the exhibit. An engineer is comparing two files by using the unified diff format. Which cade snippet belongs to the new.py file?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

Explanation:


Refer to the exhibit.

Refer to the exhibit. A network engineer executes the bash script shown. Which two things are achieved by running the script? (Choose two.)

A.

A directory called PRODUCTION is created.

A.

A directory called PRODUCTION is created.

Answers
B.

The engineer changes to the parent directory.

B.

The engineer changes to the parent directory.

Answers
C.

A YAML file is created.

C.

A YAML file is created.

Answers
D.

A YAML file is removed.

D.

A YAML file is removed.

Answers
E.

A directory called state.yml is created.

E.

A directory called state.yml is created.

Answers
Suggested answer: A, C

Explanation:


Refer to the exhibit.

Refer to the exhibit. Which code snippet represents the sequence.

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

Explanation:


A developer attempts to refactor and improve the application code. It is noticed that the code contains several pieces of key information that could be a security threat if this code is accessible by those who are not authorized to this dat a.

Which approach addresses the security concerns noticed by the developer?

A.

Host the application code on a machine located in a secure data center.

A.

Host the application code on a machine located in a secure data center.

Answers
B.

Utilize environment variables for username and password details.

B.

Utilize environment variables for username and password details.

Answers
C.

Rely on the security teams’ goodwill to not give access to those who do not need it.

C.

Rely on the security teams’ goodwill to not give access to those who do not need it.

Answers
D.

Move the hardware that the application is deployed on to a secure location.

D.

Move the hardware that the application is deployed on to a secure location.

Answers
Suggested answer: B

Explanation:


Which tool provides a testing environment to run tests on network devices and perform network automation scenarios?

A.

Visual Studio Code

A.

Visual Studio Code

Answers
B.

Cisco VIRL

B.

Cisco VIRL

Answers
C.

pyATS

C.

pyATS

Answers
D.

Cisco Packet Tracer

D.

Cisco Packet Tracer

Answers
Suggested answer: C

Explanation:

pyATS (Python Automated Test Systems) is a comprehensive testing framework developed byCisco, designed specifically for automating the testing of network devices. It provides a robustand flexible environment for creating and running tests on network devices and simulatingnetwork automation scenarios.pyATS enables the creation of reusable test scripts and workflows that can be applied acrossdifferent network environments and devices.It supports various protocols and devices, allowing for extensive testing coverage.It integrates well with other Cisco network automation tools and frameworks, making it aversatile choice for network engineers and developers.

A developer writes an application that refines data in temporary secure file storage hosted on the public cloud. Data will be deleted after processing and does not contain any private information.

What is the advantage that a public cloud deployment provides to the developer?

A.

high security with encryption

A.

high security with encryption

Answers
B.

ease in infrastructure management

B.

ease in infrastructure management

Answers
C.

flexible development

C.

flexible development

Answers
D.

bespoke services

D.

bespoke services

Answers
Suggested answer: B

Explanation:


Refer to the exhibit.

Refer to the exhibit. A network engineer must copy the “config.txt” file from directory TEST to directory PROD. The copied file must also be renamed into “current.txt”. Which command must be used to accomplish these tasks?

A.

cp ./PROD/current.txt ./TEST/config.txt

A.

cp ./PROD/current.txt ./TEST/config.txt

Answers
B.

cp ./TESTi/current.txt ./PROD/config.txt

B.

cp ./TESTi/current.txt ./PROD/config.txt

Answers
C.

cp ./PROD/config.txt ./TEST/current.txt

C.

cp ./PROD/config.txt ./TEST/current.txt

Answers
D.

cp ./TEST/config.txt ./PROD/current.txt

D.

cp ./TEST/config.txt ./PROD/current.txt

Answers
Suggested answer: D

Explanation:


Total 471 questions
Go to page: of 48