ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











Which two techniques protect against injection attacks? (Choose two.)

A.

input validation

A.

input validation

Answers
B.

trim whitespace

B.

trim whitespace

Answers
C.

limit text areas to 255 characters

C.

limit text areas to 255 characters

Answers
D.

string escaping of user free text and data entry

D.

string escaping of user free text and data entry

Answers
E.

only use dropdown, checkbox, and radio button fields

E.

only use dropdown, checkbox, and radio button fields

Answers
Suggested answer: A, D

Refer to the exhibit.

A kubeconfig file to manage access to clusters is provided. How many clusters are defined and which of them are accessed using username/password authentication versus certificate?

A.

two clusters; scratch

A.

two clusters; scratch

Answers
B.

three clusters; scratch

B.

three clusters; scratch

Answers
C.

three clusters; development

C.

three clusters; development

Answers
D.

two clusters; development

D.

two clusters; development

Answers
Suggested answer: A

Which two strategies are used to protect personally identifiable information? (Choose two.)

A.

Encrypt data in transit.

A.

Encrypt data in transit.

Answers
B.

Encrypt hash values of data.

B.

Encrypt hash values of data.

Answers
C.

Encrypt data at rest.

C.

Encrypt data at rest.

Answers
D.

Only hash usernames and passwords for efficient lookup.

D.

Only hash usernames and passwords for efficient lookup.

Answers
E.

Only encrypt usernames and passwords for efficient lookup.

E.

Only encrypt usernames and passwords for efficient lookup.

Answers
Suggested answer: A, C

The response from a server includes the header ETag: W/"7eb8b94419e371767916ef13e0d6e63d".

Which statement is true?

A.

The ETag has a Strong validator directive.

A.

The ETag has a Strong validator directive.

Answers
B.

The ETag has a Weak validator directive, which is an optional directive.

B.

The ETag has a Weak validator directive, which is an optional directive.

Answers
C.

The ETag has a Weak validator directive, which is a mandatory directive.

C.

The ETag has a Weak validator directive, which is a mandatory directive.

Answers
D.

The ETag has a Strong validator directive, which it is incorrectly formatted.

D.

The ETag has a Strong validator directive, which it is incorrectly formatted.

Answers
Suggested answer: B

Explanation:

https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/ETagThe ETag HTTP response header is an identifier for a specific version of a resource. It lets caches bemore efficient and save bandwidth, as a web server does not need to resend a full response if thecontent has not changed. Additionally, etags help prevent simultaneous updates of a resource fromoverwriting each otherSyntax:

ETag: W/"<etag_value>"

Directives:

W/ ( Optional)

'W/' (case-sensitive) indicates that a weak validator is used. Weak etags are easy to generate, but are far less useful for comparisons.

"<etag_value>"

Entity tag uniquely representing the requested resource. They are a string of ASCII characters placed between double quotes, like "675af34563dc-tr34"

Refer to the exhibit.

A developer created the code, but it fails to execute. Which code snippet helps to identify the issue?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

>>> read_file = open("me.txt", "r")

Traceback (most recent call last):

File "<stdin>", line 1, in <module>

FileNotFoundError: [Errno 2] No such file or directory: 'me.txt'

>>>

Which HTTP status code indicates that a client application is experiencing intentional rate limiting bythe server?

A.

202

A.

202

Answers
B.

401

B.

401

Answers
C.

429

C.

429

Answers
D.

503

D.

503

Answers
Suggested answer: C

Explanation:

https://httpstatuses.com/429

Which database type should be used to store data received from model-driven telemetry?

A.

BigQuery database

A.

BigQuery database

Answers
B.

Time series database

B.

Time series database

Answers
C.

NoSQL database

C.

NoSQL database

Answers
D.

PostgreSQL database

D.

PostgreSQL database

Answers
Suggested answer: B

A heterogeneous network of vendors and device types needs automating for better efficiency and to enable future automated testing. The network consists of switches, routers, firewalls and load balancers from different vendors, however they all support the NETCONF/RESTCONF configuration standards and the YAML models with every feature the business requires. The business is looking for a buy versus build solution because they cannot dedicate engineering resources, and they need configuration diff and rollback functionality from day 1.

Which configuration management for automation tooling is needed for this solution?

A.

Ansible

A.

Ansible

Answers
B.

Ansible and Terraform

B.

Ansible and Terraform

Answers
C.

NSO

C.

NSO

Answers
D.

Terraform

D.

Terraform

Answers
E.

Ansible and NSO

E.

Ansible and NSO

Answers
Suggested answer: C

Explanation:

https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2020/pdf/DEVLIT-4019.pdf

An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online.

Which configuration management and/or automation tooling is needed for this solution?

A.

Ansible

A.

Ansible

Answers
B.

Ansible and Terraform

B.

Ansible and Terraform

Answers
C.

NSO

C.

NSO

Answers
D.

Terraform

D.

Terraform

Answers
E.

Ansible and NSO

E.

Ansible and NSO

Answers
Suggested answer: D

Refer to the exhibit.

The Ansible playbook is using the netconf_module to configure an interface using a YANG model. As part of this workflow, which YANG models augment the interface?

A.

ietf-interfaces and ietf-ip

A.

ietf-interfaces and ietf-ip

Answers
B.

iana-if-type and ietf-interfaces

B.

iana-if-type and ietf-interfaces

Answers
C.

ietf-ip and openconfig-interface

C.

ietf-ip and openconfig-interface

Answers
D.

ietf-ip and iana-if-type

D.

ietf-ip and iana-if-type

Answers
Suggested answer: B
Total 364 questions
Go to page: of 37