Cisco 350-901 Practice Test - Questions Answers, Page 18
List of questions
Related questions
Which Puppet manifest needs to be used to configure an interface GigabitEthernet 0/1 on a Cisco IOS switch?
Option A
Option B
Option C
Option D
What are two steps in the OAuth2 protocol flow? (Choose two.)
The user is authenticated by the authorization server and granted an access token.
The user's original credentials are validated by the resource server and authorization is granted.
The user indirectly requests authorization through the authorization server.
The user requests an access token by authentication and authorization grant presentation.
The user requests the protected resource from the resource server using the original credentials.
Refer to the exhibit. A developer must create a new network object named testnetwork by using the Cisco Firepower Device Management API. The script must also handle any exceptions that occur during the request and print out any resulting errors. Which script must be used?
Option A
Option B
Option C
Option D
What is the gRPC Network Management Interface protocol?
a unified management protocol for streaming telemetry and database logging
a configuration management protocol for monitoring
a protocol for configuration management and streaming telemetry
a logging protocol used across database servers
An application has been developed for monitoring rooms in Cisco Webex. An engineer uses the application to retrieve all the messages from a Cisco Webex room, but the results are slowly presented. Which action optimizes calls to retrieve the messages from the /v1/messages endpoint?
Define the ma property by using the pagination functionality.
Set the beforeMessage property to retrieve the messages sent before a specific message ID.
Avoid unnecessary calls by using a prior request to /v1/rooms to retrieve the last activity property.
Filter the response results by specifying the created property in the request.
What are two principles according to the build, release, run principle of the twelve-factor app methodology?
(Choose two.)
Code changes are able to be made at runtime.
Separation between the build, release, and run phases.
Releases should have a unique identifier.
Existing releases are able to be mutated after creation.
Release stage is responsible for compilation of assets and binaries.
A developer is building an application to access a website. When running the application, an HTTP403 errorcode has been received. How should the application be modified to handle this code?
Create a loop on cancel the operation and run a new one after the code is received.
Use exponential backoff when retrying distributed services and other remote endpoints.
Build a try/except around the urlopen to find errors occurring in the request.
Redirect the request to an internal web server and make a new request from the internal resource.
When end-to-end encryption is implemented, which area is most vulnerable to exploitation?
cryptographic key exchange
endpoint security
cryptographic key generation
security of data in transit
Refer to the exhibit. The presented application consists of a Nginx container and a load balancer service. Which GitLab CI/CD configuration implements the Kubernetes deployment?
Option A
Option B
Option C
Option D
What are two benefits of using distributed log collectors? (Choose two.)
supports multiple transport protocols such as TCP/UDP
improves performance and reduces resource consumption
provides flexibility due to a wide range of plugins and accepted log formats
enables extension of logs with fields and export to backend systems
buffers and resends data when the network is unavailable
Question