Cisco 350-901 Practice Test - Questions Answers, Page 16
List of questions
Related questions
What are two advantages of using model-driven telemetry, such as gRPC. instead of traditional telemetry gathering methods? (Choose two.)
all data is ad-hoc
efficient use of bandwidth
no overhead
decentralized storage of telemetry
continuous information with incremental updates
Refer to the exhibit. Which snippet creates a Webex Teams space and adds the users in the variable user list to that space?
What is a consideration for using gRPC as the model-driven telemetry protocol on a Cisco IOS XE device?
XML-based transmission format
works in dial-out mode
human-readable transmission format
works in call-out mode
Refer to the exhibit.
Which AP! call does an engineer use to delete the FQDN object?
DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f
DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns/005056BB-0B24-0ed3-0000-858993545263
DELETE /api/fmc_config/v1/domain?id=e276abec-e0f2-11e3-8169-6d9ed49b625f
DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns?id=005056BB-0B24-0ed3-0000-858993545263
Refer to the exhibit.
An engineer needs to change the IP address via RESTCOMF on interface GigabitEthernet2. An error message is received when the script is run. Which amendment to the code will result in a successful RESTCONF action?
Change POST to PATCH.
Issue a DELETE before POST.
Issue a DELETE before PATCH
Change POST to GET
Why is end-to-end encryption deployed when exposing sensitive data through APIs?
Traffic is encrypted and decrypted at every hop in the network path.
Data transfers are untraceable from source to destination.
Data cannot be read or modified other than by the true source and destination.
Server-side encryption enables the destination to control data protection.
Refer to the exhibits which show the documentation associated with the create port object API cafl in Cisco Firepower Threat Defense, and a cURL command. Which data payload completes the cURL command to run the APi call?
What is a characteristic of a monolithic architecture?
It is an application with multiple independent parts.
New capabilities are deployed by restarting a component of the application.
A service failure can bring down the whole application.
The components are platform-agnostic.
A local Docker image has an image ID of 386231131. Fill in the blanks to complete the command in order to tag the image into the "cisco" repository with "version1 0'".
Other options
A bot has been created, called "386231131", to respond to alarm messages. A developer is now creating a Webhook to allow the bot to respond to messages. Which format allows the Webhook to respond to messages for the bot within
Webex Teams?
Question