Cisco 350-901 Practice Test - Questions Answers, Page 18
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 171
 
                            
                            
                                Which Puppet manifest needs to be used to configure an interface GigabitEthernet 0/1 on a Cisco IOS switch?
Question 172
 
                            
                            
                                What are two steps in the OAuth2 protocol flow? (Choose two.)
Question 173
 
                            
                            
                                Refer to the exhibit. A developer must create a new network object named testnetwork by using the Cisco Firepower Device Management API. The script must also handle any exceptions that occur during the request and print out any resulting errors. Which script must be used?
Question 174
 
                            
                            
                                What is the gRPC Network Management Interface protocol?
Question 175
 
                            
                            
                                An application has been developed for monitoring rooms in Cisco Webex. An engineer uses the application to retrieve all the messages from a Cisco Webex room, but the results are slowly presented. Which action optimizes calls to retrieve the messages from the /v1/messages endpoint?
Question 176
 
                            
                            
                                What are two principles according to the build, release, run principle of the twelve-factor app methodology?
(Choose two.)
Question 177
 
                            
                            
                                A developer is building an application to access a website. When running the application, an HTTP403 errorcode has been received. How should the application be modified to handle this code?
Question 178
 
                            
                            
                                When end-to-end encryption is implemented, which area is most vulnerable to exploitation?
Question 179
 
                            
                            
                                Refer to the exhibit. The presented application consists of a Nginx container and a load balancer service. Which GitLab CI/CD configuration implements the Kubernetes deployment?
Question 180
 
                            
                            
                                What are two benefits of using distributed log collectors? (Choose two.)
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question