Pass the Cisco Cisco Certified DevNet Professional 350-901 Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions
Questions # 21:

Drag and drop the code from the bottom onto the box where the code is missing to retrieve a summary of physical compute resources. The collected information about the compute resources will be presented in a dashboard to be developed for device monitoring purposes. Not all snippets are used.

Question # 21


Expert Solution
Questions # 22:

A developer releases a new application for network automation of Cisco devices deployed in a local data center. The application utilizes complex design patterns such as microservices that host multiple third-party libraries and programming languages. The development must be simplified by implementing an observability- driven velopment lifecycle. Which two considerations must be taken to meet the requirements? (Choose two.)

Options:

A.

which KPIs to monitor


B.

description of low-level errors


C.

relevant metrics to expose


D.

which monitoring tools to use


E.

identifying customer priorities


Expert Solution
Questions # 23:

Which security approach should be used for developing a REST API?

Options:

A.

Use custom security relevant HTTP response codes


B.

Utilise TLS for end to end encryption


C.

Add an API key to each URL string


D.

Utilize CORS headers


Expert Solution
Questions # 24:

Drag and drop the steps from the left into the sequence on the fight to implement an OAuth2 three-legged authorization code flow grant type in an application Not all options are used.

Question # 24


Expert Solution
Questions # 25:

Refer to the exhibit.

Question # 25

Which key value pair from the ios_ntp Ansible module creates an NTP server peer?

Options:

A.

state: present


B.

state: True


C.

config: present


D.

config: True


Expert Solution
Questions # 26:

A web application is being developed to provide online sales to a retailer. The customers will need to use their username and passwords to login into then profile and complete their order For this reason the application must store user passwords Which approach ensures that an attacker wifi need to crack the passwords one at a time?

Options:

A.

Apply the peppering technique


B.

Store the passwords by using asymmetric encryption


C.

Apply the salting technique


D.

Store the passwords by using symmetric encryption


Expert Solution
Questions # 27:

Which RFC5988 (Web Linking) relation type is used in the Link header to control pagination in APIs?

Options:

A.

rel=”index”


B.

rel=”page”


C.

rel=”next”


D.

rel=”section”


Expert Solution
Questions # 28:

Drag and drop the steps from the left into the order on the right to ensure that an application requiring communication to the external network is hosted on a Cisco Catalyst 9000 switch.

Question # 28


Expert Solution
Questions # 29:

Refer to the exhibit.

Question # 29

Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow.

Question # 29


Expert Solution
Questions # 30:

Refer to the exhibit.

Question # 30

A Python script has these requirements

• Retrieve a list of Bluetooth clients seen by the access pants on a network.

• Print the content of the response

• Retrieve the next page only if it is available in the response headers

What must be added where the code is missing to get the remaining pages by using the next link from the link response header of the last request?

A)

Question # 30

B)

Question # 30

C)

Question # 30

D)

Question # 30

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions