Practice Free 350-901 Exam Online Questions
What is a benefit of continuous testing?
- A . decreases the frequency of code check-ins
- B . removes the requirement for test environments
- C . enables parallel testing
- D . increases the number of bugs found in production
A developer IS deploying an action to automate the configuration and management of Cisco network switches and routers. The application must use REST API interlace to achieve programmability. The security team mandates that the network must be protected against DDoS attacks.
What mitigates the attacks without impacting genuine requests?
- A . traffic routing on the network perimeter
- B . firewall on the network perimeter
- C . API rate limiting at the application layer
- D . IP address filtering at the application layer
What are two benefits of using a centralized logging service? (Choose two.)
- A . reduces the time required to query log data across multiple hosts
- B . reduces the loss of logs after a single disk failure
- C . improves application performance by reducing CPU usage
- D . improves application performance by reducing memory usage
- E . provides compression and layout of log data
An engineer developed an application to be used as a file server using Python. The application was placed in a Kubernetes pod and must be accessible from outside the network utilizing an HTTPS service.
Which command must be used to enable the required access?
A)
B)
C)
D)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
Refer to the exhibit.
A network administrator copies SSL certificates to a Cisco NX-OS switch. An Ansible playbook is created to enable NX-API, which will use the new certificate.
In the group_vars/vars.yml file, which code snippet must be used to define the properly formatted variables?
A)
B)
C)
D)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
Refer to the exhibit.
A developer runs the docker service scale command to increase the number of replicas for the cisco_devnet service. The swarm cluster is using a private IP address subnet.
The service has these design requirements:
✑ It must be hosted behind a virtual IP address that is reachable from the Internet.
✑ For security reasons, the Docker swarm cluster subnet must not be reachable from the Internet.
Which design approach is used to fulfill the requirements?
- A . Create an overlay network by using a globally roulable subnet and enable a routing mesh within the swarm cluster.
- B . Create a bridge network by using a globally routable subnet and enable a routing mesh within the swarm cluster.
- C . Configure an external load balancer to route requests to the swarm service by using VPN.
- D . Configure an external load balancer to route requests to the swarm service by using NAT.
A developer deploys a SQLite database in a Docker container. Single-use secret keys are generated each time a user accesses the database. The keys expire after 24 hours.
Where should the keys be stored?
- A . Outside of the Docker container in the source code of applications that connect to the SQLite database.
- B . In a separate file inside the Docker container that runs the SQLite database.
- C . In an encrypted database table within the SQLite database.
- D . In a separate storage volume within the Docker container.
DRAG DROP
Drag and drop the code from the bottom onto the box where the code is missing on the Dockerfile to containerize an application that listens on the specified TCP network port at runtime. Not all options are used.

Refer to the exhibit.
An application is created to serve the needs of an enterprise. Slow performance now impacts certain API calls, and the application design lacks observability.
Which two commands improve observability and provide an output that is similar to the sample output? (Choose two.)
A)
B)
C)
D)
E)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
- E . Option E
Refer to the exhibit.
Which line of code needs to be placed on the snippet where the code is missing to provide APl rate-limiting to the requests?
- A . int(self.response.headers.post(‘Retry-After’))
- B . int(response.headers.get(‘Retry-After’))
- C . int(self.response.headers.get(Retry-After’))
- D . int(response.headers.post(‘Retry-After’))