110 likes | 110 Views
PassQuestion 2021 Updated Cisco Certified DevNet Professional 350-901 Real Questions are the latest and the most valid study materials online, which help you clear your exam in the first attempt.
E N D
350-901 Training Questions Developing Applications using Cisco Core Platforms and APIs v1.0 https://www.passquestion.com/350-901.html
Practice PassQuestion 350-901 Training Questions ensure your 100% success Question 1 Which two strategies are used to protect personally identifiable information? Which two strategies are used to protect personally identifiable information? (Choose two.) (Choose two.) A. Encrypt data in transit. A. Encrypt data in transit. B. Encrypt hash values of data. B. Encrypt hash values of data. C. Encrypt data at rest. C. Encrypt data at rest. D. Only hash usernames and passwords for efficient lookup. D. Only hash usernames and passwords for efficient lookup. E. Only encrypt usernames and passwords for efficient lookup. E. Only encrypt usernames and passwords for efficient lookup. Answer: A,C Answer: A,C
Practice PassQuestion 350-901 Training Questions ensure your 100% success Question 2 Which two techniques protect against injection attacks? (Choose two.) Which two techniques protect against injection attacks? (Choose two.) A. input validation A. input validation B. trim whitespace B. trim whitespace C. limit text areas to 255 characters C. limit text areas to 255 characters D. string escaping of user free text and data entry D. string escaping of user free text and data entry E. only use dropdown, checkbox, and radio button fields E. only use dropdown, checkbox, and radio button fields Answer: A,D Answer: A,D
Practice PassQuestion 350-901 Training Questions ensure your 100% success Question 3 Refer to the exhibit , The command docker build -tag=friendlyhello . is run to build a docker image from Refer to the exhibit , The command docker build -tag=friendlyhello . is run to build a docker image from the given Dockerfile, requirements,txt, and app.py, Then the command docker run -p 4000:80 friendlyhello the given Dockerfile, requirements,txt, and app.py, Then the command docker run -p 4000:80 friendlyhello is executed to run the application. is executed to run the application. Which URL is entered in the web browser to see the content served by the application? Which URL is entered in the web browser to see the content served by the application? A. http://localhost:4000 A. http://localhost:4000 B. http ://localhost:80 B. http ://localhost:80 C. http ://127.0.0.1:80 C. http ://127.0.0.1:80 D. http:///4000:80 D. http:///4000:80 Answer: A Answer: A
Practice PassQuestion 350-901 Training Questions ensure your 100% success Question 4 A developer has completed the implementation of a REST API, but when it is executed, it A developer has completed the implementation of a REST API, but when it is executed, it returns a 401 error message. returns a 401 error message. What must be done on the API to resolve the issue? What must be done on the API to resolve the issue? A. Access permission to the resource must be granted, before the request. A. Access permission to the resource must be granted, before the request. B. Configure new valid credentials. B. Configure new valid credentials. C. The requested API endpoint does not exist, and the request URL must be changed. C. The requested API endpoint does not exist, and the request URL must be changed. D. Additional permission must be granted before the request can submitted. D. Additional permission must be granted before the request can submitted. Answer: B Answer: B
Practice PassQuestion 350-901 Training Questions ensure your 100% success Question 5 In the three-legged OAuth2 authorization workflow, which entity grants access to a In the three-legged OAuth2 authorization workflow, which entity grants access to a protected resource? protected resource? A. resource server A. resource server B. resource owner B. resource owner C. client C. client D. authorization server D. authorization server Answer: A Answer: A
Practice PassQuestion 350-901 Training Questions ensure your 100% success Question 6 A developer needs to configure an environment to orchestrate and configure. A developer needs to configure an environment to orchestrate and configure. Which two tools should be used for each task? (Choose two.) Which two tools should be used for each task? (Choose two.) A. Puppet for orchestration A. Puppet for orchestration B. Terraform for orchestration B. Terraform for orchestration C. Terraform for configuration C. Terraform for configuration D. Ansible for orchestration D. Ansible for orchestration E. Ansible for configuration E. Ansible for configuration Answer: B,E Answer: B,E
Practice PassQuestion 350-901 Training Questions ensure your 100% success Question 7 Why is end-to-end encryption deployed when exposing sensitive data through APIs? Why is end-to-end encryption deployed when exposing sensitive data through APIs? A. Traffic is encrypted and decrypted at every hop in the network path. A. Traffic is encrypted and decrypted at every hop in the network path. B. Data transfers are untraceable from source to destination. B. Data transfers are untraceable from source to destination. C. Data cannot be read or modified other than by the true source and destination. C. Data cannot be read or modified other than by the true source and destination. D. Server-side encryption enables the destination to control data protection. D. Server-side encryption enables the destination to control data protection. Answer: C Answer: C
Practice PassQuestion 350-901 Training Questions ensure your 100% success Question 8 Users report that they are no longer able to process transactions with the online ordering Users report that they are no longer able to process transactions with the online ordering application, and the logging dashboard is displaying these messages: Fri Jan 10 19:37:31.123 ESI application, and the logging dashboard is displaying these messages: Fri Jan 10 19:37:31.123 ESI 2020 [FRONTEND] [NFO: Incoming request to add item to cart from user 45834534858 2020 [FRONTEND] [NFO: Incoming request to add item to cart from user 45834534858 Fri Jan 10 19:37:31.247 EST 2020 [BACKEND] INFO: Attempting to add item to cart Fri Jan 10 19:37:31.247 EST 2020 [BACKEND] INFO: Attempting to add item to cart Fri Jan 10 19:37:31.250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB Fri Jan 10 19:37:31.250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused ERROR: Connection refused What is causing the problem seen in these log messages? What is causing the problem seen in these log messages? A. The database server container has crashed. A. The database server container has crashed. B. The backend process is overwhelmed with too many transactions. B. The backend process is overwhelmed with too many transactions. C. The backend is not authorized to commit to the database. C. The backend is not authorized to commit to the database. D. The user is not authorized to add the item to their cart. D. The user is not authorized to add the item to their cart. Answer: A Answer: A
Practice PassQuestion 350-901 Training Questions ensure your 100% success Question 9 Which two statements are considered best practices according to the 12-factor app methodology for Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.) application design? (Choose two.) A. Application code writes its event stream to stdout. A. Application code writes its event stream to stdout. B. Application log streams are archived in multiple replicated databases. B. Application log streams are archived in multiple replicated databases. C. Application log streams are sent to log indexing and analysis systems. C. Application log streams are sent to log indexing and analysis systems. D. Application code writes its event stream to specific log files. D. Application code writes its event stream to specific log files. E. Log files are aggregated into a single file on individual nodes. E. Log files are aggregated into a single file on individual nodes. Answer: A,C Answer: A,C
Practice PassQuestion 350-901 Training Questions ensure your 100% success Question 10 Which two data encoding techniques are supported by gRPC? (Choose two.) Which two data encoding techniques are supported by gRPC? (Choose two.) A. XML A. XML B. JSON B. JSON C. ASCII C. ASCII D. ProtoBuf D. ProtoBuf E. YAML E. YAML Answer: B,D Answer: B,D