ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B

A new record-keeping application for employees to track customer orders must be deployed to a company's existing infrastructure. The host servers reside in a data center in a different country to where the majority of users work. The new network configuration for the database server is: •IP:

10.8.32.10

• Subnet Mask: 255.255.255.0

• Hostname: CustOrd423320458-Prod-010

• MAC: 18-46-AC-6F-F4-52.

The performance of the client-side application is a priority due to the high demand placed on it by employees. Which area should the team consider in terms of impact to application performance due to the planned deployment?

A.

jitter

A.

jitter

Answers
B.

decreased bandwidth

B.

decreased bandwidth

Answers
C.

latency

C.

latency

Answers
D.

connectivity loss

D.

connectivity loss

Answers
Suggested answer: C

An application requires SSL certificates signed by an intermediate CA certificate. The crt files must be available to the application:

• The root CA certificate is root_certrficate.crt.

• The intermediate CA certificate is intermediate_certificate.crt

• The application-specific SSL certificate is crt_certificate.crt.

Which Bash command outputs the certificate bundle as a .pern file?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D

Refer to the exhibit.

Refer to the exhibit An application hosting server with the local data center is experiencing large amounts of traffic from enclusers. A developer must optimize this API server to reduce the toad on its host. What are two ways to optimize this code through HTTP cache controls? (Choose two.)

A.

Include the "ETag" header in the API response.

A.

Include the "ETag" header in the API response.

Answers
B.

Include the "Last-Modified" header in the API response.

B.

Include the "Last-Modified" header in the API response.

Answers
C.

Include the "Content-Type" header in the API response.

C.

Include the "Content-Type" header in the API response.

Answers
D.

Leverage middleware caching and respond with HTTP code 104 m the API response

D.

Leverage middleware caching and respond with HTTP code 104 m the API response

Answers
E.

Leverage middleware caching and respond with HTTP code 204 m the API response.

E.

Leverage middleware caching and respond with HTTP code 204 m the API response.

Answers
Suggested answer: A, B

Refer to the exhibit.

One part of an application routinely uses the Cisco Meraki API to collate data about all clients Other parts of the application also use the Meraki API, but a single API key is used within the application The organization has approximately 4.000 clients across 30 networks Some of the application users report poor performance and missing dat a. Which two changes improve the performance of the application? (Choose two.)

A.

Check for HTTP code 429 and wait until Retry-After time before further calls are made

A.

Check for HTTP code 429 and wait until Retry-After time before further calls are made

Answers
B.

Configure multiple API keys in the application and rotate usage of each one.

B.

Configure multiple API keys in the application and rotate usage of each one.

Answers
C.

Use random values in the User-Agent header when HTTP calls are made.

C.

Use random values in the User-Agent header when HTTP calls are made.

Answers
D.

Use fewer API calls to create a more efficient endpoint.

D.

Use fewer API calls to create a more efficient endpoint.

Answers
E.

Check API response payloads for later reuse in real time during code execution.

E.

Check API response payloads for later reuse in real time during code execution.

Answers
Suggested answer: A, B

How should logs for an application be created?

A.

Use a standard and easily configurable logging framework.

A.

Use a standard and easily configurable logging framework.

Answers
B.

Use fault-tolerant protocols.

B.

Use fault-tolerant protocols.

Answers
C.

Monitor for backlogs and outages.

C.

Monitor for backlogs and outages.

Answers
D.

Filter sensitive data before transmitting logs.

D.

Filter sensitive data before transmitting logs.

Answers
Suggested answer: A

Which approach is used to protect East-West API traffic?

A.

Use encryption between services

A.

Use encryption between services

Answers
B.

Install a perimeter firewall

B.

Install a perimeter firewall

Answers
C.

Use a dedicated cloud connection service.

C.

Use a dedicated cloud connection service.

Answers
D.

Implement an API gateway

D.

Implement an API gateway

Answers
Suggested answer: A

A developer creates an application for a Cisco Catalyst 9000 switch in a Docker container. Which action must be taken to host the application on the switch?

A.

Copy the application code to a NETCONF file and upload the file to the switch

A.

Copy the application code to a NETCONF file and upload the file to the switch

Answers
B.

Connect the switch to Cisco DNA Center and push the application through the platform.

B.

Connect the switch to Cisco DNA Center and push the application through the platform.

Answers
C.

Use the Cisco IOxClient tool to export the application to a ZIP file and push the file to the switch

C.

Use the Cisco IOxClient tool to export the application to a ZIP file and push the file to the switch

Answers
D.

Export the application as a TAR file and import the file to the switch

D.

Export the application as a TAR file and import the file to the switch

Answers
Suggested answer: D

Refer to the exhibit.

A network engineer must integrate error handling tor time-outs on network devices using the REST interface. Which line of code needs to be placed on the snippet where the code is missing to accomplish this task?

A.

elif resp.status_code == 429 or serf._retries < selff._MAX_RETRIES:

A.

elif resp.status_code == 429 or serf._retries < selff._MAX_RETRIES:

Answers
B.

elif resp.status_code == 404 or self, retries < self._MAX_RETRIES:

B.

elif resp.status_code == 404 or self, retries < self._MAX_RETRIES:

Answers
C.

elif resp.status_code == 429 and self .retries < self._MAX_RETRIES:

C.

elif resp.status_code == 429 and self .retries < self._MAX_RETRIES:

Answers
D.

elif resp.status_code == 404 and self._relries < self._MAX_RETRIES:

D.

elif resp.status_code == 404 and self._relries < self._MAX_RETRIES:

Answers
Suggested answer: C

Two Elasticsearch database servers use bidirectional asynchronous data replication Both servers accept writes from clients The design must meet these requirements:

• The cluster must survive if a fault occurs that causes the network connection to go down between nodes

• The data must remain consistent if communication between nodes fails.

• The data must be spread evenly across all nodes in the cluster.

Which design approach must be used to meet the requirements?

A.

Set the initial voting configuration to force a specific node as the master.

A.

Set the initial voting configuration to force a specific node as the master.

Answers
B.

Scale the master nodes down to a single node.

B.

Scale the master nodes down to a single node.

Answers
C.

Set the minimum_master_nodes to 2 in the configuration.

C.

Set the minimum_master_nodes to 2 in the configuration.

Answers
D.

Add a third cluster node to provide majority votes.

D.

Add a third cluster node to provide majority votes.

Answers
Suggested answer: C
Total 364 questions
Go to page: of 37