ExamGecko
Home / Cisco / 350-901 / List of questions
Ask Question

Cisco 350-901 Practice Test - Questions Answers, Page 23

List of questions

Question 221

Report
Export
Collapse

An architect must optimize traffic that targets a popular API endpoint Currently, the application downloads a large file hourly, but often the file is unchanged and the download causes unnecessary load and delays Which cURL command must be used to determine the last modified date of the file and to optimize the API usage?

curl GET request

curl GET request

curl HEAD request

curl HEAD request

curl --silent request

curl --silent request

curl -H 'Cache-Control: no-cache' request

curl -H 'Cache-Control: no-cache' request

Suggested answer: B
asked 10/10/2024
Jennifer Leon
41 questions

Question 222

Report
Export
Collapse

Refer to the exhibit.

Cisco 350-901 image Question 222 118534 10102024233131000000

A developer created a Python script to retrieve information about Meraki devices in a local network deployment After requesting a security review of the code the security analyst has observed poor secret storage practices What is the appropriate secret storage approach''

Set the Base64 encoded version of the API key as MER_API_KEY m the code and Base64 decode before using m the header

Set the Base64 encoded version of the API key as MER_API_KEY m the code and Base64 decode before using m the header

Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code

Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code

Leverage an external secret vault to retrieve MER_APl_KEY and set the vault key as an OS environment variable before running the code

Leverage an external secret vault to retrieve MER_APl_KEY and set the vault key as an OS environment variable before running the code

Set an OS environment variable for MER_API_KEY to the API key before running the code and no longer set MER_API_KEY within the code

Set an OS environment variable for MER_API_KEY to the API key before running the code and no longer set MER_API_KEY within the code

Suggested answer: C
asked 10/10/2024
Chan Man Wong
43 questions

Question 223

Report
Export
Collapse

When an application is designed that requires high availability, what is a reason to use a cross-region cloud?

Provide disaster recovery protection

Provide disaster recovery protection

Protect from a single component failure

Protect from a single component failure

Minimize costs

Minimize costs

Account for failure in another zone

Account for failure in another zone

Suggested answer: A
asked 10/10/2024
Khaled Fouad
33 questions

Question 224

Report
Export
Collapse

Refer to the exhibit.

Cisco 350-901 image Question 224 118536 10102024233131000000

A Docker swarm cluster is configured to load balance services across data centers in three different geographical regions west central and east. The cluster has three manager nodes and three worker nodes Anew service named cisco.devnet is being deployed. The service has these design requirements

• All containers must be hosted only on nodes in the central region

• The service must run only on nodes that are ineligible for the manager role Which approach fulfills the requirements?

Create a second swarm cluster that is hosted only in the central region.

Create a second swarm cluster that is hosted only in the central region.

Create the service manually in the central region and set replicas to 0.

Create the service manually in the central region and set replicas to 0.

Use placement constraints to control nodes to which the service can be assigned.

Use placement constraints to control nodes to which the service can be assigned.

Enable the control flag in the containers of the west and east regions to prevent the service from starting

Enable the control flag in the containers of the west and east regions to prevent the service from starting

Suggested answer: D
asked 10/10/2024
mohamad rachwani
29 questions

Question 225

Report
Export
Collapse

Refer to the exhibit.

Cisco 350-901 image Question 225 118537 10102024233131000000

Refer to the exhibit A Docker swarm service is currently running m a local data center The service is hosting an HTML website it the container fads then the service becomes unavailable The design must meet these requirements

• The service must be highly available and resilient against a data center outage.

• The service must be accessible from a single URL

• The HTTP session must remain on the server from which the original request was sent

• Failure of the server must force the client to reconnect

Which two design approaches must be used to meet the requirements? (Choose two.)

Create another swarm cluster within a data center and deploy a secondary instance of the service.

Create another swarm cluster within a data center and deploy a secondary instance of the service.

Create another node in the swarm duster to scale the service across the nodes over two replicas.

Create another node in the swarm duster to scale the service across the nodes over two replicas.

Configure an external load balancer to route requests to the swarm service by using session persistence

Configure an external load balancer to route requests to the swarm service by using session persistence

Scale the Docker swarm service to 2 and set endpoint-mode to DNSRR instead of the default value of VIP

Scale the Docker swarm service to 2 and set endpoint-mode to DNSRR instead of the default value of VIP

Configure a routing mesh to route requests to the swarm service by using NAT on the network side

Configure a routing mesh to route requests to the swarm service by using NAT on the network side

Suggested answer: B, C
asked 10/10/2024
Harieswaran Ramesh
37 questions

Question 226

Report
Export
Collapse

A developer must deploy a containerized application foe network device inventory management.

The developer sets up a Kubernetes duster on two separate hypervisors. The SLA is not currently meeting a specified maximum value for network latencyjitter CPU/memory and disk I/O are functioning property. Which two design approaches resolve the issue'' (Choose two.)

Colocate services in the same pod

Colocate services in the same pod

Replace the HDD drives with SSD drives

Replace the HDD drives with SSD drives

Enable IPv6 within the duster

Enable IPv6 within the duster

Deploy the duster to a bare metal server

Deploy the duster to a bare metal server

Upgrade the server NIC card

Upgrade the server NIC card

Suggested answer: A, E
asked 10/10/2024
Thanh Tran
34 questions

Question 227

Report
Export
Collapse

Refer to the exhibit.

Cisco 350-901 image Question 227 118539 10102024233131000000

A Python script must list network clients in the Cisco Meraki API that have used a network with an ID of 2 The number of client entries per returned page is restricted to 1.000 according to the API specification Network 2 has 2.500 clients

What must be added where the code is missing to print the content of each response?


Cisco 350-901 image Question 227 Answer 1 118539 10102024233131000000


Cisco 350-901 image Question 227 Answer 1 118539 10102024233131000000


Cisco 350-901 image Question 227 Answer 2 118539 10102024233131000000


Cisco 350-901 image Question 227 Answer 2 118539 10102024233131000000


Cisco 350-901 image Question 227 Answer 3 118539 10102024233131000000


Cisco 350-901 image Question 227 Answer 3 118539 10102024233131000000


Cisco 350-901 image Question 227 Answer 4 118539 10102024233131000000


Cisco 350-901 image Question 227 Answer 4 118539 10102024233131000000

Suggested answer: B
asked 10/10/2024
Tarun Sharma
45 questions

Question 228

Report
Export
Collapse

A developer deploys a web application in a local data center that is now experiencing high traffic load from users accessing data through REST API calls. Which approach enhances the responsiveness and performance of the API?

Use HTTP POST or other non-read methods for read requests when possible

Use HTTP POST or other non-read methods for read requests when possible

Ensure that all read requests are clearly identified by the PUT method

Ensure that all read requests are clearly identified by the PUT method

Configure API payload to return errors in HTTP 200 responses

Configure API payload to return errors in HTTP 200 responses

Use HTTP standard authorization header to submit authentication credentials

Use HTTP standard authorization header to submit authentication credentials

Suggested answer: D
asked 10/10/2024
Walter van der Heijden
42 questions

Question 229

Report
Export
Collapse

A custom dashboard of the network health must be created by using Cisco DNA Center APIs An existing dashboard is a RESTful API that receives data from Cisco DNA Center as a new metric every time the network health information is sent from the script to the dashboard Which set of requests creates the custom dashboard?

PUT request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

PUT request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

POST request to Cisco DNA Center to obtain the network health information and then a GET request to the dashboard to publish the new metric

POST request to Cisco DNA Center to obtain the network health information and then a GET request to the dashboard to publish the new metric

GET request to Cisco DNA Center to obtain the network health information and then a PUT request to the dashboard to publish the new metric

GET request to Cisco DNA Center to obtain the network health information and then a PUT request to the dashboard to publish the new metric

GET request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

GET request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

Suggested answer: D
asked 10/10/2024
Tyler Raymond
39 questions

Question 230

Report
Export
Collapse

A developer wants to automate virtual infrastructure to provision and manage it. The system will be implemented m large-scale deployment while offering redundancy and scalability with ease of management The solution must meet these requirements:

• Support the provisioning of up to 500 new virtual machines into private datacenters or the public cloud

• Support the modeling of a complex environment that consists of multiple virtual machines while supporting disaster recovery

• Maintain steady-state environments

Which configuration management solution must the developer use?

Puppet

Puppet

Terraform

Terraform

Docker

Docker

Arable

Arable

Suggested answer: B
asked 10/10/2024
Thomas Spring
28 questions
Total 364 questions
Go to page: of 37
Search

Related questions