ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 24

Question list
Search
Search

List of questions

Search

Related questions











What are two building blocks of the 12-factor app? (Choose two.)

A.

Stateful Processes

A.

Stateful Processes

Answers
B.

Easy access to underlying systems

B.

Easy access to underlying systems

Answers
C.

Dev and Prod must be different

C.

Dev and Prod must be different

Answers
D.

One codebase

D.

One codebase

Answers
E.

Isolated Dependencies

E.

Isolated Dependencies

Answers
Suggested answer: D, E

Refer to the exhibit.

A Python script has these requirements

• Retrieve a list of Bluetooth clients seen by the access pants on a network.

• Print the content of the response

• Retrieve the next page only if it is available in the response headers

What must be added where the code is missing to get the remaining pages by using the next link from the link response header of the last request?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

Which command is used 10 enable application hosting on a Cisco IOS XE device?

A.

iox

A.

iox

Answers
B.

iox-service

B.

iox-service

Answers
C.

application -honing

C.

application -honing

Answers
D.

app- hosting

D.

app- hosting

Answers
Suggested answer: A

A developer releases a new application for network automation of Cisco devices deployed m a local data center. The application utilizes complex design patterns such as microservices that host multiple third-party libraries and programming languages. The development must be simplified by implementing an observability-driven development lifecycle Which two considerations must be taken to meet the requirements? (Choose two.)

A.

description of low-level errors

A.

description of low-level errors

Answers
B.

which KPls to monitor

B.

which KPls to monitor

Answers
C.

relevant metrics to expose

C.

relevant metrics to expose

Answers
D.

which monitoring tools to use

D.

which monitoring tools to use

Answers
E.

identifying customer priorities

E.

identifying customer priorities

Answers
Suggested answer: B, C

A developer must recommend an appropriate tool to deploy a configuration to hundreds of servers.

The configuration management solution must meet these requirements.

• The servers must initiate the connection to obtain updates

• The configuration must be defined in a declarative style

Which tool should be used?

A.

Chef

A.

Chef

Answers
B.

Terraform

B.

Terraform

Answers
C.

Puppet

C.

Puppet

Answers
D.

Ansible

D.

Ansible

Answers
Suggested answer: A

Refer to the exhibit.

An engineer writes a script to retrieve data from a REST API and must build support for cases where the response that contains data from the server may take a longer time than normal Which code must be added to the snippet where the code is missing to catch such a timeout?

A.

request.exeception.ConnectTimeout

A.

request.exeception.ConnectTimeout

Answers
B.

request.executions.DataTimeout

B.

request.executions.DataTimeout

Answers
C.

request.exeception.HTTPError

C.

request.exeception.HTTPError

Answers
D.

request.exception.ReadTimeout

D.

request.exception.ReadTimeout

Answers
Suggested answer: A

Refer to the exhibit.

The application follows a containerized microservices architecture that has one container per microservice. The microservices communicate with each other by using REST APIs The doubleheaded arrows m the diagram display chains of synchronous HTTP calls needed for a single use/request Which action ensures the resilience of the application in the scope of a single user request'

A.

Redesign the application to be separated into these three layers Presentation. API. and Data

A.

Redesign the application to be separated into these three layers Presentation. API. and Data

Answers
B.

Implement retries with exponential backoff during HTTP API calls

B.

Implement retries with exponential backoff during HTTP API calls

Answers
C.

Set up multiple instances of each microservice m active/active mode by using the Orchestrator

C.

Set up multiple instances of each microservice m active/active mode by using the Orchestrator

Answers
D.

Create two virtual machines that each host an instance of the application and set up a cluster

D.

Create two virtual machines that each host an instance of the application and set up a cluster

Answers
Suggested answer: A

What is the result of a successful OAuth2 authorization grant flow?

A.

The user has the application rights that correspond to the user's role within the application's database

A.

The user has the application rights that correspond to the user's role within the application's database

Answers
B.

The application is provided with a token that allows actions on services on the user's behalf

B.

The application is provided with a token that allows actions on services on the user's behalf

Answers
C.

The user has administrative rights to the application's backend services

C.

The user has administrative rights to the application's backend services

Answers
D.

The third-party service is provided with a token that allows actions to be performed

D.

The third-party service is provided with a token that allows actions to be performed

Answers
Suggested answer: B

Explanation:

"The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf."

A timeframe custom dashboard must be developed to present data collected from Cisco Meraki. The dashboard must include a wireless health alert count. What needs to be built as a prerequisite?

A.

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Dashboard API

A.

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Dashboard API

Answers
B.

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Scanning API

B.

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Scanning API

Answers
C.

A daemon to consume the Wireless Health endpoint of the Meraki Scanning API

C.

A daemon to consume the Wireless Health endpoint of the Meraki Scanning API

Answers
D.

A daemon to consume the Wireless Health endpoint of the Meraki Dashboard API

D.

A daemon to consume the Wireless Health endpoint of the Meraki Dashboard API

Answers
Suggested answer: A

An application has these characteristics

• provide one service or function

• distributed database

• API gateway

• central repository for code

• configuration database

• uses session management

Which two design approaches contribute to the scalability of the application'? (Choose two )

A.

built to scale based on a star topology

A.

built to scale based on a star topology

Answers
B.

modular design iteration

B.

modular design iteration

Answers
C.

session management in a stateless architecture

C.

session management in a stateless architecture

Answers
D.

planned before the first device is deployed

D.

planned before the first device is deployed

Answers
E.

distributed computing with tightly coupled components

E.

distributed computing with tightly coupled components

Answers
Suggested answer: C, E
Total 364 questions
Go to page: of 37