Pass the Cisco Cisco Certified DevNet Professional 350-901 Questions and answers with CertsForce

Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is a risk to data privacy during the storage and transmission of data?

Options:

A.

The risk of exposure is increased when data is shared between applications.


B.

The transfer of unencrypted data between storage devices increases the risk of exposure.


C.

Data breaches cause ongoing exposure of personal information.


D.

The transfer of unencrypted personally identifiable financial information from a storage device increases the risk of a data broach.


Expert Solution
Questions # 2:

Which Git command enables the developer to revert back to f414f31 commit to discard changes in the current working tree?

Options:

A.

git reset-hard f414f31


B.

git reset checkout-hard f414f31


C.

git reset-soft f414f31


D.

git checkout f414f31


Expert Solution
Questions # 3:

What are two advantages of using model-driven telemetry, such as gRPC. instead of traditional telemetry gathering methods? (Choose two.)

Options:

A.

all data is ad-hoc


B.

efficient use of bandwidth


C.

no overhead


D.

decentralized storage of telemetry


E.

continuous information with incremental updates


Expert Solution
Questions # 4:

Drag and drop the expressions from below onto the code to implement error handling. Not all options are used.

Question # 4


Expert Solution
Questions # 5:

Refer to the exhibit.

Question # 5

An application uses an API to periodically sync a large data set. Based on the HTTP message sequence provided, which statements are true about the caching behavior seen in the scenario? (Choose two.)

Options:

A.

The full dataset was transmitted to the client twice.


B.

The dataset changed sometime between message #4 and #5.


C.

A partial dataset was transmitted to the client in message #4.


D.

The dataset did not change during the scenario.


E.

Messages #3 and #5 are equivalent.


Expert Solution
Questions # 6:

Question # 6

Question # 6

Click on the GET Resource button above to view resources that will help with this question. An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB. Which REST API call accomplishes this task?

Options:

A.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=not(Model eq ‘UCSC’) and AvailableMemory le 5000


B.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=Model eq ‘UCSB’ and AvailableMemory lt 5000


C.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory lt 5000


D.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory le 5000


Expert Solution
Questions # 7:

An engineer is developing a Docket container for an application in Python For security reasons the application needs to be accessible on port 5001 only Which line should be added to the dockerfile m order to accomplish this?

Options:

A.

ENTRYPOINT 5001


B.

PORT SRC 5001


C.

ADO PORT 5001


D.

EXPOSE 5001


Expert Solution
Questions # 8:

A Python application is being written to run inside a Cisco IOS XE device to assist with gathering telemetry data. Drag and drop the elements of the stack from the left onto the functions on the right to collect and display the telemetry streaming data.

Question # 8


Expert Solution
Questions # 9:

A developer must deploy a containerized application for network device inventory management. The developer sets up a Kubernetes cluster on two separate hypervisors The SLA is not currently meeting a specified maximum value for network latency/jitter. CPU/memory and disk 1,0 are functioning property.

Which two design approaches resolve the issue? (Choose two.)

Options:

A.

Upgrade the server NIC card.


B.

Colocate services in the same pod.


C.

Enable IPv6 within the cluster


D.

Replace the HDD drives with SSD drives.


E.

Deploy the cluster to a bare metal server.


Expert Solution
Questions # 10:

Which action enhances end-user privacy when an application is built that collects and processes the location data from devices?

Options:

A.

Pepper the MAC address for each device.


B.

Salt the MAC address for each device.


C.

Implement an algorithmic information theoretic loss to the MAC address for each device.


D.

Use the network device serial number to encrypt the MAC address for each device.


Expert Solution
Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions