Cisco 350-901 Practice Test - Questions Answers, Page 29
List of questions
Related questions
DRAG DROP
Drag and drop the code from the bottom onto the box where the code is missing to construct a UCS XML API request to generate two service profiles from the template org-root/is-service-template.
Not at options are used
DRAG DROP
Drag and drop the code from the bottom onto the box where the code is missing to stop the REST API requests if a 'Too Many Requests" response is received Not all options are used.
DRAG DROP
Drag and drop the code from the bottom onto the box where the code is missing to create a new IKEv2 policy Not all options are used
DRAG DROP
Drag and drop the components from the left into the order on the right to create the flow of the three-legged OAuth2.
DRAG DROP
Refer to the exhibit Drag and drop the code from the bottom onto the box where the code is missing to query the last 10 Bluetooth clients seen by APs in their network using the Meraki Dashboard API Not all options are used.
DRAG DROP
Drag and drop the code from the bottom onto the box where the code is missing to construct a contact tracking application that dynamically returns all the Bluetooth clients on a given Meraki network. Not all options are used.
Refer to the exhibit.
Which code snippet must be added to the blank in the code to automate the evaluation and handling of errors due to wrong credentials when Basic Authorization is used?
A developer needs to build a new Docker image and has created a tag by using the command:
$ docker tag 32df423320458 local/app.1.2
Which command must be executed next to build the Docker image using the tag?
Refer to the exhibit.
A developer created a Python script to retrieve interface information for the devices in a MeraKi network environment. A security analyst has reviewed the code and observed poor secret storage practices. What is the appropriate password storage approach?
Set the Base64 encoded version of the API key as MER_API_KEY in the code and Base64 decode before using in the header.
Set an OS environment variable for MER_API_KEY to the API key during running the code and longer set MER_API_KEY within the code.
Create a secret for the API key, set MER_API_KEY using the value from the secret in the Pod. and no longer set MER_API_KEY within the code.
Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code.
Which action enhances end-user privacy when an application is built that collects and processes the location data from devices?
Pepper the MAC address for each device.
Salt the MAC address for each device.
Implement an algorithmic information theoretic loss to the MAC address for each device.
Use the network device serial number to encrypt the MAC address for each device.
Question