Cisco 350-901 Practice Test - Questions Answers, Page 13
List of questions
Related questions
Which two techniques protect against injection attacks? (Choose two.)
input validation
trim whitespace
limit text areas to 255 characters
string escaping of user free text and data entry
only use dropdown, checkbox, and radio button fields
Refer to the exhibit.
A kubeconfig file to manage access to clusters is provided. How many clusters are defined and which of them are accessed using username/password authentication versus certificate?
two clusters; scratch
three clusters; scratch
three clusters; development
two clusters; development
Which two strategies are used to protect personally identifiable information? (Choose two.)
Encrypt data in transit.
Encrypt hash values of data.
Encrypt data at rest.
Only hash usernames and passwords for efficient lookup.
Only encrypt usernames and passwords for efficient lookup.
The response from a server includes the header ETag: W/"7eb8b94419e371767916ef13e0d6e63d".
Which statement is true?
The ETag has a Strong validator directive.
The ETag has a Weak validator directive, which is an optional directive.
The ETag has a Weak validator directive, which is a mandatory directive.
The ETag has a Strong validator directive, which it is incorrectly formatted.
Refer to the exhibit.
A developer created the code, but it fails to execute. Which code snippet helps to identify the issue?
Option A
Option B
Option C
Option D
Which HTTP status code indicates that a client application is experiencing intentional rate limiting bythe server?
202
401
429
503
Which database type should be used to store data received from model-driven telemetry?
BigQuery database
Time series database
NoSQL database
PostgreSQL database
A heterogeneous network of vendors and device types needs automating for better efficiency and to enable future automated testing. The network consists of switches, routers, firewalls and load balancers from different vendors, however they all support the NETCONF/RESTCONF configuration standards and the YAML models with every feature the business requires. The business is looking for a buy versus build solution because they cannot dedicate engineering resources, and they need configuration diff and rollback functionality from day 1.
Which configuration management for automation tooling is needed for this solution?
Ansible
Ansible and Terraform
NSO
Terraform
Ansible and NSO
An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online.
Which configuration management and/or automation tooling is needed for this solution?
Ansible
Ansible and Terraform
NSO
Terraform
Ansible and NSO
Refer to the exhibit.
The Ansible playbook is using the netconf_module to configure an interface using a YANG model. As part of this workflow, which YANG models augment the interface?
ietf-interfaces and ietf-ip
iana-if-type and ietf-interfaces
ietf-ip and openconfig-interface
ietf-ip and iana-if-type
Question