Jump to content
piyushjainji

Devnet Associate (DEVASC) 200-901 Demo questions

Recommended Posts

43 > security benefits of docker based app. 

 

shouldn't the answer be 1, allow seperation traditionally running on same host, and 2. Natively secures access to secrets that are used by runnng app. Check out the blog docker-secrets-management on docker dot com.

 

the option : easier to patch ... doesn't seem right because patches not necessarily be a security benefit everytime. 

 

Please comment. Are there any new questions in exam, i'm writing next week. 

  • Haha 1

Share this post


Link to post
Share on other sites
On 5/5/2020 at 1:09 AM, meaexperts said:

Hidden Content
  • to edit it later on

Q29 - Container (Container is the only platform can run directly on the hypervisor without OS)

 

Q31 - This is the correct sequence:
Request Headers   --> -H is the Header request
Request Payload   --> curl -d "payload"
HTTP Request      --> POST https is the HTTP Request
HTTP Response     --> OK is the Response
Response Headers  --> Content-Type is the Header Response
Response Payload  --> Payload

Q42 - This is the correct sequence:
Queue  --> (https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cust_contact/contact_center/icm_enterprise/icm_enterprise_11_5_1/User/Guide/ucce_b_reporting-concepts-for-ucce-11-5/ucce_b_reporting-concepts-for-ucce-11-5_chapter_0111.pdf)
SystemInfo
User
Team
Dialog
ClientLogs
Media
 
Q78 - Cisco Unified Communication Manager is the correct answer (CUMI API allows recalling of voicemails using API, also if it's PAI it means P-Asserted-Identity (PAI) in CUCM)
Q82 - Generating the logs causes the CPU on the network controller to spike
Q93 - The subnet of PC-C can contain 256 hosts (Note: PC-C can contain 256 hosts but 254 are usable hosts "192.168.3.255 is the broadcast"), One of the routers has two connected serial interfaces

 

Dear @freddyk1428

Please give us your answer on these questions, and pls mention the other new questions faced in your exam:

1. D&D with UCS Director, UCS Manager and Intersight - which does what
2. What bash commands used to rename all files in a folder to their SHA256 version
3. You have a network of 5 servers and 50 pc - why would you subnet ?

Q93

Which two statements about the network diagram are true? (Choose two.)
A. PC-A and PC-B are in the same subnet.
B. One of the routers has two connected serial interfaces.
C. The subnet of PC-C can contain 256 hosts. 

D. R1 and R3 are in the same subnet.
E. The subnet address of PC-B has 18 bits dedicated to the network portion.

 

Anyone can explain more on the answers B and C?

C may be right, 256 host IP address, and 254 useful host IP Address. 

 

Share this post


Link to post
Share on other sites
Just now, wunderup said:

Q56

I think that answer should be YANG.


Accept: application/yang-data+json

Hidden Content

    Give reaction to this post to see the hidden content.


 

YANG doesn't seems the right Answer. ITs a modelling method where as the actual encoding methods are XML/JSON/ etc. Therefore the xml should be right answer. 

  • Like 26
  • Thanks 12

Share this post


Link to post
Share on other sites

Question 97,

An administrator attempts to perform a GET using the Cisco IOS XE RESTOCNF API to return the
hostname of a device. The sequence diagram illustrated the HTTP message observed. Which change to
the API request resolves the issue?
A. Add Content-Type HTTP header with 'application/yang-data+json' using –H ‘Content-Type:
application/yang-data+json’.
B. Use -u cisco: cisco instead of -u ‘cisco: cisco'.
C. Change the request method from -X "GET” to- X’ POST”.
D. Remove the -H ’Accept: application/yang-data^/son’ HTTP header because it is not required.

 

I feel the answer is A,

Any feedbacl

  • Like 1

Share this post


Link to post
Share on other sites
32 minutes ago, trends said:

Hidden Content
  • Hidden Content

      Give reaction to this post to see the hidden content.

 

Latest 200-901 file

 

these aren't new.If you have the new questions please share. The new drag and drop for UCS manager/Director/Intersight. L3 Benefits over L2 network, and the renaming of files to respective SHA hash.

  • Like 3

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...