Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
350-901
Free trial
Verified
Question 26
DRAG DROP -
Refer to the exhibit. A developer is creating a Python script to use the Webex REST API to list joined spaces, retry after the server-specified amount of time if a
Too many requests response is received, and print any other error that is received. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.
Select and Place:
Question 27
Refer to the exhibit. Which set of API requests must be executed by a Webex bot after receiving a webhook callback to process messages in a room and reply with a new message back to the same room?
A.
B.
C.
D.
Question 28
The Meraki API url https://api.meraki.com/api/v0/networks/123456789/ssids/2 has been stored in the environment variable meraki_url, and the API key has been stored in meraki_api_key.
Which snippet presents the correct API call to configure, secure, and enable an SSID using the Meraki API?
A.
B.
C.
D.
Question 29
FILL BLANK -
Fill in the blanks to complete the Python script to enable the SSID with a name of 371767916 in the network resource 11111111 using the Meraki Dashboard
API.
Question 30
DRAG DROP -
Drag and drop the code onto the snippet to update a SSID in Meraki using the Dashboard API. Not all options are used.
Select and Place:
Question 31
DRAG DROP -
Refer to the exhibit. Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit that consumes REST API pagination.
Select and Place:
Question 32
DRAG DROP -
Drag and drop the code from the bottom onto the box where the code is missing to retrieve and display wireless network health information. The wireless network devices are being managed by Cisco DNA Center and are compatible with REST API. Not all options are used.
Select and Place:
Question 33
DRAG DROP -
Drag and drop the code from the bottom onto the box where the code is missing to create a Webex space. Not all options are used.
Select and Place:
Question 34
A local data center deployment using Cisco NX-OS switches is scaling and requires automatic configuration at scale. Configuration management must be set up for a Cisco NX-OS switch by using Ansible. The Ansible control server is currently located on a different subnet than the switch. The solution has these requirements:
✑ The transport protocol used must be encrypted.
✑ The connections must originate from a server in the same local network.
Enable mode must be supported.
Which connectivity method must be used?
- A: HTTP through a web proxy.
- B: HTTPS through a repository and ansible_become method for privilege escalation.
- C: SSH through a bastion host and ansible_become method for privilege escalation.
- D: XML-RPC through a web proxy.
Question 35
Which database type should be used with highly structured data and provides support for ACID transactions?
- A: time series
- B: document
- C: graph
- D: relational
Question 36
A developer must create VLANs 2-5 on a remote Cisco NX-OS switch by using an Ansible playbook. The playbook must meet these requirements:
✑ Configure the VLANs and a name for each VLAN.
✑ Only run against the switches inventory group.
✑ Execute from the local Ansible controller.
✑ Prevent the collection of system information prior to execution.
Which playbook must be used?
A.
B.
C.
D.
Question 37
A Cisco Catalyst 9000 switch has guest shell enabled. Which Linux command installs a third-party application?
- A: apt-get install <package-name>
- B: zypper install <package-name>
- C: yum install <package-name>
- D: dnf install <package-name>
Question 38
Refer to the exhibit. A Python script has these requirements:
✑ Retrieve a list of Bluetooth clients seen by the access points on a network.
✑ Print the content of the response.
✑ Retrieve the next page only if it is available in the response headers.
What must be added where the code is missing to get the remaining pages by using the next link from the link response header of the last request?
A.
B.
C.
D.
Question 39
DRAG DROP -
Drag and drop the code from the bottom onto the box where the code is missing to create a new Cisco Webex space and attach a previously configured bot named 'sampleBot'. Not all options are used.
Select and Place:
Question 40
Refer to the exhibit. A Python script must list network clients in the Cisco Meraki API that have used a network with an ID of 2. The number of client entries per returned page is restricted to 1,000 according to the API specification. Network 2 has 2,500 clients. What must be added where the code is missing to print the content of each response?
A.
B.
C.
D.
Question 41
There is a requirement to securely store unique usernames and passwords. Given a valid username, it is also required to validate that the password provided is correct.
Which action accomplishes this task?
- A: Encrypt the username, hash the password, and store these values.
- B: Hash the username, hash the password, and store these values.
- C: Encrypt the username, encrypt the password, and store these values.
- D: Hash the username, encrypt the password, and store these values.
Question 42
While developing an application following the 12-factor app methodology, which approach should be used in the application for logging?
- A: Write a log to a file in the application directory.
- B: Write a log to a file in /var/log.
- C: Write the logs buffered to stdout.
- D: Write the logs unbuffered to stdout.
Question 43
An application has initiated an OAuth authorization code grant flow to get access to an API resource on behalf of an end user.
Which two parameters are specified in the HTTP request coming back to the application as the end user grants access? (Choose two.)
- A: access token and a refresh token with respective expiration times to access the API resource
- B: access token and expiration time to access the API resource
- C: redirect URI a panel that shows the list of permissions to grant
- D: code that can be exchanged for an access token
- E: state can be used for correlation and security checks
Question 44
A web application is susceptible to cross-site scripting.
Which two methods allow this issue to be mitigated? (Choose two.)
- A: Use only drop downs.
- B: Limit user input to acceptable characters.
- C: Encrypt user input on the client side.
- D: Use AES encryption to secure the script.
- E: Remove all HTML/XML tags from user input.
Question 45
Why is end-to-end encryption deployed when exposing sensitive data through APIs?
- A: Data transfers are untraceable from source to destination.
- B: Data cannot be read or modified other than by the true source and destination.
- C: Server-side encryption enables the destination to control data protection.
- D: Traffic is encrypted and decrypted at every hop in the network path.
Question 46
Where should distributed load balancing occur in a horizontally scalable architecture?
- A: firewall-side/policy load balancing
- B: network-side/central load balancing
- C: service-side/remote load balancing
- D: client-side/local load balancing
Question 47
A developer deploys a SQLite database in a Docker container. Single-use secret keys are generated each time a user accesses the database. The keys expire after 24 hours.
Where should the keys be stored?
- A: Outside of the Docker container in the source code of applications that connect to the SQLite database.
- B: In a separate file inside the Docker container that runs the SQLite database.
- C: In an encrypted database table within the SQLite database.
- D: In a separate storage volume within the Docker container.
Question 48
While working with the Webex API, on an application that uses end-to-end encryption, a webhook has been received. What must be considered to read the message?
- A: Webhook information cannot be used to read the message because of end-to-end encryption. The API key is needed to decrypt the message.
- B: Webhook returns the full unencrypted message. Only the body is needed to query the API.
- C: Webhook returns a hashed version of the message that must be unhashed with the API key.
- D: Webhook returns message identification. To query, the API is needed for that message to get the decrypted information.
Question 49
When end-to-end encryption is implemented, which area is most vulnerable to exploitation?
- A: cryptographic key exchange
- B: endpoint security
- C: cryptographic key generation
- D: security of data in transit
Question 50
How do end-to-end encryption principles apply to APIs?
- A: The owners of the service are prevented from accessing data that is being transferred.
- B: Sensitive information is protected against backdoor attacks.
- C: The API data is protected against man-in-the-middle attacks.
- D: Both endpoints that are using the API resources are hardened against hacking.
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!