Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

350-901 Questions and Answers

Question # 6

When an application is designed that requires high availability, what is a reason to use a cross-region cloud?

A.

Provide disaster recovery protection

B.

Protect from a single component failure

C.

Minimize costs

D.

Account for failure in another zone

Full Access
Question # 7

A developer deploys a web application in a local data center that is now experiencing high traffic load from users accessing data through REST API calls. Which approach enhances the responsiveness and performance of the API?

A.

Use HTTP POST or other non-read methods for read requests when possible

B.

Ensure that all read requests are clearly identified by the PUT method

C.

Configure API payload to return errors in HTTP 200 responses

D.

Use HTTP standard authorization header to submit authentication credentials

Full Access
Question # 8

Which configuration stop must be performed on a Cisco IOS XE device to present collected data in Cisco DNA Center?

A.

Create an SNMPv3 user account.

B.

Apply a telemetry profile.

C.

Synchronize the device and the data collector.

D.

Enable Cisco NetFlow collection.

Full Access
Question # 9

A web application has those requirements for HTTP cache control:

  • The client browser must be prevented from storing responses that contain sensitive information.
  • Assets must be downloaded from the remote server every time.

Which header must the engineer use?

A.

must-revabdate

B.

no-store

C.

public

D.

private

Full Access
Question # 10

What are two steps in the OAuth2 protocol flow? (Choose two.)

A.

The user is authenticated by the authorization server and granted an access token.

B.

The user’s original credentials are validated by the resource server and authorization is granted.

C.

The user indirectly requests authorization through the authorization server.

D.

The user requests an access token by authentication and authorization grant presentation.

E.

The user requests the protected resource from the resource server using the original credentials.

Full Access
Question # 11

A developer has issued git add file1 and file2 test.py command to add the three files for the next commit, but then decides to executed test.py from this command. Which command needs to be used to exclude test.py from this commit but keep the rest of the files?

A.

git clean — test.py

B.

git reset - test py

C.

git checkout - file1 file2

D.

git stash -- file1 file 2

Full Access
Question # 12

Which Puppet manifest changes the NTP server and generates the traffic from VLAN 15?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 13

Refer to the exhibit.

A developer created a Python script to retrieve interface information for the devices in a MeraKi network environment. A security analyst has reviewed the code and observed poor secret storage practices. What is the appropriate password storage approach?

A.

Set the Base64 encoded version of the API key as MER_API_KEY in the code and Base64 decode before using in the header.

B.

Set an OS environment variable for MER_API_KEY to the API key during running the code and longer set MER_API_KEY within the code.

C.

Create a secret for the API key, set MER_API_KEY using the value from the secret in the Pod. and no longer set MER_API_KEY within the code.

D.

Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code.

Full Access
Question # 14

Refer to the exhibit.

Which configuration of method and parameter retrieves the health of a laptop connected to the network from Cisco DNA Center?

A.

PUT; network-health;

B.

GET; client-health;

C.

GET; network-device;

D.

POST; network-device;

Full Access
Question # 15

Which two types of organization are subject to GDPR? (Choose two.)

A.

only organizations that operate outside the EU

B.

any organization that offers goods or services to customers in the EU

C.

only organizations that have offices in countries that are part of the EU

D.

any organization that operates within the EU

E.

only organizations that physically reside in the EU

Full Access
Question # 16

What are two benefits of using a centralized logging service? (Choose two.)

A.

reduces the time required to query log data across multiple hosts

B.

reduces the loss of logs after a single disk failure

C.

improves application performance by reducing CPU usage

D.

improves application performance by reducing memory usage

E.

provides compression and layout of log data

Full Access
Question # 17

Refer to the exhibit.

A network engineer writes a script to test authentication workflow using Python and REST API. The engineer wants to ensure that the script handles expected errors by matching output to HTTP status codes The scnpt uses the Python requests module. Which line of code must be added on the snippet where the code is missing?

A.

requests.error_code

B.

response.sutus_code

C.

response

D.

requests.post

Full Access
Question # 18

Drag and drop the expressions from below onto the code to implement error handling. Not all options are used.

Full Access
Question # 19

Which two types of storage are supported for app hosting on a Cisco Catalyst 9000 Series Switch? (Choose two.)

A.

external USB storage

B.

internal SSD

C.

CD-ROM

D.

SD-card

E.

bootflash

Full Access
Question # 20

What is the unique identifier in the 0Auth2 three-legged authorization code flow?

A.

client ID

B.

resource server

C.

resource owner

D.

authorization server

Full Access
Question # 21

What is the gRPC Network Management Interface protocol?

A.

a unified management protocol for streaming telemetry and database logging

B.

a configuration management protocol for monitoring

C.

a protocol for configuration management and streaming telemetry

D.

a logging protocol used across database servers

Full Access
Question # 22

Refer to the exhibit.

Which AP! call does an engineer use to delete the FQDN object?

A.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f

B.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns/005056BB-0B24-0ed3-0000-858993545263

C.

DELETE /api/fmc_config/v1/domain?id=e276abec-e0f2-11e3-8169-6d9ed49b625f

D.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns?id=005056BB-0B24-0ed3-0000-858993545263

Full Access
Question # 23

Refer to the exhibit.

An application is being developed as an information repository. The application will be used to store details about television shows, including the scenario, year, and category. Which database type must used for high performance for the data structure?

A.

time series

B.

Eidocument-based

C.

graph

D.

columnar

Full Access
Question # 24

An application is hosted on Google Kubernetes Engine. A new JavaScript module is created to work with the existing application. Which task is mandatory to make the code ready to deploy?

A.

Create a Dockerfile for the code base.

B.

Rewrite the code in Python.

C.

Build a wrapper for the code to “containerize” it.

D.

Rebase the code from the upstream git repo.

Full Access
Question # 25

Refer to the exhibit.

Drag and drop the steps from the left into the correct order of operation on the right for a successful OAuth2 three-legged authorization code grant flow.

Full Access
Question # 26

Which two methods are API security best practices? (Choose two.)

A.

Use tokens after the identity of a client has been established.

B.

Use the same operating system throughout the infrastructure.

C.

Use encryption and signatures to secure data.

D.

Use basic auth credentials over all internal API interactions.

E.

Use cloud hosting services to manage security configuration.

Full Access
Question # 27

Where mus! the data be encrypted to ensure end-to-end encryption when using an API?

A.

on the device that consumes the API

B.

on the source device before transmission

C.

on the end device after a request is received

D.

on the server that stores the data

Full Access
Question # 28

A developer needs to build a new Docker image and has created a tag by using the command:

$ docker tag 32df423320458 local/app.1.2

Which command must be executed next to build the Docker image using the tag?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 29

Refer to the exhibit.

A developer must review an intern's code for a script they wrote to automate backups to the storage server. The script must connect to the network device and copy the running-config to the server. When considering maintainability, which two changes must be made to the code? (Choose two.)

A.

Rename the class to "ArchiveManager".

B.

The code is incorrect because the class does not have an__init__() method.

C.

The command sent to the network device is incorrect.

D.

Refactor the code placing the "for" loop steps inside a single nc method.

E.

The intern must use IP addresses because DNS is unreliable.

Full Access
Question # 30

Refer to the exhibit.

Which action should be performed to avoid an SQL injection attack?

A.

Encrypt the password that is used to connect to the database

B.

Develop a denial of service response plan

C.

Vacate the input on the platform variable

D.

Compile the Python file instead of allowing live interpretation

Full Access
Question # 31

Refer to the exhibit. Which URI string retrieves configured static routes in a VRF named CUSTOMER from a RESTCONF-enabled device?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 32

Drag and drop the steps from the left into the sequence on the fight to implement an OAuth2 three-legged authorization code flow grant type in an application Not all options are used.

Full Access
Question # 33

An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct element functions on the right.

Full Access
Question # 34

Refer to the exhibit.

Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content?

A.

CMD [“/bin/echo”, “Test”]

B.

RUN [“/bin/echo”, “Test”]

C.

ENTRYPOINT [“/bin/echo”, “Test”]

D.

CMD [“/bin/echo Test”]

Full Access
Question # 35

Drag and drop the code from the bottom onto the box where the code is missing to provision a new Cisco Unified Computing System server by using the UCS XML API. Options may be used more than once. Not all options are used.

Full Access
Question # 36

A developer is deploying an application to automate the configuration and management of Osco network files and routers The application must use REST API interface lo achieve programmability. The security team mandates that the network must be protected against DDoS attacks What mitigates the attacks without impacting genuine requests?

A.

API rate limiting at the application layer

B.

IP address filtering at the application layer

C.

traffic routing on the network perimeter

D.

firewall on the network perimeter

Full Access
Question # 37

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Python code that uses the UCS Python SDK is instantiating a service profile named ''devcore-server-01'' from service profile template ''device-template'' , then associating the service profile instance to blade 3 in chassis 7. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the Python exhibit.

Full Access
Question # 38

Refer to the exhibit.

Drag and drop the components from the Oauth2 authorization protocol flow on the left onto the letter that matches the location in the exhibit.

Full Access
Question # 39

Drag and drop the code from the bottom onto the box where the code is missing in the Python code to query for user permissions while mitigating against SQL Injection Not all options are used.

Full Access
Question # 40

A container running a Python script is failing when it reaches the integration testing phase of the CI/CD process. The code has been reviewed thoroughly and the build process works on this container and all other containers pass unit and integration testing.

What should be verified to resolve the issue?

A.

that the correct port is exposed in the Dockerfile

B.

that the necessary modules and packages are installed on build

C.

that the script is running from the right directory

D.

that the Python version of the container image is correct

Full Access
Question # 41

The response from a server includes the header ETag: W/”7eb8b94419e371767916ef13e0d6e63d”. Which statement is true?

A.

The ETag has a Strong validator directive.

B.

The ETag has a Weak validator directive, which is an optional directive.

C.

The ETag has a Weak validator directive, which is a mandatory directive.

D.

The ETag has a Strong validator directive, which it is incorrectly formatted.

Full Access
Question # 42

A developer releases a new application for network automation of Cisco devices deployed m a local data center. The application utilizes complex design patterns such as microservices that host multiple third-party libraries and programming languages. The development must be simplified by implementing an observability-driven development lifecycle. Which two considerations must be taken to meet the requirements? (Choose two.)

A.

description of low-level errors

B.

which KPls to monitor

C.

relevant metrics to expose

D.

which monitoring tools to use

E.

identifying customer priorities

Full Access
Question # 43

Refer to the exhibit.

Interface Lookback 1 must be created with IP address 10.30.0.1/24 in a Cisco IOS XE device using RESTCONF. The schema that is defined by the exhibit must be used. Which body and URI should be used for this operation?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 44

Refer to the exhibit.

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 45

A developer is creating a Python function that adds network engineers to a Webex room to troubleshoot after a monitoring alert Drag and drop the code from the bottom onto the box where the code is missing in the Python function to add the engineers to the room. Not all options are used.

Full Access
Question # 46

An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online.

Which configuration management and/or automation tooling is needed for this solution?

A.

Ansible

B.

Ansible and Terraform

C.

NSO

D.

Terraform

E.

Ansible and NSO

Full Access
Question # 47

Drag and drop the code from the bottom onto the box where the code is missing to construct a contact tracking application that dynamically returns all the Bluetooth clients on a given Meraki network. Not all options are used.

Full Access
Question # 48

Refer to the exhibit. The self-service Webex Teams bot is failing when many users attempt to interact with it at the same time. Drag and drop the code snippets from the left onto the correct item numbers on the right that match the missing sections in the exhibit to complete this code to handle this high-load situation.

Full Access
Question # 49

What is a capability of the End User Monitoring feature of the AppDynamics platform?

A.

discovers traffic flows, nodes, and transport connections where network or application/network issues are

developing

B.

monitoring local processes, services, and resource use, to explain problematic server performance

C.

identifies the slowest mobile and IoT network requests, to locate the cause of problems

D.

provides metrics on the performance of the database to troubleshoot performance-related issues

Full Access
Question # 50

Refer to the exhibits. Which data payload completes the CURL command to run the create port object API call In Cisco Firepower Threat Defense?

Refer to the exhibits. Which data payload completes the CURL command to run the create port object API call In Cisco Firepower Threat Defense?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 51

A developer must containerize a Python application to integrate into a prebuilt CD environment by creating a Docker image. It will be hosted as a web application to enable end users from accessing it remotely. Drag and drop the code from the bottom onto the box where the code is missing in the Docker file Not all options are used.

Full Access
Question # 52

Drag and drop the git commands from the left into the correct order on the right to create a feature branch from the master and then incorporate that feature branch into the master.

Full Access
Question # 53

Refer to the exhibit.

Which set of API requests must be executed by a Webex Teams bot after receiving a webhook callback to process messages in a room and reply with a new message back to the same room?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 54

Refer to the exhibit.

The cisco_devnet Docker swarm service runs across five replicas.The development team tags and imports a new image named devnet/ test:1.1 and requests that the image be upgraded on each container.There must be no service outages during the upgrade process. Which two design approaches must be used? (Choose two.)

A.

Enable parallel upgrades by using the docker service update command

B.

Ensure that the service replicas are set to a minimum of 5

C.

Implement rolling upgrades by using the docker service update command

D.

Ensure that the service is hosted behind a VIP with no session persistence

E.

Update the restart policy of the containers to restart upon failure

Full Access