Cisco 350-901 Practice Test - Questions Answers, Page 8
List of questions
Related questions
A network operations team is using the cloud to automate some of their managed customer and branch locations. They require that all of their tooling be ephemeral by design and that the entire automation environment can be recreated without manual commands. Automation code and configuration state will be stored in git for change control and versioning. The engineering high-level plan is to use VMs in a cloud- provider environment then configure open source tooling onto these VMs to poll, test, and configure the remote devices, as well as deploy the tooling itself.
Which configuration management and/or automation tooling is needed for this solution?
Ansible
Ansible and Terraform
NSO
Terraform
Ansible and NSO
An application is hosted on Google Kubernetes Engine. A new JavaScript module is created to work with the existing application. Which task is mandatory to make the code ready to deploy?
Create a Dockerfile for the code base.
Rewrite the code in Python.
Build a wrapper for the code to "containerize" it.
Rebase the code from the upstream git repo.
Which database type should be used with highly structured data and provides support for ACID transactions?
time series
document
graph
relational
Where should distributed load balancing occur in a horizontally scalable architecture?
firewall-side/policy load balancing
network-side/central load balancing
service-side/remote load balancing
client-side/local load balancing
Which two statements about a stateless application are true? (Choose two.)
Different requests can be processed by different servers.
Requests are based only on information relayed with each request.
Information about earlier requests must be kept and must be accessible.
The same server must be used to process all requests that are linked to the same state.
No state information can be shared across servers.
Which statement about microservices architecture is true?
Applications are written in a single unit.
It is a complex application composed of multiple independent parts.
It is often a challenge to scale individual parts.
A single faulty service can bring the whole application down.
Which two data encoding techniques are supported by gRPC? (Choose two.)
XML
JSON
ASCII
ProtoBuf
YAML
Refer to the exhibit.
Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)
Terminate the TLS over the UDP connection from the router and originate an HTTPS connection tothe selected server.
Terminate the TLS over the UDP connection from the router and originate an HTTP connection tothe selected server.
Terminate the TLS over the TCP connection from the router and originate an HTTP connection tothe selected server.
Terminate the TLS over the TCP connection from the router and originate an HTTPS connection tothe selected server.
Terminate the TLS over the SCTP connection from the router and originate an HTTPS connection tothe selected server.
Which transport protocol is used by gNMI?
HTTP/2
HTTP 1.1
SSH
MQTT
Which two methods are API security best practices? (Choose two.)
Use tokens after the identity of a client has been established.
Use the same operating system throughout the infrastructure.
Use encryption and signatures to secure data.
Use basic auth credentials over all internal API interactions.
Use cloud hosting services to manage security configuration.
Question