Pass the Cisco Cisco Certified DevNet Professional 350-901 Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions
Questions # 31:

Question # 31

Refer to the exhibit. A Python API server has been deployed. Based on metrics and logs, increased load has been noticed. Which two approaches must be taken to optimize API usage on the server? (Choose two.)

Options:

A.

Include the ETag header in the API response


B.

Include the Last-Modified header in the API response.


C.

Change the query to be more efficient.


D.

Include the Content-Type header in the API response.


E.

Leverage middleware caching and respond with HTTP code 204 in the API response.


Expert Solution
Questions # 32:

Refer to the exhibits. Which data payload completes the CURL command to run the create port object API call In Cisco Firepower Threat Defense?

Question # 32

Refer to the exhibits. Which data payload completes the CURL command to run the create port object API call In Cisco Firepower Threat Defense?

A)

Question # 32

B)

Question # 32

C)

Question # 32

D)

Question # 32

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 33:

A client is written that uses a REST API to interact with a server. Using HTTPS as the transport, an HTTP request is sent and received an HTTP response. The response contains the HTTP response status code: 503 Service Unavailable.

Which action is the appropriate response?

Options:

A.

Add an Authorization header that supplies appropriate credentials and sends the updated request.


B.

Resend the request using HTTP as the transport instead of HTTPS.


C.

Add an Accept header that indicates the content types that the client understands and send the updated request.


D.

Look for a Retry-After header in the response and resend the request after the amount of time indicated.


Expert Solution
Questions # 34:

A developer is working in a branch to develop a new feature named ‘newfeat404880077’. A file named ‘devcoreg13642911.jpg’ has accidentally been staged. This needs to be removed so that the commit is performed and branches merged. Which git command must be used to unstage the file?

Options:

A.

git delete HEAD devcoreg13642911.jpg


B.

git remove HEAD devcoreg13642911.jpg


C.

git reset HEAD devcoreg13642911.jpg


D.

git revert HEAD devcoreg13642911.jpg


Expert Solution
Questions # 35:

An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances.

Which two actions can improve the design of the application to identify the faults? (Choose two.)

Options:

A.

Automatically pull out the container that fails the most over a time period.


B.

Implement a tagging methodology that follows the application execution from service to service.


C.

Add logging on exception and provide immediate notification.


D.

Do a write to the datastore every time there is an application failure.


E.

Implement an SNMP logging system with alerts in case a network link is slow.


Expert Solution
Questions # 36:

In the three-legged OAuth2 process, after the authorization server presents a form to the resource owner to grant access, what is the next step?

Options:

A.

The resource owner authenticates and optionally authorizes with the authorization server.


B.

The user who owns the resource initiates a request to the OAuth client.


C.

If the resource owner allows access, the authorization server sends the OAuth client a redirection.


D.

A form to allow or restrict access is submitted by the owner of the resource.


Expert Solution
Questions # 37:

Which two gRPC modes of model-driven telemetry are supported on Cisco IOS XE Software? (Choose two.)

Options:

A.

dial-in


B.

dial-out


C.

call-in


D.

call-out


E.

passive


Expert Solution
Questions # 38:

A Cisco Catalyst 9000 switch has guest shell enabled. Which Linux command installs a third-party application?

Options:

A.

yum Install


B.

apt-get install


C.

zypper install


D.

dnf install


Expert Solution
Questions # 39:

Cisco sensorBase gathers threat information from a variety of cisco products and services and performs analytics on threats. Which term describes this process?

Options:

A.

consumption


B.

deployment


C.

sharing


D.

authoring


Expert Solution
Questions # 40:

Refer to the exhibit.

Question # 40

The Ansible playbook is using the netconf_module to configure an interface using a YANG model. As part of this workflow, which YANG models augment the interface?

Options:

A.

ietf-interfaces and ietf-ip


B.

iana-if-type and ietf-interfaces


C.

ietf-ip and openconfig-interface


D.

ietf-ip and iana-if-type


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions