Practice Free 350-901 Exam Online Questions
Refer to the exhibit.
An engineer is developing a Python script to check if an API is live If the API is not live, the script must evaluate the response code and either raise an exception or add the request to a queue for retry.
Which code snippet must be placed in the plank in the code to complete the script?
A)
B)
C)
D)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
DRAG DROP
Drag and drop the code from the bottom onto the box where the code is missing to retrieve a summary of physical compute resources. The collected information about the compute resources will be presented in a dashboard to be developed for device monitoring purposes. Not all snippets are used.

A developer needs to build a new Docker image and has created a tag by using the command: $ docker tag 32df423320458 local/app.1.2
Which command must be executed next to build the Docker image using the tag?
A)
B)
C)
D)
- A . Option
- B . Option
- C . Option
- D . Option
An engineer creates an application that manages the parsing and analysis of data. The data is continuously generated in bursts and is disrupting the performance of the application by overloading the provided resources. The engineer wants to implement rate limiting on the receiving endpoint to ensure that a minimum data sample from every timeframe is parsed and that no more than a specific number of requests are processed each time.
Which rate limiting algorithm must the engineer use?
- A . leaky bucket
- B . sliding window
- C . fixed window
- D . event queue
An enterprise refactors its monolithic application into a modem cloud-native application that is based on microservices. A key requirement of the application design is to ensure that the IT team is aware of performance issues or bottlenecks in the new application.
Which two approaches must be part of the design considerations” (Choose two.)
- A . Periodically scale up the resources of the host machines when the application starts to experience high loads
- B . Instrument the application code to gather telemetry data from logs, metrics or tracing
- C . Adopt a service-oriented architecture to handle communication between the services that make up the application
- D . Deploy infrastructure monitoring agents into the operating system of the host machines
- E . Implement infrastructure monitoring to ensure that pipeline components interoperate smoothly and reliably
Refer to the exhibit.
Which code snippet is required in the headers to successfully authorize wireless information from Cisco DNA Center?
- A . headers = {‘X-auth-token’:’fa8426a0-8eaf-4d22-8e13-7c1b16a9370c’}
- B . headers = {‘Authorization’:’Basic YWRtaW46R3JhcGV2aW5IMQ==’}
- C . headers = {‘Authorization’:’Bearer ASDNFALKJER23412RKDALSNKF”}
- D . headers = {‘Content-type’:’application/json}
A developer plans to create a new bugfix branch to fix a bug that was found on the release branch.
Which command completes the task?
- A . git checkout -b RELEASE BUGFIX
- B . git checkout -t BUGF1X RELEASE
- C . git checkout -b BUG FIX RELEASE
- D . git checkout -t RELEASE BUGFIX
What is submitted when an SSL certificate is requested?
- A . PEM
- B . CRT
- C . DER
- D . CSR
Refer to the exhibit.
A network engineer created a simple Python Flask application but must incorporate a CSRF token.
Which code snippet must be added in the blank in the script to manually incorporate the token?
- A . _access_tokenM value=M{{ csrf_token}}
- B . _csrMoken" value="{{ csrf_grant()}}
- C . _csrMoken" value="{{ csrf_token()}}
- D . _xssjoken" value="{{ csrMoken}}
A developer deploys a web application in a local data center that is now experiencing high traffic load from users accessing data through REST API calls.
Which approach enhances the responsiveness and performance of the API?
- A . Use HTTP POST or other non-read methods for read requests when possible
- B . Ensure that all read requests are clearly identified by the PUT method
- C . Configure API payload to return errors in HTTP 200 responses
- D . Use HTTP standard authorization header to submit authentication credentials