ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











DRAG DROP

Drag and drop the code from the bottom onto the box where the code is missing to construct a UCS XML API request to generate two service profiles from the template org-root/is-service-template.

Not at options are used


Question 281
Correct answer: Question 281

DRAG DROP

Drag and drop the code from the bottom onto the box where the code is missing to stop the REST API requests if a 'Too Many Requests" response is received Not all options are used.


Question 282
Correct answer: Question 282

DRAG DROP

Drag and drop the code from the bottom onto the box where the code is missing to create a new IKEv2 policy Not all options are used


Question 283
Correct answer: Question 283

DRAG DROP

Drag and drop the components from the left into the order on the right to create the flow of the three-legged OAuth2.


Question 284
Correct answer: Question 284

DRAG DROP

Refer to the exhibit Drag and drop the code from the bottom onto the box where the code is missing to query the last 10 Bluetooth clients seen by APs in their network using the Meraki Dashboard API Not all options are used.


Question 285
Correct answer: Question 285

DRAG DROP

Drag and drop the code from the bottom onto the box where the code is missing to construct a contact tracking application that dynamically returns all the Bluetooth clients on a given Meraki network. Not all options are used.


Question 286
Correct answer: Question 286

Refer to the exhibit.

Which code snippet must be added to the blank in the code to automate the evaluation and handling of errors due to wrong credentials when Basic Authorization is used?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

A developer needs to build a new Docker image and has created a tag by using the command:

$ docker tag 32df423320458 local/app.1.2

Which command must be executed next to build the Docker image using the tag?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

Refer to the exhibit.

A developer created a Python script to retrieve interface information for the devices in a MeraKi network environment. A security analyst has reviewed the code and observed poor secret storage practices. What is the appropriate password storage approach?

A.

Set the Base64 encoded version of the API key as MER_API_KEY in the code and Base64 decode before using in the header.

A.

Set the Base64 encoded version of the API key as MER_API_KEY in the code and Base64 decode before using in the header.

Answers
B.

Set an OS environment variable for MER_API_KEY to the API key during running the code and longer set MER_API_KEY within the code.

B.

Set an OS environment variable for MER_API_KEY to the API key during running the code and longer set MER_API_KEY within the code.

Answers
C.

Create a secret for the API key, set MER_API_KEY using the value from the secret in the Pod. and no longer set MER_API_KEY within the code.

C.

Create a secret for the API key, set MER_API_KEY using the value from the secret in the Pod. and no longer set MER_API_KEY within the code.

Answers
D.

Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code.

D.

Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code.

Answers
Suggested answer: D

Which action enhances end-user privacy when an application is built that collects and processes the location data from devices?

A.

Pepper the MAC address for each device.

A.

Pepper the MAC address for each device.

Answers
B.

Salt the MAC address for each device.

B.

Salt the MAC address for each device.

Answers
C.

Implement an algorithmic information theoretic loss to the MAC address for each device.

C.

Implement an algorithmic information theoretic loss to the MAC address for each device.

Answers
D.

Use the network device serial number to encrypt the MAC address for each device.

D.

Use the network device serial number to encrypt the MAC address for each device.

Answers
Suggested answer: C
Total 364 questions
Go to page: of 37