Practice Free 350-901 Exam Online Questions
Which transport layer protocol does gRPC use to retrieve telemetry information?
- A . SSH
- B . SNMP
- C . TCP
- D . HTTP/2
Refer to the exhibit.
The virtual next-generation firewalls running in the public cloud must be scaled out to meet the throughput requirements of the application layer.
Which component is deployed to location A in the diagram?
- A . frontend caching server
- B . forward proxy
- C . backend database
- D . internal load balancer
Refer to the exhibit.
The virtual next-generation firewalls running in the public cloud must be scaled out to meet the throughput requirements of the application layer.
Which component is deployed to location A in the diagram?
- A . frontend caching server
- B . forward proxy
- C . backend database
- D . internal load balancer
Refer to the exhibit.
An engineer is configuring Ansible to run playbooks against Cisco IOS XE Software.
What should be configured in ansible.cfg as the connection type?
- A . network_cli
- B . ssh
- C . shell
- D . command
B
Explanation:
Reference: https://docs.ansible.com/ansible/latest/user_guide/intro_inventory.html
Where must the data be encrypted to ensure end-to-end encryption when using an API?
- A . on the device that consumes the API
- B . on the source device before transmission
- C . on the end device after a request is received
- D . on the server that stores the data
A development team is looking for a tool to automate configurations across the infrastructure.
The tool must have these characteristics:
• written in Python
• define playbooks (or intent
• stateless
• imperative
Which tool meets these requirements?
- A . Puppet
- B . Netmiko
- C . Ansible
- D . NCM
A developer is containerizing an application using Docker. A local Docker alpine image has been created, and it has the image ID ‘b9c2d50f0b6y74998’ with the tag ‘dev’. The developer must make a running container based on the tagged image, with the container port 80 bound to port 8080 on the host.
Which command must be used?
- A . docker run -p 8080:80 alpine:dev
- B . docker start -p 8080:80 alpine:dev
- C . docker build -p 8080:80 alpine:dev
- D . docker exec -p 8080:80 alpine:dev
DRAG DROP
Drag and drop the code snippets from the bottom onto the blanks in the code to deploy the last version of a previously created Python Flask application called app-updates onto a Kubernetes cluster. Not all options ate used.

Refer to the exhibit.
Recently, users have reported problems logging into an application with their usernames and passwords. The logs have captured an authentication attempt.
Based on the messages and errors contained, what is the cause of the problem?
- A . The sign-in redirection is sending clients to the wrong server for SSO.
- B . There is a time synchronization issue between the application and LDAP.
- C . Users are providing incorrect credentials when logging in.
- D . The LDAP server used for authentication fails to respond to connection requests
Which two actions must be taken when an observable microservice application is developed? (Choose two.)
- A . Know the state of a single instance of a single service.
- B . Place “try/except” statement in code.
- C . Place log statements in the code.
- D . Use distributed tracing techniques.
- E . Deploy microservice to multiple datacenters.