Cisco (350-901-DEVCOR) Exam Questions And Answers page 28
Which two strategies are used to protect personally identifiable information? (Choose two.)
Encrypt hash values of data.
Encrypt data at rest.
Only hash usernames and passwords for efficient lookup.
Only encrypt usernames and passwords for efficient lookup.
Network Fundamentals
Security Fundamentals
Refer to the exhibit. An Intersight API is being used to query RackUnit resources that have a tag keyword set to Site .
What is the expected output of this command?
list of all resources that have a tag with the keyword Site
error message because the Value field was not specified
error message because the tag filter should be lowercase
list of all sites that contain RackUnit tagged compute resources
Cisco Core Platforms and APIs
Software Development and Design
Which two actions must be taken when an observable microservice application is developed? (Choose two.)
Know the state of a single instance of a single service.
Place try/except statement in code.
Place log statements in the code.
Use distributed tracing techniques.
Deploy microservice to multiple datacenters.
Software Development and Design
Infrastructure and Automation
Drag and drop the code from the bottom onto the box where the code is missing in the Python script to execute a REST API call to query all the NTP policy names and print the name of each policy. Not all options are used.
Software Development and Design
Using APIs
Refer to the exhibit. The self-service Webex bot is failing when many users attempt to interact with it at the same time. Drag and drop the code snippets from the left onto the correct item numbers on the right that match the missing sections in the exhibit to complete this code to handle this high-load situation.
Cisco Core Platforms and APIs
Infrastructure and Automation
Refer to the exhibit. Many faults have occurred in the ACI environment and a sample of them needs to be examined.
Which API call retrieves faults 31 through 45?
GET https://apic-ip-address/api/class/faultInfo.json\?order-by=faultInst.severity|desc&page=1&page-size=15
GET https://apic-ip-address/api/class/faultInfo.json\?order-by=faultInst.severity|desc&page=2&page-size=15
GET https://apic-ip-address/api/class/faultInfo.json\?order-by=faultInst.severity|desc&page-size=30
GET https://apic-ip-address/api/class/faultInfo.json\?order-by=faultInst.severity|desc&page=2&page-size=30
Cisco Core Platforms and APIs
Using APIs
A developer is creating a Python script to use the Webex REST API to list joined spaces, and gracefully handle and print the errors it receives. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script.
Software Development and Design
Using APIs
Refer to the exhibit. Which word is missing from this Ansible playbook shown, to allow the Cisco IOS XE commands for router configuration to be pushed after the playbook is executed?
lines
input
commands
config
Network Fundamentals
Infrastructure and Automation
A cloud native project is being worked on in which all source code and dependencies are written in Python, Ruby, and/or JavaScnpt. A change in code triggers a notification to the CI/CD tool to run the CI/CD pipeline.
Which step should be omitted from the pipeline?
Which step should be omitted from the pipeline?
Deploy the code to one or more environments, such as staging and/or production.
Build one of more containers that package up code and all its dependencies.
Compile code.
Run automated tests to validate the code.
Infrastructure and Automation
Software Development and Design
Refer to the exhibit. The JSON response is received from the Meraki location API.
Which parameter is missing?
apMac
clientMac
clientId
accesspoint
Cisco Core Platforms and APIs
Infrastructure and Automation
Comments