The Cisco Certified DevNet Associate exam certifies basic network application abilities such as software development and design for Cisco platforms. The CCNA DevNet course is designed for software developers who wish to improve their programmability, software, and automation abilities.
DevOps training can help Network Engineers start their automation journey because they understand the network better.
200-901 DEVASC
Developing Applications and Automating Workflows using Cisco Platforms
Duration: 120 minutes
Languages: English and Japanese
Associated certification : DevNet Associate
Exam overview
This exam tests your knowledge and skills related to:
Network fundamentals
Network access
IP connectivity
IP services
Security fundamentals
Automation and programmability
Exam preparation
Official Cisco training
Developing Applications and Automating Workflows using Cisco Core Platforms (DEVASC)
Network Automation training videos
DEVASC study materials
Exam Description
To earn your DevNet Associate certification, you must pass the 200-901 DEVASC exam. This 120-minute exam tests your knowledge of:
Exam Description: DevNet Associate Exam v1.0 (DEVASC 200-901) is a 120-minute exam associated with the DevNet Associate – Developer Certification. This exam tests a candidate’s knowledge of software development and design including understanding and using APIs, Cisco platforms and development, application development and security, and infrastructure and automation. The course, Developing Applications and Automating Workflows using Cisco Core Platforms, helps candidates to prepare for this exam.
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
15% 1.0 Software Development and Design
1.1 Compare data formats (XML, JSON, and YAML)
1.2 Describe parsing of common data format (XML, JSON, and YAML) to Python data structures
1.3 Describe the concepts of test-driven development
1.4 Compare software development methods (agile, lean, and waterfall)
1.5 Explain the benefits of organizing code into methods / functions, classes, and modules
1.6 Identify the advantages of common design patterns (MVC and Observer)
1.7 Explain the advantages of version control
1.8 Utilize common version control operations with Git
1.8.a Clone
1.8.b Add/remove
1.8.c Commit
1.8.d Push / pull
1.8.e Branch
1.8.f Merge and handling conflicts
1.8.g diff
20% 2.0 Understanding and Using APIs
2.1 Construct a REST API request to accomplish a task given API documentation
2.2 Describe common usage patterns related to webhooks
2.3 Identify the constraints when consuming APIs
2.4 Explain common HTTP response codes associated with REST APIs
2.5 Troubleshoot a problem given the HTTP response code, request and API documentation
2.6 Identify the parts of an HTTP response (response code, headers, body)
2.7 Utilize common API authentication mechanisms: basic, custom token, and API keys
2.8 Compare common API styles (REST, RPC, synchronous, and asynchronous)
2.9 Construct a Python script that calls a REST API using the requests library
15% 3.0 Cisco Platforms and Development
3.1 Construct a Python script that uses a Cisco SDK given SDK documentation
3.2 Describe the capabilities of Cisco network management platforms and APIs (Meraki, Cisco DNA Center, ACI, Cisco SD-WAN, and NSO)
3.3 Describe the capabilities of Cisco compute management platforms and APIs (UCS Manager, UCS Director, and Intersight)
3.4 Describe the capabilities of Cisco collaboration platforms and APIs (Webex Teams, Webex devices, Cisco Unified Communication Manager including AXL and UDS interfaces, and Finesse)
3.5 Describe the capabilities of Cisco security platforms and APIs (Firepower, Umbrella, AMP, ISE, and ThreatGrid)
3.6 Describe the device level APIs and dynamic interfaces for IOS XE and NX-OS
3.7 Identify the appropriate DevNet resource for a given scenario (Sandbox, Code Exchange, support, forums, Learning Labs, and API documentation)
3.8 Apply concepts of model driven programmability (YANG, RESTCONF, and NETCONF) in a Cisco environment
3.9 Construct code to perform a specific operation based on a set of requirements and given API reference documentation such as these:
3.9.a Obtain a list of network devices by using Meraki, Cisco DNA Center, ACI, Cisco SD-WAN, or NSO
3.9.b Manage spaces, participants, and messages in Webex Teams
3.9.c Obtain a list of clients / hosts seen on a network using Meraki or Cisco DNA Center
15% 4.0 Application Deployment and Security
4.1 Describe benefits of edge computing
4.2 Identify attributes of different application deployment models (private cloud, public cloud, hybrid cloud, and edge)
4.3 Identify the attributes of these application deployment types
4.3.a Virtual machines
4.3.b Bare metal
4.3.c Containers
4.4 Describe components for a CI/CD pipeline in application deployments
4.5 Construct a Python unit test
4.6 Interpret contents of a Dockerfile
4.7 Utilize Docker images in local developer environment
4.8 Identify application security issues related to secret protection, encryption (storage and transport), and data handling
4.9 Explain how firewall, DNS, load balancers, and reverse proxy in application deployment
4.10 Describe top OWASP threats (such as XSS, SQL injections, and CSRF)
4.11 Utilize Bash commands (file management, directory navigation, and environmental variables)
4.12 Identify the principles of DevOps practices
20% 5.0 Infrastructure and Automation
5.1 Describe the value of model driven programmability for infrastructure automation
5.2 Compare controller-level to device-level management
5.3 Describe the use and roles of network simulation and test tools (such as VIRL and pyATS)
5.4 Describe the components and benefits of CI/CD pipeline in infrastructure automation
5.5 Describe principles of infrastructure as code
5.6 Describe the capabilities of automation tools such as Ansible, Puppet, Chef, and Cisco NSO
5.7 Identify the workflow being automated by a Python script that uses Cisco APIs including ACI, Meraki, Cisco DNA Center, or RESTCONF
5.8 Identify the workflow being automated by an Ansible playbook (management packages, user management related to services, basic service configuration, and start/stop)
5.9 Identify the workflow being automated by a bash script (such as file management, app install, user management, directory navigation)
5.10 Interpret the results of a RESTCONF or NETCONF query
5.11 Interpret basic YANG models
5.12 Interpret a unified diff
5.13 Describe the principles and benefits of a code review process
5.14 Interpret sequence diagram that includes API calls
15% 6.0 Network Fundamentals
6.1 Describe the purpose and usage of MAC addresses and VLANs
6.2 Describe the purpose and usage of IP addresses, routes, subnet mask / prefix, and gateways
6.3 Describe the function of common networking components (such as switches, routers, firewalls, and load balancers)
6.4 Interpret a basic network topology diagram with elements such as switches, routers, firewalls, load balancers, and port values
6.5 Describe the function of management, data, and control planes in a network device
6.6 Describe the functionality of these IP Services: DHCP, DNS, NAT, SNMP, NTP
6.7 Recognize common protocol port values (such as, SSH, Telnet, HTTP, HTTPS, and NETCONF)
6.8 Identify cause of application connectivity issues (NAT problem, Transport Port blocked, proxy, and VPN)
6.9 Explain the impacts of network constraints on applications
Actualkey 200-901 study materials exam pdf,
Best Cisco 200-901 exam format Certification, Cisco 200-901 exam cost Training at certkingdom.com
QUESTION 1
Which type of threat occur when an attacker can send hostile data to an interpreter within an application?
A. Cross-site scripting
B. Sensitive data exposure
C. Broken authentication
D. Injection
Answer: D
QUESTION 2
Refer to the exhibit.
What is the effect of this Ansible playbook on an IOS router?
A. A new running configuration is pushed to the IOS router.
B. The current running configuration of the IOS router is backed up.
C. The start-up configuration of the IOS router is copied to a local folder.
D. A new start-up configuration is copied to the IOS router.
Answer: B
QUESTION 3
Which two statement describe the role of an artifact repository in a CI/CD pipeline? (Choose two.)
A. An artifact repository allows to compare and merge changes in the source code of files involved in a build process.
B. An artifact repository is needed only for CI/CD pipeline executed on a public cloud infrastructure.
C. An artifact repository provides traceability, search, and management of binary files.
D. An artifact repository is needed only for managing open source software.
E. An artifact repository stores files needed and generated during the build process.
Answer: CE
QUESTION 4
What is the purpose of the Cisco VIRL software tool?
A. To verify configurations against compliance standards
B. To simulate and model networks
C. To automate API workflows
D. To test performance of an application
Answer: B
QUESTION 5
Which detail is included in a routing table?
A. IP protocol
B. Broadcast address
C. TCP or UDP port number
D. Destination next hop or outgoing interface
Answer: D