ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 18

Question list
Search
Search

Related questions











Which Puppet manifest needs to be used to configure an interface GigabitEthernet 0/1 on a Cisco IOS switch?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: D

Explanation:

https://github.com/puppetlabs/cisco_ios/blob/main/examples/network_interface.pp

What are two steps in the OAuth2 protocol flow? (Choose two.)

A.

The user is authenticated by the authorization server and granted an access token.

A.

The user is authenticated by the authorization server and granted an access token.

Answers
B.

The user's original credentials are validated by the resource server and authorization is granted.

B.

The user's original credentials are validated by the resource server and authorization is granted.

Answers
C.

The user indirectly requests authorization through the authorization server.

C.

The user indirectly requests authorization through the authorization server.

Answers
D.

The user requests an access token by authentication and authorization grant presentation.

D.

The user requests an access token by authentication and authorization grant presentation.

Answers
E.

The user requests the protected resource from the resource server using the original credentials.

E.

The user requests the protected resource from the resource server using the original credentials.

Answers
Suggested answer: A, E

Explanation:

Reference: https://www.digitalocean.com/community/tutorials/an-introduction-to-oauth-2

Refer to the exhibit. A developer must create a new network object named testnetwork by using the Cisco Firepower Device Management API. The script must also handle any exceptions that occur during the request and print out any resulting errors. Which script must be used?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

What is the gRPC Network Management Interface protocol?

A.

a unified management protocol for streaming telemetry and database logging

A.

a unified management protocol for streaming telemetry and database logging

Answers
B.

a configuration management protocol for monitoring

B.

a configuration management protocol for monitoring

Answers
C.

a protocol for configuration management and streaming telemetry

C.

a protocol for configuration management and streaming telemetry

Answers
D.

a logging protocol used across database servers

D.

a logging protocol used across database servers

Answers
Suggested answer: C

Explanation:

Reference: https://infohub.delltechnologies.com/l/enterprise-sonic-distribution-by-delltechnologies-lifecyclemanagement/grpc-network-management-interface

An application has been developed for monitoring rooms in Cisco Webex. An engineer uses the application to retrieve all the messages from a Cisco Webex room, but the results are slowly presented. Which action optimizes calls to retrieve the messages from the /v1/messages endpoint?

A.

Define the ma property by using the pagination functionality.

A.

Define the ma property by using the pagination functionality.

Answers
B.

Set the beforeMessage property to retrieve the messages sent before a specific message ID.

B.

Set the beforeMessage property to retrieve the messages sent before a specific message ID.

Answers
C.

Avoid unnecessary calls by using a prior request to /v1/rooms to retrieve the last activity property.

C.

Avoid unnecessary calls by using a prior request to /v1/rooms to retrieve the last activity property.

Answers
D.

Filter the response results by specifying the created property in the request.

D.

Filter the response results by specifying the created property in the request.

Answers
Suggested answer: A

Explanation:

Reference: https://apphub.webex.com/messaging/applications/paginate-cisco-systems-82277

What are two principles according to the build, release, run principle of the twelve-factor app methodology?

(Choose two.)

A.

Code changes are able to be made at runtime.

A.

Code changes are able to be made at runtime.

Answers
B.

Separation between the build, release, and run phases.

B.

Separation between the build, release, and run phases.

Answers
C.

Releases should have a unique identifier.

C.

Releases should have a unique identifier.

Answers
D.

Existing releases are able to be mutated after creation.

D.

Existing releases are able to be mutated after creation.

Answers
E.

Release stage is responsible for compilation of assets and binaries.

E.

Release stage is responsible for compilation of assets and binaries.

Answers
Suggested answer: B, C

Explanation:

Reference: https://www.bmc.com/blogs/twelve-factor-app/

A developer is building an application to access a website. When running the application, an HTTP403 errorcode has been received. How should the application be modified to handle this code?

A.

Create a loop on cancel the operation and run a new one after the code is received.

A.

Create a loop on cancel the operation and run a new one after the code is received.

Answers
B.

Use exponential backoff when retrying distributed services and other remote endpoints.

B.

Use exponential backoff when retrying distributed services and other remote endpoints.

Answers
C.

Build a try/except around the urlopen to find errors occurring in the request.

C.

Build a try/except around the urlopen to find errors occurring in the request.

Answers
D.

Redirect the request to an internal web server and make a new request from the internal resource.

D.

Redirect the request to an internal web server and make a new request from the internal resource.

Answers
Suggested answer: B

When end-to-end encryption is implemented, which area is most vulnerable to exploitation?

A.

cryptographic key exchange

A.

cryptographic key exchange

Answers
B.

endpoint security

B.

endpoint security

Answers
C.

cryptographic key generation

C.

cryptographic key generation

Answers
D.

security of data in transit

D.

security of data in transit

Answers
Suggested answer: B

Refer to the exhibit. The presented application consists of a Nginx container and a load balancer service. Which GitLab CI/CD configuration implements the Kubernetes deployment?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

Explanation:

https://kubernetes.io/docs/reference/kubectl/kubectl/

What are two benefits of using distributed log collectors? (Choose two.)

A.

supports multiple transport protocols such as TCP/UDP

A.

supports multiple transport protocols such as TCP/UDP

Answers
B.

improves performance and reduces resource consumption

B.

improves performance and reduces resource consumption

Answers
C.

provides flexibility due to a wide range of plugins and accepted log formats

C.

provides flexibility due to a wide range of plugins and accepted log formats

Answers
D.

enables extension of logs with fields and export to backend systems

D.

enables extension of logs with fields and export to backend systems

Answers
E.

buffers and resends data when the network is unavailable

E.

buffers and resends data when the network is unavailable

Answers
Suggested answer: B, E
Total 364 questions
Go to page: of 37