Practice Free 350-901 Exam Online Questions
What are two benefits of using distributed log collectors? (Choose two.)
- A . supports multiple transport protocols such as TCP/UDP
- B . improves performance and reduces resource consumption
- C . provides flexibility due to a wide range of plugins and accepted log formats
- D . enables extension of logs with fields and export to backend systems
- E . buffers and resends data when the network is unavailable
DRAG DROP
Refer to the exhibit.
Drag and drop the code snippets from the bottom onto the boxes where the code is missing to retrieve a list of all the members of a specific Cisco Webex organization Not at options are used.

DRAG DROP
Refer to the exhibit.
Drag and drop the code snippets from the bottom onto the boxes where the code is missing to retrieve a list of all the members of a specific Cisco Webex organization Not at options are used.

Users report that they are no longer able to process transactions with the online ordering application, and the logging dashboard is displaying these messages:
Fri Jan 10 19:37:31.123 ESI 2020 [FRONTEND] [NFO: Incoming request to add item to cart from user 45834534858
Fri Jan 10 19:37:31.247 EST 2020 [BACKEND] INFO: Attempting to add item to cart
Fri Jan 10 19:37:31.250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB
ERROR: Connection refused
What is causing the problem seen in these log messages?
- A . The database server container has crashed.
- B . The backend process is overwhelmed with too many transactions.
- C . The backend is not authorized to commit to the database.
- D . The user is not authorized to add the item to their cart.
What is the result of a successful OAuth2 authorization grant flow?
- A . The user has the application rights that correspond to the user’s role within the application’s database
- B . The application is provided with a token that allows actions on services on the user’s behalf
- C . The user has administrative rights to the application’s backend services
- D . The third-party service is provided with a token that allows actions to be performed
B
Explanation:
"The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf."
What is the result of a successful OAuth2 authorization grant flow?
- A . The user has the application rights that correspond to the user’s role within the application’s database
- B . The application is provided with a token that allows actions on services on the user’s behalf
- C . The user has administrative rights to the application’s backend services
- D . The third-party service is provided with a token that allows actions to be performed
B
Explanation:
"The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf."
What is the result of a successful OAuth2 authorization grant flow?
- A . The user has the application rights that correspond to the user’s role within the application’s database
- B . The application is provided with a token that allows actions on services on the user’s behalf
- C . The user has administrative rights to the application’s backend services
- D . The third-party service is provided with a token that allows actions to be performed
B
Explanation:
"The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf."
On which system must the messaging standards be defined to allow communication between all the components for a custom dashboard?
- A . front end
- B . back end
- C . web application
- D . management server
DRAG DROP
Refer to the exhibit.
The Python script is supposed to make an API call to Cisco DNA Center querying a wireless profile for the “ChicagoCampus” and then parsing out its enable FlexConnect value.
Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit.

DRAG DROP
An engineer has created an NGINX web server. The server will be accessible from outside the organization. A public-key certificate must be installed before external access is allowed.
Drag and drop the steps from the left into the order on the right to configure the certificate. Not all options are used

Explanation: