Exams > Cisco > 200-901: DevNet Associate (DEVASC)
200-901: DevNet Associate (DEVASC)
Page 8 out of 39 pages Questions 71-80 out of 390 questions
Question#71

Which Cisco product provides malware and content filtering through DNS?

  • A. Cisco ASA Firepower module
  • B. Cisco AMP
  • C. Cisco ISE
  • D. Cisco Umbrella
Discover Answer Hide Answer

D

Question#72

Which Cisco platform provides organization-wide automation, security, policy enforcement, and agility across wired and wireless networks?

  • A. Cisco SD-WAN
  • B. Cisco DNA Center
  • C. Cisco ACI
  • D. Cisco Umbrella
Discover Answer Hide Answer

B

Question#73

What is a characteristic of the Cisco Finesse platform?

  • A. Applications allow services to be invoked on a network triggered event.
  • B. The platform provides a ready-to-go platform for HD video and audio conferencing.
  • C. Applications are added to the platform from the desktop remotely.
  • D. The platform includes an enterprise-class IM engine.
Discover Answer Hide Answer

C
Reference:
https://developer.cisco.com/docs/finesse/#!finesse-overview/what-are-the-business-benefits

Question#74

An engineer needs to retrieve a list of locally available Firepower Threat Defense upgrade packages by using the Firepower Management Center REST API. The engineer uses a GET request with the URL:
/api/fmc_platform/v1/updates/upgradepackages/f413afeb-e6f6-75f4-9169-6d9bd49s625e
What does `f413afeb-e6f6-75f4-9169-6d9bd49s625e` represent?

  • A. container UUID
  • B. package UUID
  • C. domain UUID
  • D. object UUID
Discover Answer Hide Answer

B
Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/640/api/REST/Firepower_Management_Center_REST_API_Quick_Start_Guide_640.html

Question#75

Refer to the exhibit.

A process running on the host wants to access the service running inside this Docker container. Which port or ports are used to make a connection?

  • A. only outbound connections between 3000 and 5000 are possible
  • B. port 3000
  • C. any port between 3000 and 5000
  • D. port 5000
Discover Answer Hide Answer

D

Question#76

DRAG DROP -
Drag and drop the Dockerfile instructions from the left onto the descriptions on the right. Not all options are used.
Select and Place:

Discover Answer Hide Answer


Question#77

What are two security benefits of a Docker-based application? (Choose two.)

  • A. natively secures access to secrets that are used by the running application
  • B. guarantees container images are secured and free of vulnerabilities
  • C. easier to patch because Docker containers include only dependencies that the application requires
  • D. prevents information leakage occurring when unhandled exceptions are returned in HTTP responses
  • E. allows for separation of applications that traditionally run on the same host
Discover Answer Hide Answer

CE

Question#78

A local Docker alpine image has been created with an image ID of a391665405fe and tagged as `latest`. Which command creates a running container based on the tagged image, with the container port 8080 bound to port 80 on the host?

  • A. docker build -p 8080:80 alpine:latest
  • B. docker exec -p 8080:80 alpine:latest
  • C. docker start -p 8080:80 alpine:latest
  • D. docker run -p 8080:80 alpine:latest
Discover Answer Hide Answer

D

Question#79

Refer to the exhibit.

Which function does the EXPOSE line perform when building an image from this Dockerfile?

  • A. Local port 8080 of the container that launched with this docker image is accessible from co-hosted containers and external clients.
  • B. Local port 8080 is not reachable at all because no IP address is specified along with the EXPOSE command of the Dockerfile.
  • C. Local port 8080 is accessible from other containers running on the same docker host as the container that launched with this docker image.
  • D. Local port 8080 of the container that launched with this docker image is accessible to external clients.
Discover Answer Hide Answer

C

Question#80

Which two elements are foundational principles of DevOps? (Choose two.)

  • A. organizing cross-functional teams over organizational silos
  • B. designing applications as microservices
  • C. encouraging containers for the deployment of applications
  • D. automating over documenting
  • E. optimizing the cost of infrastructures
Discover Answer Hide Answer

AD

chevron rightPrevious Nextchevron right