ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 25

Question list
Search
Search

Related questions











What is an effective logging strategy according 10 the 12-factor app tenets?

A.

Capture togs by the execution environment and route to a centralized destination

A.

Capture togs by the execution environment and route to a centralized destination

Answers
B.

Tag and save togs in a local document database that has querying capabilities.

B.

Tag and save togs in a local document database that has querying capabilities.

Answers
C.

Back up log files in a high-availability remote cluster on the public cloud

C.

Back up log files in a high-availability remote cluster on the public cloud

Answers
D.

Timestamp and save logs in a local time-series database that has querying capabilities

D.

Timestamp and save logs in a local time-series database that has querying capabilities

Answers
Suggested answer: A

Which two encryption principles should be applied to secure APIs? (Choose two.)

A.

Use temporary files as part of the encryption and decryption process

A.

Use temporary files as part of the encryption and decryption process

Answers
B.

Transmit authorization information by using digitally signed payloads

B.

Transmit authorization information by using digitally signed payloads

Answers
C.

Use encrypted connections to protect data n transit

C.

Use encrypted connections to protect data n transit

Answers
D.

Reuse source code that contain existing UUIDs

D.

Reuse source code that contain existing UUIDs

Answers
E.

Embed keys in code to simplify the decryption process

E.

Embed keys in code to simplify the decryption process

Answers
Suggested answer: B, C

Refer to the exhibit A script returns the location of a specific access point when given the access point name If a user enters a search value such as DROP TABLE access points then the entire table is removed. What must be added to the box where the code is missing to prevent a SQL injection attack?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D

Refer to the exhibit.

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D

A Cisco Catalyst 9000 switch has guest shell enabled. Which Linux command installs a third-party application?

A.

yum Install <package-name>

A.

yum Install <package-name>

Answers
B.

apt-get install <package-name>

B.

apt-get install <package-name>

Answers
C.

zypper install <package-name>

C.

zypper install <package-name>

Answers
D.

dnf install <package-name>

D.

dnf install <package-name>

Answers
Suggested answer: A

Which function does Fluentd fulfill for application logging in Kubernetes?

A.

logging agent for distribution

A.

logging agent for distribution

Answers
B.

backend time series database storage

B.

backend time series database storage

Answers
C.

monitoring and log visualization

C.

monitoring and log visualization

Answers
D.

messaging queueig infrastructure

D.

messaging queueig infrastructure

Answers
Suggested answer: A

Refer to the exhibit.

A network engineer needs to handle API errors in their requests when users do not have permission to access the resource, even if they are authenticated and authorized. Which line of code needs to be placed on the snippet where the code is missing to handle these API errors?

A.

if r.status_code == 403

A.

if r.status_code == 403

Answers
B.

il if r.raise for status() == 403

B.

il if r.raise for status() == 403

Answers
C.

if r.raise for_status() = 401

C.

if r.raise for_status() = 401

Answers
D.

if r.status_code = 401

D.

if r.status_code = 401

Answers
Suggested answer: B

How is client code that consumes gRPC telemetry implemented, assuming that the preferred language is able to be chosen?

A.

Parse the OpenAPI spec model

A.

Parse the OpenAPI spec model

Answers
B.

Compile the protocol buffers IDL

B.

Compile the protocol buffers IDL

Answers
C.

Leverage a Thrift code generator to parse a Thrift IDL

C.

Leverage a Thrift code generator to parse a Thrift IDL

Answers
D.

Review the Swagger API documentation to build client code

D.

Review the Swagger API documentation to build client code

Answers
Suggested answer: B

Refer to the exhibit.

An application is being developed as an information repository.The application will be used to store details about television shows, including the scenario, year, and category. Which database type must used for high performance for the data structure?

A.

time series

A.

time series

Answers
B.

Eidocument-based

B.

Eidocument-based

Answers
C.

graph

C.

graph

Answers
D.

columnar

D.

columnar

Answers
Suggested answer: B

Refer to the exhibit.

Which cURL request is included in the presented XML as the body of the response?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D
Total 364 questions
Go to page: of 37