Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

200-901 Exam Dumps - DevNet Associate (DEVASC)

Go to page:
Question # 89

A developer is attempting to retrieve all the messages from a Cisco Webex space. The server responds by sending the first 1,000 messages. The developer must make additional requests to retrieve the rest of the messages. Which API constraint is described in this scenario?

A.

payload limiting

B.

throttling

C.

pagination

D.

rate limiting

Full Access
Question # 90

Refer to the exhibit.

A developer cannot reach the web application behind an NGINX load balancer. The developer sends a request to an application FQDN with cURL but gets an HTTP 502 response. Which action solves the problem?

A.

Fix errors in the server configuration, which is behind the load balancer.

B.

Bring up the load balancer to the active state.

C.

Fix errors in the cURL request sent by the client.

D.

Change the default gateway on the load balancer to an active one.

Full Access
Question # 91

An engineer must review and clean up a code repository. During the review, the engineer finds a file named config.json that contains API URLs, shared keys, and other application configurations. Which two methods, according to best practice, must be used to protect secrets? (Choose two.)

A.

Store in plaintext if they are not stored in a code repository.

B.

Store as plaintext when the server is secured physically.

C.

Never appear in plaintext at rest or in transit.

D.

Make them long, secure strings that include numbers with special characters.

E.

Always store in a secure vault.

Full Access
Question # 92

Which type of OWASP threat forges a malicious HTTP request into an application?

A.

Clickjacking

B.

SQL Injection

C.

CSRF

D.

XSS

Full Access
Question # 93

What is a benefit of organizing code into modules?

A.

better maintainability

B.

reduced development costs

C.

simplified development

D.

compatibility with REST APIs

Full Access
Question # 94

A developer starts to learn about building applications that use Cisco APIs. The developer needs access to Cisco security products in a development lab to test the first new Dlication that has been built. Which DevNet resource must be used?

A.

DevNet Code Exchange

B.

DevNet Automation Exchange

C.

DevNet Sandbox

D.

DevNet Communities

Full Access
Question # 95

Refer to the exhibit.

What is the function of the python script?

A.

Count and print the total number of available devices.

B.

Iterate over a list of network devices and write all device names and management IP addresses to an output file.

C.

Iterate over a list of network devices and write all device type and associated management IP address.

D.

For each device that is returned, display the device and, for each device, print the device name and management IP address.

E.

Loop through the returned list of network devices and, for each device, print the device name management IP address.

Full Access
Question # 96

A REST API service requires authentication based on the username and password. The user “john” has the password “384279060” and the Base64 encoding of those credentials is “am9objowMTIzNDU2Nzg=”. Which method completes an authentication request?

A.

The header must include:

Authorization: Bearer am9obJowMTlzNDU2Nzg=

B.

The payload must include:

Authorization: Bearer am9objowMTIzNDU2Nzg=

C.

The payload must include.

Authorization: Basic am9objowMTlzNDU2Nzg=

D.

The header must include:

Authorization: Basic am9objowMTlzNDU2Nzg=

Full Access
Go to page: