Cisco 350-901 Practice Test - Questions Answers, Page 20
List of questions
Related questions
What is a well-defined concept for GDPR compliance?
Records that are relevant to an existing contract agreement can be retained as long as the contract is in effect.
Data controllers must confirm to data subjects as to whether where, and why personal data is being processed.
Personal data that was collected before the compliance standards were set do not need to be protected.
Compliance standards apply to organizations that have a physical presence in Europe.
Refer to the exhibit.
Interface Lookback 1 must be created with IP address 10.30.0.1/24 in a Cisco IOS XE device using RESTCONF. The schema that is defined by the exhibit must be used. Which body and URI should be used for this operation?
Refer to the exhibit.
Which word is missing from this Ansible playbook shown, to allow the Cisco IOS XE commands for router configuration to be pushed after the playbook is executed?
Commands
Input
Lines
cofig
Refer to the exhibit.
The cisco_devnet Docker swarm service runs across five replicas The development team tags and imports a new image named devnet'test 1 1 and requests that the image be upgraded on each container There must be no service outages during the upgrade process Which two design approaches must be used? (Choose two.)
Implement rolling upgrades by using the docker service update command.
Enable parallel upgrades by using the docker service update command.
Ensure that the service is hosted behind a VIP with no session persistence.
Update the restart policy of the containers to restart upon failure.
Ensure that the service replicas are set to a minimum of 5
How is AppDynamics used to instrument an application?
Provides visibility into the transaction logs that can be correlated to specific business transaction requests
Enables instrumenting a backend web server (or packet installation by using an AppDynamics agent
Retrieves a significant amount of information from the perspective of the database server by using application monitoring
Monitors traffic flows by using an AppDynamics agent installed on a network infrastructure device
An engineer is developing a Docket container for an application in Python For security reasons the application needs to be accessible on port 5001 only Which line should be added to the dockerfile m order to accomplish this?
ENTRYPOINT 5001
PORT SRC 5001
ADO PORT 5001
EXPOSE 5001
Which OAuth mechanism enables clients to continue to have an active access token without further interaction from the user?
JWT
password grant
refresh grant
preshared key
Refer to the exhibit.
A developer must configure an SSL certificate for an nginx web server Which code must be added on the script to accomplish this configuration?
A web application is being developed to provide online sales to a retailer. The customers will need to use their username and passwords to login into then profile and complete their order For this reason the application must store user passwords Which approach ensures that an attacker wifi need to crack the passwords one at a time?
Apply the peppering technique
Store the passwords by using asymmetric encryption
Apply the salting technique
Store the passwords by using symmetric encryption
Which scenario is an example of the pseudonymization of sensitive data that meets GDPR requirements?
encrypting sensitive data at rest by using native cloud services and data in transit by using SSL/TLS transport
implementing XFowarded For at the frontend of a web app to enable the source IP addresses of headers to change
leveraging an application load balancer at the frontend of a web app for SSL/TLS decryption to inspect data in transit
separating the sensitive data into its own dedicated secured data store and using tokens in its place
Question