Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

200-901 Exam Dumps - DevNet Associate (DEVASC)

Go to page:
Question # 81

Which network device plane is responsible for handling QoS?

A.

management plane

B.

data plane

C.

configuration plane

D.

control plane

Full Access
Question # 82

What are two benefits of implementing common data structures when working with APIs in remote systems? (Choose two.)

A.

ensures that developers are limited to using one data schema type

B.

prevents multivendor interoperability

C.

improves security in RESTful web services

D.

enforces standardized data structures

E.

leverages code that is easily managed and reused

Full Access
Question # 83

Drag and drop the code from the bottom onto the box where the code is missing to obtain a list of network devices by using the Cisco Meraki API. Not all options are used.

Full Access
Question # 84

Refer to the exhibit. An engineer runs a network that consists of Cisco Nexus devices. The network is distributed between data centers in different locations. The switches are configured using standalone connections and a single point of failure. Which process is being automated by the Ansible playbook?

A.

enabling HSRP on the nxos_rtr inventory host

B.

enabling HSRP on the rtr-1a inventory host

C.

executing HSRP configuration from the Ansible controller node

D.

executing HSRP configuration from the srv-1a inventory host

Full Access
Question # 85

Drag and drop the capabilities from the left onto the Cisco Network Management Platforms that support the capabilities on the right.

Full Access
Question # 86

How do XML and JSON compare regarding functionality?

A.

XML provides more human readability than JSON.

B.

JSON natively supports arrays and XML does not natively support arrays.

C.

XML provides more support for mapping data structures into host languages than JSON.

D.

JSON provides less support for data types than XML.

Full Access
Question # 87

A developer attempts to refactor and improve the application code. It is noticed that the code contains several pieces of key information that could be a security threat if this code is accessible by those who are not

authorized to this data. Which approach addresses the security concerns noticed by the developer?

A.

Host the application code on a machine located in a secure data center.

B.

Utilize environment variables for username and password details.

C.

Rely on the security teams’ goodwill to not give access to those who do not need it.

D.

Move the hardware that the application is deployed on to a secure location.

Full Access
Question # 88

Which port does HTTPS use by default?

A.

433

B.

443

C.

803

D.

883

Full Access
Go to page: