ExamGecko
Home Home / Cisco / 200-901

Cisco 200-901 Practice Test - Questions Answers, Page 42

Question list
Search
Search

List of questions

Search

DRAG DROP

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.


Question 411
Correct answer: Question 411

Explanation:

Cisco DevNet Associate Certification Guide, Sections on interacting with REST APIs using Python

Official documentation for the Requests library: Requests: HTTP for Humans

Which HTTP response code is returned from a successful REST API call to create a new resource?

A.

201

A.

201

Answers
B.

204

B.

204

Answers
C.

302

C.

302

Answers
D.

429

D.

429

Answers
Suggested answer: A

Explanation:

The HTTP status code 201 (Created) indicates that a request has been fulfilled and resulted in a new resource being created.

201 Created: This status code is used when a new resource is successfully created as a result of a POST request.

Use Case: Commonly returned in response to a POST request that adds a new item to a collection.

HTTP Status Codes: HTTP Status Code 201

Refer to the exhibit.

A security team observes an attack that originates from a Cisco Meraki device. To mitigate the attack, the team requests that the engineering team remove the /ice from the network. The security team also requests information about the device, such as Its name and location. Which tool must the engineering team use to meet the luirements by using tasks?

A.

CFEngine

A.

CFEngine

Answers
B.

cURL

B.

cURL

Answers
C.

Postman

C.

Postman

Answers
D.

Ansible

D.

Ansible

Answers
Suggested answer: D

Explanation:

Ansible is a powerful automation tool used for IT tasks such as configuration management, application deployment, and task automation. In the context of the exhibit, Ansible can be used to automate the removal of a Cisco Meraki device from the network and retrieve device information.

Device Management: Ansible modules, such as the meraki_device module shown in the exhibit, allow for the management of Meraki devices. Tasks can include querying device information and changing the state of the device.

Automation with Playbooks: The Ansible playbook in the exhibit demonstrates how to authenticate, define the organization and network, and manage the device state (query or absent).

Task Execution: The playbook is structured to perform tasks using a loop (with_items) to execute actions such as querying device details and removing the device (absent state).

Ansible Documentation for Meraki Modules: Ansible Meraki Modules

A developer checks the performance of a web application. The application is in the local data center and uses a REST-based API. Based on the API logs, it is discovered that many its abandon API requests. Also, the response is taking too long to get back. What is the reason for this issue?

A.

Pagination is not implemented

A.

Pagination is not implemented

Answers
B.

Token-based authentication is enabled.

B.

Token-based authentication is enabled.

Answers
C.

Rate limiting is not implemented.

C.

Rate limiting is not implemented.

Answers
D.

Token-based authentication is disabled

D.

Token-based authentication is disabled

Answers
Suggested answer: C

Explanation:

Rate limiting is a technique to control the rate of incoming and outgoing traffic to or from a network. If rate limiting is not implemented, excessive API requests can overwhelm the server, causing long response times and abandoned requests.

Abandoned Requests: When a server is overwhelmed with too many requests, it may not process them all, leading to abandoned requests.

Long Response Times: Without rate limiting, the server might be handling more requests than it can efficiently process, resulting in delayed responses.

Solution: Implementing rate limiting ensures that the server processes requests at a manageable rate, improving performance and reliability.

Rate Limiting and API Performance: Understanding Rate Limiting

Which two protocols are associated with the control plane on a network device? (Choose two.)

A.

BGP

A.

BGP

Answers
B.

UDP

B.

UDP

Answers
C.

SNMP

C.

SNMP

Answers
D.

FTP

D.

FTP

Answers
E.

OSPF

E.

OSPF

Answers
Suggested answer: A, E

Explanation:

The control plane in a network device is responsible for routing and signaling. Protocols such as BGP (Border Gateway Protocol) and OSPF (Open Shortest Path First) are integral to the control plane.

BGP (Border Gateway Protocol): BGP is used for exchanging routing information between autonomous systems on the internet, making it a crucial control plane protocol.

OSPF (Open Shortest Path First): OSPF is an interior gateway protocol used for routing within an autonomous system, also part of the control plane.

BGP and OSPF Protocol Details: BGP, OSPF

A lead engineer is managing the development of a web application with a team of remote developers using Git as the version control system. What is the advantage of a version Control system that allows developers to pick code from any part of the project and perform updates on it?

A.

efficient handling of projects

A.

efficient handling of projects

Answers
B.

linear development

B.

linear development

Answers
C.

build automation

C.

build automation

Answers
D.

nonlinear development

D.

nonlinear development

Answers
Suggested answer: D

Explanation:

Nonlinear development in a version control system like Git allows developers to work on different parts of the project independently and simultaneously. This approach provides several advantages:

Independent Workflows: Developers can work on different features or bug fixes without interfering with each other's work.

Parallel Development: Multiple branches enable parallel development, where teams can develop, test, and merge features separately.

Efficient Collaboration: Changes can be reviewed, tested, and merged systematically, improving collaboration among remote teams.

Git and Nonlinear Development: Understanding Git Workflow

Refer to the exhibit.

A.

It deletes some device configurations.

A.

It deletes some device configurations.

Answers
B.

It deletes all the device configurations.

B.

It deletes all the device configurations.

Answers
C.

It shuts off the device.

C.

It shuts off the device.

Answers
D.

It adds a new device configuration

D.

It adds a new device configuration

Answers
Suggested answer: A

Explanation:

The exhibit shows an XML configuration using NETCONF (Network Configuration Protocol) to edit the configuration of a network device. Specifically, the <edit-config> operation is being used with the nc:operation='delete' attribute within the <interface> element. This means that the configuration is intended to delete specific configurations related to the interface named FastEthernet0/0/3.9.

Here is the detailed explanation:

The <rpc> element initiates a remote procedure call.

The <edit-config> element specifies the operation to be performed.

The <target> element with <running> indicates that the changes are to be made to the running configuration.

The <config> element contains the configuration data to be applied.

Within <interfaces>, the <interface> element with nc:operation='delete' specifies that the interface configuration for FastEthernet0/0/3.9 is to be deleted.

This configuration does not affect all device configurations or shut down the device but deletes the specified interface configuration.

Cisco DevNet Associate Certification Guide

RFC 6241 - Network Configuration Protocol (NETCONF)

DRAG DROP

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.


Question 418
Correct answer: Question 418

Explanation:

Cisco DevNet Associate Certification Guide

Python Requests Library Documentation

HOTSPOT

An engineer clones a repository that contains a Python script from GitLab to a laptop. After modifying the code, the engineer wants to validate the changes. Which command starts ... CI/CD pipeline and runs the automated tests?


Question 419
Correct answer: Question 419

Explanation:

Cisco DevNet Associate Certification Guide

GitLab CI/CD Documentation

Refer to the exhibit.

A company recently acquired new IP-based security cameras. After discussion with the engineering team, they decide to segment the security camera traffic m the rest...The engineer assigns the new VLAN 10 for the security camera traffic. After all the devices are configured, it seems as if the cameras cannot access the Internet, .. a few minutes of debugging, the engineer restricts the problem to the router configuration. What is the cause of the issue?

A.

A specific permit statement for the 192.168.20.0/24 subnet is missing from the access list.

A.

A specific permit statement for the 192.168.20.0/24 subnet is missing from the access list.

Answers
B.

A NAT inside rule is missing from the GlgabitEthernet0/0/0.10 interface.

B.

A NAT inside rule is missing from the GlgabitEthernet0/0/0.10 interface.

Answers
C.

A specific permit statement for the 192.168.10.0/24 subnet is missing from the access list.

C.

A specific permit statement for the 192.168.10.0/24 subnet is missing from the access list.

Answers
D.

A NAT inside rule is missing from the GigabitEthemet0/0/0 interface.

D.

A NAT inside rule is missing from the GigabitEthemet0/0/0 interface.

Answers
Suggested answer: C

Explanation:

The exhibit shows the router configuration for NAT (Network Address Translation). To allow traffic from the security cameras to access the Internet, the access list needs to include a permit statement for the 192.168.10.0/24 subnet.

Access List Configuration: The access list (ACL) should permit traffic from the security camera VLAN (192.168.10.0/24).

NAT Configuration: The NAT configuration uses an ACL to determine which internal IP addresses are translated to the public IP address pool.

Missing Permit Statement: Without a specific permit statement for the 192.168.10.0/24 subnet, the router does not translate the IP addresses from this subnet, resulting in a lack of Internet access for the security cameras.

Cisco NAT Configuration Guide: NAT Configuration

Total 471 questions
Go to page: of 48