Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 200-901 Practice Exam with Questions & Answers | Set: 4

Questions 31

200-901 Question 31

Refer to the exhibit. Drag and drop the actions from the left that the contents of this Dockerfile accomplish onto the right. Not all options are used.

200-901 Question 31

Options:
Cisco 200-901 Premium Access
Questions 32

200-901 Question 32

Refer to the exhibit. Which action does the script perform?

Options:
A.

It queries user credentials from Cisco IOS XE devices.

B.

It retrieves device identification from Cisco DNA Center.

C.

It exports SSID information from Meraki dashboard.

D.

It collects group information from ACI.

Questions 33

Which two details are captured from the subnet mask? (Choose two.)

Options:
A.

portion of an IP address that refers to the subnet

B.

default gateway of the host

C.

unique number ID assigned to the host

D.

part of an IP address that refers to the host

E.

network connection of a host or interface

Questions 34

Which RFC 1918 address space includes a subnet of 172.16.0.0 that uses a mask of 255.255.0.0?

Options:
A.

class A

B.

class B

C.

class C

D.

class D

Questions 35

What is a characteristic of Waterfall compared to Agile software development method?

Options:
A.

Waterfall focuses on continuous improvement, and Agile focuses on the design phase.

B.

Waterfall separates the project development lifecycle into sprints, and Agile does not use cycles.

C.

Waterfall specifies requirements before development begins, and Agile responds flexibly to changes in requirements.

D.

Waterfall uses reviews with step by step approach, and Agile uses a serially phased approach.

Questions 36

Which standard supported by Cisco IOS XE and Cisco NX-OS is used for automating the configuration of multiple devices across a network?

Options:
A.

SNMP – YANG

B.

SYSLOG – YANG

C.

CLI – YANG

D.

NETCONF – YANG

Questions 37

What are two benefits of using classes over functions when writing applications? (Choose two.)

Options:
A.

improved readability

B.

increased compatibility

C.

variable reusability

D.

increased performance

E.

code organization

Questions 38

A developer pushes an application to production. The application receives a webhook over HTTPS without a secret. The webhook information contains credentials to service in cleartext. When the information is received, it is stored in the database with an SHA-256 hash. Credentials to the database are accessed at runtime through the use of a vault service. While troubleshooting, the developer sets the logging to debug to view the message from the webhook. What is the security issue in this scenario?

Options:
A.

Database credentials should be accessed by using environment variables defined at runtime.

B.

During the transport of webhook messages, the credentials could be unencrypted and leaked.

C.

During logging, debugging should be disabled for the webhook message.

D.

Hashing the credentials in the database is not secure enough; the credentials should be encrypted.

Questions 39

Which two HTTP code series relate to errors? (Choose two.

Options:
A.

400

B.

200

C.

500

D.

300

E.

100

Questions 40

What are two benefits of implementing common data structures when working with APIs in remote systems? (Choose two.)

Options:
A.

ensures that developers are limited to using one data schema type

B.

prevents multivendor interoperability

C.

improves security in RESTful web services

D.

enforces standardized data structures

E.

leverages code that is easily managed and reused