350-901 Real Exam Dumps Questions and answers 31-40

Get Full Version of the Exam
http://www.EnsurePass.com/350-901.html

Question No.31

Which type of file is created from issued intermediate, root, and primary certificates for SSL installation on a server?

  1. DER

  2. CSR

  3. PEM

  4. CRT

Correct Answer: C

Question No.32

DRAG DROP

Refer to the exhibit. The Python script is supposed to make an API call to Cisco DNA Center querying a wireless profile for the quot;ChicagoCampusquot; and then parsing out its enable FlexConnect value. Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit.

image

image

Correct Answer:

image

Question No.33

Which two countermeasures help reduce the risk of playback attacks? (Choose two.)

  1. Store data in a NoSQL database.

  2. Implement message authentication (HMAC).

  3. Enable end-to-end encryption.

  4. Remove stack traces from errors.

  5. Use short-lived access tokens.

Correct Answer: BE

Question No.34

An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances. Which two actions can improve the design of the application to identify the faults? (Choose two.)

  1. Automatically pull out the container that fails the most over a time period.

  2. Implement a tagging methodology that follows the application execution from service to service.

  3. Add logging on exception and provide immediate notification.

  4. Do a write to the datastore every time there is an application failure.

  5. Implement an SNMP logging system with alerts in case a network link is slow.

Correct Answer: BC

Question No.35

An organization manages a large cloud-deployed application that employs a microservices

architecture. No notable issues occur with downtime because the services of this application are redundantly deployed over three or more data center regions. However, several times a week reports are received about application slowness. The container orchestration logs show faults in a variety of containers that cause them to fail and then spin up brand new. Which action must be taken to improve the resiliency design of the application while maintaining current scale?

  1. Update the base image of the containers.

  2. Test the execution of the application with another cloud services platform.

  3. Increase the number of containers running per service.

  4. Add consistent quot;try/catch(exception)quot; clauses to the code.

Correct Answer: D

Question No.36

Which RFC5988 (Web Linking) relation type is used in the Link header to control pagination in APIs?

  1. rel=quot;indexquot;

  2. rel=quot;pagequot;

  3. rel=quot;nextquot;

  4. rel=quot;sectionquot;

Correct Answer: C

Question No.37

Which database type should be used with highly structured data and provides support for ACID transactions?

  1. time series

  2. document

  3. graph

  4. relational

Correct Answer: D

Question No.38

Which transport protocol is used by gNMI?

  1. HTTP/2

  2. HTTP 1.1

  3. SSH

  4. MQTT

Correct Answer: A

Question No.39

An application uses OAuth to get access to several API resources on behalf of an end user. What are two valid parameters to send to the authorization server as part of the first step of an authorization code grant flow? (Choose two.)

  1. URI to which the authorization server will send the user-agent back when access is granted or denied

  2. list of the API resources that the application is requesting to access

  3. secret that was generated by the authorization server when the application registered as an OAuth integration

  4. list of scopes that correspond to the API resources to which the application is requesting to access

  5. name of the application under which the application registered as an OAuth integration

Correct Answer: AC

Question No.40

An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online. Which configuration management and/or automation tooling is needed for this solution?

  1. Ansible

  2. Ansible and Terraform

  3. NSO

  4. Terraform

  5. Ansible and NSO

Correct Answer: E

Get Full Version of 350-901 Dumps