Categories
350-901 Dumps

350-901 Real Exam Dumps Questions and answers 11-20

Get Full Version of the Exam
http://www.EnsurePass.com/350-901.html

Question No.11

Refer to the exhibit. An application uses an API to periodically sync a large data set. Based on the HTTP message sequence provided, which statements are true about the caching behavior seen in the scenario? (Choose two.)

image

  1. The full dataset was transmitted to the client twice.

  2. The dataset changed sometime between message #4 and #5.

  3. A partial dataset was transmitted to the client in message #4.

  4. The dataset did not change during the scenario.

  5. Messages #3 and #5 are equivalent.

Correct Answer: AD

Question No.12

A developer has completed the implementation of a REST API, but when it is executed, it returns a 401 error message. What must be done on the API to resolve the issue?

  1. Access permission to the resource must be granted, before the request.

  2. Configure new valid credentials.

  3. The requested API endpoint does not exist, and the request URL must be changed.

  4. Additional permission must be granted before the request can submitted.

Correct Answer: D

Question No.13

DRAG DROP

Refer to the exhibit. Python threading allows a developer to have different parts of a program run concurrently and simplify a design. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to create a thread instance.

image

image

Correct Answer:

image

Question No.14

Refer to the exhibit. Many faults have occurred in the ACI environment and a sample of them needs to be examined. Which API call retrieves faults 30 through 45?

image

  1. GET https://apic-ip-address/api/class/faultInfo.json?order- by=faultinst.severity|descamp;page=1amp;page- size=15

  2. GET https://apic-ip-address/api/class/faultInfo.json?order- by=faultinst.severity|descamp;page=2amp;page- size=15

  3. GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|descamp;page=30

  4. GET https://apic-ip-address/api/class/faultInfo.json?order- by=faultinst.severity|descamp;page=2amp;page- size=30

Correct Answer: D

Question No.15

DRAG DROP

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. A developer is creating a Python Script that will use the Webex Teams REST API to automatically create a new collaboration space with him and his team leads on- demand via a Linux terminal command. Drag and drop the code snippets from the left onto the numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.

image

image

image

Correct Answer:

image

Question No.16

A network operations team is using the cloud to automate some of their managed customer and branch locations. They require that all of their tooling be ephemeral by design and that the entire automation environment can be recreated without manual commands. Automation code and configuration state will be stored in git for change control and versioning. The engineering high- level plan is to use VMs in a cloud- provider environment then configure open source tooling onto these VMs to poll, test, and configure the remote devices, as well as deploy the tooling itself.

Which configuration management and/or automation tooling is needed for this solution?

  1. Ansible

  2. Ansible and Terraform

  3. NSO

  4. Terraform

  5. Ansible and NSO

Correct Answer: B

Question No.17

Refer to the exhibit. Which set of API requests must be executed by a Webex Teams bot after receiving a webhook callback to process messages in a room and reply with a new message back to the same room?

image

image

  1. Option A

  2. Option B

  3. Option C

  4. Option D

Correct Answer: B

Question No.18

Click on the GET Resource button above to view resources that will help with this question. An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB. Which REST API call accomplishes this task?

image

image

image

  1. GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serialamp;$filter=not(Model eq `UCSC#39;) and AvailableMemory le 5000

  2. GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serialamp;$filter=Model eq `UCSB#39; and AvailableMemory lt 5000

  3. GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serialamp;$filter=contains(Model, UCSB#39;) and AvailableMemory lt 5000

  4. GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serialamp;$filter=contains(Model, UCSB#39;) and AvailableMemory le 5000

Correct Answer: D

Question No.19

The response from a server includes the header ETag: W/quot;7eb8b94419e371767916ef13e0d6e63dquot;. Which statement is true?

  1. The ETag has a Strong validator directive.

  2. The ETag has a Weak validator directive, which is an optional directive.

  3. The ETag has a Weak validator directive, which is a mandatory directive.

  4. The ETag has a Strong validator directive, which it is incorrectly formatted.

Correct Answer: B

Question No.20

DRAG DROP

An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct element functions on the right.

image

Correct Answer:

image

Get Full Version of 350-901 Dumps

Categories
350-901 Dumps

350-901 Real Exam Dumps Questions and answers 21-30

Get Full Version of the Exam
http://www.EnsurePass.com/350-901.html

Question No.21

DRAG DROP

Refer to the exhibit. Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit that consumes REST API pagination.

image

Correct Answer:

image

Question No.22

DRAG DROP

Refer to the exhibit. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the curl exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used.

image

image

Correct Answer:

image

Question No.23

Refer to the exhibit. The YAML represented is using the ios_vrf module. As part of the Ansible playbook workflow, what is the result when this task is run?

image

  1. VRFs not defined in the host_vars file are removed from the device.

  2. VRFs not defined in the host_vars file are added to the device, and any other VRFs on the device remain.

  3. VRFs defined in the host_vars file are removed from the device.

  4. VRFs are added to the device from the host_vars file, and any other VRFs on the device are removed.

Correct Answer: D

Question No.24

DRAG DROP

Drag and drop the code onto the snippet to update a SSID in Meraki using the Dashboard API. Not all options are used.

image

Correct Answer:

image

Question No.25

Which snippet presents the correct API call to configure, secure, and enable an SSID using the Meraki API?

A.

image

B.

image

C.

image

D.

image

  1. Option A

  2. Option B

  3. Option C

  4. Option D

Correct Answer: B

Question No.26

DRAG DROP

Drag and drop the expressions from below onto the code to implement error handling. Not all options are used.

image

Correct Answer:

image

Question No.27

DRAG DROP

Refer to the exhibit. A developer is creating a Python script to use the Webex Teams REST API to list joined spaces, retry after the server-specified amount of time if a quot;Too many requestsquot; response is received, and print any other error that is received. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.

image

Correct Answer:

image

Question No.28

A user is receiving a 429 Too Many Requests error. Which scheme is the server employing that causes this error?

  1. rate limiting

  2. time outs

  3. caching

  4. redirection

Correct Answer: A

Question No.29

Refer to the exhibit. As part of the Ansible playbook workflow, several new interfaces are being configured using the netconf_config module. The task references the interface variables that are unique per device. In which directory is the YAML file with these variables found?

image

  1. host_vars directory

  2. home directory

  3. group_vars directory

  4. current working directory

Correct Answer: A

Question No.30

DRAG DROP

Refer to the exhibit. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow.

image

Correct Answer:

image

Get Full Version of 350-901 Dumps

Categories
350-901 Dumps

350-901 Real Exam Dumps Questions and answers 31-40

Get Full Version of the Exam
http://www.EnsurePass.com/350-901.html

Question No.31

Which type of file is created from issued intermediate, root, and primary certificates for SSL installation on a server?

  1. DER

  2. CSR

  3. PEM

  4. CRT

Correct Answer: C

Question No.32

DRAG DROP

Refer to the exhibit. The Python script is supposed to make an API call to Cisco DNA Center querying a wireless profile for the quot;ChicagoCampusquot; and then parsing out its enable FlexConnect value. Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit.

image

image

Correct Answer:

image

Question No.33

Which two countermeasures help reduce the risk of playback attacks? (Choose two.)

  1. Store data in a NoSQL database.

  2. Implement message authentication (HMAC).

  3. Enable end-to-end encryption.

  4. Remove stack traces from errors.

  5. Use short-lived access tokens.

Correct Answer: BE

Question No.34

An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances. Which two actions can improve the design of the application to identify the faults? (Choose two.)

  1. Automatically pull out the container that fails the most over a time period.

  2. Implement a tagging methodology that follows the application execution from service to service.

  3. Add logging on exception and provide immediate notification.

  4. Do a write to the datastore every time there is an application failure.

  5. Implement an SNMP logging system with alerts in case a network link is slow.

Correct Answer: BC

Question No.35

An organization manages a large cloud-deployed application that employs a microservices

architecture. No notable issues occur with downtime because the services of this application are redundantly deployed over three or more data center regions. However, several times a week reports are received about application slowness. The container orchestration logs show faults in a variety of containers that cause them to fail and then spin up brand new. Which action must be taken to improve the resiliency design of the application while maintaining current scale?

  1. Update the base image of the containers.

  2. Test the execution of the application with another cloud services platform.

  3. Increase the number of containers running per service.

  4. Add consistent quot;try/catch(exception)quot; clauses to the code.

Correct Answer: D

Question No.36

Which RFC5988 (Web Linking) relation type is used in the Link header to control pagination in APIs?

  1. rel=quot;indexquot;

  2. rel=quot;pagequot;

  3. rel=quot;nextquot;

  4. rel=quot;sectionquot;

Correct Answer: C

Question No.37

Which database type should be used with highly structured data and provides support for ACID transactions?

  1. time series

  2. document

  3. graph

  4. relational

Correct Answer: D

Question No.38

Which transport protocol is used by gNMI?

  1. HTTP/2

  2. HTTP 1.1

  3. SSH

  4. MQTT

Correct Answer: A

Question No.39

An application uses OAuth to get access to several API resources on behalf of an end user. What are two valid parameters to send to the authorization server as part of the first step of an authorization code grant flow? (Choose two.)

  1. URI to which the authorization server will send the user-agent back when access is granted or denied

  2. list of the API resources that the application is requesting to access

  3. secret that was generated by the authorization server when the application registered as an OAuth integration

  4. list of scopes that correspond to the API resources to which the application is requesting to access

  5. name of the application under which the application registered as an OAuth integration

Correct Answer: AC

Question No.40

An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online. Which configuration management and/or automation tooling is needed for this solution?

  1. Ansible

  2. Ansible and Terraform

  3. NSO

  4. Terraform

  5. Ansible and NSO

Correct Answer: E

Get Full Version of 350-901 Dumps

Categories
350-901 Dumps

350-901 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Exam
http://www.EnsurePass.com/350-901.html

Question No.1

Where should distributed load balancing occur in a horizontally scalable architecture?

  1. firewall-side/policy load balancing

  2. network-side/central load balancing

  3. service-side/remote load balancing

  4. client-side/local load balancing

Correct Answer: B

Question No.2

A cloud native project is being worked on in which all source code and dependencies are written in Python, Ruby, and/or JavaScnpt. A change in code triggers a notification to the CI/CD tool to run the CI/CD pipeline. Which step should be omitted from the pipeline?

  1. Deploy the code to one or more environments, such as staging and/or production.

  2. Build one of more containers that package up code and all its dependencies.

  3. Compile code.

  4. Run automated tests to validate the correctness.

Correct Answer: A

Question No.3

A heterogeneous network of vendors and device types needs automating for better efficiency and to enable future automated testing. The network consists of switches, routers, firewalls and load balancers from different vendors, however they all support the NETCONF/RESTCONF configuration standards and the YAML models with every feature the business requires. The business is looking for a buy versus build solution because they cannot dedicate engineering resources, and they need configuration diff and rollback functionality from day 1. Which configuration management for automation tooling is needed for this solution?

  1. Ansible

  2. Ansible and Terraform

  3. NSO

  4. Terraform

  5. Ansible and NSO

Correct Answer: E

Question No.4

Refer to the exhibit. A company has extended networking from the data center to the cloud

through Transit VPC. Which two statements describe the benefits of this approach? (Choose two.)

image

  1. Dynamic routing combined with multi-AZ- deployment creates a robust network infrastructure.

  2. VPC virtual gateways provide highly available connections to virtual networks.

  3. Dedicated VPC simplifies load balancing by combining internal and external web services.

  4. VPC virtual gateways provide more secure connections to virtual networks.

  5. Dedicated VPC simplifies routing by not combining this service with other shared services.

Correct Answer: BD

Question No.5

Refer to the exhibit. This script uses ciscoyang to configure two VRF instances on a Cisco IOS- XR device using the Yang NETCONF type. Which two words are required to complete the script? (Choose two.)

image

  1. ensure

  2. commit

  3. false

  4. replace

  5. none

Correct Answer: CD

Question No.6

DRAG DROP

Drag and drop the characteristics from the left onto the correct data processing techniques on the right, in the context of GDPR.

image

Correct Answer:

image

Question No.7

AppGigabitEthernet interface is used as data port for a container on a Cisco Catalyst 9000 Series Switch. Which two interface configuration options should be used? (Choose two.)

  1. trunk interface

  2. bridged virtual interface

  3. SPAN port

  4. management interface

  5. subinterface

Correct Answer: AC

Question No.8

Refer to the exhibit. The Ansible playbook is using the netconf_module to configure an interface using a YANG model. As part of this workflow, which YANG models augment the interface?

image

  1. ietf-interfaces and ietf-ip

  2. iana-if-type and ietf-interfaces

  3. ietf-ip and openconfig-interface

  4. ietf-ip and iana-if-type

Correct Answer: B

Question No.9

Refer to the exhibit. Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)

image

  1. Terminate the TLS over the UDP connection from the router and originate an HTTPS connection to the selected server.

  2. Terminate the TLS over the UDP connection from the router and originate an HTTP connection to the selected server.

  3. Terminate the TLS over the TCP connection from the router and originate an HTTP connection to the selected server.

  4. Terminate the TLS over the TCP connection from the router and originate an HTTPS connection to the selected server.

  5. Terminate the TLS over the SCTP connection from the router and originate an HTTPS connection to the selected server.

Correct Answer: DE

Question No.10

DRAG DROP

Refer to the exhibit. Drag and drop the correct parts of the Dockerfile from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the Dockerfile to successfully build and deploy a container running a Python application. Not all parts of the Dockerfile are used.

image

Correct Answer:

image

Get Full Version of 350-901 Dumps