New 2020 DevNet 350-901 DEVCOR exam questions from PassLeader 350-901 dumps! Welcome to download the newest PassLeader 350-901 VCE and PDF dumps: https://www.passleader.com/350-901.html (427 Q&As)
P.S. Free 2020 DevNet 350-901 DEVCOR dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=17D6eTLKfQI64bIz9cAR9agb2o_YNONJv
NEW QUESTION 381
Which action enhances end-user privacy when an application is built that collects and processes the location data from devices?
A. Pepper the MAC address for each device.
B. Salt the MAC address for each device.
C. Implement an algorithmic information theoretic loss to the MAC address for each device.
D. Use the network device serial number to encrypt the MAC address for each device.
Answer: C
NEW QUESTION 382
A new record-keeping application for employees to track customer orders must be deployed to a company’s existing infrastructure. The host servers reside in a data center in a different country to where the majority of users work. The new network configuration for the database server is:
– IP: 10.8.32.10
– Subnet Mask: 255.255.255.0
– Hostname: CustOrd423320458-Prod-010
– MAC: 18-46-AC-6F-F4-52
The performance of the client-side application is a priority due to the high demand placed on it by employees. Which area should the team consider in terms of impact to application performance due to the planned deployment?
A. jitter
B. decreased bandwidth
C. latency
D. connectivity loss
Answer: C
NEW QUESTION 383
How should logs for an application be created?
A. Use a standard and easily configurable logging framework.
B. Use fault-tolerant protocols.
C. Monitor for backlogs and outages.
D. Filter sensitive data before transmitting logs.
Answer: A
NEW QUESTION 384
Which approach is used to protect East-West API traffic?
A. Use encryption between services.
B. Install a perimeter firewall.
C. Use a dedicated cloud connection service.
D. Implement an API gateway.
Answer: A
NEW QUESTION 385
A developer creates an application for a Cisco Catalyst 9000 switch in a Docker container. Which action must be taken to host the application on the switch?
A. Copy the application code to a NETCONF file and upload the file to the switch.
B. Connect the switch to Cisco DNA Center and push the application through the platform.
C. Use the Cisco IOxClient tool to export the application to a ZIP file and push the file to the switch.
D. Export the application as a TAR file and import the file to the switch.
Answer: D
NEW QUESTION 386
Two Elasticsearch database servers use bidirectional asynchronous data replication. Both servers accept writes from clients. The design must meet these requirements:
– The cluster must survive if a fault occurs that causes the network connection to go down between nodes.
– The data must remain consistent if communication between nodes fails.
– The data must be spread evenly across all nodes in the cluster.
Which design approach must be used to meet the requirements?
A. Set the initial voting configuration to force a specific node as the master.
B. Scale the master nodes down to a single node.
C. Set the minimum_master_nodes to 2 in the configuration.
D. Add a third cluster node to provide majority votes.
Answer: C
NEW QUESTION 387
Refer to the exhibit:
A developer created a Python script to retrieve interface information for the devices in a MeraKi network environment. A security analyst has reviewed the code and observed poor secret storage practices. What is the appropriate password storage approach?
A. Set the Base64 encoded version of the API key as MER_API_KEY in the code and Base64 decode before using in the header.
B. Set an OS environment variable for MER_API_KEY to the API key during running the code and longer set MER_API_KEY within the code.
C. Create a secret for the API key, set MER_API_KEY using the value from the secret in the Pod, and no longer set MER_API_KEY within the code.
D. Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code.
Answer: D
NEW QUESTION 388
Refer to the exhibit:
An application hosting server with the local data center is experiencing large amounts of traffic from enclusers. A developer must optimize this API server to reduce the toad on its host. What are two ways to optimize this code through HTTP cache controls? (Choose two.)
A. Include the “ETag” header in the API response.
B. Include the “Last-Modified” header in the API response.
C. Include the “Content-Type” header in the API response.
D. Leverage middleware caching and respond with HTTP code 104 m the API response.
E. Leverage middleware caching and respond with HTTP code 204 m the API response.
Answer: AB
NEW QUESTION 389
Refer to the exhibit:
One part of an application routinely uses the Cisco Meraki API to collate data about all clients. Other parts of the application also use the Meraki API, but a single API key is used within the application. The organization has approximately 4,000 clients across 30 networks Some of the application users report poor performance and missing data. Which two changes improve the performance of the application? (Choose two.)
A. Check for HTTP code 429 and wait until Retry-After time before further calls are made.
B. Configure multiple API keys in the application and rotate usage of each one.
C. Use random values in the User-Agent header when HTTP calls are made.
D. Use fewer API calls to create a more efficient endpoint.
E. Check API response payloads for later reuse in real time during code execution.
Answer: AB
NEW QUESTION 390
Refer to the exhibit:
A network engineer developed an Ansible playbook and committed it to GitLab. A GitLab CI pipeline is started but immediately fails. What is the issue?
A. The runner task uses an incorrect parameter.
B. The Ansible playbook task has a formatting issue.
C. The Ansible playbook has an undefined variable.
D. The runner is running the wrong Docker version.
Answer: B
NEW QUESTION 391
Refer to the exhibit:
Which action resolves the error for the GitLab CI/CD pipeline execution?
A. Download the correct artifacts by specifying them in GitLab.
B. Use the python:3.9.0a4-alpine3.10 Docker image.
C. Install the missing python libraries via pip3.
D. Add the absolute path to the python3 executable.
Answer: B
NEW QUESTION 392
Refer to the exhibit:
Recently, users have reported problems logging into an application with their usernames and passwords. The logs have captured an authentication attempt. Based on the messages and errors contained, what is the cause of the problem?
A. The sign-in redirection is sending clients to the wrong server for SSO.
B. There is a time synchronization issue between the application and LDAP.
C. Users are providing incorrect credentials when logging in.
D. The LDAP server used for authentication fails to respond to connection requests.
Answer: A
NEW QUESTION 393
Drag and Drop
A developer must package an application for Kubernetes to integrate into a prebuilt CD environment. The application utilizes a Docker image from Cisco DevNet public repository and is accessible from a specific port of the container. Drag and drop the code from the bottom onto the box where the code is missing in the Kubernetes YAML configuration file. Not all options are used.
NEW QUESTION 394
Drag and Drop
Drag and drop the steps from the left into the order on the right to build and run a customized Python DocKer image. Not all options are used.
NEW QUESTION 395
Drag and Drop
A developer must containerize a Python application to integrate into a prebuilt CD environment by creating a Docker image. It will be hosted as a web application to enable end users from accessing it remotely. Drag and drop the code from the bottom onto the box where the code is missing in the Docker file. Not all options are used.
NEW QUESTION 396
Drag and Drop
Drag and drop the code from the bottom onto the box where the code is missing in the Python code to query for user permissions while mitigating against SQL Injection. Not all options are used.
NEW QUESTION 397
Drag and Drop
Drag and drop the code from the bottom onto the box where the code is missing to delete a host object by using the Cisco Firepower Device Manager API. Not all options are used.
NEW QUESTION 398
Drag and Drop
Drag and drop the steps from the left into the order on the right to ensure that an application requiring communication to the external network is hosted on a Cisco Catalyst 9000 switch.
NEW QUESTION 399
Drag and Drop
A developer is creating a Python function that adds network engineers to a Webex room to troubleshoot after a monitoring alert. Drag and drop the code from the bottom onto the box where the code is missing in the Python function to add the engineers to the room. Not all options are used.
NEW QUESTION 400
Drag and Drop
Drag and drop the components from the left into the order on the right to create the flow of the three-legged OAuth2.
NEW QUESTION 401
Drag and Drop
Drag and drop the code from the bottom onto the box where the code is missing to construct a contact tracking application that dynamically returns all the Bluetooth clients on a given Meraki network. Not all options are used.
NEW QUESTION 402
……
New 2020 DevNet 350-901 DEVCOR exam questions from PassLeader 350-901 dumps! Welcome to download the newest PassLeader 350-901 VCE and PDF dumps: https://www.passleader.com/350-901.html (427 Q&As)
P.S. Free 2020 DevNet 350-901 DEVCOR dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=17D6eTLKfQI64bIz9cAR9agb2o_YNONJv