Exam Code | 200-901 |
Exam Name | DevNet Associate (DEVASC) |
Questions | 406 |
Update Date | November 10,2024 |
Price |
Was : |
This exam is a key step towards achieving your Cisco certification in the service provider domain. At Prep4Cisco, we are dedicated to providing you with the most comprehensive study materials and resources to ensure your success in this important certification exam.
Take the first step towards becoming a certified Cisco service provider professional. With Prep4Cisco's comprehensive study materials and 100% passing guarantee, you'll be well-prepared to excel on the Cisco 200-901 exam. Start your journey today and unlock exciting career opportunities in the world of service provider networking.
Choose Prep4Cisco and let's achieve your Cisco certification goals together!
Developer is working on a new feature and made changes on a branch named ‘branch-413667549a-new’. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?
git merge -no-edit
git merge -commit
git merge -revert
git merge -abort
Which TCP port is used to connect to a network device by using Telnet?
23
69
400
830
What is a comparison of YAML and JSON?
YAML has a more consistent approach to representing data compared to JSON.
JSON does not support comments and YAML does.
YAML is a more verbose data structure compared to JSON.
JSON has more common usage in configuration management tools compared to YAML.
Which IP service is used to monitor the performance of network devices?
SNMP
DHCP
DNS
NTP
A developer pushes an application to production. The application receives a webhook over HTTPS without a secret. The webhook information contains credentials to service in cleartext. When the information is received, it is stored in the database with an SHA-256 hash. Credentials to the database are accessed at runtime through the use of a vault service. While troubleshooting, the developer sets the logging to debug to view the message from the webhook. What is the security issue in this scenario?
Database credentials should be accessed by using environment variables defined at runtime.
During the transport of webhook messages, the credentials could be unencrypted and leaked.
During logging, debugging should be disabled for the webhook message.
Hashing the credentials in the database is not secure enough; the credentials should be encrypted.
A file in a local Git repository has been updated and issued the git add . command. The git diff command has been run to compare the changes to the previous commit, but nothing shows. Which action identifies the problem?
Run the git add . command again in the correct subdirectory to ensure changes added to the staging area.
Run the git commit command before the differences are compared to receive the end state of the code.
Run the git status command to see the differences between current and previous code review stages.
Run the git diff --staged command to compare the code added to the staging area.
What is the meaning of the HTTP status code 204?
request completed; new resource created
server successfully processed request; no content returned
standard response for successful requests
invalid query parameters
A developer has experienced security issues with a previously developed application. The API offered by that application is open and without any constraints. During a recent attack, the application was overloaded with API requests. To address this issue, an API constraint is implemented to protect the application from future attacks or any sudden throttling. Which API constraint must the application developer implement in this situation?
pagination
rate limiting
filtering
payload limiting
What is a capability of the AXL API?
It signs a user in to a phone that is configured for extension mobility.
It pulls logs for the Cisco Tomcat service.
It authenticates users who exist in Cisco Unified Communications Manager.
It provides support for HTTP and HTTPS communications.
Which technology is responsible for resolving a host name to an IP address?
DNS
SNMP
DHCP
NTP