Professional Documents
Culture Documents
200-901 - 153 Questions
200-901 - 153 Questions
200-901 - 153 Questions
Cisco
200-901 Exam
Cisco Developing Applications and Automating Workflows
using Cisco Core Platforms Exam
Questions & Answers PDF P-2
Which type of threat occur when an attacker can send hostile data to an interpreter within an
application?
A. Cross-site scripting
B. Sensitive data exposure
C. Broken authentication
D. Injection
Answer: D
Reference:
https://owasp.org/www-project-top-ten/OWASP_Top_Ten_2017/Top_10-2017_A1-Injection
Question: 2
Answer: B
Question: 3
Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)
A. An artifact repository allows to compare and merge changes in the source code of files involved in
a build process.
B. An artifact repository is needed only for CI/CD pipeline executed on a public cloud infrastructure.
C. An artifact repository provides traceability, search, and management of binary files.
D. An artifact repository is needed only for managing open source software.
E. An artifact repository stores files needed and generated during the build process.
Answer: CE
Question: 4
DRAG DROP
Drag and drop the network component names from the left onto the correct descriptions on the
right. Not all options are used.
Answer:
Questions & Answers PDF P-4
Question: 5
Answer: B
Reference:
https://www.speaknetworks.com/cisco-virl-better-gns3/
Question: 6
A. IP protocol
B. Broadcast address
C. TCP or UDP port number
D. Destination next hop or outgoing interface
Answer: D
Reference:
https://geek-university.com/ccna/routing-table-explained/
Questions & Answers PDF P-5
Question: 7
FILL IN THE BLANK
Fill in the blanks to complete the python script to retrieve a list of network devices using the Cisco
DNA center API.
Answer:
Explanation:
Solution as below.
Question: 8
Which statement about authentication a RESTCONF API session with a router that runs Cisco IOS XE
software is true?
Answer: C
Question: 9
Which mechanism is used to consume a RESTful API design when large amounts of data are
returned?
Questions & Answers PDF P-6
A. Data sets
B. Scrolling
C. Blobs
D. Pagination
Answer: D
Reference:
https://nordicapis.com/everything-you-need-to-know-about-api-pagination/
Question: 10
Which action does the Git command git merge allow the development to perform?
Answer: A
Reference:
https://www.atlassian.com/git/tutorials/using-branches/git-merge
Question: 11
A REST API retune this JSON output for a GET HTTP request, Which has assigned to a variable called
“vegetables” Using python, which output is the result of this command?
A. Lettuce
B. Kiwi
C. [‘kiwi’, ‘grape’]
D. {‘color’: ‘green’, ‘items’: [‘kiwi’, ‘grape’]
Answer: B
Question: 12
Which status code is used by a REST API to indicate that the submitted payload is incorrect?
A. 400
B. 403
C. 405
D. 429
Answer: A
Reference:
https://community.cisco.com/t5/application-centric/apic-rest-api-produces-inconsistent-
response/td-p/2758230
Question: 13
Answer: B
Question: 14
Answer: B
Question: 15
Answer: D
Question: 16
DRAG DROP
Drag and drop elements of the RESTCONF protocol stack from the left onto the correct description on
the right. Not all elements on the left are used.
Questions & Answers PDF P-10
Answer:
Explanation:
1 – B, 2 – E, 3 - F
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-
xml/ios/prog/configuration/169/b_169_programmability_cg/restconf_programmable_interface.htm
l
Question: 17
Answer: DE
Question: 18
A. It is a device that receives IP packets that have no explicit next-hop in the routing table.
B. It is a feature that translates between public and private addresses.
C. It is a security feature that denies certain traffic.
D. It is a device that receives Layer 2 frames with an unknown destination address.
Answer: A
Explanation:
Refe
https://www.certificationkits.com/cisco-certification/ccna-articles/cisco-ccna-intro-to-routing-
basics/cisco-ccna-default-gateway-a-default-routes/
Question: 19
DRAG DROP
Drag and drop the HTTP methods from the left onto their generally accepted corresponding create,
read, update, and delete operations on the right.
Answer:
Questions & Answers PDF P-12
Reference:
https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/application-policy-
infrastructure-controller-enterprise-module/1-2-x/config-guide/b_apic-em_config_guide_v_1-2-
x/b_apic-em_config_guide_v_1-2-x_chapter_01001.pdf
OR
Answer :
Post
Get
Put
Delete
Question: 20
Which two descriptions can be given to an application that is interacting with a webhook? (Choose
two.)
A. Processor
B. Codec
C. Listener
D. Receiver
Questions & Answers PDF P-13
E. Transaction monitor
Answer: CD
Question: 21
Which action resolves a 401 error in response to an HTTP GET that is issued to retrieve statement
using RESTCONF on a CSR 1000V?
Answer: D
Question: 22
Answer: E
Question: 23
What is the Git command to delete a local branch named “experiment” without a warning?
Questions & Answers PDF P-14
Answer: D
Reference:
https://www.atlassian.com/git/tutorials/using-branches
Question: 24
A. 23
B. 443
C. 822
D. 830
Answer: D
Question: 25
Answer: BC
Question: 26
An automation script fails to connect to an internal server exactly 1 out of 2 times it is executed. This
behavior is seen from different clients. Which networking device mut be at fault?
Answer: D
Question: 27
Questions & Answers PDF P-15
Fill in the blanks to complete the cURL command that invokes a RESTful API to retrieve a resource in
JSON format using OAuth.
Answer:
Reference:
https://webcache.googleusercontent.com/search?q=cache:Se6d2trvMsEJ:https://blogs.cisco.com/d
eveloper/security-api-best-practices+&cd=4&hl=en&ct=clnk&gl=pk&client=firefox-b-d
Question: 28
A. TAC support
B. Bitbucket
C. Sandbox
D. Software research
E. API Documentation
Answer: CE
Reference:
https://developer.cisco.com/
Question: 29
A. Virtual
B. Bare metal systems
C. Containers
D. Applications
Answer: C
Question: 30
Questions & Answers PDF P-16
Answer: B
Question: 31
DRAG DROP
Refer to the exhibit.
Drag and drop the descriptors from the left onto the correct parts of the API request and response on
the right.
Questions & Answers PDF P-17
Answer:
Question: 32
A. The script waits until input is entered. If the directory exists, the script goes into it until there is no
directory with the same name, then it creates a new directory.
B. The script goes into the directory called “$ndir” and makes a new directory called “$ndir”
C. The script waits unit input is entered, then it goes into the directory entered and creates a new
directory with the same name.
D. For all directories in the current folder. The script goes into directory and makes a new directory.
Answer: A
Question: 33
A. @@ -90,88 +20191008T1349@@
B. @@ -20191007T1200 +88,90 @@
C. @@ -20191007T1200 +20191008T1349@@
D. @@ -88,10 +88,6 @@
Answer: D
Reference:
https://unix.stackexchange.com/questions/252927/what-do-the-numbers-in-the-line-mean-in-
output-of-diff
Question: 34
A. JSON
B. XML
C. XHTML
D. Plain text
E. BER
Questions & Answers PDF P-19
Answer: AB
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-
xml/ios/prog/configuration/171/b_171_programmability_cg/model_driven_telemetry.html
Question: 35
In python, which expression checks whether the script returns a success status code when the
Requests library is used?
A. response.status_code== requests.ok
B. response.status_code== requests.codes.ok
C. response.code== requests.codes.ok
D. response.status_code ! == requests.codes.ok
Answer: B
Reference:
https://realpython.com/python-requests/
Question: 36
Answer: D
Question: 37
Answer: A
Reference:
https://www.atlassian.com/git/tutorials/setting-up-a-repository/git-clone
Question: 38
Answer: C
Question: 39
Questions & Answers PDF P-21
A. Static NAT
B. Normal NAT
C. Multicast NAT
D. Dynamic NAT
E. Router NAT
Answer: AD
Reference:
https://www.dummies.com/programming/networking/cisco/types-of-network-address-translation/
Question: 40
A. List
B. Json
C. Map
D. Dict
Answer: D
Reference:
Questions & Answers PDF P-22
https://stackoverflow.com/questions/34764979/loading-python-string-with-u-as-
json?noredirect=1&lq=1
Question: 41
Which device is a system that monitors and controls incoming and outgoing network traffic based on
predetermined security rules?
A. Switch
B. Router
C. Firewall
D. Load balancer
Answer: C
Question: 42
DRAG DROP
Drag and drop the element of the Finesse API on the left onto the description of its functionally on
the right.
Answer:
Questions & Answers PDF P-23
Question: 43
A. easier to patch because Docker containers include only dependencies that the application requires
B. prevents information leakage that can occur when unhandled exceptions are returned in HTTP
responses
C. allows for separation of application that traditionally run in the same host
D. natively secures access to secrets that are used by the running application
E. guarantees container images are secured and free of vulnerabilities
Answer: AC
Question: 44
Given the API documentation for the UCS SDK python class, UcsHandle, which code snippet creates a
handle instance?
Questions & Answers PDF P-24
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Question: 45
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Question: 46
Which Cisco DevNet resource allows access to products in a development lab to explore, learn, and
build application that use Cisco APLs?
A. DevNet communities
B. DevNet code Exchange
Questions & Answers PDF P-27
Answer: D
Reference:
https://developer.cisco.com/site/sandbox/
Question: 47
Which two statements are true about Cisco UCS manager, Cisco Intersight APIs? (Choose two.)
A. Cisco Intersight API interactions can be encoded in XML or JSON and require an APIs key in the
HTTP header for authentication.
B. USC Director API interactions can be XML- or JSON-encoded and require an APLs key in the HTTP
header for authentication.
C. UCS manager API interactions are XML-encoded and require a cookie in the method for
authentication.
D. Cisco Intersight uses XML to encoded API interactions and requires an API key pair for
authentication.
E. UCS manager uses JSON to encode API interactions and utilizes Base64-encoded credentials in the
HTTP header for authentication.
Answer: BC
Reference:
https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/ucs-director/rest-api-getting-
started-guide/6-5/cisco-ucs-director-REST-API-getting-started-65.html
https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/sw/api/b_ucs_api_book.pdf
Question: 48
A developer is writing an application that a REST API and the application requires a valid from the API
which element of the response is used in the conditional check?
A. URL
B. Status code
C. Link
D. Body
E. Headers
Answer: B
Question: 49
What are two characteristics of Bare Metal environments that are related to application
deployment? (Choose two.)
Questions & Answers PDF P-28
Answer: CD
Question: 50
Fill in the blank to complete the query parameter and value so that the result set is returned in
reverse chronological order (most recent first) based on when message were entered.
Answer:
?sortBy=lastactivity
Questions & Answers PDF P-29
Explanation:
Question: 51
Which task is performed because the test-driven development approach is being used?
Answer: B
Question: 52
Answer:
Explanation:
Solution as below
Questions & Answers PDF P-30
Reference:
https://developer.cisco.com/docs/apic-em/#!hello-world
Question: 53
Which two statements describe the traits of an asynchronous API call? (Choose two.)
Answer: BE
Question: 54
A function my_func() returns True when it executes normally. Which python snippet tests my_func()?
A. Option A
B. Option B
C. Option C
Questions & Answers PDF P-31
D. Option D
Answer: B
Question: 55
When using the Bash shell, how it the output of the devnet command saved to a tile named
“output.txt”?
Answer: B
Reference:
https://askubuntu.com/questions/420981/how-do-i-save-terminal-output-to-a-file
Question: 56
When a Cisco IOS XE networking device is configured using RESTCONF, what is the default data-
encoding method?
A. XML
B. x-form-encoding
C. YANG
D. YAML
Answer: A
Question: 57
A. domain name
B. IP address
C. workstation name
D. MAC address
Answer: D
Question: 58
Given the API documentation for the UCS SDK python class, UcsHandle, which code snippet creates a
handle instance?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Question: 59
Questions & Answers PDF P-33
Which REST architectural constraint indicates that no client context should be stored on the server
between requests?
A. stateless
B. uniform interface
C. cacheable
D. client-server
Answer: A
Reference:
https://developer.cisco.com/docs/nx-os/#!representational-state-transfer-rest
Question: 60
An application calls a REST API and expects a result set of more than 550 records, but each time the
call is made, only 25 are returned. Which feature limits the amount of data that is returned by the
API?
A. pagination
B. payload limit
C. rate limiting
D. service timeouts
Answer: A
Question: 61
DRAG DROP
Drag and drop the network automation interfaces from the left onto the transport protocols that
they support on the right.
Answer:
Questions & Answers PDF P-34
Explanation:
gRPC = C, NETCONF = A, RESTCONF = B, D
OR
Question: 62
A developer is troubleshooting an API with the given API with the given API documentation and cURL
command. What is the cause of this problem?
Answer: C
Question: 63
Answer: CE
Question: 64
Which two use cases are supported by Meraki APIs? (Choose two.)
Answer: BC
Question: 65
Package updates from a local server fail to download. However, the same updates work when a
much slower external repository is used. Way are local updates failing?
A. The update utility is trying to use a proxy to access the internal resource.
B. The Internet connection is too slow.
C. The Internet is down at the moment, which causes the local server to not be able to respond.
D. The server is running out of disk space.
Answer: A
Question: 66
Answer: A
Question: 67
What are two benefit of managing network configuration via APIs? (Choose two.)
Answer: CE
Question: 68
Which CI/CD tool is an automation tool used to build, test, and deploy software?
A. Nagios
B. Gradle
C. Jenkins
D. Git
Answer: C
Reference:
https://www.infoworld.com/article/3271126/what-is-cicd-continuous-integration-and-continuous-
delivery-explained.html
Question: 69
DRAG DROP
Drag and drop the descriptions from the left onto correct application deployment models on the
right.
Questions & Answers PDF P-38
Answer:
Question: 70
Which two statements describe the advantages of using a version control system? (Choose two.)
A. It allows for branching and merging so that different tasks are worked on in isolation before they
are merged into a feature or master branch.
B. It allows multiple engineers to work against the same code and configuration files and manage
differences and conflicts.
C. It provides tooling to automate application builds and infrastructure provisioning.
D. It allows developers to write effective unit tests.
E. It provides a system to track User Stories and allocate to backlogs.
Answer: AB
Question: 71
In DNS, which record specifies an alias that refers to another name that ultimately resolves to an IP
address?
Questions & Answers PDF P-39
A. AAA
B. SOA
C. NS
D. CNAME
Answer: D
Reference:
https://ns1.com/resources/dns-types-records-servers-and-queries
Question: 72
Answer:
devnet:Cisco123,
Basic
Explanation:
Solution as below
Question: 73
The definition of the YANG module and a RESTCONF query sent to a Cisco IOc XE device is shown.
Which statement is correct if the RESTCONF interface responds with a 204 status code?
D. The query updated the logging seventy level or created it if not present on the device.
Answer: D
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-
xml/ios/prog/configuration/1611/b_1611_programmability_cg/restconf_programmable_interface.h
tml
Question: 74
Which two NETCONF operations cover the RESTCONF GET operation? (Choose two.)
A. <get>
B. <edit>
C. <get-update>
D. <modify-config>
E. <get-config>
Answer: AE
Reference:
https://www.cisco.com/c/en/us/support/docs/storage-networking/management/200933-YANG-
NETCONF-Configuration-Validation.html
Question: 75
Answer: A
Reference:
https://www.cisco.com/c/en/us/products/cloud-systems-management/index.html
Question: 76
DRAG DROP
Refer to the exhibit.
Questions & Answers PDF P-41
Drag and drop the code from the left onto the item numbers on the right to complete to Meraki
python script shown in the exhibit.
Questions & Answers PDF P-42
Answer:
Question: 77
Which principle is a value from the manifesto for Agile software development?
Answer: D
Reference:
https://www.cisco.com/c/dam/global/en_hk/solutions/collaboration/files/agile_product_developm
ent.pdf
Question: 78
A. Finesse gadgets
B. Cisco Unified Communications manager
C. Webex devices
D. Webex teams
Answer: B
Question: 79
DRAG DROP
Drag and drop the Docker file instructions from the onto correct descriptions on the right. Not all
options are used.
Answer:
Questions & Answers PDF P-44
Question: 80
The output of a unified diff when comparing two versions of a python script is shown. Which two
“single_request _timeout ()”
Questions & Answers PDF P-45
OR
Questions & Answers PDF P-46
A. Option A
B. Option B
C. Option C
D. Option D
Answer: BC
Question: 81
Which two statements about JSON and XML are true? (Choose two.)
Answer: AD
Question: 82
A company has written a script that creates a log bundle from the Cisco DNA Center every day. The
script runs without error and the bundles are produced. However, when the script is run during
business hours, report poor voice quality of phones calls. What explains this behavior?
A. The application is running in the Voice VLAN and causes delays and jitter in the subnet.
B. The speed and duplex settings in Cisco DNA Center are sot incorrectly, which causes the transfer to
be too slow.
C. 9 The script is written in a low-level programming language where there is no memory safety. This
Questions & Answers PDF P-47
Answer: D
Question: 83
A. interface management
B. topology
C. BGP
D. OpenFlow
Answer: A
Question: 84
DRAG DROP
Drag and Drop the Bash commands from the left onto the correct actions on the right.
Questions & Answers PDF P-48
Answer:
Questions & Answers PDF P-49
Question: 85
A process on the host wants to access the service running inside this Docker container. Which port is
used to make a connection?
Answer: B
Question: 86
Questions & Answers PDF P-50
Which platform has an API that be used to obtain a list of vulnerable software on user devices?
A. Cisco Umbrella
B. Cisco Firepower
C. Cisco Identity Services Engine
D. Cisco Advanced Malware Protection
Answer: D
Question: 87
DRAG DROP
Drag and drop the functionalities from the left onto correct networking devices on the right.
Answer:
Reference:
https://geek-university.com/ccna/broadcast-domain-explained/
Question: 88
DRAG DROP
Questions & Answers PDF P-51
Drag and drop the variables from the left onto the item numbers on the right that match the missing
assignments in the exhibit.
Answer:
Reference:
https://medium.com/@fotios.floros/linux-backup-script-1722cc9c2bf6 (use tar in order to create
your backup file)
Question: 89
A. data plane
B. management plane
C. authentication plane
D. control plane
Answer: D
Reference:
Questions & Answers PDF P-52
https://tools.cisco.com/security/center/resources/understanding_cppr
Question: 90
Which type of HTTP method is used by the Meraki nad webex teams APIs to send webhook
notifications?
A. HTTP GET
B. HTTP PUT
C. HTTP HEAD
D. HTTP POST
Answer: D
Reference:
https://meraki.cisco.com/blog/tag/alerts/
Question: 91
Before which process is code review performed when version control is used?
A. committing code
B. branching code
C. merge of code
D. checkout of code
Answer: C
Question: 92
Answer:
Question: 93
Questions & Answers PDF P-53
Which two statements about the network diagram are true? (Choose two.)
Answer: BC
Questions & Answers PDF P-54
Question: 94
DRAG DROP
Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.
Answer:
Reference:
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/118217-
troubleshoot-wsa-00.html
Question: 95
A. Functions allow problems to be split into simpler, smaller groups, and reduce code repetition,
which makes the code easier to read.
B. Functions ensure that a developer understands the inner logic contained before using them as part
of a script or application.
C. Functions create the implementation of secret and encrypted algorithms.
D. Functions store mutable values within a script 01 application.
Questions & Answers PDF P-55
Answer: A
Question: 96
DRAG DROP
Drag and drop the requests from the left into the correct order on the right to create and check the
path trace between two devices using Cisco DNA center API.
Answer:
Question: 97
An administrator attempts to perform a GET using the Cisco IOS XE RESTOCNF API to return the
Questions & Answers PDF P-56
hostname of a device. The sequence diagram illustrated the HTTP message observed. Which change
to the API request resolves the issue?
Answer: B
Question: 98
A developer is reviewing a code that was written by a colleague. It runs fine, but there are many lines
of code to do a seemingly simple task repeatedly. Which action organizes the code?
Answer: B
Question: 99
The python interpreter and the Cisco python SDK are available by default in the Cisco NX-OS
software. The SDK documentation shows how the cild() API can be used when working with working
with JSON and XML. What are two effect of running the script? (Choose two.)
Answer: AC
Reference:
Questions & Answers PDF P-58
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/7-
x/programmability/guide/b_Cisco_Nexus_9000_Series_NX-
OS_Programmability_Guide_7x/Python_API.html
Question: 100
Which two statement describe the configuration of the Ansible script is run? (Choose two.)
Questions & Answers PDF P-59
Answer: BD
Question: 101
What are two advantages of the Model-view-controller software design pattern? (Choose two.)
Answer: BE
Question: 102
DRAG DROP
Refer to the exhibit.
Questions & Answers PDF P-60
Drag and drop the code from the left code from the left onto the item number on the right to
complete the Meraki code to obtain a list of client which have used this network.
Answer:
Questions & Answers PDF P-61
1 - d, 2 - f, 3 - b, 4 - h, 5 - i, 6 – j, 7 - g, 8 - a, 9 - c, 10 - e
Question: 103
Answer: A
Reference: https://blogs.cisco.com/networking/time-to-get-serious-about-edge-computing
Question: 104
Questions & Answers PDF P-62
A. CORBA
B. SSH
C. gNMI
D. SOAP
Answer: C
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-
xml/ios/prog/configuration/1610/b_1610_programmability_cg/gnmi_protocol.html
Question: 105
Drag and drop the network automation interfaces from the left onto the transport protocols that
they support on the right. (Not all Options are used)
Answer:
Explanation:
Grpc == http/2 , netconfig == ssh , restconfig == https
Question: 106
Questions & Answers PDF P-63
Answer:
request, headers , payload
Question: 107
Answer: B
Question: 108
What are two roles of an artifact repository in a CI/CD pipeline? (Choose two.)
Answer: CE
Question: 109
What are two advantages of YANG-based approaches for infrastructure automation? (Choose two.)
Answer: BC
Question: 110
Answer: C
Question: 111
DRAG DROP
Drag and drop the capability on the left onto the Cisco compute management platform that supports
the capability on the right.
Answer:
Questions & Answers PDF P-65
Question: 112
Answer: B
Question: 113
Which service provides a directory lookup for IP addresses and host names?
A. DNS
B. DHCP
C. SNMP
D. NAT
Answer: A
Question: 114
A small company has 5 servers and 50 clients. What are two reasons an engineer should spilt this
network into separate client and server subnets? (Choose two)
B. A router will limit the traffic types between the clients and servers.
C. Subnets will split domains to limit failures.
D. A router will bridge the traffic between clients and servers.
E. Subnets provide more IP address space for clients and servers.
Answer: AC
Question: 115
Which device is used to transport traffic from one broadcast domain to another broadcast domain?
A. load balancer
B. layer 2 switch
C. router
D. proxy server
Answer: C
Question: 116
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
https://tools.ietf.org/html/rfc7950#section-9.12
Question: 117
Answer: C
Question: 118
A 401 HTTP response code is returned when calling a REST API. What is the error state identified by
this response code?
A. The server cannot process the request as it has detected an issue in the request syntax or body.
B. The server accepted the request but the client is not authorized for this content.
C. The request has not been accepted because it requires authentication.
D. The server cannot find the requested resource because the path specified is incorrect.
Answer: C
Question: 119
Answer:
Is , $TARGET_DIR , mv
Explanation:
Check below the answer exact.
Question: 120
Users cannot access a webserver and after the traffic is captured. the capture tool shows an ICMP
packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?
Answer: A
Question: 121
DRAG DROP
Drag and drop the network automation interfaces from the left onto the transport protocols that
they support on the right. Not all options are used.
Questions & Answers PDF P-70
Answer:
Question: 122
Refer to Exhibit.
Questions & Answers PDF P-71
B)
Questions & Answers PDF P-72
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Question: 123
DRAG DROP
Drag and drop the function on the left onto the type of plane that handles the function on the right.
Questions & Answers PDF P-73
Answer:
Questions & Answers PDF P-74
Question: 124
Answer: C
Question: 125
Answer: D
Question: 126
What is used in Layer 2 switches to direct packet transmission to the intended recipient?
A. spanning tree
B. IPv4 address
C. IPv6 address
D. MAC address
Answer: D
Question: 127
Answer: A
Questions & Answers PDF P-75
Question: 128
Users cannot access a webserver and after the traffic is captured, the capture too* shows an ICMP
packet that reports "communication administratively prohibited" What Is the cause of this webserver
access Issue?
Answer: A
Question: 129
DRAG DROP
Drag and drop the Python code from the left onto the correct step on the right to call a REST API.
Answer:
Questions & Answers PDF P-76
Question: 130
How does requesting a synchronous API operation differ from requesting an asynchronous API
operation?
Answer: C
Question: 131
A Company is looking for cloud deployment which will use the on-premise infrastructure, is user self-
service, and easy to scale. Which cloud solution should be selected for these requirements?
Questions & Answers PDF P-77
A. multi
B. public
C. private
D. hybrid
Answer: C
Question: 132
Which HTTP status Code means that the server cannot or will not process the request because of
perceived client error?
A. 100
B. 203
C. 303
D. 400
Answer: D
Question: 133
DRAG DROP
Drag and Drop the GIT commands from the left onto the right that add modified local files to a
remote repository. Not all options are used
Answer:
Question: 134
What are the two purposes for using a VLAN in a network? (Choose two)
Answer: DE
Question: 135
A developer needs to prepare the file README.md in the working tree for the next commit operation
using Git. Which command needs to be used to accomplish this?
Answer: C
Question: 136
Which two query types does a client make to a DNS server? (Choose Two)
A. AAAA
B. ACK
C. DISCOVER
D. Inverse
E. PTR
Answer: AE
Question: 137
Answer: D
Question: 138
Answer: A
Question: 139
The JSON data in the exhibit has been parsed and stored in a variable, “data”. What returns the value
“172.16.0.11” ?
A. data['items'][O]['host']['value']
B. data['items']['1']['host']['value']
C. data['items']['host'][1]
D. data['items']['host']['value']
Answer: A
Question: 140
Which network device monitors incoming and outgoing traffic and decides whether to allow or block
specific traffic based on a defined set of rules?
A. switch
B. load balancer
C. reverse proxy
D. firewall
Answer: D
Question: 141
DRAG DROP
Refer to the exhibit.
Questions & Answers PDF P-80
Drag and Drop the code from the bottom onto the box where the code is missing on the Meraki
Python script to create a new network
Answer:
Questions & Answers PDF P-81
Question: 142
Which response status code is used by a RESTful interface to indicate successful execution of a
request?
A. 200
B. 404
C. 405
D. 500
Answer: A
Question: 143
Answer: C
Question: 144
What are the two principles of an infrastructure as code environment? (Choose two)
A. Complete complex systems must be able to be built from reusable infrastructure definitions.
B. Environments must be provisioned consistently using the same inputs.
Questions & Answers PDF P-82
Answer: AB
Question: 145
Fill in the blanks to complete the cURL command to the list of networks in the Meraki organization
with an id of 384279060
Answer:
organizations , 384279060 , networks
Explanation:
Solution below
Questions & Answers PDF P-83
Question: 146
A REST API service requires authentication based on the username and password. The user “john”
has the password “384279060” and the Base64 encoding of those credentials is
“am9objowMTIzNDU2Nzg=”. Which method completes an authentication request?
Answer: D
Question: 147
DRAG DROP
Drag and drop the characteristics from the left onto the corresponding software development
methodologies on the right?
Questions & Answers PDF P-84
Answer:
Question: 148
Which two protocols are used to apply a configuration change on a Cisco IOS XE device? (Choose
two)
A. CCX
B. RESTCONF
C. NETCONF
D. HSRP
E. CDP
Questions & Answers PDF P-85
Answer: BC
Question: 149
Answer: D
Question: 150
The project is migrated to a new codebase, the “old_project” directory must be deleted. The
directory has multiple read-only files, and it must be deleted recursively without prompting for
confirmation. Which bash command must be used?
A. rm -rf old_project
B. rm -r old_project
C. rmdir -p old_project
D. rmdir old_project
Answer: A
Question: 151
A. enforces the generation of all automation scripts through the modeling environment
B. provides a small learning curve and helps system administrators with limited coding experience
Questions & Answers PDF P-86
C. ensures that system administrators gain a good understanding of coding and expand their
experience and capabilities
D. enables a user to understand a declarative language to translate the model into an actionable
script
Answer: A
Question: 152
DRAG DROP
Drag and drop the code from the bottom onto the box where the code is missing in the Bash script to
complete the missing assignment.
Answer:
Question: 153
How does a synchronous API request differ from an asynchronous API request?
Answer: C