New Year Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

200-901 Questions and Answers

Question # 6

A REST API service requires authentication based on the username and password. The user “john” has the password “384279060” and the Base64 encoding of those credentials is “am9objowMTIzNDU2Nzg=”. Which method completes an authentication request?

A.

The header must include:

Authorization: Bearer am9obJowMTlzNDU2Nzg=

B.

The payload must include:

Authorization: Bearer am9objowMTIzNDU2Nzg=

C.

The payload must include.

Authorization: Basic am9objowMTlzNDU2Nzg=

D.

The header must include:

Authorization: Basic am9objowMTlzNDU2Nzg=

Full Access
Question # 7

Which configuration management tool has an agentless capability?

A.

Chef

B.

Puppet

C.

Ansible

D.

CFEngine

Full Access
Question # 8

Refer to the exhibit.

The documentation outlines how to use credentials for the AMP API Which script successfully performs an API call using basic authentication?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 9

Drag and drop the element of the Finesse API on the left onto the description of its functionally on the right.

Full Access
Question # 10

What are two considerations when selecting the "best route" for a network device to reach its destination? (Choose two.)

A.

MAC address

B.

metrics

C.

administrative distance

D.

IP address

E.

subnet mask

Full Access
Question # 11

What is a difference between a synchronous API and an asynchronous API?

A.

An asynchronous API can make offline calls while synchronous APIs do not have this capability.

B.

Synchronous API calls are returned immediately while asynchronous calls do not guarantee an immediate response.

C.

Synchronous API calls require an authentication header to be sent while asynchronous calls do not require authentication.

D.

An asynchronous API can make a larger number of calls in a specified time period than a synchronous API.

Full Access
Question # 12

Refer to the exhibit.

The definition of the YANG module and a RESTCONF query sent to a Cisco IOc XE device is shown. Which statement is correct if the RESTCONF interface responds with a 204 status code?

A.

The query failed at retrieving the logging seventy level.

B.

The query failed to set the logging seventy level due to an invalid path.

C.

The query retrieved the logging seventy level.

D.

The query updated the logging seventy level or created it if not present on the device.

Full Access
Question # 13

Refer to the exhibit.

The JSON data in the exhibit has been parsed and stored in a variable, “data”. What returns the value “172.16.0.11” ?

A.

data['items'][0]['host']['value']

B.

data['items']['1']['host']['value']

C.

data['items']['host'][1]

D.

data['items']['host']['value']

Full Access
Question # 14

Fill in the blanks to complete the Python script to update the Webex Teams membership of a room using the Python requests library import requests

Full Access
Question # 15

A 401 HTTP response code is returned when calling a REST API. What is the error state identified by this response code?

A.

The server cannot process the request as it has detected an issue in the request syntax or body.

B.

The server accepted the request but the client is not authorized for this content.

C.

The request has not been accepted because it requires authentication.

D.

The server cannot find the requested resource because the path specified is incorrect.

Full Access
Question # 16

A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without error and the bundles are produced. However, when the script is run during business hours, report poor voice quality of phones calls. What explains this behavior?

A.

The application is running in the Voice VLAN and causes delays and jitter in the subnet.

B.

The speed and duplex settings in Cisco DNA Center are sot incorrectly, which causes the transfer to be too slow.

C.

9 The script is written in a low-level programming language where there is no memory safety. This causes a buffer overflow and disruption on the network.

D.

Generating the logs causes the CPU on the network controller to spike, which causes delays m forwarding the voice IP packets.

Full Access
Question # 17

What operation is performed with YANG model-driven programmability in NX-OS?

A.

configure a device with native and OpenConfig-based models

B.

send CLI commands to a device and retrieve output in JSON format

C.

run Linux commands natively on the device

D.

bootstrap a device that has a factory-default configuration

Full Access
Question # 18

Refer to Exhibit.

Which JSON is equivalent to the XML-encoded data.

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 19

Drag and drop the characteristics from the left onto the corresponding software development methodologies on the right?

Full Access
Question # 20

What is the function of IP address in networking?

A.

specifies the type of traffic that is allowed to roam on a network

B.

represents the unique ID that is assigned to one host on a network

C.

specifies resource's location and the mechanism to retrieve it

D.

represents a network connection on specific devices

Full Access
Question # 21

Refer to the exhibit.

What caused the error in this API request?

A.

The API resource does not support the POST operation.

B.

The API resource does not support JSON format payloads.

C.

The submitted JSON payload includes a field that is not supported by the API resources.

D.

The submitted JSON payload has a formatting issue.

Full Access
Question # 22

Which platform is run directly using a hypervisor?

A.

Virtual

B.

Bare metal systems

C.

Containers

D.

Applications

Full Access
Question # 23

What are two roles of an artifact repository in a CI/CD pipeline? (Choose two.)

A.

is required for CI/CD pipelines executed on a public cloud infrastructure

B.

is required for managing open source software

C.

stores files needed and generated during the build process

D.

allows for comparing and merging changes in the source code

E.

provides traceability, search, and management of binary files

Full Access
Question # 24

Refer to the exhibit.

Drag and drop the code from the left onto the item numbers on the right to complete to Meraki python script shown in the exhibit.

Full Access
Question # 25

Drag and drop the HTTP methods from the left onto their generally accepted corresponding create, read, update, and delete operations on the right.

Full Access
Question # 26

A developer is trying to retrieve data over a REST API. The API server responds with an HTTP client error response code. After investigating the response the developer realizes the realizes the response has a Retry-After header. What is the root cause of this error?

A.

The REST service is unreachable at the time of the REST request

B.

Too many requests were sent to the REST service in a given amount of time.

C.

An appliance limited the rate of requests to the transport layer.

D.

An appliance limited the rate of requests to the application layer

Full Access
Question # 27

Which two descriptions can be given to an application that is interacting with a webhook? (Choose two.)

A.

Processor

B.

Codec

C.

Listener

D.

Receiver

E.

Transaction monitor

Full Access
Question # 28

Users cannot access a webserver and after the traffic is captured, the capture too* shows an ICMP packet that reports "communication administratively prohibited" What Is the cause of this webserver access Issue?

A.

An access list along the path is blocking the traffic

B.

The traffic is not allowed to be translated with NAT and dropped.

C.

Users must authenticate on the webserver to access It

D.

A router along the path is overloaded and thus dropping traffic

Full Access
Question # 29

Refer to the exhibit.

What is the effect of this Ansible playbook on an IOS router?

A.

A new running configuration is pushed to the IOS router.

B.

The current running configuration of the IOS router is backed up.

C.

The start-up configuration of the IOS router is copied to a local folder.

D.

A new start-up configuration is copied to the IOS router.

Full Access
Question # 30

What are two use cause where webhooks are effective? (Choose two.)

A.

Close a session with a web server after a specific amount of time.

B.

Filter out information from a response to an API call

C.

Change the response format or content type of an API call.

D.

Inform a previously defined chat channel after a deployment fate.

E.

Send an email to a customer of an online store after payment is complete

Full Access
Question # 31

Fill in the blanks to complete the Bash script in which each file in a directory is renamed to Its SHA256 hash?

Full Access
Question # 32

Which protocol runs over TCP port 22?

A.

SSH

B.

HTTP

C.

Telnet

D.

NETCONF

Full Access
Question # 33

Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?

A.

100

B.

204

C.

302

D.

402

Full Access