Cisco 350-901 Practice Test - Questions Answers, Page 34
Related questions
Where mus! the data be encrypted to ensure end-to-end encryption when using an API?
on the device that consumes the API
on the source device before transmission
on the end device after a request is received
on the server that stores the data
Refer to the exhibit.
A network engineer created a simple Python Flask application but must incorporate a CSRF token.
Which code snippet must be added in the blank in the script to manually incorporate the token?
_access_tokenM value=M{{ csrf_token}}
_csrMoken" value="{{ csrf_grant()}}
_csrMoken" value="{{ csrf_token()}}
_xssjoken" value="{{ csrMoken}}
Refer to the exhibit.
An architect wrote an application to collect device information from the Cisco Meraki Dashboard API.
Every time a network change occurs the application collects information and records new endpoint MAC addresses. The application stopped working after the locations and network equipment of a competitor were acquired. Which application approach must be applied to reduce latency and rate limiting?
MOS scoring system before collecting information
leaky faucet algorithm for fault categorizing
error handling to check for reachability first
webhooks to trigger updates
An application must be able to print the values of the variables in specific modules. Different message levels will be used for production and for development. Proof of access and activity must be documented. What must be included in the implementation to support these observability requirements?
metrics
logging
streaming
Refer to the exhibit.
An engineer creates an application that leverages the Ansible framework to provision CPE endpoints that have configuration changes. The application contains an Ansible playbook named provision_cpes.yml that uses the ansible.builtin.script Ansible module to execute these two Python scripts:
• gather and_create.py. which creates a JSON file named bios.json that contains the CPE models and their respective IOS file information
• load and parse.py. which loads the file data and parses it for later consumption After several successful runs, the application fails. During a review of the Ansible execution logs, the engineer discovers an error output that indicates that one of the stages failed. What is the cause of this issue?
ansible builtm script Ansible module
gather and create.py Python script
load_and_parse.py Python script
provision cpes.yml Ansibte playbook
How is an OAulh2 three-legged authentication flow initiated?
The user makes a roquost to the OAuth client
Exchange the key f<x an access token
Construct an API call to retrieve the credentials.
Get the authorization code.
What is the unique identifier in the 0Auth2 three-legged authorization code flow?
client ID
resource server
resource owner
authorization server
A developer is designing a modem, distributed microservice enterprise application. The application will be integrating with other systems and focus on a large deployment, so control of API calls is necessary. What is the best practice to reduce application response latency and protect the application from excessive use?
Implement rate limiting on the client side.
Implement rate limiting on the client and server sides.
Do not enforce any rate Imiting
Implement rate limiting on the server side.
An application is made up of multiple microservices, each communicating via APIs. One service is beginning to be a bottleneck for the application because it can take a lot of time to complete requests. An engineer tried adding additional instances of this service behind the load balancer, but it did not have any effect. Which application design change must be implemented m this scenario?
Move from synchronous to asynchronous interactions with the service and implement a message queue.
Deploy an API gateway to centralize all inbound communication requests and offload authentication
Vendor all dependencies into the service that is causing delays to remove external dependency checks.
Leverage serverless architecture instead of containers to gain the advantage of event driven APIs.
What is a risk to data privacy during the storage and transmission of data?
The risk of exposure is increased when data is shared between applications.
The transfer of unencrypted data between storage devices increases the risk of exposure.
Data breaches cause ongoing exposure of personal information.
The transfer of unencrypted personally identifiable financial information from a storage device increases the risk of a data broach.
Question