Cisco 350-901 Practice Test - Questions Answers, Page 17
List of questions
Related questions
Refer to the exhibit.
An application's REST API GET call is tested to the inventory database. Which missing code must be included to limit the number of values that are returned from the query to 20?
Inventory=20
limit=?2Q
inventory=limit?20
inventory? Iimit20
Given an application that implements a basic search function as Well as a video upload function , which two load-balancing approaches optimize the application's user experience? (Choose two.)
Video upload requests should be routed to the endpoint using an intermediate hop.
Video upload requests should be routed to the endpoint with highest data throughput.
Video upload requests should be routed to the endpoint with lowest round-trip latency.
Search requests should be routed to the endpoint with lowest round-trip latency.
Search requests should be routed to the endpoint with highest data throughput.
What are two methods for sending bearer access tokens in resource requests to servers? (Choose two,)
in plaintext for user access
in the HTTP API schema
in the HTTP request entity-body
in the "Authorization" request header field
in the HTTP request URI
Which Git command enables the developer to revert back to f414f31 commit to discard changes in the current working tree?
git reset-hard f414f31
git reset checkout-hard f414f31
git reset-soft f414f31
git checkout f414f31
An engineer must enable an SSID in a Meraki network. Which request accomplishes this task?
PUT /networks/{networkld}/ssids/{number} {"enable": true)
POST /networks/{networkid}/ssids/{number) {"enable": true)
PUT /networks/{networkld}/ssids/{number}?enabled=true
POST /networks/{networkid}/sslds/{number}?enabled=true
A team of developers created their own CA and started signing certificates for all of their loT devices, Which action will make the browser accept these certificates?
Set the private keys 1024-bit RSA.
Preload the developer CA on the trusted CA list of the browser.
Enable HTTPS or port 443 on the browser.
install a TLS instead of SSL certificate on the loT devices.
Refer to the exhibit.
Which action will complete the workflow that represents how an API call sends multiple messages?
{PUT} messages(roomID)
{PUT} messages(BearerToken)
{POST} messages(roomID)
{POST} messages(BearerToken)
Which two types of organization are subject to GDPR? (Choose two.)
only organizations that operate outside the EU
any organization that offers goods or services to customers in the EU
only organizations that have offices in countries that are part of the EU
any organization that operates within the EU
only organizations that physically reside in the EU
A developer deploys a SQLite database in a Docker container. Single-use secret keys are generated each time a user accesses the database. The keys expire after 24 hours. Where should the keys be stored?
Outside of the Docker container in the source code of applications that connect to the SQLite database.
In a separate file inside the Docker container that runs the SQLite database.
In an encrypted database table within the SQLite database.
In a separate storage volume within the Docker container.
While working with the Webex Teams API, on an application that uses end-to-end encryption, a webhook has been received. What must be considered to read the message?
Webhook information cannot be used to read the message because of end-to-end encryption. The API key is needed to decrypt the message.
Webhook returns the full unencrypted message. Only the body is needed to query the API.
Webhook returns a hashed version of the message that must be unhashed with the API key.
Webhook returns message identification. To query, the API is needed for that message to get the decrypted information.
Question