You are on page 1of 106

IT Certification Guaranteed, The Easy Way!

Exam : 200-901

Title : DevNet Associate Exam

Vendor : Cisco

Version : V16.35

1
IT Certification Guaranteed, The Easy Way!

NO.1 Which detail is included in a routing table?


A. IP protocol
B. Broadcast address
C. TCP or UDP port number
D. Destination next hop or outgoing interface
Answer: D

NO.2 How does requesting a synchronous API operation differ from requesting an asynchronous API
operation?
A. clients poll for the status of the execution of operations
B. clients subscribe to a webhook for operation results
C. clients can access the results immediately
D. clients receive responses with a task id for further processing
Answer: C

NO.3 In python, which expression checks whether the script returns a success status code when the
Requests library is used?
A. response.status_code== requests.ok
B. response.status_code== requests.codes.ok
C. response.code== requests.codes.ok
D. response.status_code ! == requests.codes.ok
Answer: B

NO.4 Which two elements are foundational principles of DevOps? (Choose two.)
A. designing applications as microservices
B. encouraging containers for the deployment of applications
C. organizing cross-functional teams over organizational silos
D. optimizing the cost of infrastructures
E. automating over documenting
Answer: C,E

NO.5 what is an advantage of a version control system?


A. forces the practice of trunk-based development
B. prevents over-writing code or configuration files
C. facilitates resolving conflicts when merging code
D. ensures that unit tests are written
Answer: C

NO.6 Drag and drop the network automation interfaces from the left onto the transport protocols
that they support on the right. Not all options are used.

2
IT Certification Guaranteed, The Easy Way!

Answer:

NO.7 Refer to the exhibit.

Drag and drop the variables from the left onto the item numbers on the right that match the missing
assignments in the exhibit.

3
IT Certification Guaranteed, The Easy Way!

Answer:

NO.8 What is the purpose of a MAC address?


A. To uniquely identify a router in a LAN
B. To uniquely identify a network interface in a LAN
C. To uniquely identify a device on the internet
D. To uniquely identify a switch in a LAN
Answer: B

NO.9 A small company has 5 servers and 50 clients. What are two reasons an engineer should spilt
this network into separate client and server subnets? (Choose two)
A. Internet access to the servers will be denied on the router.
B. A router will limit the traffic types between the clients and servers.
C. Subnets will split domains to limit failures.
D. A router will bridge the traffic between clients and servers.
E. Subnets provide more IP address space for clients and servers.
Answer: A,C

NO.10 Which HTTP response status code means "Forbidden"?


A. 500
B. 401
C. 403
D. 502
Answer: C

NO.11 Fill in the blanks to complete the python script to request a service ticket using the APIC-EM
rest API for the user "devnetuser".

4
IT Certification Guaranteed, The Easy Way!

Answer:
devnetuserrequestsheader
Explanation:
Solution as below

NO.12 Which protocol must be allowed on the firewall so that NTP services work properly?
A. ICMP
B. BGP
C. UDP
D. TCP
Answer: C

NO.13 Refer to the exhibit.

The script returns an output of 401. To use the supplied URL. an HTTP GET request must Be sent with
an Authorization header. The header value is a BaseG4 encoded concatenation of the username and
password. Which action must be taken to return an output of 200?
A. Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication
B. Modify the method from LOGIN to GET and supply the username ;password value as JSON payload
C. Verify that the username and password values imported from the configuration file ate still valid.

5
IT Certification Guaranteed, The Easy Way!

D. Insert an Authorization header with the values username password from the supplied
configuration file.
Answer: C

NO.14 What are two benefit of managing network configuration via APIs? (Choose two.)
A. configuration on devices becomes less complex
B. more security due to locking out manual device configuration
C. increased scalability and consistency of network changes
D. eliminates the need of legacy management protocols like SNMP
E. reduction in network changes performed manually
Answer: C,E

NO.15 What are two considerations when selecting the "best route" for a network device to reach
its destination? (Choose two.)
A. MAC address
B. metrics
C. administrative distance
D. IP address
E. subnet mask
Answer: B,C

NO.16 Drag and drop the function on the left onto the type of plane that handles the function on
the right.

Answer:

6
IT Certification Guaranteed, The Easy Way!

NO.17 Which two query types does a client make to a DNS server? (Choose Two)
A. AAAA
B. ACK
C. DISCOVER
D. Inverse
E. PTR
Answer: A,E

NO.18 Which tool allows changes to the configuration management toolset to be tested?
A. Cisco VIRL
B. NAPALM
C. Ansible
D. pyATS
Answer: D

NO.19 Drag and Drop the GIT commands from the left onto the right that add modified local files to
a remote repository. Not all options are used

7
IT Certification Guaranteed, The Easy Way!

Answer:

NO.20 Which data is specified in the response header?


A. {
"id": "y123987jdkl". HTTP/1.1 200 OK
"status: "online",
"type": "switch"
}
B. HTTP/1.1 200 OK
C. ''type'', ''switch''
D. Content-Type
Answer: B

NO.21 Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.

Answer:

8
IT Certification Guaranteed, The Easy Way!

NO.22 When using the Bash shell, how it the output of the devnet command saved to a tile named
"output.txt"?
A. devnet & output.txt
B. devnet > output.txt
C. devnet < output.txt
D. devnet I output.txt
Answer: B

NO.23 A developer needs a list of clients connected to a specific device in a Meraki network. After
making a REST API call, the developer receives an unfamiliar response code. Which Cisco DevNet
resource should be used to identify the meaning of the response code?
A. API documentation
B. Sandbox
C. Learning Labs
D. Code Exchange
Answer: A

NO.24 Refer to the exhibit.

OR

9
IT Certification Guaranteed, The Easy Way!

An administrator attempts to perform a GET using the Cisco IOS XE RESTOCNF API to return the
hostname of a device. The sequence diagram illustrated the HTTP message observed. Which change
to the API request resolves the issue?
A. Add Content-Type HTTP header with 'application/yang-data+json' using -H 'Content-Type:
application/yang-data+json'.
B. Use -u cisco: cisco instead of -u 'cisco: cisco'.
C. Change the request method from -X "GET" to- X' POST".
D. Remove the -H 'Accept: application/yang-data^/son' HTTP header because it is not required.
Answer: B

NO.25 A developer creates a script that configured multiple Cisco IOS XE devices in a corporate
infrastructure. The internal test environment is unavailable, and no maintenance window is available
to test on a low-priority production environment. Which resource is used to test the code before it is
applied to the production environment?
A. Code Exchange
B. Cisco DevNet Learning Labs
C. Cisco DevNet Sandbox
D. Cisco Support
Answer: C

NO.26 What is the Git command to delete a local branch named "experiment" without a warning?
A. git branch -n experiment
B. git branch -rm experiment
C. git branch -f experiment
D. git branch -D experiment
Answer: D

NO.27 Drag and drop the Docker file instructions from the onto correct descriptions on the right.
Not all options are used.

10
IT Certification Guaranteed, The Easy Way!

Answer:

NO.28 What is the outcome of executing this command?


git clone ssh://john@exmaple.com/path/to/my-project_git
A. Creates a local copy of a repository called "my project"
B. Creates a copy of a branch called "my project"
C. Initiates a new Git repository called "my project"
D. Creates a new branch called "my project"
Answer: A

NO.29 A Company is looking for cloud deployment which will use the on-premise infrastructure, is
user self-service, and easy to scale. Which cloud solution should be selected for these requirements?
A. multi
B. public
C. private
D. hybrid
Answer: C

NO.30 Which statement describes the benefit of using functions in programming?


A. Functions allow problems to be split into simpler, smaller groups, and reduce code repetition,
which makes the code easier to read.
B. Functions ensure that a developer understands the inner logic contained before using them as
part of a script or application.

11
IT Certification Guaranteed, The Easy Way!

C. Functions create the implementation of secret and encrypted algorithms.


D. Functions store mutable values within a script 01 application.
Answer: A

NO.31 Refer to the exhibit.

Which JSON is equivalent to the XML -encoded data?

12
IT Certification Guaranteed, The Easy Way!

13
IT Certification Guaranteed, The Easy Way!

A. Option A
B. Option B
C. Option C
D. Option D
Answer: A

NO.32 Which product provides network controller-level management features?

14
IT Certification Guaranteed, The Easy Way!

A. Cisco DNA Center


B. Cisco NX-OS
C. Cisco UCS Manager
D. Cisco ISE
Answer: A

NO.33 Which status code is used by a REST API to indicate that the submitted payload is incorrect?
A. 400
B. 403
C. 405
D. 429
Answer: A

NO.34 Refer to the exhibit.

A Python script must delete all Cisco Catayst 9300 Series switches that have an uptime that is greater
than 90 days The script must also query for the status of all the other devices Drag and drop the code
from the bottom onto the bottom box the code is missing to complete the script Not at options are
used

15
IT Certification Guaranteed, The Easy Way!

Answer:

16
IT Certification Guaranteed, The Easy Way!

NO.35 What should a CI/CD pipeline aim to achieve?


A. to allow manual testing before deployment
B. to require minimal manual interaction
C. to support new deployments on a fixed monthly schedule
D. to provide a documented process for feedback
Answer: A

NO.36 Which model-driven programmability protocol does Cisco IOS XE Software support?
A. CORBA
B. SSH
C. gNMI
D. SOAP
Answer: C

NO.37 Drag and drop the Dockerfile instructions from the left onto the descriptions on the right. Not
at options are used.

Answer:

NO.38 Refer to the exhibit.

17
IT Certification Guaranteed, The Easy Way!

The output of a unified diff when comparing two versions of a python script is shown. Which two
"single_request _timeout ()"

18
IT Certification Guaranteed, The Easy Way!

A. Option A
B. Option B
C. Option C
D. Option D
Answer: B,C

NO.39 Which two items are Cisco DevNet resources? (Choose two.)
A. TAC support
B. Bitbucket
C. Sandbox
D. Software research
E. API Documentation
Answer: C,E

NO.40 Which HTTP response code should be returned when the request is completed, but there is
no content to send for the request?
A. 100
B. 204
C. 302
D. 402
Answer: B

NO.41 Which service provides a directory lookup for IP addresses and host names?
A. DNS
B. DHCP
C. SNMP
D. NAT
Answer: A

NO.42 What are two roles of an artifact repository in a CI/CD pipeline? (Choose two.)
A. is required for CI/CD pipelines executed on a public cloud infrastructure
B. is required for managing open source software
C. stores files needed and generated during the build process
D. allows for comparing and merging changes in the source code
E. provides traceability, search, and management of binary files
Answer: C,E

NO.43 Drag and drop the HTTP methods from the left onto their generally accepted corresponding
create, read, update, and delete operations on the right.

19
IT Certification Guaranteed, The Easy Way!

Answer:

NO.44 Refer to the exhibit.

20
IT Certification Guaranteed, The Easy Way!

Fill in the blank to complete the query parameter and value so that the result set is returned in
reverse chronological order (most recent first) based on when message were entered.

Answer:
sortBylastactivity
Explanation:

NO.45 Before which process is code review performed when version control is used?
A. committing code
B. branching code
C. merge of code
D. checkout of code
Answer: C

NO.46 Which device is a system that monitors and controls incoming and outgoing network traffic

21
IT Certification Guaranteed, The Easy Way!

based on predetermined security rules?


A. Switch
B. Router
C. Firewall
D. Load balancer
Answer: C

NO.47 Which principle is a value from the manifesto for Agile software development?
A. adhering to a plan over responding to requirements
B. detailed documentation over working software
C. processes and tools over teams and inter actions
D. customer collaboration over contract negotiation
Answer: D

NO.48 In the test-driven development model, what is changed after a test fails?
A. test
B. schedule
C. project requirements
D. code
Answer: D

NO.49 A developer is reviewing a code that was written by a colleague. It runs fine, but there are
many lines of code to do a seemingly simple task repeatedly. Which action organizes the code?
A. Refactor the code by removing any unnecessary tests
B. Using functions, rewrite any pieces of code that are repeated
C. Reverse engineer and rewrite the code logic
D. Modify the code to use loops
Answer: B

NO.50 Refer to the exhibit.

The definition of the YANG module and a RESTCONF query sent to a Cisco IOc XE device is shown.
Which statement is correct if the RESTCONF interface responds with a 204 status code?

22
IT Certification Guaranteed, The Easy Way!

A. The query failed at retrieving the logging seventy level.


B. The query failed to set the logging seventy level due to an invalid path.
C. The query retrieved the logging seventy level.
D. The query updated the logging seventy level or created it if not present on the device.
Answer: D

NO.51 Fill in the blanks to complete the statement.


Cisco DNA provide the capability to send an HTTP _______________ request to the API endpoint
https://DNA-c_API_ADDRESS/api/vi/network-device/ and receive the network __________ list in
__________ format.
Answer:
GETdeviceJSON
Explanation:
Solution below as

NO.52 Where is an IP packet routed if the packet does not match any routes in the routing table?
A. firewall
B. load balancer
C. central switch
D. default gateway
Answer: D

NO.53 Refer to the exhibit.

23
IT Certification Guaranteed, The Easy Way!

An API call is constructed to retrieve the inventory in XML format by using the API. The response to
the call is 401 Unauthorized. Which two headers must be added to the API call? (Choose two.)

A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
Answer: B,E

NO.54 What is a tenet of test-driven development?


A. write documentation for tests
B. write tests after adding new blocks of code
C. write and run tests before writing new code
D. run tests after writing new code
Answer: C

NO.55 Which two statements describe the traits of an asynchronous API call? (Choose two.)
A. The order in which API calls return can be guaranteed
B. A call to an API does not block the code, but rather it allows application processing to continue
C. The end user can experience latency or performance lag while waiting for the API call to return
D. Code execution blocks or waits for the call to an API to return.
E. A callback function typically is used to process the response from an API call
Answer: B,E

NO.56 What is the main purpose of a code review?


A. To provide the technical lead visibility into all code
B. To identify and review errors with the team
C. To ensure that all code is checked in simultaneously
D. To detect logical errors

24
IT Certification Guaranteed, The Easy Way!

Answer: B

NO.57 Package updates from a local server fail to download. However, the same updates work when
a much slower external repository is used. Way are local updates failing?
A. The update utility is trying to use a proxy to access the internal resource.
B. The Internet connection is too slow.
C. The Internet is down at the moment, which causes the local server to not be able to respond.
D. The server is running out of disk space.
Answer: A

NO.58 What are two advantages of the Model-view-controller software design pattern? (Choose
two.)
A. simplifies network automation
B. allows for multiple views of the same model
C. makes code easier to deploy using Cl/CD pipelines
D. reduces need for error handling
E. separates responsibilities of the code, which makes future modifications easier
Answer: B,E

NO.59 What is a benefit of organizing code into modules?


A. improves overall performance
B. reduces the length of code
C. enables code to be multifunctional
D. enables the reuse of code
Answer: D

NO.60 A developer is trying to retrieve data over a REST API. The API server responds with an HTTP
client error response code. After investigating the response the developer realizes the realizes the
response has a Retry-After header. What is the root cause of this error?
A. The REST service is unreachable at the time of the REST request
B. Too many requests were sent to the REST service in a given amount of time.
C. An appliance limited the rate of requests to the transport layer.
D. An appliance limited the rate of requests to the application layer
Answer: B

NO.61 Users cannot access a webserver and after the traffic is captured. the capture tool shows an
ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access
issue?
A. A router along the path is misrouting the packets in a wrong direction.
B. A router along the path has the wrong time.
C. The server is too far away and the packets require too much time to reach it
D. The server is too loaded and the connection could not be handled in time
Answer: A

25
IT Certification Guaranteed, The Easy Way!

NO.62 Refer to the exhibit.

What is the effect of this Ansible playbook on an IOS router?


A. A new running configuration is pushed to the IOS router.
B. The current running configuration of the IOS router is backed up.
C. The start-up configuration of the IOS router is copied to a local folder.
D. A new start-up configuration is copied to the IOS router.
Answer: B

NO.63 Which action does the Git command git merge allow the development to perform?
A. Combine multiple sequence of commits into one unified history.
B. Push changes to the remote repository
C. Switch between branches
D. Create, list, rename, and delete branches
Answer: A

NO.64 Which Cisco platform provides organization-wide automation, security, policy enforcement,
any agility across wired and wireless networks?
A. Cisco ACI
B. Cisco DNA Center
C. Cisco Umbrella
D. Cisco SD-WAN
Answer: D

NO.65 Which HTTP status Code means that the server cannot or will not process the request
because of perceived client error?
A. 100
B. 203

26
IT Certification Guaranteed, The Easy Way!

C. 303
D. 400
Answer: D

NO.66 An automation script fails to connect to an internal server exactly 1 out of 2 times it is
executed. This behavior is seen from different clients. Which networking device mut be at fault?
A. Laptop on which the script is running
B. Router
C. Switch
D. Load balancer
Answer: D

NO.67 Which API is used to obtain data voicemail ports?


A. Finesse gadgets
B. Cisco Unified Communications manager
C. Webex devices
D. Webex teams
Answer: B
Explanation:
Cisco Unified Communications Manager (CUCM) provides API access to data management, call
management, and voicemail integration. Source: Cisco DevNet Fundamental Course:
https://developer.cisco.com/certification/fundamentals/

NO.68 What is a function of the default gateway in a network?


A. to drop traffic that is destined to the default gateway
B. to drop traffic that is not destined to the default gateway
C. to forward traffic to the same subnet
D. to forward traffic to different subnets
Answer: D

NO.69 Fill in the blanks to complete the Bash script in which each file in a directory is renamed to Its
SHA256 hash?

Answer:
IsTARGETDIRmv
Explanation:
Check below the answer exact.

27
IT Certification Guaranteed, The Easy Way!

NO.70 Refer to the exhibit.

What caused the error in this API request?


A. The API resource does not support the POST operation
B. The API resource does not support JSON format payloads.
C. The submitted JSON payload includes a field that is not supported by the API resource.
D. The submitted JSON payload has a formatting issue
Answer: D

NO.71 What is the purpose of the first three pairs of digits in a MAC address?
A. defines a routing identifier for the client

28
IT Certification Guaranteed, The Easy Way!

B. indicates the IP address of the client in Hex


C. defines packet forwarding priority sent or received by the adapter
D. indicates vendor of the network card or adapter
Answer: D

NO.72 A local Docker alpine image has been created with an image ID of a391665405fe and tagged
as "latest". Which command creates a running container based on the tagged image, with the
container port 8080 bound to port 80 on the host?
A. docker build -p 8080:80 alpine:latest
B. docker exec -p 8080:80 alpine:latest
C. docker start -p 8080:80 alpine:latest
D. docker run -p 8080:80 alpine:latest
Answer: D
Explanation:
https://docs.docker.com/get-started/02_our_app/

NO.73 Refer to the exhibit.

What is the action of the Bash script that is shown?


A. The script waits until input is entered. If the directory exists, the script goes into it until there is no
directory with the same name, then it creates a new directory.
B. The script goes into the directory called "$ndir" and makes a new directory called "$ndir"
C. The script waits unit input is entered, then it goes into the directory entered and creates a new
directory with the same name.
D. For all directories in the current folder. The script goes into directory and makes a new directory.
Answer: A

NO.74 Refer to the exhibit.

29
IT Certification Guaranteed, The Easy Way!

Which device limits traffic between server 1 and server 2?


A. Device B
B. Device C
C. Device D
D. Device E
Answer: D

NO.75 Refer to the exhibit. A network engineer must collect information from the network. The
engineer prepares a script to automate workflow by using Cisco Meraki API. The script must run over
nested loops to collect organization and network information and uses the collected data for final
collection. Which process is being automated by using the Python script?
A. Gather the IDs of the ACME organization, the BLDG21 network, and the dents on the network
B. Provide the BLDG21 network information if it is part of the ACME organization
C. Collect the IDs of the clients on the BLDG21 network
D. List the IDs from the ACME organization
Answer: A

NO.76 Refer to the exhibit.

30
IT Certification Guaranteed, The Easy Way!

Which two statements about the network diagram are true? (Choose two.)
A. PC-A and PC-B are in the same subnet.
B. One of the routers has two connected serial interfaces.
C. The subnet of PC-C can contain 256 hosts.
D. R1 and R3 are in the same subnet.
E. The subnet address of PC-B has 18 bits dedicated to the network portion.
Answer: B,C

31
IT Certification Guaranteed, The Easy Way!

NO.77 How are load balancers used in modern application deployment?


A. Allow traffic to continue as new compute units are brought up and old compute units are taken
down.
B. Allow http and https traffic to continue as old compute units are discontinued before new units
are brought up.
C. Turn off traffic and take down compute units, then update and bring the compute units back up.
D. Bring up new compute units, test the compute units, and switch the traffic from old units to new
units.
Answer: D

NO.78 Which two descriptions can be given to an application that is interacting with a webhook?
(Choose two.)
A. Processor
B. Codec
C. Listener
D. Receiver
E. Transaction monitor
Answer: C,D

NO.79 Which CI/CD tool is an automation tool used to build, test, and deploy software?
A. Nagios
B. Gradle
C. Jenkins
D. Git
Answer: C

NO.80 What is the first development task in test-driven development?


A. Write code that implements a desired function.
B. Write a failing test case for a desired function.
C. Write a passing test case for existing code.
D. Reverse engineer the code for a desired function.
Answer: B

NO.81 Which advantage does the agile process offer compared to waterfall software development?
A. to view the full scope of end-to-end work
B. to have each phase end before the next begins
C. to fix any issues at the end of the development cycle
D. to add or update features with incremental delivery
Answer: D

NO.82 How does a synchronous API request differ from an asynchronous API request?
A. clients receive responses with a task id for further processing

32
IT Certification Guaranteed, The Easy Way!

B. clients subscribe to a webhook for operation results


C. clients are able to access the results immediately
D. clients poll for the status of the execution of operations
Answer: C

NO.83 On which network plane is routing protocol traffic handled?


A. data plane
B. management plane
C. authentication plane
D. control plane
Answer: D

NO.84 What operation is performed with YANG model-driven programmability in NX-OS?


A. configure a device with native and OpenConfig-based models
B. send CLI commands to a device and retrieve output in JSON format
C. run Linux commands natively on the device
D. bootstrap a device that has a factory-default configuration
Answer: A

NO.85 Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve
statement using RESTCONF on a CSR 1000V?
A. Change the HTTP method to PUT.
B. Change the transport protocol to HTTPS.
C. Check the MIMF types in the HTTP headers.
D. Check the authentication credentials.
Answer: D

NO.86 Drag and Drop the Bash commands from the left onto the correct actions on the right.

33
IT Certification Guaranteed, The Easy Way!

Answer:

34
IT Certification Guaranteed, The Easy Way!

NO.87 In test-driven development, what are two of the green bar patterns? (Choose two.)
A. another test
B. break
C. triangulate
D. starter test
E. fake it
Answer: C,E
Explanation:
https://blog.baudson.de/blog/test-driven-development-green-bar-patterns

NO.88 What is used in Layer 2 switches to direct packet transmission to the intended recipient?
A. spanning tree
B. IPv4 address
C. IPv6 address
D. MAC address
Answer: D

NO.89 Refer to the exhibit.

35
IT Certification Guaranteed, The Easy Way!

An engineer must configure a load balancer server. The engineer prepares a script to automate
workflow by using Bash. The script install the nginx package, moves to the /optAtginx directory, and
reads the sites M We (or further processing Based on the script workflow, which process is being
automated within the loop by using the information mi sites txt?
A. creating a new Me Based on template .conf in the /etc/ngin/sites_enabled directory for each lie in
the sites txt file. and then changing the file execution permission.
B. creating a Me per each the in sites txt with the information in template conf. creating a link for the
previously created file. and then changing the ownership of the created files
C. using the content of the file to create the template conf file. creating a Iink from the created file to
the /etc/nginx/files.enabled. and then changing the file execution permissions.
D. using the information in the file to create a set of empty files in the /etchginx/sites_enabled
directory and then assigning the owner of the file.
Answer: B

NO.90 Which description of a default gateway if true?


A. It is a device that receives IP packets that have no explicit next-hop in the routing table.
B. It is a feature that translates between public and private addresses.
C. It is a security feature that denies certain traffic.
D. It is a device that receives Layer 2 frames with an unknown destination address.
Answer: A
Explanation:
Refe
https://www.certificationkits.com/cisco-certification/ccna-articles/cisco-ccna-intro-to-routing-
basics/cisco-ccna-default-gateway-a-default-routes/

NO.91 Drag and drop the element of the Finesse API on the left onto the description of its
functionally on the right.

36
IT Certification Guaranteed, The Easy Way!

Answer:

NO.92 Refer to the exhibit.

A Python code has been written to query a device. The executed code results in the error shown.
Which action resolves the problem?
A. import json
B. requests("GET", base_url + request_url, cookles=cookies)

37
IT Certification Guaranteed, The Easy Way!

C. pip install requests


D. import requests
Answer: D

NO.93 Refer to the exhibit.

A developer creates a Python script that queries Cisco Webex. When the script is executed, a 401
code is returned. After troubleshooting, the developer discovers that the service is missing privileges.
Which change to the header in line 4 of the script results in the code 200?
A)

B)

C)

D)

A. Option A
B. Option B
C. Option C
D. Option D
Answer: C

NO.94 Which REST architectural constraint indicates that no client context should be stored on the
server between requests?
A. stateless
B. uniform interface

38
IT Certification Guaranteed, The Easy Way!

C. cacheable
D. client-server
Answer: A

NO.95 Which network device monitors incoming and outgoing traffic and decides whether to allow
or block specific traffic based on a defined set of rules?
A. switch
B. load balancer
C. reverse proxy
D. firewall
Answer: D

NO.96 Refer to the exhibit.

Which python data structure does my_json contain?


A. List
B. Json
C. Map
D. Dict
Answer: D

NO.97 Drag and drop the capability on the left onto the Cisco compute management platform that
supports the capability on the right.

39
IT Certification Guaranteed, The Easy Way!

Answer:

NO.98 Refer to the exhibit.

40
IT Certification Guaranteed, The Easy Way!

OWASP threat does this example demonstrate?


A. Broken access control
B. SQL injection
C. Man-in-the-middle
D. Cross-site-scripting
Answer: D

NO.99 Refer to the exhibit.

41
IT Certification Guaranteed, The Easy Way!

Drag and Drop the code from the bottom onto the box where the code is missing on the Meraki
Python script to create a new network

42
IT Certification Guaranteed, The Easy Way!

Answer:

43
IT Certification Guaranteed, The Easy Way!

NO.100 Refer to the exhibit.

A developer must integrate a bot with an internal communication app. The developer wants to
replace the webexbot package with the teamsbot package by using Ansible and prepares a playbook
In the first two tasks, the playbook stops the webexbot and verifies that the teamsbot is installed.
What is accomplished in the last task of the workflow when the developer runs the Ansible playbook
?
A. stops the webexbot service and uninstals it and retains its configuration files
B. installs the webexbot and retains the configuration files
C. uninstalls the webexbot package and removes its configuration files
D. searches whether the purge package is available in the repository and uninstalls the webexbot
package
Answer: C

NO.101 Which statement about authentication a RESTCONF API session with a router that runs Cisco
IOS XE software is true?
A. OAuth must be used.
B. A token must be retrieved and the associated string must be embedded in the X-Auth-Token
header.
C. Basic authentication must be used.
D. No authentication is required.
Answer: C

NO.102 Which device is used to transport traffic from one broadcast domain to another broadcast
domain?
A. load balancer
B. layer 2 switch
C. router
D. proxy server

44
IT Certification Guaranteed, The Easy Way!

Answer: C

NO.103 What are two key capabilities of Cisco Finesse? (Choose two.)
A. Finesse includes an RPC API that enables the development of custom gadgets.
B. Agents access Finesse from a browser without needing to install or configure anything on the
client machine.
C. Finesse automatically collects telemetry data
D. An OpenDNS utility is preconfigured and ready to use on Finesse.
E. Gadget containers provide a seamless experience in a single user interface.
Answer: B,E

NO.104 Which two types of NAT are used in a network? (Choose two.)
A. Static NAT
B. Normal NAT
C. Multicast NAT
D. Dynamic NAT
E. Router NAT
Answer: A,D

NO.105 In DNS, which record specifies an alias that refers to another name that ultimately resolves
to an IP address?
A. AAA
B. SOA
C. NS
D. CNAME
Answer: D

NO.106 Drag and drop the functionalities from the left onto correct networking devices on the right.

Answer:

45
IT Certification Guaranteed, The Easy Way!

NO.107 Refer to the exhibit.

A developer needs to upload a local file by using the REST API. The developer gathers information
according to the documentation and sends the request by using the cURL command in the exhibit but
gets an error code. Which action should be followed to get valid response?
A. change content type as JSON
B. add the authorization header with the access token
C. add a username-password combination to request command
D. change request method as GET
Answer: B

NO.108 Drag and drop the types of management from the left onto the levels at which they are
performed on the right.

46
IT Certification Guaranteed, The Easy Way!

Answer:

NO.109 Refer to the exhibit.

47
IT Certification Guaranteed, The Easy Way!

Fill in the blanks to complete the cURL command to the list of networks in the Meraki organization
with an id of 384279060

Answer:
organizationsnetworks
Explanation:
Solution below

NO.110 What is the purpose of a MAC address on a network device?


A. unique network address that identifies the network interface of a device
B. unique network interlace address that is provided by the DHCP server

48
IT Certification Guaranteed, The Easy Way!

C. unique hardware address that identifies the network interface of a device


D. unique hardware interface address that is provided by the central switch
Answer: C

NO.111 Drag and drop the code from the bottom onto the box where the code is missing in the Bash
script to complete the missing assignment.

Answer:

NO.112 What is a benefit of test-driven development?


A. early customer involvement
B. increased code quality
C. faster releases that have minimal features

49
IT Certification Guaranteed, The Easy Way!

D. strict adherence to product requirements


Answer: D

NO.113 A new application is being developed that must be hardware independent. The application
includes an administrative component which is accessed using a Windows desktop GUI. Installation
and management of the environment must be fully automated. Which application deployment type
meets the requirements?
A. bare metal
B. virtual Python environment
C. container
D. virtual machine
Answer: C

NO.114 Which response status code is used by a RESTful interface to indicate successful execution
of a request?
A. 200
B. 404
C. 405
D. 500
Answer: A

NO.115 Which two statements describe the advantages of using a version control system? (Choose
two.)
A. It allows for branching and merging so that different tasks are worked on in isolation before they
are merged into a feature or master branch.
B. It allows multiple engineers to work against the same code and configuration files and manage
differences and conflicts.
C. It provides tooling to automate application builds and infrastructure provisioning.
D. It allows developers to write effective unit tests.
E. It provides a system to track User Stories and allocate to backlogs.
Answer: A,B

NO.116 What are two advantages of version control software? (Choose two.)
A. It supports tracking and comparison of changes in binary formate files.
B. It allows old versions of packaged applications to be hosted on the Internet
C. It provides wiki collaboration software for documentation.
D. It supports comparisons between revisions of source code files.
E. It allows new team members to access the current code and history.
Answer: D,E

NO.117 Which platform is run directly using a hypervisor?


A. bare metal systems
B. containers

50
IT Certification Guaranteed, The Easy Way!

C. virtual machines
D. applications
Answer: C

NO.118 A developer is creating a script to interact with a REST API service which requires basic
authentication. The credentials are "devnet:391665405" and the Base64 encoding of the credentials
is "GV2bmV0dXNlcjpDaXNj=". Which payload and header combination must be used for
authentication?

A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation:
https://developer.cisco.com/docs/epnm/#!how-to-authenticate/authorization

NO.119 Which platform has an API that be used to obtain a list of vulnerable software on user
devices?
A. Cisco Umbrella
B. Cisco Firepower
C. Cisco Identity Services Engine

51
IT Certification Guaranteed, The Easy Way!

D. Cisco Advanced Malware Protection


Answer: D

NO.120 Users cannot access a webserver and after the traffic is captured, the capture too* shows an
ICMP packet that reports "communication administratively prohibited" What Is the cause of this
webserver access Issue?
A. An access list along the path is blocking the traffic
B. The traffic is not allowed to be translated with NAT and dropped.
C. Users must authenticate on the webserver to access It
D. A router along the path is overloaded and thus dropping traffic
Answer: A

NO.121 Refer to the exhibit.

What is the value of the node defined by this YANG structure?

52
IT Certification Guaranteed, The Easy Way!

A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
Explanation:
https://tools.ietf.org/html/rfc7950#section-9.12

NO.122 Refer to the exhibit.

53
IT Certification Guaranteed, The Easy Way!

Which OWASP threat does this example demonstrate?


A. broken access control
B. SQL injection
C. man-in-the-middle
D. cross-site scripting
Answer: D

NO.123 What is the purpose of a firewall in application deployment?


A. adds TLS support to an application that does not support it natively
B. forwards traffic to a pool of instances of the application
C. provides translation for an application's hostname to its IP address
D. limits traffic to only ports required by the application
Answer: D

NO.124 Which two NETCONF operations cover the RESTCONF GET operation? (Choose two.)
A. <get>
B. <edit>
C. <get-update>
D. <modify-config>
E. <get-config>
Answer: A,E

NO.125 Refer to the exhibit.

54
IT Certification Guaranteed, The Easy Way!

The documentation outlines how to use credentials for the AMP API Which script successfully
performs an API call using basic authentication?
A)

B)

55
IT Certification Guaranteed, The Easy Way!

C)

D)

A. Option
B. Option
C. Option
D. Option
Answer: D

NO.126 Which API must an engineer use to change a netmask on a Cisco IOS XE device?
A. Meraki
B. RESTCONF/YANG
C. SD-WAN
D. DNAC
Answer: B

NO.127 Which two protocols are used to apply a configuration change on a Cisco IOS XE device?
(Choose two)

56
IT Certification Guaranteed, The Easy Way!

A. CCX
B. RESTCONF
C. NETCONF
D. HSRP
E. CDP
Answer: B,C

NO.128 Which two use cases are supported by Meraki APIs? (Choose two.)
A. Retrieve live streams from a Meraki Camera.
B. Build a custom Captive Portal for Mobile Apps.
C. Configure network devices via the Dashboard API.
D. Build location-aware apps from Wi-Fi and LoRaWAN devices.
E. Deploy applications onto the devices.
Answer: B,C

NO.129 Drag and drop the Python code from the left onto the correct step on the right to call a REST
API.

Answer:

57
IT Certification Guaranteed, The Easy Way!

NO.130 Which two statements about JSON and XML are true? (Choose two.)
A. JSON objects are collection of key value pair.
B. The syntax of JSON contains tags, elements, and attributes.
C. JSON arrays are an unordered set of key value pairs.
D. The syntax of XML contains tags, elements, and attributes.
E. XML objects are collections of key-value pairs.
Answer: A,D

NO.131 What are the two principles of an infrastructure as code environment? (Choose two)
A. Complete complex systems must be able to be built from reusable infrastructure definitions.
B. Environments must be provisioned consistently using the same inputs.
C. Redeployments cause varying environment definitions.
D. Service overlap is encouraged to cater for unique environment needs.
E. Components are coupled, and definitions must be deployed for the environment to function.
Answer: A,B

NO.132 Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose
two.)
A. Cisco Intersight API interactions can be encoded in XML or JSON and require an APIs key in the
HTTP header for authentication.
B. USC Director API interactions can be XML- or JSON-encoded and require an APLs key in the HTTP
header for authentication.
C. UCS manager API interactions are XML-encoded and require a cookie in the method for
authentication.
D. Cisco Intersight uses XML to encoded API interactions and requires an API key pair for

58
IT Certification Guaranteed, The Easy Way!

authentication.
E. UCS manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the
HTTP header for authentication.
Answer: B,C
Reference:
https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/ucs-director/rest-api-getting-
started-guide/6-5/cisco-ucs-director-REST-API-getting-started-65.html
https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/sw/api/b_ucs_api_book.pdf

NO.133 What does a load balancer distribute in a network environment?


A. outgoing connections to the network
B. incoming traffic across multiple servers
C. different TCP connections to the routers
D. traffic in the network by leveraging the switch architecture
Answer: B

NO.134 Which task is performed because the test-driven development approach is being used?
A. testing existing software before developing new code
B. refactoring code that is covered by existing tests
C. writing code without committing any coding violations
D. creating test scenarios based on continuous development
Answer: B
Explanation:
"The idea is that you build a test case first, before any software has been created or modified" but
"testing existing software before developing new code" is the idea or goal, not the task five steps of
TDD:
-Write a test
-Test fails
-Write some code
-Test passes
-Refactor

NO.135 What is a requirement when authenticating a RESTCONF API session with a router that runs
Cisco IOS XE Software?
A. No authentication is required.
B. OAuth must be used.
C. Basic authentication must be used.
D. A token must be retrieved and the associated string must be embedded in the X-Auth-Token
header.
Answer: C
Explanation:
https://www.cisco.com/c/en/us/td/docs/routers/csr1000/software/restapi/restapi/RESTAPIclient.ht
ml

59
IT Certification Guaranteed, The Easy Way!

NO.136 On which port does NETCONF operate by default?


A. 23
B. 443
C. 822
D. 830
Answer: D

NO.137 Refer to the exhibit.

What is represented in this YANG module?


A. interface management
B. topology
C. BGP
D. OpenFlow
Answer: A

NO.138 What are the two purposes for using a VLAN in a network? (Choose two)
A. It is used to create the routing table.
B. It creates a collection of MAC addresses.

60
IT Certification Guaranteed, The Easy Way!

C. It is used for VM network traffic.


D. It segments a network.
E. It creates a broadcast domain.
Answer: D,E

NO.139 How does a developer create and switch to a new branch called "my-bug-fix" to develop a
product fix?
A. git checkout -b my-bug-fix
B. git branch -b my-bug-fix
C. git branch my-bug-fix
D. git checkout my-bug-fix
Answer: A
Explanation:
https://www.shellhacks.com/git-create-new-branch-and-checkout/

NO.140 Which Cisco DevNet resource allows access to products in a development lab to explore,
learn, and build application that use Cisco APLs?
A. DevNet communities
B. DevNet code Exchange
C. DevNet Automation Exchange
D. DevNet sandbox
Answer: D

NO.141 Refer to the exhibit.

A developer needs to automatically retrieve all of the messages of a Webex room with the roomld of
HY2l2Y292cGFyazovL3Vz397748444YjU5NjAtNTk0ZJ0xMWVhLTk0Mj". Using the Webex API
documentation shown, drag and drop the code snippets from below onto the code to complete the
Python script to list all of the messages in the room. Not all options are used.

61
IT Certification Guaranteed, The Easy Way!

Answer:

NO.142 Refer to the exhibit.

62
IT Certification Guaranteed, The Easy Way!

What is the result of executing this Ansible playbook?


A. The playbook copies a new start-up configuration to CISCO_ROUTER_01.
B. The playbook backs up the running configuration of CISCO_ROUTER_01.
C. The playbook backs up the start-up configuration of C1SCO_ROUTER_01.
D. The playbook copies a new running configuration to CISCO_ROUTER_01.
Answer: C

NO.143 Refer to the exhibit.

Given the API documentation for the UCS SDK python class, UcsHandle, which code snippet creates a
handle instance?

63
IT Certification Guaranteed, The Easy Way!

A. Option A
B. Option B
C. Option C
D. Option D
Answer: C

NO.144 Which protocol runs over TCP port 22?


A. SSH
B. HTTP
C. Telnet
D. NETCONF
Answer: A

NO.145 Drag and drop the descriptions from the left onto correct application deployment models on
the right.

64
IT Certification Guaranteed, The Easy Way!

Answer:

NO.146 What is a benefit of using edge computing in an IoT implementation?


A. low cost in network design
B. low network design complexity
C. high availability for network components
D. high speed in data processing
Answer: D

NO.147 Refer to the exhibit.

65
IT Certification Guaranteed, The Easy Way!

Drag and drop the code from the left code from the left onto the item number on the right to
complete the Meraki code to obtain a list of client which have used this network.

66
IT Certification Guaranteed, The Easy Way!

Answer:

67
IT Certification Guaranteed, The Easy Way!

NO.148 What is a benefit of organizing into modules?


A. improves collaboration of the development team
B. makes it easier to deal with large and complex systems
C. enables the code to be broken down into layers
D. enables the inclusion of more programming languages in the code
Answer: B
Explanation:
From Wikipedia (https://en.wikipedia.org/wiki/Modular_programming) "Modular programming is
closely related to structured programming and object-oriented programming, all having the same
goal of facilitating the construction of large software programs and systems by decomposition into
smaller pieces."

68
IT Certification Guaranteed, The Easy Way!

NO.149 Refer to the exhibit.

Drag and drop the code from the bottom onto the blanks in the code to construct a cURL command
using the Cisco DNA Center API. which will provide the details of a WLAN controller with Id
af397748444. Not at options are used.

Answer:

NO.150 Which way should be used to safely the API keys?

69
IT Certification Guaranteed, The Easy Way!

A. In an environment variable unique to the system database


B. Encrypted in a configuration file that is separate from the code
C. Encrypted in the code in a function
D. Plain text in the code as a constant
Answer: B

NO.151 Which two concepts describe test-driven development? (Choose two.)


A. It enables code refactoring.
B. Write a test before writing code.
C. Implementation is driven by incremental testing of release candidates.
D. User acceptance testers development the test requirements.
E. Tests are created when code is ready for release.
Answer: B,C
Explanation:
https://www.tutorialspoint.com/software_testing_dictionary/release_candidate.htm

NO.152 What are two benefits of using VLANs? (Choose two.)


A. limits the devices that can join the network
B. segments the broadcast domain
C. extends the broadcast domain
D. allows all network devices to be accessible from any host on the network
E. enables the logical grouping of devices that belong to different Layer 2 devices
Answer: B,E

NO.153 Which mechanism is used to consume a RESTful API design when large amounts of data are
returned?
A. Data sets
B. Scrolling
C. Blobs
D. Pagination
Answer: D

NO.154 Drag and drop the requests from the left into the correct order on the right to create and
check the path trace between two devices using Cisco DNA center API.

Answer:

70
IT Certification Guaranteed, The Easy Way!

NO.155 Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose
two.)
A. An artifact repository allows to compare and merge changes in the source code of files involved in
a build process.
B. An artifact repository is needed only for CI/CD pipeline executed on a public cloud infrastructure.
C. An artifact repository provides traceability, search, and management of binary files.
D. An artifact repository is needed only for managing open source software.
E. An artifact repository stores files needed and generated during the build process.
Answer: C,E

NO.156 The project is migrated to a new codebase, the "old_project" directory must be deleted. The
directory has multiple read-only files, and it must be deleted recursively without prompting for
confirmation. Which bash command must be used?
A. rm -rf old_project
B. rm -r old_project
C. rmdir -p old_project
D. rmdir old_project
Answer: A

NO.157 Drag and drop the network automation interfaces from the left onto the transport protocols
that they support on the right. (Not all Options are used)

Answer:

71
IT Certification Guaranteed, The Easy Way!

NO.158 Refer to the exhibit.

Which command needs to be placed on the box where the code is missing to output the value of
page_jd in the Python 3.7 script?
A)

B)

72
IT Certification Guaranteed, The Easy Way!

C)

D)

A. Option A
B. Option B
C. Option C
D. Option D
Answer: C

NO.159 A developer needs to prepare the file README.md in the working tree for the next commit
operation using Git. Which command needs to be used to accomplish this?
A. git add README.md staging
B. git -a README.md
C. git add README.md
D. git commit README.md
Answer: C

NO.160 While developing a real-Time VoIP application on a Cisco Webex platform, users report that
their voice gets chopped or parts of the conversation drop out. Which network constraint is
impacting the application?
A. latency
B. jitter
C. capacity
D. delay
Answer: B

NO.161 Refer to the exhibit.

73
IT Certification Guaranteed, The Easy Way!

74
IT Certification Guaranteed, The Easy Way!

A developer is troubleshooting an API with the given API with the given API documentation and cURL
command. What is the cause of this problem?
A. The user is not allowed to post massages from their account
B. The request body is missing or incomplete
C. The API token specified is expired
D. The authorization header is missing or incomplete
Answer: C

NO.162 In which situation would an edge computing solution be used?


A. where low latency is needed
B. where high CPU throughput is needed
C. where fast memory is needed
D. where high disk space is needed
Answer: A

NO.163 When a Cisco IOS XE networking device is configured using RESTCONF, what is the default
data-encoding method?
A. XML
B. x-form-encoding
C. YANG
D. YAML
Answer: A

NO.164 What are two advantages of YANG-based approaches for infrastructure automation?
(Choose two.)

75
IT Certification Guaranteed, The Easy Way!

A. directly maps to JavaScript


B. multi-platform vendor abstraction
C. designed to reflect networking concepts
D. compiles to executables that run on network devices
E. command line driven interface
Answer: B,C

NO.165 Drag and drop the characteristics from the left onto the corresponding software
development methodologies on the right?

Answer:

NO.166 How is a branch called "my-bug-fix" started to develop a fix needed in a product?
A. git branch -b my-bug-fix
B. git checkout -b my-bug-fix
C. git checkout my-bug-fix
D. git branch my-bug-fix
Answer: B

NO.167 Refer to the exhibit.

76
IT Certification Guaranteed, The Easy Way!

What caused the error in this API request?


A. The API resource does not support the POST operation.
B. The API resource does not support JSON format payloads.
C. The submitted JSON payload includes a field that is not supported by the API resources.
D. The submitted JSON payload has a formatting issue.
Answer: D

NO.168 Refer to the exhibit.

What is the function of the python script?


A. Count and print the total number of available devices.
B. Iterate over a list of network devices and write all device names and management IP addresses to
an output file.
C. Iterate over a list of network devices and write all device type and associated management IP

77
IT Certification Guaranteed, The Easy Way!

address.
D. For each device that is returned, display the device and, for each device, print the device name
and management IP address.
E. Loop through the returned list of network devices and, for each device, print the device name
management IP address.
Answer: E

NO.169 What is a difference between a synchronous API and an asynchronous API?


A. An asynchronous API can make offline calls while synchronous APIs do not have this capability.
B. Synchronous API calls are returned immediately while asynchronous calls do not guarantee an
immediate response.
C. Synchronous API calls require an authentication header to be sent while asynchronous calls do not
require authentication.
D. An asynchronous API can make a larger number of calls in a specified time period than a
synchronous API.
Answer: B

NO.170 Refer to the exhibit.

The output of the diff-u README.md-repo README.md command is shown. The original file was 165
lines long How many lines are in the edited copy of the file?
A. 162
B. 165
C. 172
D. 173
Answer: D

78
IT Certification Guaranteed, The Easy Way!

NO.171 Which two encoding formats do YANG interfaces support?


A. JSON
B. XML
C. XHTML
D. Plain text
E. BER
Answer: A,B

NO.172 What are two use cause where webhooks are effective? (Choose two.)
A. Close a session with a web server after a specific amount of time.
B. Filter out information from a response to an API call
C. Change the response format or content type of an API call.
D. Inform a previously defined chat channel after a deployment fate.
E. Send an email to a customer of an online store after payment is complete
Answer: D,E

NO.173 Refer to the exhibit.

Drag and drop the descriptors from the left onto the correct parts of the API request and response on
the right.

79
IT Certification Guaranteed, The Easy Way!

Answer:

NO.174 Refer to the exhibit.

80
IT Certification Guaranteed, The Easy Way!

What does the python function do?


A. It returns DNAC user and password.
B. It returns HTTP Basic Authentication.
C. It returns an authorization token.
D. It reads a token from a local JSON file and posts the token to the DNAC URL.
Answer: C

NO.175 Refer to the exhibit.

Which JSON snippet configures a new interface according to YANG model?


A)

81
IT Certification Guaranteed, The Easy Way!

B)

C)

D)

82
IT Certification Guaranteed, The Easy Way!

A. Option A
B. Option B
C. Option C
D. Option D
Answer: B

NO.176 A 401 HTTP response code is returned when calling a REST API. What is the error state
identified by this response code?
A. The server cannot process the request as it has detected an issue in the request syntax or body.
B. The server accepted the request but the client is not authorized for this content.
C. The request has not been accepted because it requires authentication.
D. The server cannot find the requested resource because the path specified is incorrect.
Answer: C

NO.177 Which type of threat occur when an attacker can send hostile data to an interpreter within
an application?
A. Cross-site scripting
B. Sensitive data exposure
C. Broken authentication
D. Injection
Answer: D

NO.178 Refer to the exhibit.

83
IT Certification Guaranteed, The Easy Way!

The python interpreter and the Cisco python SDK are available by default in the Cisco NX-OS
software. The SDK documentation shows how the cild() API can be used when working with working
with JSON and XML. What are two effect of running the script? (Choose two.)
A. configure interlace loopback 5
B. issue shutdown on interface loopback 5
C. show only the interfaces In the up status
D. show only the interfaces in admin shut status

84
IT Certification Guaranteed, The Easy Way!

E. show details for the TABLE interface


Answer: A,C
Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/7-
x/programmability/guide/b_Cisco_Nexus_9000_Series_NX-
OS_Programmability_Guide_7x/Python_API.html

NO.179 Refer to the exhibit.

A process on the host wants to access the service running inside this Docker container. Which port is
used to make a connection?
A. only outbound connections between 3000 and 5000 are possible
B. port 3000
C. any port between 3000 and 5000
D. port 5000
Answer: B

NO.180 Drag and drop elements of the RESTCONF protocol stack from the left onto the correct
description on the right. Not all elements on the left are used.

Answer:

85
IT Certification Guaranteed, The Easy Way!

NO.181 A developer is writing an application that a REST API and the application requires a valid
from the API which element of the response is used in the conditional check?
A. URL
B. Status code
C. Link
D. Body
E. Headers
Answer: B

NO.182 Refer to the exhibit.

86
IT Certification Guaranteed, The Easy Way!

87
IT Certification Guaranteed, The Easy Way!

Which two statement describe the configuration of the Ansible script is run? (Choose two.)
A. Traffic on port 0/2 and 0/3 is connected to port 0/6.
B. Traffic from ports 0/2 to 0/5 can flow on port 0/1 due to the trunk.
C. Traffic can flow between ports 0/2 to 0/5 due to the trunk on port 0/1.
D. GigabitEthernet0/2 and GigabitEthernet0/3 are access ports for VLAN 6.
E. GiabitEthernet0/1 is left unconfigured.
Answer: B,D

NO.183 Which tool is used to block all traffic to the domain by using a single API call?
A. Cisco ISE
B. Cisco Firepower
C. Cisco AMP
D. Cisco Umbrella
Answer: B

NO.184 Refer to the exhibit.

The Cisco Meraki API manages two organizations. In each organization, two independent networks
are defined. How many calls to the /organizations/(orgid)networks endpoint will be run parallel by
the GetAllNetwork function of the API client?
A. 0
B. 1
C. 2
D. 4
Answer: C

NO.185 What is the function of IP address in networking?

88
IT Certification Guaranteed, The Easy Way!

A. specifies the type of traffic that is allowed to roam on a network


B. represents the unique ID that is assigned to one host on a network
C. specifies resource's location and the mechanism to retrieve it
D. represents a network connection on specific devices
Answer: B

NO.186 Drag and drop the network component names from the left onto the correct descriptions on
the right. Not all options are used.

Answer:

NO.187 What is a benefit of a model-driven approach for infrastructure automation?


A. enforces the generation of all automation scripts through the modeling environment
B. provides a small learning curve and helps system administrators with limited coding experience
C. ensures that system administrators gain a good understanding of coding and expand their
experience and capabilities

89
IT Certification Guaranteed, The Easy Way!

D. enables a user to understand a declarative language to translate the model into an actionable
script
Answer: A

NO.188 What are two benefits of model-driven programmability?


A. model-driven APIs for abstraction and simplification
B. single choice of transport, protocol, and encoding
C. model-based, structured, and human friendly
D. easier to design, deploy, and manage APIs
E. models decoupled from transport, protocol, and encoding
Answer: D,E

NO.189 A company has written a script that creates a log bundle from the Cisco DNA Center every
day. The script runs without error and the bundles are produced. However, when the script is run
during business hours, report poor voice quality of phones calls. What explains this behavior?
A. The application is running in the Voice VLAN and causes delays and jitter in the subnet.
B. The speed and duplex settings in Cisco DNA Center are sot incorrectly, which causes the transfer
to be too slow.
C. 9 The script is written in a low-level programming language where there is no memory safety. This
causes a buffer overflow and disruption on the network.
D. Generating the logs causes the CPU on the network controller to spike, which causes delays m
forwarding the voice IP packets.
Answer: D

NO.190 Fill in the blanks to complete the cURL command that invokes a RESTful API to retrieve a
resource in JSON format using OAuth.

Answer:
GETAcceptAuthorization
Explanation:
See the solution below.

Reference:
https://webcache.googleusercontent.com/search?q=cache:Se6d2trvMsEJ:https://blogs.cisco.com/de
veloper/security-api-best-practices+&cd=4&hl=en&ct=clnk&gl=pk&client=firefox-b-d

NO.191 What are two characteristics of Bare Metal environments that are related to application
deployment? (Choose two.)
A. Provide the hypervisor to host virtual servers
B. Specifically designed for container-based workloads.
C. Provides workloads with access to hardware features
D. Suitable for legacy application that do not support virtualization

90
IT Certification Guaranteed, The Easy Way!

E. Not compatible with other cloud services such as PaaS or SaaS offerings.
Answer: C,D

NO.192 Which is an advantage of using network programmability?


A. It removes CLI access for devices.
B. It provides for more scalable and replicable network provisioning.
C. Manual configuration is faster.
D. No cloud abstraction occurs.
Answer: B

NO.193 Refer to the exhibit.

The JSON data in the exhibit has been parsed and stored in a variable, "data". What returns the value
"172.16.0.11" ?
A. data['items'][0]['host']['value']
B. data['items']['1']['host']['value']
C. data['items']['host'][1]
D. data['items']['host']['value']
Answer: A

NO.194 Drag and drop the network automation interfaces from the left onto the transport protocols
that they support on the right.

Answer:

91
IT Certification Guaranteed, The Easy Way!

NO.195 Fill in the blanks to complete the Python script to update the Webex Teams membership of
a room using the Python requests library import requests

Answer:
requestheaderspayload

NO.196 Which line is an example of the start of a chunk from a unified diff?
A. @@ -90,88 +20191008T1349@@
B. @@ -20191007T1200 +88,90 @@
C. @@ -20191007T1200 +20191008T1349@@
D. @@ -88,10 +88,6 @@
Answer: D

NO.197 Which configuration management tool has an agentless capability?


A. Chef
B. Puppet
C. Ansible
D. CFEngine
Answer: C

NO.198 How do XML and JSON compare regarding functionality?


A. JSON natively supports arrays and XML does not natively support arrays.
B. XML provides support for mapping data structures into host languages than JSON.
C. XML provides more human readability than JSON.
D. JSON provides support for data types than XML.
Answer: A

92
IT Certification Guaranteed, The Easy Way!

NO.199 What are two functions of a routing table on a network device? (Choose two.)
A. It lists entries more than two hops away.
B. It lists the routes to a particular destination.
C. It lists the routes to drop traffic.
D. It lists hosts that are one hop away.
E. It lists the static and dynamic entries.
Answer: B,E

NO.200 Refer to the exhibit.

Which infrastructure automation method is shown?


A. Waterfall
B. CI/CD pipeline
C. Agile
D. Lean
Answer: C

NO.201 Refer to the exhibit.

93
IT Certification Guaranteed, The Easy Way!

Drag and drop the code from the left onto the item numbers on the right to complete to Meraki

94
IT Certification Guaranteed, The Easy Way!

python script shown in the exhibit.

Answer:

95
IT Certification Guaranteed, The Easy Way!

NO.202 What is a benefit of model-driven programmability?


A. It addresses the static architecture of traditional networks being decentralized and complex.
B. By modeling data, it ensures that vast quantities of data are usable for monitoring.
C. It provides a programmatic and standards-based way of writing configurations to any network
device.
D. It simplifies management and operations by decoupling the networking hardware from its control
mechanism.
Answer: D

NO.203 Refer to the exhibit.

96
IT Certification Guaranteed, The Easy Way!

Which function does the EXPOSE line perform when building an image from this Dockerfile?
A. Local port 8080 of the container that launched with this docker image is accessible from co-hosted
containers and external clients.
B. Local port 8080 is not reachable at all because no IP address is specified along with the EXPOSE
command of the Dockerfile.
C. Local port 8080 is accessible from other containers running on the same docker host as the
container that launched with this docker image.
D. Local port 8080 of the container that launched with this docker image is accessible to external
clients.
Answer: C
Explanation:
By default, the EXPOSE instruction does not expose the container's ports to be accessible from the
host. In other words, it only makes the stated ports available for inter-container interaction.
Whereas publishing a port using either -P or -p exposes it, exposing a port using EXPOSE or -expose
does not publish it.
So, while exposed ports can only be accessed internally, published ports can be accessible by external
containers and services.
https://www.whitesourcesoftware.com/free-developer-tools/blog/docker-expose-port/

NO.204 What is the purpose of the Cisco VIRL software tool?


A. To verify configurations against compliance standards
B. To simulate and model networks
C. To automate API workflows
D. To test performance of an application
Answer: B

NO.205 What is used in JSON to represent a Python Tuple?


A. Object
B. Array

97
IT Certification Guaranteed, The Easy Way!

C. Dict
D. Collection
Answer: B

NO.206 What is an example of a network interface hardware address?


A. domain name
B. IP address
C. workstation name
D. MAC address
Answer: D

NO.207 Refer to the exhibit.

98
IT Certification Guaranteed, The Easy Way!

A REST API retune this JSON output for a GET HTTP request, Which has assigned to a variable called
"vegetables" Using python, which output is the result of this command?

99
IT Certification Guaranteed, The Easy Way!

A. Lettuce
B. Kiwi
C. ['kiwi', 'grape']
D. {'color': 'green', 'items': ['kiwi', 'grape']
Answer: B

NO.208 An application calls a REST API and expects a result set of more than 550 records, but each
time the call is made, only 25 are returned. Which feature limits the amount of data that is returned
by the API?
A. pagination
B. payload limit
C. rate limiting
D. service timeouts
Answer: A

NO.209 Fill in the blanks to complete the statement.


Given a username of "devnet" And a password "Cisco123", applications must create a base64
encoding of the string" ____________ " when sanding HTTP requests to an API that uses
_______________ authentication.
Answer:
devnetCiscoBasic
Explanation:
Solution as below

NO.210 Which platform is run directly using a hypervisor?


A. Virtual
B. Bare metal systems
C. Containers
D. Applications
Answer: C

NO.211 What are two security benefits of a Docker-based application?


A. easier to patch because Docker containers include only dependencies that the application requires
B. prevents information leakage that can occur when unhandled exceptions are returned in HTTP
responses
C. allows for separation of application that traditionally run in the same host
D. natively secures access to secrets that are used by the running application
E. guarantees container images are secured and free of vulnerabilities
Answer: A,C

NO.212 Refer to the exhibit.

100
IT Certification Guaranteed, The Easy Way!

A network engineer must manage the network devices. The engineer prepares a Python scripts to
authenticate to the Cisco to DNA Center API and request a device list. The device request fails and
returns errors code 401. Which action solves the problem?
A. Update the API URL. which matched the API endpoint for device list.
B. Send the request to another network in case there are reachability Issues.
C. Send the Authentication header In the request with a valid configuration.
D. Update the credentials that are already supplied and retry the request
Answer: D

NO.213 A REST API service requires authentication based on the username and password. The user
"john" has the password "384279060" and the Base64 encoding of those credentials is
"am9objowMTIzNDU2Nzg=". Which method completes an authentication request?
A. The header must include:
Authorization: Bearer am9obJowMTlzNDU2Nzg=
B. The payload must include:
Authorization: Bearer am9objowMTIzNDU2Nzg=
C. The payload must include.
Authorization: Basic am9objowMTlzNDU2Nzg=
D. The header must include:
Authorization: Basic am9objowMTlzNDU2Nzg=
Answer: D

NO.214 What is the benefit of edge computing?


A. It reduces network latency by moving processing closer to the data source.
B. It simplifies security as devices and processing are brought closer together
C. It removes the need for centralized data processing.
D. It reduces data velocity from devices or other data sources.
Answer: A

101
IT Certification Guaranteed, The Easy Way!

NO.215 Refer to the exhibit. What does the load balancer enable in the network topology?
A. hosted application to access Internet services
B. external requests to be routed to the application servers
C. workstations to access the Internet
D. application to access the database server
Answer: C

NO.216 A function my_func() returns True when it executes normally. Which python snippet tests
my_func()?

A. Option A
B. Option B
C. Option C
D. Option D
Answer: B

NO.217 Refer to Exhibit.

102
IT Certification Guaranteed, The Easy Way!

Which JSON is equivalent to the XML-encoded data.


A)

B)

103
IT Certification Guaranteed, The Easy Way!

C)

D)

104
IT Certification Guaranteed, The Easy Way!

A. Option A
B. Option B
C. Option C
D. Option D
Answer: A

NO.218 In which two ways is an application characterized when interacting with a webhook?
(Choose two.)
A. codec
B. receiver
C. transaction monitor
D. processor
E. listener
Answer: B,E

NO.219 Which type of HTTP method is used by the Meraki nad webex teams APIs to send webhook
notifications?
A. HTTP GET
B. HTTP PUT
C. HTTP HEAD
D. HTTP POST
Answer: D

NO.220 Fill in the blanks to complete the python script to retrieve a list of network devices using the
Cisco DNA center API.

105
IT Certification Guaranteed, The Easy Way!

Answer:
GETheaderspayload
Explanation:
Solution as below.

106

You might also like