Practice Free 350-901 Exam Online Questions
DRAG DROP
Refer to the exhibit.
Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the curl exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used.

A developer is building an application to access a website. When running the application, an HTTP 403 error code has been received.
How should the application be modified to handle this code?
- A . Create a loop on cancel the operation and run a new one after the code is received.
- B . Use exponential backoff when retrying distributed services and other remote endpoints.
- C . Build a try/except around the urlopen to find errors occurring in the request.
- D . Redirect the request to an internal web server and make a new request from the internal resource.
Refer to the exhibit.
A script returns the location of a specific access point when given the access point name If a user enters a search value such as DROP TABLE access points then the entire table is removed.
What must be added to the box where the code is missing to prevent a SQL injection attack?
A)
B)
C)
D)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
A team of engineers must manage and configure an infrastructure programmatically. The team must be able to bootstrap and configure new servers and switches remotely without using an agent.
Which configuration management tool meets the requirements?
- A . Terraform
- B . Puppet
- C . Jenkins
- D . Chef
An application requires SSL certificates signed by an intermediate CA certificate.
The crt files must be available to the application:
• The root CA certificate is root_certrficate.crt.
• The intermediate CA certificate is intermediate_certificate.crt
• The application-specific SSL certificate is crt_certificate.crt.
Which Bash command outputs the certificate bundle as a .pern file?
A)
B)
C)
D)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
An application requires SSL certificates signed by an intermediate CA certificate.
The crt files must be available to the application:
• The root CA certificate is root_certrficate.crt.
• The intermediate CA certificate is intermediate_certificate.crt
• The application-specific SSL certificate is crt_certificate.crt.
Which Bash command outputs the certificate bundle as a .pern file?
A)
B)
C)
D)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
DRAG DROP
Refer to the exhibit.
Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Python code that uses the UCS Python SDK is instantiating a service profile named ”devcore-server-01” from service profile template ”device-template” , then associating the service profile instance to blade 3 in chassis 7.
Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the Python exhibit.

DRAG DROP
Refer to the exhibit.
A new file named Cisco is added to a branch named testing, but it has not been committed.
Drag and drop the Git commands from the left into the order on the right to merge the testing branch, with the new Cisco frte. into the master branch. Not all options are used.

An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances.
Which two actions can improve the design of the application to identify the faults? (Choose two.)
- A . Automatically pull out the container that fails the most over a time period.
- B . Implement a tagging methodology that follows the application execution from service to service.
- C . Add logging on exception and provide immediate notification.
- D . Do a write to the datastore every time there is an application failure.
- E . Implement an SNMP logging system with alerts in case a network link is slow.
What are two principles according to the build, release, run principle of the twelve-factor app methodology? (Choose two.)
- A . Code changes are able to be made at runtime.
- B . Separation between the build, release, and run phases.
- C . Releases should have a unique identifier.
- D . Existing releases are able to be mutated after creation.
- E . Release stage is responsible for compilation of assets and binaries.
BC
Explanation:
Reference: https://www.bmc.com/blogs/twelve-factor-app/