ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











What is a well-defined concept for GDPR compliance?

A.

Records that are relevant to an existing contract agreement can be retained as long as the contract is in effect.

A.

Records that are relevant to an existing contract agreement can be retained as long as the contract is in effect.

Answers
B.

Data controllers must confirm to data subjects as to whether where, and why personal data is being processed.

B.

Data controllers must confirm to data subjects as to whether where, and why personal data is being processed.

Answers
C.

Personal data that was collected before the compliance standards were set do not need to be protected.

C.

Personal data that was collected before the compliance standards were set do not need to be protected.

Answers
D.

Compliance standards apply to organizations that have a physical presence in Europe.

D.

Compliance standards apply to organizations that have a physical presence in Europe.

Answers
Suggested answer: B

Refer to the exhibit.

Interface Lookback 1 must be created with IP address 10.30.0.1/24 in a Cisco IOS XE device using RESTCONF. The schema that is defined by the exhibit must be used. Which body and URI should be used for this operation?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

Refer to the exhibit.

Which word is missing from this Ansible playbook shown, to allow the Cisco IOS XE commands for router configuration to be pushed after the playbook is executed?

A.

Commands

A.

Commands

Answers
B.

Input

B.

Input

Answers
C.

Lines

C.

Lines

Answers
D.

cofig

D.

cofig

Answers
Suggested answer: C

Refer to the exhibit.

The cisco_devnet Docker swarm service runs across five replicas The development team tags and imports a new image named devnet'test 1 1 and requests that the image be upgraded on each container There must be no service outages during the upgrade process Which two design approaches must be used? (Choose two.)

A.

Implement rolling upgrades by using the docker service update command.

A.

Implement rolling upgrades by using the docker service update command.

Answers
B.

Enable parallel upgrades by using the docker service update command.

B.

Enable parallel upgrades by using the docker service update command.

Answers
C.

Ensure that the service is hosted behind a VIP with no session persistence.

C.

Ensure that the service is hosted behind a VIP with no session persistence.

Answers
D.

Update the restart policy of the containers to restart upon failure.

D.

Update the restart policy of the containers to restart upon failure.

Answers
E.

Ensure that the service replicas are set to a minimum of 5

E.

Ensure that the service replicas are set to a minimum of 5

Answers
Suggested answer: A, C

How is AppDynamics used to instrument an application?

A.

Provides visibility into the transaction logs that can be correlated to specific business transaction requests

A.

Provides visibility into the transaction logs that can be correlated to specific business transaction requests

Answers
B.

Enables instrumenting a backend web server (or packet installation by using an AppDynamics agent

B.

Enables instrumenting a backend web server (or packet installation by using an AppDynamics agent

Answers
C.

Retrieves a significant amount of information from the perspective of the database server by using application monitoring

C.

Retrieves a significant amount of information from the perspective of the database server by using application monitoring

Answers
D.

Monitors traffic flows by using an AppDynamics agent installed on a network infrastructure device

D.

Monitors traffic flows by using an AppDynamics agent installed on a network infrastructure device

Answers
Suggested answer: A

An engineer is developing a Docket container for an application in Python For security reasons the application needs to be accessible on port 5001 only Which line should be added to the dockerfile m order to accomplish this?

A.

ENTRYPOINT 5001

A.

ENTRYPOINT 5001

Answers
B.

PORT SRC 5001

B.

PORT SRC 5001

Answers
C.

ADO PORT 5001

C.

ADO PORT 5001

Answers
D.

EXPOSE 5001

D.

EXPOSE 5001

Answers
Suggested answer: D

Which OAuth mechanism enables clients to continue to have an active access token without further interaction from the user?

A.

JWT

A.

JWT

Answers
B.

password grant

B.

password grant

Answers
C.

refresh grant

C.

refresh grant

Answers
D.

preshared key

D.

preshared key

Answers
Suggested answer: C

Refer to the exhibit.

A developer must configure an SSL certificate for an nginx web server Which code must be added on the script to accomplish this configuration?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

A web application is being developed to provide online sales to a retailer. The customers will need to use their username and passwords to login into then profile and complete their order For this reason the application must store user passwords Which approach ensures that an attacker wifi need to crack the passwords one at a time?

A.

Apply the peppering technique

A.

Apply the peppering technique

Answers
B.

Store the passwords by using asymmetric encryption

B.

Store the passwords by using asymmetric encryption

Answers
C.

Apply the salting technique

C.

Apply the salting technique

Answers
D.

Store the passwords by using symmetric encryption

D.

Store the passwords by using symmetric encryption

Answers
Suggested answer: C


Which scenario is an example of the pseudonymization of sensitive data that meets GDPR requirements?

A.

encrypting sensitive data at rest by using native cloud services and data in transit by using SSL/TLS transport

A.

encrypting sensitive data at rest by using native cloud services and data in transit by using SSL/TLS transport

Answers
B.

implementing XFowarded For at the frontend of a web app to enable the source IP addresses of headers to change

B.

implementing XFowarded For at the frontend of a web app to enable the source IP addresses of headers to change

Answers
C.

leveraging an application load balancer at the frontend of a web app for SSL/TLS decryption to inspect data in transit

C.

leveraging an application load balancer at the frontend of a web app for SSL/TLS decryption to inspect data in transit

Answers
D.

separating the sensitive data into its own dedicated secured data store and using tokens in its place

D.

separating the sensitive data into its own dedicated secured data store and using tokens in its place

Answers
Suggested answer: A
Total 364 questions
Go to page: of 37