ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 34

Question list
Search
Search

List of questions

Search

Related questions











Where mus! the data be encrypted to ensure end-to-end encryption when using an API?

A.

on the device that consumes the API

A.

on the device that consumes the API

Answers
B.

on the source device before transmission

B.

on the source device before transmission

Answers
C.

on the end device after a request is received

C.

on the end device after a request is received

Answers
D.

on the server that stores the data

D.

on the server that stores the data

Answers
Suggested answer: A

Refer to the exhibit.

A network engineer created a simple Python Flask application but must incorporate a CSRF token.

Which code snippet must be added in the blank in the script to manually incorporate the token?

A.

_access_tokenM value=M{{ csrf_token}}

A.

_access_tokenM value=M{{ csrf_token}}

Answers
B.

_csrMoken" value="{{ csrf_grant()}}

B.

_csrMoken" value="{{ csrf_grant()}}

Answers
C.

_csrMoken" value="{{ csrf_token()}}

C.

_csrMoken" value="{{ csrf_token()}}

Answers
D.

_xssjoken" value="{{ csrMoken}}

D.

_xssjoken" value="{{ csrMoken}}

Answers
Suggested answer: C

Refer to the exhibit.

An architect wrote an application to collect device information from the Cisco Meraki Dashboard API.

Every time a network change occurs the application collects information and records new endpoint MAC addresses. The application stopped working after the locations and network equipment of a competitor were acquired. Which application approach must be applied to reduce latency and rate limiting?

A.

MOS scoring system before collecting information

A.

MOS scoring system before collecting information

Answers
B.

leaky faucet algorithm for fault categorizing

B.

leaky faucet algorithm for fault categorizing

Answers
C.

error handling to check for reachability first

C.

error handling to check for reachability first

Answers
D.

webhooks to trigger updates

D.

webhooks to trigger updates

Answers
Suggested answer: C

An application must be able to print the values of the variables in specific modules. Different message levels will be used for production and for development. Proof of access and activity must be documented. What must be included in the implementation to support these observability requirements?

A.

print

A.

print

Answers
B.

metrics

B.

metrics

Answers
C.

logging

C.

logging

Answers
D.

streaming

D.

streaming

Answers
Suggested answer: C

Refer to the exhibit.

An engineer creates an application that leverages the Ansible framework to provision CPE endpoints that have configuration changes. The application contains an Ansible playbook named provision_cpes.yml that uses the ansible.builtin.script Ansible module to execute these two Python scripts:

• gather and_create.py. which creates a JSON file named bios.json that contains the CPE models and their respective IOS file information

• load and parse.py. which loads the file data and parses it for later consumption After several successful runs, the application fails. During a review of the Ansible execution logs, the engineer discovers an error output that indicates that one of the stages failed. What is the cause of this issue?

A.

ansible builtm script Ansible module

A.

ansible builtm script Ansible module

Answers
B.

gather and create.py Python script

B.

gather and create.py Python script

Answers
C.

load_and_parse.py Python script

C.

load_and_parse.py Python script

Answers
D.

provision cpes.yml Ansibte playbook

D.

provision cpes.yml Ansibte playbook

Answers
Suggested answer: B

How is an OAulh2 three-legged authentication flow initiated?

A.

The user makes a roquost to the OAuth client

A.

The user makes a roquost to the OAuth client

Answers
B.

Exchange the key f<x an access token

B.

Exchange the key f<x an access token

Answers
C.

Construct an API call to retrieve the credentials.

C.

Construct an API call to retrieve the credentials.

Answers
D.

Get the authorization code.

D.

Get the authorization code.

Answers
Suggested answer: A

What is the unique identifier in the 0Auth2 three-legged authorization code flow?

A.

client ID

A.

client ID

Answers
B.

resource server

B.

resource server

Answers
C.

resource owner

C.

resource owner

Answers
D.

authorization server

D.

authorization server

Answers
Suggested answer: A

A developer is designing a modem, distributed microservice enterprise application. The application will be integrating with other systems and focus on a large deployment, so control of API calls is necessary. What is the best practice to reduce application response latency and protect the application from excessive use?

A.

Implement rate limiting on the client side.

A.

Implement rate limiting on the client side.

Answers
B.

Implement rate limiting on the client and server sides.

B.

Implement rate limiting on the client and server sides.

Answers
C.

Do not enforce any rate Imiting

C.

Do not enforce any rate Imiting

Answers
D.

Implement rate limiting on the server side.

D.

Implement rate limiting on the server side.

Answers
Suggested answer: B

An application is made up of multiple microservices, each communicating via APIs. One service is beginning to be a bottleneck for the application because it can take a lot of time to complete requests. An engineer tried adding additional instances of this service behind the load balancer, but it did not have any effect. Which application design change must be implemented m this scenario?

A.

Move from synchronous to asynchronous interactions with the service and implement a message queue.

A.

Move from synchronous to asynchronous interactions with the service and implement a message queue.

Answers
B.

Deploy an API gateway to centralize all inbound communication requests and offload authentication

B.

Deploy an API gateway to centralize all inbound communication requests and offload authentication

Answers
C.

Vendor all dependencies into the service that is causing delays to remove external dependency checks.

C.

Vendor all dependencies into the service that is causing delays to remove external dependency checks.

Answers
D.

Leverage serverless architecture instead of containers to gain the advantage of event driven APIs.

D.

Leverage serverless architecture instead of containers to gain the advantage of event driven APIs.

Answers
Suggested answer: A

What is a risk to data privacy during the storage and transmission of data?

A.

The risk of exposure is increased when data is shared between applications.

A.

The risk of exposure is increased when data is shared between applications.

Answers
B.

The transfer of unencrypted data between storage devices increases the risk of exposure.

B.

The transfer of unencrypted data between storage devices increases the risk of exposure.

Answers
C.

Data breaches cause ongoing exposure of personal information.

C.

Data breaches cause ongoing exposure of personal information.

Answers
D.

The transfer of unencrypted personally identifiable financial information from a storage device increases the risk of a data broach.

D.

The transfer of unencrypted personally identifiable financial information from a storage device increases the risk of a data broach.

Answers
Suggested answer: B
Total 364 questions
Go to page: of 37