ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

An application's REST API GET call is tested to the inventory database. Which missing code must be included to limit the number of values that are returned from the query to 20?

A.

Inventory=20

A.

Inventory=20

Answers
B.

limit=?2Q

B.

limit=?2Q

Answers
C.

inventory=limit?20

C.

inventory=limit?20

Answers
D.

inventory? Iimit20

D.

inventory? Iimit20

Answers
Suggested answer: D

Given an application that implements a basic search function as Well as a video upload function , which two load-balancing approaches optimize the application's user experience? (Choose two.)

A.

Video upload requests should be routed to the endpoint using an intermediate hop.

A.

Video upload requests should be routed to the endpoint using an intermediate hop.

Answers
B.

Video upload requests should be routed to the endpoint with highest data throughput.

B.

Video upload requests should be routed to the endpoint with highest data throughput.

Answers
C.

Video upload requests should be routed to the endpoint with lowest round-trip latency.

C.

Video upload requests should be routed to the endpoint with lowest round-trip latency.

Answers
D.

Search requests should be routed to the endpoint with lowest round-trip latency.

D.

Search requests should be routed to the endpoint with lowest round-trip latency.

Answers
E.

Search requests should be routed to the endpoint with highest data throughput.

E.

Search requests should be routed to the endpoint with highest data throughput.

Answers
Suggested answer: B, D

What are two methods for sending bearer access tokens in resource requests to servers? (Choose two,)

A.

in plaintext for user access

A.

in plaintext for user access

Answers
B.

in the HTTP API schema

B.

in the HTTP API schema

Answers
C.

in the HTTP request entity-body

C.

in the HTTP request entity-body

Answers
D.

in the "Authorization" request header field

D.

in the "Authorization" request header field

Answers
E.

in the HTTP request URI

E.

in the HTTP request URI

Answers
Suggested answer: C, D

Which Git command enables the developer to revert back to f414f31 commit to discard changes in the current working tree?

A.

git reset-hard f414f31

A.

git reset-hard f414f31

Answers
B.

git reset checkout-hard f414f31

B.

git reset checkout-hard f414f31

Answers
C.

git reset-soft f414f31

C.

git reset-soft f414f31

Answers
D.

git checkout f414f31

D.

git checkout f414f31

Answers
Suggested answer: A

Explanation:

Reference: https://www.freecodecamp.org/news/the-ultimate-guide-to-git-reset-and-git-revert/

An engineer must enable an SSID in a Meraki network. Which request accomplishes this task?

A.

PUT /networks/{networkld}/ssids/{number} {"enable": true)

A.

PUT /networks/{networkld}/ssids/{number} {"enable": true)

Answers
B.

POST /networks/{networkid}/ssids/{number) {"enable": true)

B.

POST /networks/{networkid}/ssids/{number) {"enable": true)

Answers
C.

PUT /networks/{networkld}/ssids/{number}?enabled=true

C.

PUT /networks/{networkld}/ssids/{number}?enabled=true

Answers
D.

POST /networks/{networkid}/sslds/{number}?enabled=true

D.

POST /networks/{networkid}/sslds/{number}?enabled=true

Answers
Suggested answer: A

A team of developers created their own CA and started signing certificates for all of their loT devices, Which action will make the browser accept these certificates?

A.

Set the private keys 1024-bit RSA.

A.

Set the private keys 1024-bit RSA.

Answers
B.

Preload the developer CA on the trusted CA list of the browser.

B.

Preload the developer CA on the trusted CA list of the browser.

Answers
C.

Enable HTTPS or port 443 on the browser.

C.

Enable HTTPS or port 443 on the browser.

Answers
D.

install a TLS instead of SSL certificate on the loT devices.

D.

install a TLS instead of SSL certificate on the loT devices.

Answers
Suggested answer: B

Refer to the exhibit.

Which action will complete the workflow that represents how an API call sends multiple messages?

A.

{PUT} messages(roomID)

A.

{PUT} messages(roomID)

Answers
B.

{PUT} messages(BearerToken)

B.

{PUT} messages(BearerToken)

Answers
C.

{POST} messages(roomID)

C.

{POST} messages(roomID)

Answers
D.

{POST} messages(BearerToken)

D.

{POST} messages(BearerToken)

Answers
Suggested answer: D

Explanation:

https://developer.webex.com/docs/api/v1/messages/create-a-message

Which two types of organization are subject to GDPR? (Choose two.)

A.

only organizations that operate outside the EU

A.

only organizations that operate outside the EU

Answers
B.

any organization that offers goods or services to customers in the EU

B.

any organization that offers goods or services to customers in the EU

Answers
C.

only organizations that have offices in countries that are part of the EU

C.

only organizations that have offices in countries that are part of the EU

Answers
D.

any organization that operates within the EU

D.

any organization that operates within the EU

Answers
E.

only organizations that physically reside in the EU

E.

only organizations that physically reside in the EU

Answers
Suggested answer: B, D

Explanation:

Reference: https://www.cisco.com/c/en/us/products/security/comply-with-GDPR.html

A developer deploys a SQLite database in a Docker container. Single-use secret keys are generated each time a user accesses the database. The keys expire after 24 hours. Where should the keys be stored?

A.

Outside of the Docker container in the source code of applications that connect to the SQLite database.

A.

Outside of the Docker container in the source code of applications that connect to the SQLite database.

Answers
B.

In a separate file inside the Docker container that runs the SQLite database.

B.

In a separate file inside the Docker container that runs the SQLite database.

Answers
C.

In an encrypted database table within the SQLite database.

C.

In an encrypted database table within the SQLite database.

Answers
D.

In a separate storage volume within the Docker container.

D.

In a separate storage volume within the Docker container.

Answers
Suggested answer: D

While working with the Webex Teams API, on an application that uses end-to-end encryption, a webhook has been received. What must be considered to read the message?

A.

Webhook information cannot be used to read the message because of end-to-end encryption. The API key is needed to decrypt the message.

A.

Webhook information cannot be used to read the message because of end-to-end encryption. The API key is needed to decrypt the message.

Answers
B.

Webhook returns the full unencrypted message. Only the body is needed to query the API.

B.

Webhook returns the full unencrypted message. Only the body is needed to query the API.

Answers
C.

Webhook returns a hashed version of the message that must be unhashed with the API key.

C.

Webhook returns a hashed version of the message that must be unhashed with the API key.

Answers
D.

Webhook returns message identification. To query, the API is needed for that message to get the decrypted information.

D.

Webhook returns message identification. To query, the API is needed for that message to get the decrypted information.

Answers
Suggested answer: D

Explanation:

room messages are considered sensitive information and since Webex initiated the request to your backend, it did not have your Access Token with which to decrypt the message. In order to get the sensitive information, your app needs to use the resource id to fetch the full resource. Using the above messages example, your app could fetch the complete message object along with the text by doing an authenticated (via your Bearer Token) GET request to /

messages/{id}

https://developer.webex.com/docs/api/guides/webhooks

Total 364 questions
Go to page: of 37