DevNet Associate (DEVASC) v1.0 (200-901)

Page:    1 / 35   
Total 528 questions

Which HTTP response code should be returned when the request is completed, but there is no content to send for the request?

  • A. 100
  • B. 204
  • C. 302
  • D. 402


Answer : B

Reference:
https://developer.mozilla.org/en-US/docs/Web/HTTP/Status#successful_responses


Refer to the exhibit. Which data is specified in the response header?

  • A. Content-Type
  • B. HTTP/1.1 200 OK
  • C. ג€typeג€: ג€switchג€
  • D. { ג€idג€: ג€a123456bcdeג€, HTTP/1.1 200 OK ג€statusג€: ג€onlineג€, ג€typeג€: ג€switchג€ }


Answer : A

What are two use cases where webhooks are effective? (Choose two.)

  • A. Filter out information from a response to an API call.
  • B. Close a session with a web server after a specific amount of time.
  • C. Inform a previously defined chat channel after a deployment fails.
  • D. Send an email to a customer of an online store after payment is complete.
  • E. Change the response format or content type of an API call.


Answer : BD

In which two ways is an application characterized when interacting with a webhook? (Choose two.)

  • A. receiver
  • B. transaction monitor
  • C. codec
  • D. processor
  • E. listener


Answer : AE

How does requesting a synchronous API operation differ from requesting an asynchronous API operation?

  • A. clients receive responses with a task ID for further processing
  • B. clients subscribe to a webhook for operation results
  • C. clients poll for the status of the execution of operations
  • D. clients can access the results immediately


Answer : D

DRAG DROP -
Drag and drop the HTTP status codes from the left onto the correct descriptions on the right.
Select and Place:



Answer :

Reference:
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/118217-troubleshoot-wsa-00.html

Which method should be used to safely store the API keys?

  • A. in an environment variable unique to the system database
  • B. encrypted in a configuration file that is separate from the code
  • C. plain text in the code as a constant
  • D. encrypted in the code in a function


Answer : A

FILL BLANK -
Fill in the blanks to complete the statement.
Given a username of `devnet` and a password of `cisco123`, applications must create a base64 encoding of the string `________________` when sending HTTP requests to an API that uses _______________ authentication.



Answer : See explanation below.

YWRtaW46Y2lzY28xMjM -

Basic -
Reference:
https://www.cisco.com/c/en/us/td/docs/net_mgmt/elastic_services_controller/4-1/install/guide/Cisco-Elastic-Services-Controller-Install-Upgrade-Guide-
4-1/Cisco-Elastic-Services-Controller-Install-Upgrade-Guide-3-0_chapter_01011.html

Refer to the exhibit.

An administrator attempts to perform a GET using the Cisco IOS XE RESTCONF API to return the hostname of a device. The sequence diagram illustrates the
HTTP messages observed. Which change to the API request resolves the issue?

  • A. Remove the ג€"H ג€˜Accept: application/yang-data+jsonג€™ HTTP header because it is not required.
  • B. Add ג€"ג€˜u cisco:ciscoג€™ in the end of the cURL command
  • C. Change the request method from ג€"X ג€GETג€ to ג€"X ג€POSTג€
  • D. Add Content-Type HTTP header with ג€˜application/yang-data+jsonג€™ using ג€"H ג€˜Content-Type: application/yang-data+jsonג€™


Answer : B

What are two benefits of managing network configuration via APIs? (Choose two.)

  • A. more security due to locking out manual device configuration
  • B. configuration on devices becomes less complex
  • C. eliminates the need of legacy management protocols like SNMP
  • D. reduction in network changes performed manually
  • E. increased scalability and consistency of network changes


Answer : DE

FILL BLANK -
Fill in the blanks to complete the cURL command that invokes a RESTful API to retrieve a resource in JSON format using OAuth. curl `"X ____________ -H ` __________: application/json` \
-H ` _______: Bearer AbCdEf123456` https://localhost/api/myresource



Answer : See explanation below.

GET -

Accept -

Authorization -
Reference:
https://webcache.googleusercontent.com/search?q=cache:Se6d2trvMsEJ:https://blogs.cisco.com/developer/security-api-best-practices
+&cd=4&hl=en&ct=clnk&gl=pk&client=firefox-b-d

Which Cisco DevNet resource allows access to products in a development lab to explore, learn, and build applications that use Cisco APIs?

  • A. DevNet Code Exchange
  • B. DevNet Sandbox
  • C. DevNet Communities
  • D. DevNet Automation Exchange


Answer : B

Reference:
https://developer.cisco.com/site/sandbox/

Refer to the exhibits.


A developer is troubleshooting an API with the given API documentation and cURL command. What is the cause of this problem?

  • A. The authorization header is missing or incomplete.
  • B. The request body is missing or incomplete.
  • C. The API token specified is expired.
  • D. The user is not allowed to post messages from their account.


Answer : A

Which two statements describe the traits of an asynchronous API call? (Choose two.)

  • A. Code execution blocks or waits for the call to an API to return.
  • B. A callback function typically is used to process the response from an API call.
  • C. A call to an API does not block the code, but rather it allows application processing to continue.
  • D. The end user can experience latency or performance lag while waiting for the API call to return.
  • E. The order in which API calls return can be guaranteed.


Answer : BC

Reference:
https://medium.com/codebuddies/getting-to-know-asynchronous-javascript-callbacks-promises-and-async-await-17e0673281ee

Which mechanism is used to consume a RESTful API design when large amounts of data are returned?

  • A. data sets
  • B. scrolling
  • C. pagination
  • D. blobs


Answer : C

Reference:
https://nordicapis.com/everything-you-need-to-know-about-api-pagination/

Page:    1 / 35   
Total 528 questions