ExamGecko
Home / Cisco / 350-901 / List of questions
Ask Question

Cisco 350-901 Practice Test - Questions Answers, Page 8

List of questions

Question 71

Report
Export
Collapse

A network operations team is using the cloud to automate some of their managed customer and branch locations. They require that all of their tooling be ephemeral by design and that the entire automation environment can be recreated without manual commands. Automation code and configuration state will be stored in git for change control and versioning. The engineering high-level plan is to use VMs in a cloud- provider environment then configure open source tooling onto these VMs to poll, test, and configure the remote devices, as well as deploy the tooling itself.

Which configuration management and/or automation tooling is needed for this solution?

Ansible

Ansible

Ansible and Terraform

Ansible and Terraform

NSO

NSO

Terraform

Terraform

Ansible and NSO

Ansible and NSO

Suggested answer: B
asked 10/10/2024
Jim Swift
37 questions

Question 72

Report
Export
Collapse

An application is hosted on Google Kubernetes Engine. A new JavaScript module is created to work with the existing application. Which task is mandatory to make the code ready to deploy?

Create a Dockerfile for the code base.

Create a Dockerfile for the code base.

Rewrite the code in Python.

Rewrite the code in Python.

Build a wrapper for the code to "containerize" it.

Build a wrapper for the code to "containerize" it.

Rebase the code from the upstream git repo.

Rebase the code from the upstream git repo.

Suggested answer: A
asked 10/10/2024
Elham Alasmari
36 questions

Question 73

Report
Export
Collapse

Which database type should be used with highly structured data and provides support for ACID transactions?

time series

time series

document

document

graph

graph

relational

relational

Suggested answer: D
asked 10/10/2024
Maria Kniess
38 questions

Question 74

Report
Export
Collapse

Where should distributed load balancing occur in a horizontally scalable architecture?

firewall-side/policy load balancing

firewall-side/policy load balancing

network-side/central load balancing

network-side/central load balancing

service-side/remote load balancing

service-side/remote load balancing

client-side/local load balancing

client-side/local load balancing

Suggested answer: D
asked 10/10/2024
Aaron Ford Jr
46 questions

Question 75

Report
Export
Collapse

Which two statements about a stateless application are true? (Choose two.)

Different requests can be processed by different servers.

Different requests can be processed by different servers.

Requests are based only on information relayed with each request.

Requests are based only on information relayed with each request.

Information about earlier requests must be kept and must be accessible.

Information about earlier requests must be kept and must be accessible.

The same server must be used to process all requests that are linked to the same state.

The same server must be used to process all requests that are linked to the same state.

No state information can be shared across servers.

No state information can be shared across servers.

Suggested answer: A, B
asked 10/10/2024
Mogens Jensen
33 questions

Question 76

Report
Export
Collapse

Which statement about microservices architecture is true?

Applications are written in a single unit.

Applications are written in a single unit.

It is a complex application composed of multiple independent parts.

It is a complex application composed of multiple independent parts.

It is often a challenge to scale individual parts.

It is often a challenge to scale individual parts.

A single faulty service can bring the whole application down.

A single faulty service can bring the whole application down.

Suggested answer: B
asked 10/10/2024
Wanicha Inburan
37 questions

Question 77

Report
Export
Collapse

Which two data encoding techniques are supported by gRPC? (Choose two.)

XML

XML

JSON

JSON

ASCII

ASCII

ProtoBuf

ProtoBuf

YAML

YAML

Suggested answer: B, D
asked 10/10/2024
Luis Gerardo Collazos Castro
38 questions

Question 78

Report
Export
Collapse

Refer to the exhibit.

Cisco 350-901 image Question 78 118390 10102024233131000000

Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)

Terminate the TLS over the UDP connection from the router and originate an HTTPS connection tothe selected server.

Terminate the TLS over the UDP connection from the router and originate an HTTPS connection tothe selected server.

Terminate the TLS over the UDP connection from the router and originate an HTTP connection tothe selected server.

Terminate the TLS over the UDP connection from the router and originate an HTTP connection tothe selected server.

Terminate the TLS over the TCP connection from the router and originate an HTTP connection tothe selected server.

Terminate the TLS over the TCP connection from the router and originate an HTTP connection tothe selected server.

Terminate the TLS over the TCP connection from the router and originate an HTTPS connection tothe selected server.

Terminate the TLS over the TCP connection from the router and originate an HTTPS connection tothe selected server.

Terminate the TLS over the SCTP connection from the router and originate an HTTPS connection tothe selected server.

Terminate the TLS over the SCTP connection from the router and originate an HTTPS connection tothe selected server.

Suggested answer: C, D
asked 10/10/2024
Tim Wersinger
42 questions

Question 79

Report
Export
Collapse

Which transport protocol is used by gNMI?

HTTP/2

HTTP/2

HTTP 1.1

HTTP 1.1

SSH

SSH

MQTT

MQTT

Suggested answer: A
asked 10/10/2024
ABDOUL RAZAK TIENDREBEOGO
26 questions

Question 80

Report
Export
Collapse

Which two methods are API security best practices? (Choose two.)

Use tokens after the identity of a client has been established.

Use tokens after the identity of a client has been established.

Use the same operating system throughout the infrastructure.

Use the same operating system throughout the infrastructure.

Use encryption and signatures to secure data.

Use encryption and signatures to secure data.

Use basic auth credentials over all internal API interactions.

Use basic auth credentials over all internal API interactions.

Use cloud hosting services to manage security configuration.

Use cloud hosting services to manage security configuration.

Suggested answer: A, C
asked 10/10/2024
Reaper Gamer
43 questions
Total 364 questions
Go to page: of 37

Related questions