ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











An architect must optimize traffic that targets a popular API endpoint Currently, the application downloads a large file hourly, but often the file is unchanged and the download causes unnecessary load and delays Which cURL command must be used to determine the last modified date of the file and to optimize the API usage?

A.

curl GET request

A.

curl GET request

Answers
B.

curl HEAD request

B.

curl HEAD request

Answers
C.

curl --silent request

C.

curl --silent request

Answers
D.

curl -H 'Cache-Control: no-cache' request

D.

curl -H 'Cache-Control: no-cache' request

Answers
Suggested answer: B

Refer to the exhibit.

A developer created a Python script to retrieve information about Meraki devices in a local network deployment After requesting a security review of the code the security analyst has observed poor secret storage practices What is the appropriate secret storage approach''

A.

Set the Base64 encoded version of the API key as MER_API_KEY m the code and Base64 decode before using m the header

A.

Set the Base64 encoded version of the API key as MER_API_KEY m the code and Base64 decode before using m the header

Answers
B.

Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code

B.

Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code

Answers
C.

Leverage an external secret vault to retrieve MER_APl_KEY and set the vault key as an OS environment variable before running the code

C.

Leverage an external secret vault to retrieve MER_APl_KEY and set the vault key as an OS environment variable before running the code

Answers
D.

Set an OS environment variable for MER_API_KEY to the API key before running the code and no longer set MER_API_KEY within the code

D.

Set an OS environment variable for MER_API_KEY to the API key before running the code and no longer set MER_API_KEY within the code

Answers
Suggested answer: C

When an application is designed that requires high availability, what is a reason to use a cross-region cloud?

A.

Provide disaster recovery protection

A.

Provide disaster recovery protection

Answers
B.

Protect from a single component failure

B.

Protect from a single component failure

Answers
C.

Minimize costs

C.

Minimize costs

Answers
D.

Account for failure in another zone

D.

Account for failure in another zone

Answers
Suggested answer: A

Refer to the exhibit.

A Docker swarm cluster is configured to load balance services across data centers in three different geographical regions west central and east. The cluster has three manager nodes and three worker nodes Anew service named cisco.devnet is being deployed. The service has these design requirements

• All containers must be hosted only on nodes in the central region

• The service must run only on nodes that are ineligible for the manager role Which approach fulfills the requirements?

A.

Create a second swarm cluster that is hosted only in the central region.

A.

Create a second swarm cluster that is hosted only in the central region.

Answers
B.

Create the service manually in the central region and set replicas to 0.

B.

Create the service manually in the central region and set replicas to 0.

Answers
C.

Use placement constraints to control nodes to which the service can be assigned.

C.

Use placement constraints to control nodes to which the service can be assigned.

Answers
D.

Enable the control flag in the containers of the west and east regions to prevent the service from starting

D.

Enable the control flag in the containers of the west and east regions to prevent the service from starting

Answers
Suggested answer: D

Refer to the exhibit.

Refer to the exhibit A Docker swarm service is currently running m a local data center The service is hosting an HTML website it the container fads then the service becomes unavailable The design must meet these requirements

• The service must be highly available and resilient against a data center outage.

• The service must be accessible from a single URL

• The HTTP session must remain on the server from which the original request was sent

• Failure of the server must force the client to reconnect

Which two design approaches must be used to meet the requirements? (Choose two.)

A.

Create another swarm cluster within a data center and deploy a secondary instance of the service.

A.

Create another swarm cluster within a data center and deploy a secondary instance of the service.

Answers
B.

Create another node in the swarm duster to scale the service across the nodes over two replicas.

B.

Create another node in the swarm duster to scale the service across the nodes over two replicas.

Answers
C.

Configure an external load balancer to route requests to the swarm service by using session persistence

C.

Configure an external load balancer to route requests to the swarm service by using session persistence

Answers
D.

Scale the Docker swarm service to 2 and set endpoint-mode to DNSRR instead of the default value of VIP

D.

Scale the Docker swarm service to 2 and set endpoint-mode to DNSRR instead of the default value of VIP

Answers
E.

Configure a routing mesh to route requests to the swarm service by using NAT on the network side

E.

Configure a routing mesh to route requests to the swarm service by using NAT on the network side

Answers
Suggested answer: B, C

A developer must deploy a containerized application foe network device inventory management.

The developer sets up a Kubernetes duster on two separate hypervisors. The SLA is not currently meeting a specified maximum value for network latencyjitter CPU/memory and disk I/O are functioning property. Which two design approaches resolve the issue'' (Choose two.)

A.

Colocate services in the same pod

A.

Colocate services in the same pod

Answers
B.

Replace the HDD drives with SSD drives

B.

Replace the HDD drives with SSD drives

Answers
C.

Enable IPv6 within the duster

C.

Enable IPv6 within the duster

Answers
D.

Deploy the duster to a bare metal server

D.

Deploy the duster to a bare metal server

Answers
E.

Upgrade the server NIC card

E.

Upgrade the server NIC card

Answers
Suggested answer: A, E

Refer to the exhibit.

A Python script must list network clients in the Cisco Meraki API that have used a network with an ID of 2 The number of client entries per returned page is restricted to 1.000 according to the API specification Network 2 has 2.500 clients

What must be added where the code is missing to print the content of each response?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B

A developer deploys a web application in a local data center that is now experiencing high traffic load from users accessing data through REST API calls. Which approach enhances the responsiveness and performance of the API?

A.

Use HTTP POST or other non-read methods for read requests when possible

A.

Use HTTP POST or other non-read methods for read requests when possible

Answers
B.

Ensure that all read requests are clearly identified by the PUT method

B.

Ensure that all read requests are clearly identified by the PUT method

Answers
C.

Configure API payload to return errors in HTTP 200 responses

C.

Configure API payload to return errors in HTTP 200 responses

Answers
D.

Use HTTP standard authorization header to submit authentication credentials

D.

Use HTTP standard authorization header to submit authentication credentials

Answers
Suggested answer: D

A custom dashboard of the network health must be created by using Cisco DNA Center APIs An existing dashboard is a RESTful API that receives data from Cisco DNA Center as a new metric every time the network health information is sent from the script to the dashboard Which set of requests creates the custom dashboard?

A.

PUT request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

A.

PUT request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

Answers
B.

POST request to Cisco DNA Center to obtain the network health information and then a GET request to the dashboard to publish the new metric

B.

POST request to Cisco DNA Center to obtain the network health information and then a GET request to the dashboard to publish the new metric

Answers
C.

GET request to Cisco DNA Center to obtain the network health information and then a PUT request to the dashboard to publish the new metric

C.

GET request to Cisco DNA Center to obtain the network health information and then a PUT request to the dashboard to publish the new metric

Answers
D.

GET request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

D.

GET request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

Answers
Suggested answer: D

A developer wants to automate virtual infrastructure to provision and manage it. The system will be implemented m large-scale deployment while offering redundancy and scalability with ease of management The solution must meet these requirements:

• Support the provisioning of up to 500 new virtual machines into private datacenters or the public cloud

• Support the modeling of a complex environment that consists of multiple virtual machines while supporting disaster recovery

• Maintain steady-state environments

Which configuration management solution must the developer use?

A.

Puppet

A.

Puppet

Answers
B.

Terraform

B.

Terraform

Answers
C.

Docker

C.

Docker

Answers
D.

Arable

D.

Arable

Answers
Suggested answer: B
Total 364 questions
Go to page: of 37