Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
350-901
Free trial
Verified
Question 76
Refer to the exhibit. Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content?
- A: CMD [ג€/bin/echoג€, ג€Test1ג€]
- B: RUN [ג€/bin/echoג€, ג€Test1ג€]
- C: ENTRYPOINT [ג€/bin/echoג€, ג€Test1ג€]
- D: CMD [ג€/bin/echo Test1ג€]
Question 77
Which two techniques protect against injection attacks? (Choose two.)
- A: input validation
- B: trim whitespace
- C: limit text areas to 255 characters
- D: string escaping of user free text and data entry
- E: only use dropdown, checkbox, and radio button fields
Question 78
Refer to the exhibit. A kubeconfig file to manage access to clusters is provided.
How many clusters are defined and which of them are accessed using username/password authentication versus certificate?
- A: two clusters; scratch
- B: three clusters; scratch
- C: three clusters; development
- D: two clusters; development
Question 79
DRAG DROP -
Drag and drop the characteristics from the left onto the correct data processing techniques on the right, in the context of GDPR.
Select and Place:
Question 80
Which two strategies are used to protect personally identifiable information? (Choose two.)
- A: Encrypt data in transit.
- B: Encrypt hash values of data.
- C: Encrypt data at rest.
- D: Only hash usernames and passwords for efficient lookup.
- E: Only encrypt usernames and passwords for efficient lookup.
Question 81
The response from a server includes the header ETag: W/7eb8b94419e371767916ef13e0d6e63d. Which statement is true?
- A: The ETag has a Strong validator directive.
- B: The ETag has a Weak validator directive, which is an optional directive.
- C: The ETag has a Weak validator directive, which is a mandatory directive.
- D: The ETag has a Strong validator directive, which it is incorrectly formatted.
Question 82
Refer to the exhibit. A developer created the code, but it fails to execute.
Which code snippet helps to identify the issue?
A.
B.
C.
D.
Question 83
Which HTTP status code indicates that a client application is experiencing intentional rate limiting by the server?
- A: 202
- B: 401
- C: 429
- D: 503
Question 84
Refer to the exhibit. A Docker swarm cluster is configured to load balance services across data centers in three different geographical regions: west, central, and east. The cluster has three manager nodes and three worker nodes. A new service named cisco_devnet is being deployed. The service has these design requirements:
✑ All containers must be hosted only on nodes in the central region.
✑ The service must run only on nodes that are ineligible for the manager role.
Which approach fulfills the requirements?
- A: Use placement constraints to control nodes to which the service can be assigned.
- B: Create the service manually in the central region and set replicas to 0.
- C: Enable the control flag in the containers of the west and east regions to prevent the service from starting.
- D: Create a second swarm cluster that is hosted only in the central region.
Question 85
Refer to the exhibit. A developer wants to automatically deploy infrastructure for a containerized application. A .gitlab-ci.yml file must describe a pipeline that builds a container based on a supplied Dockerfile and executes an Ansible playbook on the configured container. What must be added where the code is missing to complete the script?
A.
B.
C.
D.
Question 86
An engineer is developing a Docker container for an application in Python. For security reasons the application needs to be accessible on port 5001 only. Which line should be added to the dockerfile in order to accomplish this?
- A: ADD PORT 5001
- B: ENTRYPOINT 5001
- C: EXPOSE 5001
- D: PORT SRC 5001
Question 87
Refer to the exhibit. The cisco_devnet Docker swarm service runs across five replicas. The development team tags and imports a new image named devnet/ test:1.1 and requests that the image be upgraded on each container. There must be no service outages during the upgrade process. Which two design approaches must be used? (Choose two.)
- A: Enable parallel upgrades by using the docker service update command.
- B: Ensure that the service is hosted behind a VIP with no session persistence.
- C: Ensure that the service replicas are set to a minimum of 5.
- D: Update the restart policy of the containers to restart upon failure.
- E: Implement rolling upgrades by using the docker service update command.
Question 88
Refer to the exhibit. An attempt to execute a CI/CD pipeline results in the error shown. What is the cause of the error?
- A: The unit tests failed to complete.
- B: The VCS repository is unavailable.
- C: The remote library repository is unavailable.
- D: The built artifacts failed to publish to the target server.
Question 89
Refer to the exhibit. Which action should be performed to avoid an SQL injection attack?
- A: Validate the input on the platform variable.
- B: Develop a denial of service response plan.
- C: Encrypt the password that is used to connect to the database.
- D: Compile the Python file instead of allowing live interpretation.
Question 90
Which two data encoding techniques are supported by gRPC? (Choose two.)
- A: XML
- B: JSON
- C: ASCII
- D: ProtoBuf
- E: YAML
Question 91
Refer to the exhibit. A developer must configure an SSL certificate for an nginx web server. Which code must be added on the script to accomplish this configuration?
A.
B.
C.
D.
Question 92
Which scenario is an example of the pseudonymization of sensitive data that meets GDPR requirements?
- A: implementing X-Forwarded-For at the frontend of a web app to enable the source IP addresses of headers to change
- B: separating the sensitive data into its own dedicated, secured data store and using tokens in its place.
- C: encrypting sensitive data at rest by using native cloud services and data in transit by using SSL/TLS transport.
- D: leveraging an application load balancer at the frontend of a web app for SSL/TLS decryption to inspect data in transit.
Question 93
A developer must deploy a containerized application for network device inventory management. The developer sets up a Kubernetes cluster on two separate hypervisors. The SLA is not currently meeting a specified maximum value for network latency/jitter. CPU/memory and disk I/O are functioning properly. Which two design approaches resolve the issue? (Choose two.)
- A: Enable IPv6 within the cluster.
- B: Upgrade the server NIC card.
- C: Deploy the cluster to a bare metal server.
- D: Replace the HDD drives with SSD drives.
- E: Collocate services in the same pod.
Question 94
Refer to the exhibit. Information was obtained by using RESTCONF and querying URI /restconf/data/ietf-interfaces:interfaces.
Which RESTCONF call and which JSON code enables GigabitEthernet2? (Choose two.)
A.
B.
C.
D.
E.
F.
Question 95
DRAG DROP -
Drag and drop the code from the bottom onto the box where the code is missing on the Ansible task to enable a VLAN on a Meraki MX device. Not all options are used.
Select and Place:
Question 96
DRAG DROP -
Drag and drop the code from the bottom onto the box where the code is missing in the snippet to complete this Ansible playbook. Not all options are used.
Select and Place:
Question 97
Refer to the exhibit. Which key value pair from the ios_ntp Ansible module creates the NTP server peer?
- A: state: absent
- B: state: False
- C: config: absent
- D: config: False
That’s the end of your free questions
You’ve reached the preview limit for 350-901Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!