Cisco 350-901 Practice Test - Questions Answers, Page 34

List of questions
Question 331

Where mus! the data be encrypted to ensure end-to-end encryption when using an API?
Question 332

Refer to the exhibit.
A network engineer created a simple Python Flask application but must incorporate a CSRF token.
Which code snippet must be added in the blank in the script to manually incorporate the token?
Question 333

Refer to the exhibit.
An architect wrote an application to collect device information from the Cisco Meraki Dashboard API.
Every time a network change occurs the application collects information and records new endpoint MAC addresses. The application stopped working after the locations and network equipment of a competitor were acquired. Which application approach must be applied to reduce latency and rate limiting?
Question 334

An application must be able to print the values of the variables in specific modules. Different message levels will be used for production and for development. Proof of access and activity must be documented. What must be included in the implementation to support these observability requirements?
Question 335

Refer to the exhibit.
An engineer creates an application that leverages the Ansible framework to provision CPE endpoints that have configuration changes. The application contains an Ansible playbook named provision_cpes.yml that uses the ansible.builtin.script Ansible module to execute these two Python scripts:
• gather and_create.py. which creates a JSON file named bios.json that contains the CPE models and their respective IOS file information
• load and parse.py. which loads the file data and parses it for later consumption After several successful runs, the application fails. During a review of the Ansible execution logs, the engineer discovers an error output that indicates that one of the stages failed. What is the cause of this issue?
Question 336

How is an OAulh2 three-legged authentication flow initiated?
Question 337

What is the unique identifier in the 0Auth2 three-legged authorization code flow?
Question 338

A developer is designing a modem, distributed microservice enterprise application. The application will be integrating with other systems and focus on a large deployment, so control of API calls is necessary. What is the best practice to reduce application response latency and protect the application from excessive use?
Question 339

An application is made up of multiple microservices, each communicating via APIs. One service is beginning to be a bottleneck for the application because it can take a lot of time to complete requests. An engineer tried adding additional instances of this service behind the load balancer, but it did not have any effect. Which application design change must be implemented m this scenario?
Question 340

What is a risk to data privacy during the storage and transmission of data?
Question