ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 12

Question list
Search
Search

Related questions











A web application is susceptible to cross-site scripting. Which two methods allow this issue to be mitigated? (Choose two.)

A.

Use only drop downs.

A.

Use only drop downs.

Answers
B.

Limit user input to acceptable characters.

B.

Limit user input to acceptable characters.

Answers
C.

Encrypt user input on the client side.

C.

Encrypt user input on the client side.

Answers
D.

Use AES encryption to secure the script.

D.

Use AES encryption to secure the script.

Answers
E.

Remove all HTML/XML tags from user input.

E.

Remove all HTML/XML tags from user input.

Answers
Suggested answer: B, E

Explanation:

https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html

Refer to the exhibit.

A company has extended networking from the data center to the cloud through Transit VPC.

Which two statements describe the benefits of this approach? (Choose two.)

A.

Dynamic routing combined with multi-AZ- deployment creates a robust network infrastructure.

A.

Dynamic routing combined with multi-AZ- deployment creates a robust network infrastructure.

Answers
B.

VPC virtual gateways provide highly available connections to virtual networks.

B.

VPC virtual gateways provide highly available connections to virtual networks.

Answers
C.

Dedicated VPC simplifies load balancing by combining internal and external web services.

C.

Dedicated VPC simplifies load balancing by combining internal and external web services.

Answers
D.

VPC virtual gateways provide more secure connections to virtual networks.

D.

VPC virtual gateways provide more secure connections to virtual networks.

Answers
E.

Dedicated VPC simplifies routing by not combining this service with other shared services.

E.

Dedicated VPC simplifies routing by not combining this service with other shared services.

Answers
Suggested answer: B, D

A developer has just completed the configuration of an API that connects sensitive internal systems.

Based on company policies, the security of the data is a high priority.

Which approach must be taken to secure API keys and passwords?

A.

Embed them directly in the code.

A.

Embed them directly in the code.

Answers
B.

Store them in a hidden file.

B.

Store them in a hidden file.

Answers
C.

Store them inside the source tree of the application.

C.

Store them inside the source tree of the application.

Answers
D.

Change them periodically.

D.

Change them periodically.

Answers
Suggested answer: D

Which two principles are included in the codebase tenet of the 12-factor app methodology? (Choose two.)

A.

An application is always tracked in a version control system.

A.

An application is always tracked in a version control system.

Answers
B.

There are multiple codebases per application.

B.

There are multiple codebases per application.

Answers
C.

The codebase is the same across all deploys.

C.

The codebase is the same across all deploys.

Answers
D.

There can be a many-to-one correlation between codebase and application.

D.

There can be a many-to-one correlation between codebase and application.

Answers
E.

It is only possible to have one application deployment per codebase.

E.

It is only possible to have one application deployment per codebase.

Answers
Suggested answer: A, C

What is submitted when an SSL certificate is requested?

A.

PEM

A.

PEM

Answers
B.

CRT

B.

CRT

Answers
C.

DER

C.

DER

Answers
D.

CSR

D.

CSR

Answers
Suggested answer: D

Which two actions must be taken when an observable microservice application is developed?

(Choose two.)

A.

Know the state of a single instance of a single service.

A.

Know the state of a single instance of a single service.

Answers
B.

Place "try/except" statement in code.

B.

Place "try/except" statement in code.

Answers
C.

Place log statements in the code.

C.

Place log statements in the code.

Answers
D.

Use distributed tracing techniques.

D.

Use distributed tracing techniques.

Answers
E.

Deploy microservice to multiple datacenters.

E.

Deploy microservice to multiple datacenters.

Answers
Suggested answer: C, D

Which two countermeasures help reduce the risk of playback attacks? (Choose two.)

A.

Store data in a NoSQL database.

A.

Store data in a NoSQL database.

Answers
B.

Implement message authentication (HMAC).

B.

Implement message authentication (HMAC).

Answers
C.

Enable end-to-end encryption.

C.

Enable end-to-end encryption.

Answers
D.

Remove stack traces from errors.

D.

Remove stack traces from errors.

Answers
E.

Use short-lived access tokens.

E.

Use short-lived access tokens.

Answers
Suggested answer: B, E

Which type of file is created from issued intermediate, root, and primary certificates for SSL installation on a server?

A.

DER

A.

DER

Answers
B.

CSR

B.

CSR

Answers
C.

PEM

C.

PEM

Answers
D.

CRT

D.

CRT

Answers
Suggested answer: C

Explanation:

SSL .pem files (concatenated certificate container files), are frequently required for certificate installations when multiple certificates are being imported as one file.

Which two statements describe advantages of static code analysis over unit tests? (Choose two.)

A.

It checks for potential tainted data where input is not checked.

A.

It checks for potential tainted data where input is not checked.

Answers
B.

It enforces proper coding standards and style.

B.

It enforces proper coding standards and style.

Answers
C.

It performs a quick analysis of whether tests will pass or fail when run.

C.

It performs a quick analysis of whether tests will pass or fail when run.

Answers
D.

It checks for race conditions in threaded applications.

D.

It checks for race conditions in threaded applications.

Answers
E.

It estimates the performance of the code when run.

E.

It estimates the performance of the code when run.

Answers
Suggested answer: A, B

Refer to the exhibit.

Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content?

A.

CMD ["/bin/echo", "Test"]

A.

CMD ["/bin/echo", "Test"]

Answers
B.

RUN ["/bin/echo", "Test"]

B.

RUN ["/bin/echo", "Test"]

Answers
C.

ENTRYPOINT ["/bin/echo", "Test"]

C.

ENTRYPOINT ["/bin/echo", "Test"]

Answers
D.

CMD ["/bin/echo Test"]

D.

CMD ["/bin/echo Test"]

Answers
Suggested answer: A
Total 364 questions
Go to page: of 37