ExamGecko
Home Home / Cisco / 350-901

Cisco 350-901 Practice Test - Questions Answers, Page 8

Question list
Search
Search

Related questions











A network operations team is using the cloud to automate some of their managed customer and branch locations. They require that all of their tooling be ephemeral by design and that the entire automation environment can be recreated without manual commands. Automation code and configuration state will be stored in git for change control and versioning. The engineering high-level plan is to use VMs in a cloud- provider environment then configure open source tooling onto these VMs to poll, test, and configure the remote devices, as well as deploy the tooling itself.

Which configuration management and/or automation tooling is needed for this solution?

A.

Ansible

A.

Ansible

Answers
B.

Ansible and Terraform

B.

Ansible and Terraform

Answers
C.

NSO

C.

NSO

Answers
D.

Terraform

D.

Terraform

Answers
E.

Ansible and NSO

E.

Ansible and NSO

Answers
Suggested answer: B

An application is hosted on Google Kubernetes Engine. A new JavaScript module is created to work with the existing application. Which task is mandatory to make the code ready to deploy?

A.

Create a Dockerfile for the code base.

A.

Create a Dockerfile for the code base.

Answers
B.

Rewrite the code in Python.

B.

Rewrite the code in Python.

Answers
C.

Build a wrapper for the code to "containerize" it.

C.

Build a wrapper for the code to "containerize" it.

Answers
D.

Rebase the code from the upstream git repo.

D.

Rebase the code from the upstream git repo.

Answers
Suggested answer: A

Which database type should be used with highly structured data and provides support for ACID transactions?

A.

time series

A.

time series

Answers
B.

document

B.

document

Answers
C.

graph

C.

graph

Answers
D.

relational

D.

relational

Answers
Suggested answer: D

Where should distributed load balancing occur in a horizontally scalable architecture?

A.

firewall-side/policy load balancing

A.

firewall-side/policy load balancing

Answers
B.

network-side/central load balancing

B.

network-side/central load balancing

Answers
C.

service-side/remote load balancing

C.

service-side/remote load balancing

Answers
D.

client-side/local load balancing

D.

client-side/local load balancing

Answers
Suggested answer: D

Which two statements about a stateless application are true? (Choose two.)

A.

Different requests can be processed by different servers.

A.

Different requests can be processed by different servers.

Answers
B.

Requests are based only on information relayed with each request.

B.

Requests are based only on information relayed with each request.

Answers
C.

Information about earlier requests must be kept and must be accessible.

C.

Information about earlier requests must be kept and must be accessible.

Answers
D.

The same server must be used to process all requests that are linked to the same state.

D.

The same server must be used to process all requests that are linked to the same state.

Answers
E.

No state information can be shared across servers.

E.

No state information can be shared across servers.

Answers
Suggested answer: A, B

Which statement about microservices architecture is true?

A.

Applications are written in a single unit.

A.

Applications are written in a single unit.

Answers
B.

It is a complex application composed of multiple independent parts.

B.

It is a complex application composed of multiple independent parts.

Answers
C.

It is often a challenge to scale individual parts.

C.

It is often a challenge to scale individual parts.

Answers
D.

A single faulty service can bring the whole application down.

D.

A single faulty service can bring the whole application down.

Answers
Suggested answer: B

Which two data encoding techniques are supported by gRPC? (Choose two.)

A.

XML

A.

XML

Answers
B.

JSON

B.

JSON

Answers
C.

ASCII

C.

ASCII

Answers
D.

ProtoBuf

D.

ProtoBuf

Answers
E.

YAML

E.

YAML

Answers
Suggested answer: B, D

Refer to the exhibit.

Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)

A.

Terminate the TLS over the UDP connection from the router and originate an HTTPS connection tothe selected server.

A.

Terminate the TLS over the UDP connection from the router and originate an HTTPS connection tothe selected server.

Answers
B.

Terminate the TLS over the UDP connection from the router and originate an HTTP connection tothe selected server.

B.

Terminate the TLS over the UDP connection from the router and originate an HTTP connection tothe selected server.

Answers
C.

Terminate the TLS over the TCP connection from the router and originate an HTTP connection tothe selected server.

C.

Terminate the TLS over the TCP connection from the router and originate an HTTP connection tothe selected server.

Answers
D.

Terminate the TLS over the TCP connection from the router and originate an HTTPS connection tothe selected server.

D.

Terminate the TLS over the TCP connection from the router and originate an HTTPS connection tothe selected server.

Answers
E.

Terminate the TLS over the SCTP connection from the router and originate an HTTPS connection tothe selected server.

E.

Terminate the TLS over the SCTP connection from the router and originate an HTTPS connection tothe selected server.

Answers
Suggested answer: C, D

Which transport protocol is used by gNMI?

A.

HTTP/2

A.

HTTP/2

Answers
B.

HTTP 1.1

B.

HTTP 1.1

Answers
C.

SSH

C.

SSH

Answers
D.

MQTT

D.

MQTT

Answers
Suggested answer: A

Which two methods are API security best practices? (Choose two.)

A.

Use tokens after the identity of a client has been established.

A.

Use tokens after the identity of a client has been established.

Answers
B.

Use the same operating system throughout the infrastructure.

B.

Use the same operating system throughout the infrastructure.

Answers
C.

Use encryption and signatures to secure data.

C.

Use encryption and signatures to secure data.

Answers
D.

Use basic auth credentials over all internal API interactions.

D.

Use basic auth credentials over all internal API interactions.

Answers
E.

Use cloud hosting services to manage security configuration.

E.

Use cloud hosting services to manage security configuration.

Answers
Suggested answer: A, C
Total 364 questions
Go to page: of 37