ExamGecko
Home Home / Cisco / 200-901

Cisco 200-901 Practice Test - Questions Answers, Page 45

Question list
Search
Search

What is a characteristic of lest-driven development?

A.

It enables code refactoring.

A.

It enables code refactoring.

Answers
B.

User tests are created after deployment.

B.

User tests are created after deployment.

Answers
C.

Infrastructure testing is done at every stage.

C.

Infrastructure testing is done at every stage.

Answers
D.

Large updates are applied infrequently.

D.

Large updates are applied infrequently.

Answers
Suggested answer: A

Explanation:

Test-Driven Development (TDD) is a software development approach where tests are written before writing the actual code. TDD enables and encourages code refactoring because it ensures that tests are already in place to verify the correctness of the code after changes.

Red-Green-Refactor Cycle: TDD follows a cycle of writing a test (Red), writing code to pass the test (Green), and then refactoring the code while ensuring the test still passes (Refactor).

Refactoring Support: Because tests are written first, developers can confidently refactor code knowing that any changes that break functionality will be caught by the existing tests.

Test-Driven Development: TDD Overview

What is the purpose of Infrastructure as Code?

A.

to provide the ability of independent development process

A.

to provide the ability of independent development process

Answers
B.

to manually configure and manage infrastructure at scale

B.

to manually configure and manage infrastructure at scale

Answers
C.

to apply new practices on the development process

C.

to apply new practices on the development process

Answers
D.

to use development engineering practices on the infrastructure

D.

to use development engineering practices on the infrastructure

Answers
Suggested answer: D

Explanation:

Infrastructure as Code (IaC) applies software development practices to infrastructure management. This approach uses code to provision and manage IT infrastructure, enabling version control, automated testing, and continuous delivery.

Automated Provisioning: IaC scripts automate the setup and configuration of infrastructure resources.

Consistency: By defining infrastructure in code, environments can be consistently reproduced across different stages (development, testing, production).

Development Practices: IaC allows infrastructure to be managed with the same tools and processes as application code, including version control and automated testing.

Infrastructure as Code Overview: IaC Introduction

What is the impact on an application from having a large distance between a client device and a host server?

A.

jitter

A.

jitter

Answers
B.

latency

B.

latency

Answers
C.

loss of connectivity

C.

loss of connectivity

Answers
D.

increased bandwidth

D.

increased bandwidth

Answers
Suggested answer: B

Explanation:

Latency refers to the delay between a client request and a server response. A large distance between a client device and a host server increases the latency due to the time it takes for data to travel over the network.

Latency: The time delay experienced in a system, particularly in networking, where it refers to the time taken for data to travel from the source to the destination.

Impact: High latency can result in slow response times, negatively impacting the performance of applications, especially those requiring real-time interactions.

Network Latency Overview: Network Latency

Which RFC 1918 address space includes a subnet of 172.16.0.0 that uses a mask of 255.255.0.0?

A.

class A

A.

class A

Answers
B.

class B

B.

class B

Answers
C.

class C

C.

class C

Answers
D.

class D

D.

class D

Answers
Suggested answer: B

Explanation:

RFC 1918 defines private IP address ranges for use within private networks. The address space 172.16.0.0 to 172.31.255.255 is designated as private and falls under class B.

Class B Address Space: The range 172.16.0.0 to 172.31.255.255 is a private IP address range designated for class B networks.

Subnet Mask: A subnet mask of 255.255.0.0 (/16) is commonly used within this range to create subnets.

RFC 1918 Address Allocation: RFC 1918

Refer to the exhibit.

A network engineer makes a RESTCONF API call to Cisco IOS XE to retrieve information. Which HTTP method and URL does the engineer use to make the ..call?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

The provided JSON configuration includes information about a GigabitEthernet interface with the name '2'. To retrieve information about this specific interface using a RESTCONF API call, the correct HTTP method and URL must be used.

HTTP Method: The GET method is used to retrieve information from the server.

Correct URL: The URL must specify the path to the particular interface. The correct URL structure includes the native and interface resources, followed by the interface type (GigabitEthernet) and its specific name ('2').

The correct RESTCONF API call to retrieve the information would be:

GET https://devnetlab.local/restconf/api/running/native/interface/GigabitEthernet/2/

This URL correctly targets the specific GigabitEthernet interface named '2' in the running configuration.

Cisco RESTCONF API Documentation: RESTCONF API Guide

Which Cisco compute management platform controls server, network, storage, and virtual resources with policy-driven management for up to 10000 physical Cisco servers?

A.

UCS Central

A.

UCS Central

Answers
B.

Cisco Intersight

B.

Cisco Intersight

Answers
C.

Cisco DNA Center

C.

Cisco DNA Center

Answers
D.

Cisco HyperFlex

D.

Cisco HyperFlex

Answers
Suggested answer: B

Explanation:

Cisco Intersight is a cloud-based management platform that provides comprehensive management for Cisco UCS and HyperFlex systems. It integrates with Cisco UCS Director and UCS Manager to control server, network, storage, and virtual resources, supporting policy-driven management for up to 10,000 physical Cisco servers. Intersight offers advanced capabilities such as proactive support and a robust API for automation and integration, ensuring seamless operations across various infrastructures.

Cisco Intersight Overview

An engineer must review and clean up a code repository. During the review, the engineer finds a file named config.json that contains API URLs, shared keys, and other application configurations. Which two methods, according to best practice, must be used to protect secrets? (Choose two.)

A.

Store in plaintext if they are not stored in a code repository.

A.

Store in plaintext if they are not stored in a code repository.

Answers
B.

Store as plaintext when the server is secured physically.

B.

Store as plaintext when the server is secured physically.

Answers
C.

Never appear in plaintext at rest or in transit.

C.

Never appear in plaintext at rest or in transit.

Answers
D.

Make them long, secure strings that include numbers with special characters.

D.

Make them long, secure strings that include numbers with special characters.

Answers
E.

Always store in a secure vault.

E.

Always store in a secure vault.

Answers
Suggested answer: C, E

Explanation:

To protect secrets such as API URLs, shared keys, and other application configurations, it is best practice to: C. Ensure they never appear in plaintext at rest or in transit. Encrypt sensitive data both when it is stored (at rest) and when it is transmitted over the network (in transit). This prevents unauthorized access and exposure. E. Always store secrets in a secure vault. Use dedicated secret management tools like HashiCorp Vault, AWS Secrets Manager, or Azure Key Vault to store and manage sensitive information securely. These tools provide mechanisms for access control, audit logging, and automatic rotation of secrets.

Securing Secrets

HashiCorp Vault

AWS Secrets Manager

What is an advantage of device-level management as compared to controller-level management to automate the configuration of network devices?

A.

Device-level management has access to all devices from a single point on the network and controller-level management does not.

A.

Device-level management has access to all devices from a single point on the network and controller-level management does not.

Answers
B.

Device-level management supports all subsets of the potential device settings and controller-level management does not.

B.

Device-level management supports all subsets of the potential device settings and controller-level management does not.

Answers
C.

Device-level management supports REST API-enabled devices and controller-level management does not.

C.

Device-level management supports REST API-enabled devices and controller-level management does not.

Answers
D.

Device-level management requires one controller per vendor and controller-level management does not.

D.

Device-level management requires one controller per vendor and controller-level management does not.

Answers
Suggested answer: B

Explanation:

Device-level management allows for more granular control over the specific settings and configurations of individual network devices. This is beneficial in scenarios where fine-tuning of device settings is required, and where certain configurations may not be exposed or supported by the overarching controller. Controller-level management, on the other hand, abstracts many device-specific settings to provide a more uniform and simplified management interface, which may not support all the detailed configurations available at the device level.

Cisco DevNet: Device vs. Controller Management

What is a benefit of organizing code into modules?

A.

better maintainability

A.

better maintainability

Answers
B.

reduced development costs

B.

reduced development costs

Answers
C.

simplified development

C.

simplified development

Answers
D.

compatibility with REST APIs

D.

compatibility with REST APIs

Answers
Suggested answer: A

Explanation:

Organizing code into modules improves maintainability by encapsulating functionality into smaller, more manageable pieces. This modular approach allows developers to focus on specific sections of code without being overwhelmed by the entire codebase. It also makes it easier to debug, test, and update parts of the application independently, enhancing overall code quality and maintainability.

Modular Programming - Python Documentation

A resource named /item is protected by oAuth2 authentication. An endpoint named /login must request authentication. Which method must be used to access the resource by using the REST API?

A.

Make a GET call to /login that includes the username and password, and retrieve a token to insert into the /item call.

A.

Make a GET call to /login that includes the username and password, and retrieve a token to insert into the /item call.

Answers
B.

Make a POST call to /login including the user credentials in the message, and retrieve a token to insert into the authorization header of the /item call.

B.

Make a POST call to /login including the user credentials in the message, and retrieve a token to insert into the authorization header of the /item call.

Answers
C.

Make a GET call to /item, then make a call to /login that includes the username and password in the body of the message, and wait for the authorization code.

C.

Make a GET call to /item, then make a call to /login that includes the username and password in the body of the message, and wait for the authorization code.

Answers
D.

Make a POST call to /item that includes the username and password in the body of the request message, and submit it to request access.

D.

Make a POST call to /item that includes the username and password in the body of the request message, and submit it to request access.

Answers
Suggested answer: B

Explanation:

When using OAuth2 authentication for accessing a protected resource via a REST API, the typical flow involves obtaining an access token which can then be used to authenticate subsequent API requests. The correct process is:

POST Call to /login: Make a POST request to the /login endpoint with the user credentials (username and password) in the request body. This call will authenticate the user and, if successful, return an access token.

Use the Token: Use the retrieved token by including it in the Authorization header (usually as a Bearer token) in the request to access the protected resource, in this case, the /item endpoint.

OAuth 2.0 Authorization Framework - RFC 6749

Total 471 questions
Go to page: of 48