ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











What are two advantages of using model-driven telemetry, such as gRPC. instead of traditional telemetry gathering methods? (Choose two.)

A.

all data is ad-hoc

A.

all data is ad-hoc

Answers
B.

efficient use of bandwidth

B.

efficient use of bandwidth

Answers
C.

no overhead

C.

no overhead

Answers
D.

decentralized storage of telemetry

D.

decentralized storage of telemetry

Answers
E.

continuous information with incremental updates

E.

continuous information with incremental updates

Answers
Suggested answer: B, E


Refer to the exhibit. Which snippet creates a Webex Teams space and adds the users in the variable user list to that space?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

What is a consideration for using gRPC as the model-driven telemetry protocol on a Cisco IOS XE device?

A.

XML-based transmission format

A.

XML-based transmission format

Answers
B.

works in dial-out mode

B.

works in dial-out mode

Answers
C.

human-readable transmission format

C.

human-readable transmission format

Answers
D.

works in call-out mode

D.

works in call-out mode

Answers
Suggested answer: B

Refer to the exhibit.

Which AP! call does an engineer use to delete the FQDN object?

A.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f

A.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f

Answers
B.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns/005056BB-0B24-0ed3-0000-858993545263

B.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns/005056BB-0B24-0ed3-0000-858993545263

Answers
C.

DELETE /api/fmc_config/v1/domain?id=e276abec-e0f2-11e3-8169-6d9ed49b625f

C.

DELETE /api/fmc_config/v1/domain?id=e276abec-e0f2-11e3-8169-6d9ed49b625f

Answers
D.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns?id=005056BB-0B24-0ed3-0000-858993545263

D.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns?id=005056BB-0B24-0ed3-0000-858993545263

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/firepower/640/api/REST/Firepower_Management_Center_REST_API_Quick_Start_Guide_640/Objects_In_The_REST_API.html#fqdns_DELETE

Refer to the exhibit.

An engineer needs to change the IP address via RESTCOMF on interface GigabitEthernet2. An error message is received when the script is run. Which amendment to the code will result in a successful RESTCONF action?

A.

Change POST to PATCH.

A.

Change POST to PATCH.

Answers
B.

Issue a DELETE before POST.

B.

Issue a DELETE before POST.

Answers
C.

Issue a DELETE before PATCH

C.

Issue a DELETE before PATCH

Answers
D.

Change POST to GET

D.

Change POST to GET

Answers
Suggested answer: A

Why is end-to-end encryption deployed when exposing sensitive data through APIs?

A.

Traffic is encrypted and decrypted at every hop in the network path.

A.

Traffic is encrypted and decrypted at every hop in the network path.

Answers
B.

Data transfers are untraceable from source to destination.

B.

Data transfers are untraceable from source to destination.

Answers
C.

Data cannot be read or modified other than by the true source and destination.

C.

Data cannot be read or modified other than by the true source and destination.

Answers
D.

Server-side encryption enables the destination to control data protection.

D.

Server-side encryption enables the destination to control data protection.

Answers
Suggested answer: C

Refer to the exhibits which show the documentation associated with the create port object API cafl in Cisco Firepower Threat Defense, and a cURL command. Which data payload completes the cURL command to run the APi call?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

Explanation:

Reference : https://developer.cisco.com/site/ftd-api-reference/#!editicmpv4portobject/pathparameters

What is a characteristic of a monolithic architecture?

A.

It is an application with multiple independent parts.

A.

It is an application with multiple independent parts.

Answers
B.

New capabilities are deployed by restarting a component of the application.

B.

New capabilities are deployed by restarting a component of the application.

Answers
C.

A service failure can bring down the whole application.

C.

A service failure can bring down the whole application.

Answers
D.

The components are platform-agnostic.

D.

The components are platform-agnostic.

Answers
Suggested answer: C

Explanation:

A monolitic app can be platform-agnostic but it's not mandatory. But is the app is monolitic, a service failure (such as storage or network) will bring down the whole app/service. This is unlike the distributed application architecture where failure of one microcomponent can be detected and fixed dynamically.

A local Docker image has an image ID of 386231131. Fill in the blanks to complete the command in order to tag the image into the "cisco" repository with "version1 0'".

A.


A.


Answers
B.

Other options

B.

Other options

Answers
Suggested answer: A

Explanation:

https://docs.docker.com/engine/reference/commandline/tag/

A bot has been created, called "386231131", to respond to alarm messages. A developer is now creating a Webhook to allow the bot to respond to messages. Which format allows the Webhook to respond to messages for the bot within

Webex Teams?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

Explanation:

Reference : https://developer.webex.com/docs/bots

Total 364 questions
Go to page: of 37