New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco Cisco Certified DevNet Associate 200-901 Questions and answers with CertsForce

Viewing page 6 out of 15 pages
Viewing questions 51-60 out of questions
Questions # 51:

What is a capability of Cisco Webex?

Options:

A.

Join preconfigured or new spaces with fixed user rights.


B.

Configure devices at scale via automation scripts or by manual execution.


C.

Initiate or respond to calls automatically via automation.


D.

Get space history or notified in real time when new messages are posted.


Expert Solution
Questions # 52:

Which two commands download and execute an Apache web server container in Docker with a port binding 8080 in the container to 80 on the host? (Choose two.)

Options:

A.

docker pull apache


B.

docker run -p 8080:80 httpd


C.

docker run -p 80:8080 httpd


D.

docker pull httpd


E.

docker pull https


Expert Solution
Questions # 53:

Refer to the exhibit.

Question # 53

A developer cannot reach the web application behind an NGINX load balancer. The developer sends a request to an application FQDN with cURL but gets an HTTP 502 response. Which action solves the problem?

Options:

A.

Fix errors in the server configuration, which is behind the load balancer.


B.

Bring up the load balancer to the active state.


C.

Fix errors in the cURL request sent by the client.


D.

Change the default gateway on the load balancer to an active one.


Expert Solution
Questions # 54:

In which way do webhooks notify a client about server or application changes by default?

Options:

A.

Asynchronously


B.

Periodically


C.

In real time


D.

Synchronously


Expert Solution
Questions # 55:

An engineer must review and clean up a code repository. During the review, the engineer finds a file named config.json that contains API URLs, shared keys, and other application configurations. Which two methods, according to best practice, must be used to protect secrets? (Choose two.)

Options:

A.

Store in plaintext if they are not stored in a code repository.


B.

Store as plaintext when the server is secured physically.


C.

Never appear in plaintext at rest or in transit.


D.

Make them long, secure strings that include numbers with special characters.


E.

Always store in a secure vault.


Expert Solution
Questions # 56:

Which protocol is used for clock synchronization between network devices?

Options:

A.

FTP


B.

NNTP


C.

BGP


D.

NTP


Expert Solution
Questions # 57:

Which solution reduces costs from MPLS, improves application performance, and simplifies operations?

Options:

A.

Cisco NSO


B.

Cisco SD-WAN


C.

Cisco ACI


D.

Cisco DNA Center


Expert Solution
Questions # 58:

Which OWASP threat takes advantage of a web application that the user has already authenticated to execute an attack?

Options:

A.

phishing


B.

DoS


C.

brute force attack


D.

CSRF


Expert Solution
Questions # 59:

Which two details are captured from the subnet mask? (Choose two.)

Options:

A.

portion of an IP address that refers to the subnet


B.

default gateway of the host


C.

unique number ID assigned to the host


D.

part of an IP address that refers to the host


E.

network connection of a host or interface


Expert Solution
Questions # 60:

Refer to the exhibit.

Question # 60

An application must be deployed on a server that has other applications installed. The server resources are to be allocated based on the deployment requirements. The OS for each application must be independent. Which type of deployment is used?

Options:

A.

hybrid


B.

virtual machines


C.

containers


D.

bare metal


Expert Solution
Viewing page 6 out of 15 pages
Viewing questions 51-60 out of questions