Jump to content
piyushjainji

Devnet Associate (DEVASC) 200-901 Demo questions

Recommended Posts

43 > security benefits of docker based app. 

 

shouldn't the answer be 1, allow seperation traditionally running on same host, and 2. Natively secures access to secrets that are used by runnng app. Check out the blog docker-secrets-management on docker dot com.

 

the option : easier to patch ... doesn't seem right because patches not necessarily be a security benefit everytime. 

 

Please comment. Are there any new questions in exam, i'm writing next week. 

  • Haha 1

Share this post


Link to post
Share on other sites
On 5/5/2020 at 1:09 AM, meaexperts said:

Hidden Content
  • to edit it later on

Q29 - Container (Container is the only platform can run directly on the hypervisor without OS)

 

Q31 - This is the correct sequence:
Request Headers   --> -H is the Header request
Request Payload   --> curl -d "payload"
HTTP Request      --> POST https is the HTTP Request
HTTP Response     --> OK is the Response
Response Headers  --> Content-Type is the Header Response
Response Payload  --> Payload

Q42 - This is the correct sequence:
Queue  --> (https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cust_contact/contact_center/icm_enterprise/icm_enterprise_11_5_1/User/Guide/ucce_b_reporting-concepts-for-ucce-11-5/ucce_b_reporting-concepts-for-ucce-11-5_chapter_0111.pdf)
SystemInfo
User
Team
Dialog
ClientLogs
Media
 
Q78 - Cisco Unified Communication Manager is the correct answer (CUMI API allows recalling of voicemails using API, also if it's PAI it means P-Asserted-Identity (PAI) in CUCM)
Q82 - Generating the logs causes the CPU on the network controller to spike
Q93 - The subnet of PC-C can contain 256 hosts (Note: PC-C can contain 256 hosts but 254 are usable hosts "192.168.3.255 is the broadcast"), One of the routers has two connected serial interfaces

 

Dear @freddyk1428

Please give us your answer on these questions, and pls mention the other new questions faced in your exam:

1. D&D with UCS Director, UCS Manager and Intersight - which does what
2. What bash commands used to rename all files in a folder to their SHA256 version
3. You have a network of 5 servers and 50 pc - why would you subnet ?

Q42

User - Represents an Agent, Supervisor or Administrator
Dialog – Represents a call and the participants if the Media Type is voice
Media - Represents a user's state in a non-voice Media Routing Domain (MRD) for CCE deployments
Queue - Represents a queue (or skill group in Unified CCE)
Team – Represents a team of Users
SystemInfo - Represents current state of the system
ClientLogs – For sending client-side logging to the Finesse Server

We can know more from this link.

Hidden Content

    Give reaction to this post to see the hidden content.

 

 

 

  • Like 29
  • Thanks 10
  • Confused 1

Share this post


Link to post
Share on other sites
On 5/5/2020 at 1:09 AM, meaexperts said:

Hidden Content
  • to edit it later on

Q29 - Container (Container is the only platform can run directly on the hypervisor without OS)

 

Q31 - This is the correct sequence:
Request Headers   --> -H is the Header request
Request Payload   --> curl -d "payload"
HTTP Request      --> POST https is the HTTP Request
HTTP Response     --> OK is the Response
Response Headers  --> Content-Type is the Header Response
Response Payload  --> Payload

Q42 - This is the correct sequence:
Queue  --> (https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cust_contact/contact_center/icm_enterprise/icm_enterprise_11_5_1/User/Guide/ucce_b_reporting-concepts-for-ucce-11-5/ucce_b_reporting-concepts-for-ucce-11-5_chapter_0111.pdf)
SystemInfo
User
Team
Dialog
ClientLogs
Media
 
Q78 - Cisco Unified Communication Manager is the correct answer (CUMI API allows recalling of voicemails using API, also if it's PAI it means P-Asserted-Identity (PAI) in CUCM)
Q82 - Generating the logs causes the CPU on the network controller to spike
Q93 - The subnet of PC-C can contain 256 hosts (Note: PC-C can contain 256 hosts but 254 are usable hosts "192.168.3.255 is the broadcast"), One of the routers has two connected serial interfaces

 

Dear @freddyk1428

Please give us your answer on these questions, and pls mention the other new questions faced in your exam:

1. D&D with UCS Director, UCS Manager and Intersight - which does what
2. What bash commands used to rename all files in a folder to their SHA256 version
3. You have a network of 5 servers and 50 pc - why would you subnet ?

Q93

Which two statements about the network diagram are true? (Choose two.)
A. PC-A and PC-B are in the same subnet.
B. One of the routers has two connected serial interfaces.
C. The subnet of PC-C can contain 256 hosts. 

D. R1 and R3 are in the same subnet.
E. The subnet address of PC-B has 18 bits dedicated to the network portion.

 

Anyone can explain more on the answers B and C?

C may be right, 256 host IP address, and 254 useful host IP Address. 

 

Share this post


Link to post
Share on other sites
On 5/5/2020 at 5:06 AM, jnlee said:

Q64. I think Ans is A and C

A - Retrieve live streams from a Meraki Camera (MV Sensors allows lives streaming of cameras)

C- Dashboard API

B - Seems not correct because Captive Portal is not only for mobile App

Hidden Content

    Give reaction to this post to see the hidden content.

Which two use cases are supported by Meraki APIs? (Choose two.)
A. Retrieve live streams from a Meraki Camera.
B. Build a custom Captive Portal for Mobile Apps.
C. Configure network devices via the Dashboard API.
D. Build location-aware apps from Wi-Fi and LoRaWAN devices. 
E. Deploy applications onto the devices.

A: i think it can not.
From Meraki>API>MV Sense API, i do not find related API for live stream.

Hidden Content

    Give reaction to this post to see the hidden content.

B: correct

Hidden Content

    Give reaction to this post to see the hidden content.

😄 wrong
dashboard API can not configure network device, but can get network device

Hidden Content

    Give reaction to this post to see the hidden content.

😧 correct

Hidden Content

    Give reaction to this post to see the hidden content.

E: wrong
 

  • Like 33
  • Thanks 8
  • Confused 1

Share this post


Link to post
Share on other sites
15 hours ago, ieeu said:

43 > security benefits of docker based app. 

 

shouldn't the answer be 1, allow seperation traditionally running on same host, and 2. Natively secures access to secrets that are used by runnng app. Check out the blog docker-secrets-management on docker dot com.

 

the option : easier to patch ... doesn't seem right because patches not necessarily be a security benefit everytime. 

 

Please comment. Are there any new questions in exam, i'm writing next week. 

maybe, you are wrong. 


The Degree of Isolation of Application Containers
Locking Down and Patching Containers

Hidden Content

    Give reaction to this post to see the hidden content.

  • Like 22
  • Thanks 7

Share this post


Link to post
Share on other sites
Posted (edited)

Q44

Given the API documentation for the UCS SDK Python class, Ucsl-landle, which code snippet creates a handle instance?

Option B is wrong. 

secure = 1, according to definition, secure is BOOL: True or False. 

So , i think correct answer should be A or C.

But, cisco live pdf shared  us that A is correct. 

Hidden Content

    Give reaction to this post to see the hidden content.

 

 

Hidden Content

    Give reaction to this post to see the hidden content.

Edited by wunderup
  • Like 27
  • Thanks 6
  • Confused 1

Share this post


Link to post
Share on other sites

Q54

I think that correct answer is C(assertRaise).

The crux of each test is a call to assertEqual() to check for an expected result; assertTrue() or assertFalse() to verify a condition; or assertRaises() to verify that a specific exception gets raised. These methods are used instead of the assert statement so the test runner can accumulate all test results and produce a report.

Hidden Content

    Give reaction to this post to see the hidden content.

  • Like 20
  • Thanks 7

Share this post


Link to post
Share on other sites

Q56

I think that answer should be YANG.


Accept: application/yang-data+json

Hidden Content

    Give reaction to this post to see the hidden content.


 

  • Like 17
  • Thanks 5
  • Confused 1

Share this post


Link to post
Share on other sites
Just now, wunderup said:

Q56

I think that answer should be YANG.


Accept: application/yang-data+json

Hidden Content

    Give reaction to this post to see the hidden content.


 

YANG doesn't seems the right Answer. ITs a modelling method where as the actual encoding methods are XML/JSON/ etc. Therefore the xml should be right answer. 

  • Like 12
  • Thanks 4

Share this post


Link to post
Share on other sites
1 hour ago, ieeu said:

YANG doesn't seems the right Answer. ITs a modelling method where as the actual encoding methods are XML/JSON/ etc. Therefore the xml should be right answer. 

you are right.

Actually, how to understand data-encoding method.

According to rfc 8040, it defined 2 data encoding.

 

Hidden Content

    Give reaction to this post to see the hidden content.

  • Like 16
  • Thanks 4
  • Confused 1

Share this post


Link to post
Share on other sites

Question 97,

An administrator attempts to perform a GET using the Cisco IOS XE RESTOCNF API to return the
hostname of a device. The sequence diagram illustrated the HTTP message observed. Which change to
the API request resolves the issue?
A. Add Content-Type HTTP header with 'application/yang-data+json' using –H ‘Content-Type:
application/yang-data+json’.
B. Use -u cisco: cisco instead of -u ‘cisco: cisco'.
C. Change the request method from -X "GET” to- X’ POST”.
D. Remove the -H ’Accept: application/yang-data^/son’ HTTP header because it is not required.

 

I feel the answer is A,

Any feedbacl

Share this post


Link to post
Share on other sites
32 minutes ago, trends said:

Hidden Content
  • Hidden Content

      Give reaction to this post to see the hidden content.

 

Latest 200-901 file

 

these aren't new.If you have the new questions please share. The new drag and drop for UCS manager/Director/Intersight. L3 Benefits over L2 network, and the renaming of files to respective SHA hash.

  • Like 2

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...