2024 Leads4pass Free Latest IT Cert Exam Dumps

High Quality Latest EMC, Microsoft, Cisco, CompTIA, VMware And Other IT Cert Exam Dumps With 100% Pass Guarantee

Lead4Pass DevNet Associate 200-901 dumps are the best material

best material

Lead4Pass DevNet Associate 200-901 dumps contains 397 latest exam questions and answers, covering the actual 200-901 DEVASC exam questions, which is the best material for candidates to take the exam.

Download DevNet Associate 200-901 dumps with PDF and VCE: https://www.leads4pass.com/200-901.html, to help candidates complete the study easily and conveniently and finally successfully pass the 200-901 DEVASC certification exam.

Check out some free DevNet Associate 200-901 exam questions and answers online:

Number of exam questionsExam nameExam code
15Developing Applications and Automating Workflows using Cisco Platforms (DEVASC)200-901
Question 1:

DRAG DROP Refer to the exhibit.

200-901 questions 1

Drag and Drop the code from the bottom onto the box where the code is missing on the Meraki Python script to create a new network.

Select and Place:

200-901 questions 1-1

Correct Answer:

200-901 questions 1-2
200-901 questions 1-3

Question 2:

Refer to the exhibit.

200-901 questions 2

The definition of the YANG module and a RESTCONF query sent to a Cisco IOS XE device is shown. Which statement is correct if the RESTCONF interface responds with a 204 status code?

A. The query retrieved the logging severity level.

B. The query updated the logging severity level or created it if not present on the device.

C. The query failed at retrieving the logging severity level.

D. The query failed to set the logging severity level due to an invalid path.

Correct Answer: B

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/prog/configuration/1611/ b_1611_programmability_cg/restconf_programmable_interface.html

Question 3:

Refer to the exhibit.

200-901 questions 3

Which infrastructure automation method is shown?

A. CI/CD pipeline

B. Lean

C. Agile

D. Waterfall

Correct Answer: A

Question 4:

A developer pushes an application to production. The application receives a webhook over HTTPS without a secret. The webhook information contains credentials to service in cleartext.

When the information is received, it is stored in the database with an SHA-256 hash. Credentials to the database are accessed at runtime through the use of a vault service.

While troubleshooting, the developer sets the logging to debug to view the message from the webhook. What is the security issue in this scenario?

A. Database credentials should be accessed by using environment variables defined at runtime.

B. During the transport of webhook messages, the credentials could be unencrypted and leaked.

C. During logging, debugging should be disabled for the webhook message.

D. Hashing the credentials in the database is not secure enough; the credentials should be encrypted.

Correct Answer: B

Question 5:

Refer to the exhibit. While developing a Cisco Webex bot, an application reaches the public IP address of the firewall, but traffic is forwarded to the IP address of server 1 instead of the IP address of server 2. What causes this issue?

200-901 questions 5

A. The proxy server that rewrites traffic is misconfigured.

B. The router is sending the traffic to server 1 instead of server 2.

C. The switch is forwarding IP traffic to the wrong VLAN.

D. NAT is misconfigured on the firewall.

Correct Answer: D

Question 6:

FILL BLANK

Fill in the blanks to complete the statement.

Given a username of “devnet” and a password of “cisco123”, applications must create a base64 encoding of the string “________________” when sending HTTP requests to an API that uses _______________ authentication.

A.

Correct Answer: See below.

Question 7:

What is the benefit of test-driven development?

A. early customer involvement

B. increased code quality

C. faster releases that have minimal features

D. strict adherence to product requirements

Correct Answer: D

Question 8:

Which two types of NAT are used in a network? (Choose two.)

A. routed NAT

B. static NAT

C. multicast NAT

D. normal NAT

E. dynamic NAT

Correct Answer: BE

Reference: https://www.dummies.com/programming/networking/cisco/types-of-network-address- translation/

Question 9:

What is the benefit of organizing code into modules?

A. enables the code to be broken down into layers

B. improves collaboration of the development team

C. makes it easier to deal with large and complex systems

D. enables the inclusion of more programming languages in the code

Correct Answer: C

Question 10:

Users cannot access a web server and after the traffic is captured, the capture tool shows an ICMP packet that reports “time exceeded in-transit”. What is the cause of this webserver access issue?

A. A router along the path has the wrong time.

B. A router along the path is misrouting the packets in the wrong direction.

C. The server is too loaded and the connection could not be handled in time.

D. The server is too far away and the packets require too much time to reach it.

Correct Answer: B

Question 11:

Which way should be used to safely store the API keys?

A. in an environment variable unique to the system database

B. encrypted in a configuration file that is separate from the code

C. plain text in the code as a constant

D. encrypted in the code in a function

Correct Answer: A

Question 12:

What are the two purposes for using a VLAN in a network? (Choose two)

A. It is used to create the routing table.

B. It creates a collection of MAC addresses.

C. It is used for VM network traffic.

D. It segments a network.

E. It creates a broadcast domain.

Correct Answer: DE

Question 13:

DRAG DROP

Drag and drop the capability on the left onto the Cisco compute management platform that supports the capability on the right.

Select and Place:

200-901 questions 13

Correct Answer:

200-901 questions 13-1

Question 14:

What operation is performed with YANG model-driven programmability in NX-OS?

A. configure a device with native and OpenConfig-based models

B. bootstrap a device that has a factory-default configuration

C. send CLI commands to a device and retrieve output in JSON format

D. run Linux commands natively on the device

Correct Answer: A

Reference: https://www.cisco.com/c/en/us/products/collateral/switches/nexus-9000-series-switches/white- paper-c11-741518.html

Question 15:

In which two ways is an application characterized when interacting with a webhook? (Choose two.)

A. codec

B. receiver

C. transaction monitor

D. processor

E. listener

Correct Answer: BE


Download DevNet Associate 200-901 dumps with PDF and VCE: https://www.leads4pass.com/200-901.html, to help candidates complete the study easily and conveniently and finally successfully pass the 200-901 DEVASC certification exam.

About the author

Share free EMC IT certification exam questions (CLOUD, CONVERGED INFRASTRUCTURE, DATA PROTECTION, DATA SCIENCE, NETWORKING, SECURITY, SERVERS, Dell Technologies vSAN Ready Node...). Participate in EMC community practice and use community recommendations to easily pass the exam.

';