New 2020 DevNet 200-901 DEVASC exam questions from PassLeader 200-901 dumps! Welcome to download the newest PassLeader 200-901 VCE and PDF dumps: https://www.passleader.com/200-901.html (462 Q&As –> 496 Q&As –> 563 Q&As –> 589 Q&As –> 626 Q&As)
P.S. Free 2020 DevNet 200-901 DEVASC dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=1D7lFZ4X-yCdOKp2wlTgg_qjehjRvEwSs
NEW QUESTION 441
What is a benefit of version control?
A. prevents two users from working on the same file
B. keeps track of all changes to the files
C. prevents the sharing of files
D. keeps the list of data types used in the files
Answer: B
NEW QUESTION 442
What is a comparison of YAML and JSON?
A. YAML has a more consistent approach to representing data compared to JSON.
B. JSON does not support comments and YAML does.
C. YAML is a more verbose data structure compared to JSON.
D. JSON has more common usage in configuration management tools compared to YAML.
Answer: B
Explanation:
https://stackoverflow.com/questions/244777/can-comments-be-used-in-json
NEW QUESTION 443
A developer is attempting to retrieve all the messages from a Cisco Webex space. The server responds by sending the first 1,000 messages. The developer must make additional requests to retrieve the rest of the messages. Which API constraint is described in this scenario?
A. payload limiting
B. throttling
C. pagination
D. rate limiting
Answer: C
NEW QUESTION 444
A developer pushes an application to production. The application receives a webhook over HTTPS without a secret. The webhook information contains credentials to service in cleartext. When the information is received, it is stored in the database with an SHA-256 hash. Credentials to the database are accessed at runtime through the use of a vault service. While troubleshooting, the developer sets the logging to debug to view the message from the webhook. What is the security issue in this scenario?
A. Database credentials should be accessed by using environment variables defined at runtime.
B. During the transport of webhook messages, the credentials could be unencrypted and leaked.
C. During logging, debugging should be disabled for the webhook message.
D. Hashing the credentials in the database is not secure enough; the credentials should be encrypted.
Answer: B
NEW QUESTION 445
Which action do webhooks enable an application to perform?
A. Increase the request rate limit.
B. Populate the application with restricted data.
C. Receive real-time data.
D. Implement a push model.
Answer: D
NEW QUESTION 446
How are operations on REST APIs performed as compared to RPC APIs?
A. In a REST API, operations are performed on an object (node) that is identified by a URL, but RPC APIs are operation-oriented.
B. In a REST API, operations are performed on an external resource that is defined on the API, but the RCP APIs are resource-oriented.
C. In a REST API, operations are performed on a platform that is identified by the URL, but RPC APIs are platform-oriented.
D. In a REST API, operations are performed on an internal resource that is defined on the API, but RPC APIs are resource-oriented.
Answer: A
NEW QUESTION 447
Which HTTP error code series relates to redirection?
A. 400
B. 500
C. 200
D. 300
Answer: D
NEW QUESTION 448
Which Cisco platform provides organization-wide automation, security, policy enforcement, and agility across wired and wireless networks?
A. Cisco SD-WAN
B. Cisco DNA Center
C. Cisco ACI
D. Cisco Umbrella
Answer: B
NEW QUESTION 449
What is a characteristic of the Cisco Finesse platform?
A. Applications allow services to be invoked on a network triggered event.
B. The platform provides a ready-to-go platform for HD video and audio conferencing.
C. Applications are added to the platform from the desktop remotely.
D. The platform includes an enterprise-class IM engine.
Answer: C
NEW QUESTION 450
What is a benefit of using a code review process in application development?
A. accelerates the deployment of new features in an existing application
B. provides version control during code development
C. enables the quick deployment of new code
D. eliminates common mistakes during development
Answer: D
NEW QUESTION 451
Which OWASP threat takes advantage of a web application that the user has already authenticated to execute an attack?
A. phishing
B. DoS
C. brute force attack
D. CSRF
Answer: D
NEW QUESTION 452
What is a benefit of a distributed version control system?
A. encourages users to commit small places of work to the system more frequently
B. ensures that all code meets minimum standards before being committed to the system
C. allows users to work on the codebase even when not connected to the Internet
D. ensures that all code is tested before being committed to the system
Answer: C
NEW QUESTION 453
What is a procedural component of CI/CD pipelines?
A. Bundled artifacts must be generated.
B. Every test must pass for the pipeline to continue its execution.
C. Some tests fall without stopping the pipeline execution.
D. The release label that identifies the build is optional.
Answer: A
NEW QUESTION 454
Which OWASP threat occurs when untrusted data is supplied as input to an interpreter as part of a command or query?
A. broken authentication
B. data exposure
C. injection
D. cross-site scripting
Answer: C
NEW QUESTION 455
A business needs to create a simulated environment that mimics a production infrastructure to make changes to the OSPF process and analyze the impact. What should be used?
A. Cisco VIRL/Cisco CML
B. Cisco DevNet Sandbox Labs
C. pyATS
D. Puppet
Answer: A
NEW QUESTION 456
What is a benefit of a CI/CD pipeline for infrastructure?
A. removes manual errors
B. enables manual steps
C. removes the need for operations
D. provides variety for deployments
Answer: A
NEW QUESTION 457
During which step of the CI/CD pipeline for infrastructure automation is code from multiple developers combined to compile and test different components?
A. integration
B. deployment
C. development
D. testing
Answer: A
NEW QUESTION 458
Which two details are captured from the subnet mask? (Choose two.)
A. portion of an IP address that refers to the subnet
B. default gateway of the host
C. unique number ID assigned to the host
D. part of an IP address that refers to the host
E. network connection of a host or interface
Answer: AD
NEW QUESTION 459
Refer to the exhibit:
A developer can access the TLS REST API on server A, but cannot access the API on server B. The developer can ping server B. When the developer performs a packet capture on the TLS REST API port on server B, the capture shows that the packet arrived and the server responded. What causes the issue?
A. Port 80 is blocked on the outgoing interface of firewall B.
B. Port 443 is blocked on the outgoing interface of firewall A.
C. Port 443 is blocked on the incoming interface of firewall B.
D. Port 80 is blocked on the incoming interface of firewall A.
Answer: C
NEW QUESTION 460
Refer to the exhibit:
While developing a Cisco Webex bot, an application reaches the public IP address of the firewall, but traffic is forwarded to the IP address of server 1 instead of the IP address of server 2. What causes this issue?
A. The proxy server that rewrites traffic is misconfigured.
B. The router is sending the traffic to server 1 instead of server 2.
C. The switch is forwarding IP traffic to the wrong VLAN.
D. NAT is misconfigured on the firewall.
Answer: D
NEW QUESTION 461
Drag and Drop
Drag and drop the API characteristics from the left onto the categories on the right.
NEW QUESTION 462
……
New 2020 DevNet 200-901 DEVASC exam questions from PassLeader 200-901 dumps! Welcome to download the newest PassLeader 200-901 VCE and PDF dumps: https://www.passleader.com/200-901.html (462 Q&As –> 496 Q&As –> 563 Q&As –> 589 Q&As –> 626 Q&As)
P.S. Free 2020 DevNet 200-901 DEVASC dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=1D7lFZ4X-yCdOKp2wlTgg_qjehjRvEwSs