ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











DRAG DROP

Drag and drop the code from the bottom onto the box where the code is rrnssmg to create a Webex space Not ail options are used.


Question 61
Correct answer: Question 61

DRAG DROP

Click on the resource labs in the top left corner to view resources to help with this question The script uses the Cisco Intersight REST API Drag and drop the code from the bottom of the code snippet to the blanks in the code to construct a Python script to update the firmware on a specific Cisco interaght managed UCS rack server, DMZ-RL3ADJM.


Question 62
Correct answer: Question 62

DRAG DROP

Click on the resource lab in the top left comer to view resources to help with this question An engineer is managing a data center with 6000 Cisco UCS servers installed and running The engineer is asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB Drag and drop the code from the bottom onto the blanks in the code snippet to construct a REST API call to accomplish this task Not all options are used.


Question 63
Correct answer: Question 63

A developer has created an application based on customer requirements. The customer needs to run the application with the minimum downtime. Which design approach regarding high-availability applications, Recovery Time Objective, and Recovery Point Objective must be taken?

A.

Active/passive results in lower RTO and RPO. For RPO, data synchronization between the two data centers must be timely to allow seamless request flow.

A.

Active/passive results in lower RTO and RPO. For RPO, data synchronization between the two data centers must be timely to allow seamless request flow.

Answers
B.

Active/passive results in lower RTO and RPO. For RPO, data synchronization between the two data centers does not need to be timely to allow seamless request flow.

B.

Active/passive results in lower RTO and RPO. For RPO, data synchronization between the two data centers does not need to be timely to allow seamless request flow.

Answers
C.

Active/active results in lower RTO and RPO. For RPO, data synchronization between the two data centers does not need to be timely to allow seamless request flow.

C.

Active/active results in lower RTO and RPO. For RPO, data synchronization between the two data centers does not need to be timely to allow seamless request flow.

Answers
D.

Active/active results in lower RTO and RPO. For RPO, data synchronization between the two data centers must be timely to allow seamless request flow.

D.

Active/active results in lower RTO and RPO. For RPO, data synchronization between the two data centers must be timely to allow seamless request flow.

Answers
Suggested answer: A

A cloud native project is being worked on in which all source code and dependencies are written in Python, Ruby, and/or JavaScipt. A change in code triggers a notification to the CI/CD tool to run the CI/CD pipeline.

Which step should be omitted from the pipeline?

A.

Deploy the code to one or more environments, such as staging and/or production.

A.

Deploy the code to one or more environments, such as staging and/or production.

Answers
B.

Build one of more containers that package up code and all its dependencies.

B.

Build one of more containers that package up code and all its dependencies.

Answers
C.

Compile code.

C.

Compile code.

Answers
D.

Run automated tests to validate the correctness.

D.

Run automated tests to validate the correctness.

Answers
Suggested answer: C

Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)

A.

Application code writes its event stream to stdout.

A.

Application code writes its event stream to stdout.

Answers
B.

Application log streams are archived in multiple replicated databases.

B.

Application log streams are archived in multiple replicated databases.

Answers
C.

Application log streams are sent to log indexing and analysis systems.

C.

Application log streams are sent to log indexing and analysis systems.

Answers
D.

Application code writes its event stream to specific log files.

D.

Application code writes its event stream to specific log files.

Answers
E.

Log files are aggregated into a single file on individual nodes.

E.

Log files are aggregated into a single file on individual nodes.

Answers
Suggested answer: A, C

An organization manages a large cloud-deployed application that employs a microservices architecture. No notable issues occur with downtime because the services of this application are redundantly deployed over three or more data center regions. However, several times a week reports are received about application slowness. The container orchestration logs show faults in a variety of containers that cause them to fail and then spin up brand new.

Which action must be taken to improve the resiliency design of the application while maintaining current scale?

A.

Update the base image of the containers.

A.

Update the base image of the containers.

Answers
B.

Test the execution of the application with another cloud services platform.

B.

Test the execution of the application with another cloud services platform.

Answers
C.

Increase the number of containers running per service.

C.

Increase the number of containers running per service.

Answers
D.

Add consistent "try/catch(exception)" clauses to the code.

D.

Add consistent "try/catch(exception)" clauses to the code.

Answers
Suggested answer: A

How should a web application be designed to work on a platform where up to 1000 requests per second can be served?

A.

Use algorithms like random early detection to deny excessive requests.

A.

Use algorithms like random early detection to deny excessive requests.

Answers
B.

Set a per-user limit (for example, 5 requests/minute/user) and deny the requests from the users who have reached the limit.

B.

Set a per-user limit (for example, 5 requests/minute/user) and deny the requests from the users who have reached the limit.

Answers
C.

Only 1000 user connections are allowed; further connections are denied so that all connected users can be served.

C.

Only 1000 user connections are allowed; further connections are denied so that all connected users can be served.

Answers
D.

All requests are saved and processed one by one so that all users can be served eventually.

D.

All requests are saved and processed one by one so that all users can be served eventually.

Answers
Suggested answer: B

An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances.

Which two actions can improve the design of the application to identify the faults? (Choose two.)

A.

Automatically pull out the container that fails the most over a time period.

A.

Automatically pull out the container that fails the most over a time period.

Answers
B.

Implement a tagging methodology that follows the application execution from service to service.

B.

Implement a tagging methodology that follows the application execution from service to service.

Answers
C.

Add logging on exception and provide immediate notification.

C.

Add logging on exception and provide immediate notification.

Answers
D.

Do a write to the datastore every time there is an application failure.

D.

Do a write to the datastore every time there is an application failure.

Answers
E.

Implement an SNMP logging system with alerts in case a network link is slow.

E.

Implement an SNMP logging system with alerts in case a network link is slow.

Answers
Suggested answer: B, C

Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)

A.

publicly disclosed vulnerabilities related to the included dependencies

A.

publicly disclosed vulnerabilities related to the included dependencies

Answers
B.

mismatches in coding styles and conventions in the included dependencies

B.

mismatches in coding styles and conventions in the included dependencies

Answers
C.

incompatible licenses in the included dependencies

C.

incompatible licenses in the included dependencies

Answers
D.

test case failures introduced by bugs in the included dependencies

D.

test case failures introduced by bugs in the included dependencies

Answers
E.

buffer overflows to occur as the result of a combination of the included dependencies

E.

buffer overflows to occur as the result of a combination of the included dependencies

Answers
Suggested answer: A, E
Total 364 questions
Go to page: of 37