Cisco 350-901 Practice Test - Questions Answers, Page 11
List of questions
Related questions
AppGigabitEthernet interface is used as data port for a container on a Cisco Catalyst 9000 Series Switch. Which two interface configuration options should be used? (Choose two.)
trunk interface
bridged virtual interface
SPAN port
management interface
subinterface
Which two types of storage are supported for app hosting on a Cisco Catalyst 9000 Series Switch?
(Choose two.)
external USB storage
internal SSD
CD-ROM
SD-card
bootflash
Refer to the exhibit.
Which configuration of method and parameter retrieves the health of a laptop connected to the network from Cisco DNA Center?
PUT; network-health;
GET; client-health;
GET; network-device;
POST; network-device;
On a Cisco Catalyst 9300 Series Switch, the guest shell is being used to create a service within a container. Which change is needed to allow the service to have external access?
Apply ip nat overload on VirtualPortGroup0.
Apply ip nat inside on Interface VirtualPortGroup0.
Apply ip nat outside on Interface VirtualPortGroup0.
Apply ip nat inside on Interface GigabitEthernet1.
Refer to the exhibit.
Which code snippet is required in the headers to successfully authorize wireless information from Cisco DNA Center?
headers = {'X-auth-token':'fa8426a0-8eaf-4d22-8e13-7c1b16a9370c'}
headers = {'Authorization':'Basic YWRtaW46R3JhcGV2aW5IMQ=='}
headers = {'Authorization':'Bearer ASDNFALKJER23412RKDALSNKF"}
headers = {'Content-type':'application/json}
Into which two areas are AppDynamics APIs categorized? (Choose two.)
application-centric
analytics-events
database-visibility
platform-side
agent-side
Refer to the exhibit.
This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type.
Which two words are required to complete the script? (Choose two.)
ensure
commit
false
replace
none
There is a requirement to securely store unique usernames and passwords. Given a valid username, it is also required to validate that the password provided is correct. Which action accomplishes this task?
Encrypt the username, hash the password, and store these values.
Hash the username, hash the password, and store these values.
Encrypt the username, encrypt the password, and store these values.
Hash the username, encrypt the password, and store these values.
While developing an application following the 12-factor app methodology, which approach should be used in the application for logging?
Write a log to a file in the application directory.
Write a log to a file in /var/log.
Write the logs buffered to stdout.
Write the logs unbuffered to stdout.
An application has initiated an OAuth authorization code grant flow to get access to an API resource on behalf of an end user.
Which two parameters are specified in the HTTP request coming back to the application as the enduser grants access? (Choose two.)
access token and a refresh token with respective expiration times to access the API resource
access token and expiration time to access the API resource
redirect URI a panel that shows the list of permissions to grant
code that can be exchanged for an access token
state can be used for correlation and security checks
Question