Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 200-901 - DevNet Associate (DEVASC)

Page: 9 / 14
Total 467 questions

Which two statements about JSON and XML are true? (Choose two.)

A.

JSON objects are collection of key value pair.

B.

The syntax of JSON contains tags, elements, and attributes.

C.

JSON arrays are an unordered set of key value pairs.

D.

The syntax of XML contains tags, elements, and attributes.

E.

XML objects are collections of key-value pairs.

: 19 DRAG DROP

Drag and drop the HTTP methods from the left onto their generally accepted corresponding create, read, update, and delete operations on the right.

Which API is used to obtain data voicemail ports?

A.

Finesse gadgets

B.

Cisco Unified Communications manager

C.

Webex devices

D.

Webex teams

What are the two principles of an infrastructure as code environment? (Choose two)

A.

Complete complex systems must be able to be built from reusable infrastructure definitions.

B.

Environments must be provisioned consistently using the same inputs.

C.

Redeployments cause varying environment definitions.

D.

Service overlap is encouraged to cater for unique environment needs.

E.

Components are coupled, and definitions must be deployed for the environment to function.

Which principle is a value from the manifesto for Agile software development?

A.

adhering to a plan over responding to requirements

B.

detailed documentation over working software

C.

processes and tools over teams and inter actions

D.

customer collaboration over contract negotiation

what is an advantage of a version control system?

A.

forces the practice of trunk-based development

B.

prevents over-writing code or configuration files

C.

facilitates resolving conflicts when merging code

D.

ensures that unit tests are written

What are two security benefits of a Docker-based application?

A.

easier to patch because Docker containers include only dependencies that the application requires

B.

prevents information leakage that can occur when unhandled exceptions are returned in HTTP responses

C.

allows for separation of application that traditionally run in the same host

D.

natively secures access to secrets that are used by the running application

E.

guarantees container images are secured and free of vulnerabilities

Which two use cases are supported by Meraki APIs? (Choose two.)

A.

Retrieve live streams from a Meraki Camera.

B.

Build a custom Captive Portal for Mobile Apps.

C.

Configure network devices via the Dashboard API.

D.

Build location-aware apps from Wi-Fi and LoRaWAN devices.

E.

Deploy applications onto the devices.

The project is migrated to a new codebase, the “old_project” directory must be deleted. The directory has multiple read-only files, and it must be deleted recursively without prompting for confirmation. Which bash command must be used?

A.

rm -rf old_project

B.

rm -r old_project

C.

rmdir -p old_project

D.

rmdir old_project

Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve statement using RESTCONF on a CSR 1000V?

A.

Change the HTTP method to PUT.

B.

Change the transport protocol to HTTPS.

C.

Check the MIMF types in the HTTP headers.

D.

Check the authentication credentials.