Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

350-901Free trialFree trial

By cisco
Aug, 2025

Verified

25Q per page

Question 76

Image 1

Refer to the exhibit. Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content?

  • A: CMD [ג€/bin/echoג€, ג€Test1ג€]
  • B: RUN [ג€/bin/echoג€, ג€Test1ג€]
  • C: ENTRYPOINT [ג€/bin/echoג€, ג€Test1ג€]
  • D: CMD [ג€/bin/echo Test1ג€]

Question 77

Which two techniques protect against injection attacks? (Choose two.)

  • A: input validation
  • B: trim whitespace
  • C: limit text areas to 255 characters
  • D: string escaping of user free text and data entry
  • E: only use dropdown, checkbox, and radio button fields

Question 78

Image 1

Refer to the exhibit. A kubeconfig file to manage access to clusters is provided.
How many clusters are defined and which of them are accessed using username/password authentication versus certificate?

  • A: two clusters; scratch
  • B: three clusters; scratch
  • C: three clusters; development
  • D: two clusters; development

Question 79

DRAG DROP -
Drag and drop the characteristics from the left onto the correct data processing techniques on the right, in the context of GDPR.
Select and Place:

Image 1

Question 80

Which two strategies are used to protect personally identifiable information? (Choose two.)

  • A: Encrypt data in transit.
  • B: Encrypt hash values of data.
  • C: Encrypt data at rest.
  • D: Only hash usernames and passwords for efficient lookup.
  • E: Only encrypt usernames and passwords for efficient lookup.

Question 81

The response from a server includes the header ETag: W/7eb8b94419e371767916ef13e0d6e63d. Which statement is true?

  • A: The ETag has a Strong validator directive.
  • B: The ETag has a Weak validator directive, which is an optional directive.
  • C: The ETag has a Weak validator directive, which is a mandatory directive.
  • D: The ETag has a Strong validator directive, which it is incorrectly formatted.

Question 82

Image 1

Refer to the exhibit. A developer created the code, but it fails to execute.
Which code snippet helps to identify the issue?
A.

Image 2

B.

Image 3

C.

Image 4

D.

Image 5

Question 83

Which HTTP status code indicates that a client application is experiencing intentional rate limiting by the server?

  • A: 202
  • B: 401
  • C: 429
  • D: 503

Question 84

Image 1

Refer to the exhibit. A Docker swarm cluster is configured to load balance services across data centers in three different geographical regions: west, central, and east. The cluster has three manager nodes and three worker nodes. A new service named cisco_devnet is being deployed. The service has these design requirements:
✑ All containers must be hosted only on nodes in the central region.
✑ The service must run only on nodes that are ineligible for the manager role.
Which approach fulfills the requirements?

  • A: Use placement constraints to control nodes to which the service can be assigned.
  • B: Create the service manually in the central region and set replicas to 0.
  • C: Enable the control flag in the containers of the west and east regions to prevent the service from starting.
  • D: Create a second swarm cluster that is hosted only in the central region.

Question 85

Image 1

Refer to the exhibit. A developer wants to automatically deploy infrastructure for a containerized application. A .gitlab-ci.yml file must describe a pipeline that builds a container based on a supplied Dockerfile and executes an Ansible playbook on the configured container. What must be added where the code is missing to complete the script?
A.

Image 2

B.

Image 3

C.

Image 4

D.

Image 5

Question 86

An engineer is developing a Docker container for an application in Python. For security reasons the application needs to be accessible on port 5001 only. Which line should be added to the dockerfile in order to accomplish this?

  • A: ADD PORT 5001
  • B: ENTRYPOINT 5001
  • C: EXPOSE 5001
  • D: PORT SRC 5001

Question 87

Image 1

Refer to the exhibit. The cisco_devnet Docker swarm service runs across five replicas. The development team tags and imports a new image named devnet/ test:1.1 and requests that the image be upgraded on each container. There must be no service outages during the upgrade process. Which two design approaches must be used? (Choose two.)

  • A: Enable parallel upgrades by using the docker service update command.
  • B: Ensure that the service is hosted behind a VIP with no session persistence.
  • C: Ensure that the service replicas are set to a minimum of 5.
  • D: Update the restart policy of the containers to restart upon failure.
  • E: Implement rolling upgrades by using the docker service update command.

Question 88

Image 1

Refer to the exhibit. An attempt to execute a CI/CD pipeline results in the error shown. What is the cause of the error?

  • A: The unit tests failed to complete.
  • B: The VCS repository is unavailable.
  • C: The remote library repository is unavailable.
  • D: The built artifacts failed to publish to the target server.

Question 89

Image 1

Refer to the exhibit. Which action should be performed to avoid an SQL injection attack?

  • A: Validate the input on the platform variable.
  • B: Develop a denial of service response plan.
  • C: Encrypt the password that is used to connect to the database.
  • D: Compile the Python file instead of allowing live interpretation.

Question 90

Which two data encoding techniques are supported by gRPC? (Choose two.)

  • A: XML
  • B: JSON
  • C: ASCII
  • D: ProtoBuf
  • E: YAML

Question 91

Image 1

Refer to the exhibit. A developer must configure an SSL certificate for an nginx web server. Which code must be added on the script to accomplish this configuration?
A.

Image 2

B.

Image 3

C.

Image 4

D.

Image 5

Question 92

Which scenario is an example of the pseudonymization of sensitive data that meets GDPR requirements?

  • A: implementing X-Forwarded-For at the frontend of a web app to enable the source IP addresses of headers to change
  • B: separating the sensitive data into its own dedicated, secured data store and using tokens in its place.
  • C: encrypting sensitive data at rest by using native cloud services and data in transit by using SSL/TLS transport.
  • D: leveraging an application load balancer at the frontend of a web app for SSL/TLS decryption to inspect data in transit.

Question 93

A developer must deploy a containerized application for network device inventory management. The developer sets up a Kubernetes cluster on two separate hypervisors. The SLA is not currently meeting a specified maximum value for network latency/jitter. CPU/memory and disk I/O are functioning properly. Which two design approaches resolve the issue? (Choose two.)

  • A: Enable IPv6 within the cluster.
  • B: Upgrade the server NIC card.
  • C: Deploy the cluster to a bare metal server.
  • D: Replace the HDD drives with SSD drives.
  • E: Collocate services in the same pod.

Question 94

Image 1

Refer to the exhibit. Information was obtained by using RESTCONF and querying URI /restconf/data/ietf-interfaces:interfaces.
Which RESTCONF call and which JSON code enables GigabitEthernet2? (Choose two.)
A.

Image 2

B.

Image 3

C.

Image 4

D.

Image 5

E.

Image 6

F.

Image 7

Question 95

DRAG DROP -
Drag and drop the code from the bottom onto the box where the code is missing on the Ansible task to enable a VLAN on a Meraki MX device. Not all options are used.
Select and Place:

Image 1

Question 96

DRAG DROP -
Drag and drop the code from the bottom onto the box where the code is missing in the snippet to complete this Ansible playbook. Not all options are used.
Select and Place:

Image 1

Question 97

Image 1

Refer to the exhibit. Which key value pair from the ios_ntp Ansible module creates the NTP server peer?

  • A: state: absent
  • B: state: False
  • C: config: absent
  • D: config: False

That’s the end of your free questions

You’ve reached the preview limit for 350-901

Consider upgrading to gain full access!

Page 4 of 20 • Questions 76-100 of 485

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!