Cisco 350-901 Practice Test - Questions Answers, Page 11
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 101
 
                            
                            
                                AppGigabitEthernet interface is used as data port for a container on a Cisco Catalyst 9000 Series Switch. Which two interface configuration options should be used? (Choose two.)
Question 102
 
                            
                            
                                Which two types of storage are supported for app hosting on a Cisco Catalyst 9000 Series Switch?
(Choose two.)
Question 103
 
                            
                            
                                Refer to the exhibit.
Which configuration of method and parameter retrieves the health of a laptop connected to the network from Cisco DNA Center?
Question 104
 
                            
                            
                                On a Cisco Catalyst 9300 Series Switch, the guest shell is being used to create a service within a container. Which change is needed to allow the service to have external access?
Question 105
 
                            
                            
                                Refer to the exhibit.
Which code snippet is required in the headers to successfully authorize wireless information from Cisco DNA Center?
Question 106
 
                            
                            
                                Into which two areas are AppDynamics APIs categorized? (Choose two.)
Question 107
 
                            
                            
                                Refer to the exhibit.
This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type.
Which two words are required to complete the script? (Choose two.)
Question 108
 
                            
                            
                                There is a requirement to securely store unique usernames and passwords. Given a valid username, it is also required to validate that the password provided is correct. Which action accomplishes this task?
Question 109
 
                            
                            
                                While developing an application following the 12-factor app methodology, which approach should be used in the application for logging?
Question 110
 
                            
                            
                                An application has initiated an OAuth authorization code grant flow to get access to an API resource on behalf of an end user.
Which two parameters are specified in the HTTP request coming back to the application as the enduser grants access? (Choose two.)
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question