200-901 DEVASC: Ccie LAB Dumps
200-901 DEVASC: Ccie LAB Dumps
LAB
DUMPS
200-901 DEVASC
This exam tests your knowledge and skills related to implementing core enterprise
network technologies, including:
Disclaimer: 200-901 DEVASC Exam Workbook is The information presented in the workbook is not necessarily related to
designed to provide extensive practical information Cisco Systems, Inc. This workbook is not affiliated, endorsed or
to help candidates in the preparation for CISCO sponsored by Cisco Systems, Inc. This workbook provides detailed and
Systems 200-901 DEVASC Exam. We do not take comprehensive practical examples for the preparation of 200-901
liability or responsibility to any person or entity DEVASCs but cannot be used as a replacement of other supplementary
with respect to loss or damage caused by the books or prescribed materials. Purpose of the workbook is to provide
information presented in the workbook more practical information about the 200-901 DEVASC Exam.
Cisco, Cisco Systems,and CCIE (Cisco Certified This workbook is prepared for the individual candidates who have
Internetwork Expert) are registered trademarks of purchased it with non-disclosure agreement. Imitation, copying, editing
Cisco Systems, Inc.And of its affiliates in the USA and or posting contents of the workbook over the internet is part of
other countries . copyright and non-disclosure agreement violation.
1. Which two statements describe the advantages of using a version control system? (Choose two.)
a. It allows for branching and merging so that different tasks are worked on in isolation before they are merged
into a feature or master branch.
b. It provides tooling to automate application builds and infrastructure provisioning.
c. It allows multiple engineers to work against the same code and configuration files and mange differences and
conflicts.
d. It provides a system to track User Stories and allocate to backlogs.
e. It allows developers to write effective unit tests.
a. Cisco ISE
b. Cisco DNA Center
c. Cisco UCS Manager
d. Cisco NX-OS
A process on the host wants to access the service running inside this Docker container. Which port is used to make a
connection?
5. Which two statements are true about Cisco UCS Manager, Cisco UCS Director, or Cisco Intersight APIs? (Choose two.)
a. UCS Manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the HTTP
header for authentication.
b. UCS Director API interactions can be XML- or JSON-encoded and require an API key in the HTTP header for
authentication.
c. Cisco Intersight uses XML to encode API interactions and requires an API key pair for authentication.
d. UCS Manager API interactions are XML-encoded and require a cookie in the method for authentication.
e. Cisco Intersight API interactions can be encoded in XML or JSON and require an API key in the HTTP header for
authentication.
a. 23
b. 443
c. 822
d. 830
7. Which device is a system that monitors and controls incoming and outgoing network traffic based on predetermined
security roles?
a. Router
b. Switch
c. load balancer
d. firewall
a. Map
b. List
c. Json
d. Dict
9. When a Cisco IOS XE networking device is configured using RESTCONF, what is the default data-encoding method?
a. YANG
b. YAML
c. XML
d. x-form-encoding
a. CNAME
b. NS
c. AAA
d. SOA
12. Drag and drop the Docker file instructions from the left onto the correct descriptions on the right. Not all options are
used.
Select and Place:
Correct Answer:
B.
C.
D.
Correct Answer: C
a. Functions ensure that a developer understands the inner logic contained before using them as part of a script
or application.
b. Functions create the implementation of secret and encrypted algorithms.
c. Functions allow problems to be split into simpler, smaller groups, and reduce code repetition, which makes the
code easier to read.
d. Functions store mutable values within a script or application.
controller = ‘devnetapi.cisco.com/sandbox/apic_em’
17. What are two advantages of version control software? (Choose two.)
The output of a unified diff when comparing two versions of a Python script is shown. Which two
“single_request_timeout()” functions are defined in fish.py and cat.py? (Choose two.)
A.
B.
C.
D.
Correct Answer: AB
19. What are two benefits of managing network configuration via APIs? (Choose two.)
a. Loop through the returned of network devices and, for each device, print the device name and management IP address.
b. Count and print the total number of available devices.
c. For each device that is returned, display the device type and associated management IP address.
d. Iterate over a list of network devices and write all device names and management IP addresses to an output file.
Correct Answer:
22. FILL BLANK
Fill in the blanks to complete the cURL command that invokes a RESTful API to retrieve a resource in JSON format using
OAuth.
Answer
GET
Accept
Authorization
23. Which model-driven programmability protocol does Cisco IOS XE Software support?
a. gNMI
b. SOAP
c. SSH
d. CORBA
24. Which two types of NAT are used in a network? (Choose two.)
a. routed NAT
b. static NAT
c. multicast NAT
d. normal NAT
e. dynamic NAT
25. Refer to the exhibit.
a. Interface
b. BGP
c. OpenFlow
d. Topology
26. A developer is reviewing a code that was written by a colleague. It runs fine, but there are many lines of code to do a
seemingly simple task repeatedly. Which action organizes the code?
a. Git
b. Gradle
c. Nagios
d. Jenkins
The definition of the YANG module and a RESTCONF query sent to a Cisco IOS XE device is shown.
Which statement is correct if the RESTCONF interface responds with a 204 status code?
29. What are the purpose of the Cisco VIRL software tool?
31. Which two NETCONF operations cover the RESTCONF GET operation? (Choose two.)
a. <get>
b. <get-config>
c. <get-update>
d. <modify>
e. <edit>
32. Which two statements about JSON and XML are true? (Choose two.)
a. The subnet address of PC-B has 18 bits dedicated to the network portion.
b. One of the routers has two connected serial interfaces.
c. R1 and R3 are in the same subnet.
d. PC-A and PC-B are in the same subnet.
e. The subnet of PC-C can contain 256 hosts.
34. Package updates from a local server fail to download. However, the same updates work when a much slower external
repository is used. Why are local updates failing?
35. Which line is an example of the start of a chunk from a unified diff?
a. @@ -20191007T1200 +88,90 @@
b. @@ -88,10 +88,6 @@
c. @@ -90,88 +20191008T1349 @@
d. @@ -20191007T1200 +20191008T1349 @@
Given a username of “devnet” and a password of “cisco123”, applications must create a base64 encoding of the string
“________________” when sending HTTP requests to an API that uses _______________ authentication.
Answer
YWRtaW46Y2lzY28xMjM
Basic
38. Refer to the exhibit.
An administrator attempts to perform a GET using the Cisco IOS XE RESTCONF API to return the hostname of a device. The
sequence diagram illustrates the HTTP messages observed. Which change to the API request resolves the issue?
Drag and drop the variables from the left onto the item numbers on the right that match the missing assignments in the exhibit.
40. Which Cisco DevNet resource allows access to products in a development lab to explore, learn, and build applications
that use Cisco APIs?
41. Which way should be used to safely store the API keys?
a. Traffic from ports 0/2 to 0/5 can flow on port 0/1 due to the trunk.
b. GigabitEthernet0/1 is left unconfigured.
c. GigabitEthernet0/2 and GigabitEthernet0/3 are access ports for VLAN 6
d. Traffic can flow between ports 0/2 to 0/5 due to the trunk on port 0/1
e. Traffic on ports 0/2 and 0/3 is connected to port 0/6
43. Which principle is a value from the manifesto for Agile software development?
44. Which statement about authenticating a RESTCONF API session with a router that runs Cisco IOS XE Software is true?
a. No authentication is required
b. OAuth must be used
c. A token must be retrieved and the associated string must be embedded in the X-Auth- Token header
d. Basic authentication must be used
45. What are two advantages of the Model-View-Controller software design pattern? (Choose two.)
a. An artifact repository stores files needed and generated during the build process.
b. An artifact repository provides traceability, search, and management of binary files.
c. An artifact repository is needed only for CI/CD pipelines executed on a public cloud infrastructure.
d. An artifact repository allows to compare and merge changes in the source code of files involved in a build
process.
e. An artifact repository is needed only for managing open source software.
a. broadcast address
b. TCP or UDP port number
c. IP protocol
d. destination next hop or outgoing interface
Drag and drop the descriptions from the left on to the correct parts of the API request and response on the right.
50. FILL BLANK
Cisco DNA Center provides the capability to send an HTTP _______________ request to the API endpoint https://DNA-
C_API_ADDRESS/api/v1/network-device/and receive the network _______________ list in _______________ format.
Correct Answer:
authentication
parameter
json
51. Which status code is used by a REST API to indicate that the submitted payload is incorrect?
a. 400
b. 403
c. 405
d. 429
52. Before which process is code review performed when version control is used?
a. checkout of code
b. merge of code
c. committing of code
d. branching code
55. An application calls a REST API and expects a result set of more than 550 records, but each time the call is made, only
25 are returned. Which feature limits the amount of data that is returned by the API?
a. Pagination
b. payload limit
c. service timeouts
d. rate limiting
56. What is the Git command to delete a local branch named “experiment” without a warning?
57. Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.)
a. Receiver
b. transaction monitor
c. codec
d. processor
e. listener
58. What is an advantage of using network programmability?
Fill in the blank to complete the query parameter and value so that the result set is returned in reverse chronological order (most
recent first) based on when messages were entered. HTTP GET /v1/rooms ________________
a. response.status_code == requests.codes.ok
b. response.code == requests.codes.ok
c. response.status_code == requests.ok
d. response.status_code != requests.codes.ok
a. workstation name
b. IP address
c. domain name
d. MAC address
a. For all directories in the current folder, the script goes into the directory and makes a new directory.
b. The script waits until input is entered. If the directory exists, the script goes into it until there is no directory with the
same name, then it creates a new directory.
c. The script waits until input is entered, then it goes into the directory entered and creates a new directory with the same
name.
d. The script goes into the directory called “$ndir” and makes a new directory called “$ndir”.
63. Which two items are Cisco DevNet resources? (Choose two.)
a. TAC Support
b. Software Research
c. API Documentation
d. Bitbucket
e. Sandbox
64. Which platform has an API that can be used to obtain a list of vulnerable software on user devices?
a. Cisco Umbrella
b. Cisco Firepower
c. Cisco Identity Services Engine
d. Cisco Advanced Malware Protection
65. Which type of HTTP method is used by the Meraki and Webex Teams APIs to send webhook notifications?
a. HTTP POST
b. HTTP GET
c. HTTP HEAD
d. HTTP PUT
Correct Answer:
67. A developer is writing an application that uses a REST API and the application requires a valid response from the API.
Which element of the response is used in the conditional check?
a. Body
b. Headers
c. Link
d. URL
e. status code
68. An authentication script fails to connect to an internal server exactly 1 out of 2 times it is executed. This behavior is seen
from different clients. Which networking device must be at fault?
a. load balancer
b. laptop on which the script is running
c. switch
d. router
69. Which task is performed because the test-driven development approach is being used?
70. Which two statements describe the traits of an asynchronous API call? (Choose two.)
72. Which two encoding formats do YANG interfaces support? (Choose two.)
a. XML
b. JSON
c. XHTML
d. BER
e. plain text
73. Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve a configuration statement using
RESTCONF on a CSR 1000V?
Given the API documentation for the UCS SDK Python class, Ucsl-landle, which code snippet creates a handle instance?
Correct Answer: A
75. A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without
error and the log bundles are produced. However, when the script is run during business hours, people report poor voice
quality of phone calls. What explains this behavior?
a. The script is written in a low-level programming language where there is no memory safety. This causes a
buffer overflow and disruption on the network.
b. The speed and duplex settings in Cisco DNA Center are set incorrectly, which causes the transfer to be too
slow.
c. The application is running in the Voice VLAN and causes delays and jitter in the subnet.
d. Generating the logs causes the CPU on the network controller to spike, which causes delays in forwarding the
voice IP packets.
76. Which mechanism is used to consume a RESTful API design when large amounts of data are returned?
a. data sets
b. scrolling
c. pagination
d. blobs
77. DRAG DROP
Refer to the exhibit.
Drag and drop the code from the left onto the item numbers on the right to complete the Meraki Python script shown in the
exhibit.
78. Which type of threat occurs when an attacker can send hostile data to an interpreter within an application?
The Python interpreter and the Cisco Python SDK are available by default in the Cisco NX-OS Software. The SDK documentation
shows how the clid() API can be used when working with JSON and XML. What are two effects of running the script? (Choose
two.)
82. A function my_func() returns True when it executes normally. Which Python snippet tests my_func()?
Correct Answer: C
83. Which two use cases are supported by Meraki APIs? (Choose two.)
a. Webex Teams
b. Cisco Unified Communications Manager
c. Finesse Gadgets
d. Webex Devices
a. management plane
b. data plane
c. authentication plane
d. control plane
86. What should a CI/CD pipeline aim to achieve?
87. What are two characteristics of Bare Metal environments that are related to application deployment? (Choose two.)
89. What are two security benefits of a Docker-based application? (Choose two.)
a. natively secures access to secrets that are used by the running application
b. guarantees container images are secured and free of vulnerabilities
c. easier to patch because Docker containers include only dependencies that the application requires
d. prevents information leakage that can occur when unhandled exceptions are returned in HTTP responsesE.
allows for separation of applications that traditionally run on the same host
90. Which action does the Git command git merge allow the developer to perform?
Drag and drop the Bash commands from the left onto the correct actions on the right.
Correct Answer:
92. DRAG DROP
Drag and drop the code from the left onto the item numbers on the right to complete the Meraki code to obtain a list of clients
which have used this network.
a. Cacheable
b. Stateless
c. uniform interface
d. client-server
94. Fill in the blanks to complete the Python script to retrieve a list of network devices using the Cisco DNA Center API.
import requests
MmQ3NGM5YzE5ZTliLmYzMCLslmV4CcCI6MTU3MjM3ODE%MCwidXNlcm5hbWUiOiJraX
N370940885.zhK5LPQd501ZUpZI0IH_qrgOXttlNbxSFFF7JOEtRls’
Correct Answer:
A REST API returns this JSON output for a GET HTTP request, which has been assigned to a variable called “vegetables”. Using
Python, which output is the result of this command? print(filter(lambda 1: 1[ ‘type’ ] == ‘fruit’,
vegetables) [0][‘items’][0][‘items’][0])