Cisco® 350-901 Exam Practice Questions (P. 2)
- Full Access (383 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
An application is hosted on Google Kubernetes Engine. A new JavaScript module is created to work with the existing application.
Which task is mandatory to make the code ready to deploy?
Which task is mandatory to make the code ready to deploy?
- ACreate a Dockerfile for the code base.Most Voted
- BRewrite the code in Python.
- CBuild a wrapper for the code to ג€containerizeג€ it.
- DRebase the code from the upstream git repo.
Correct Answer:
D
D

Indeed, for a JavaScript module to be deployed on Google Kubernetes Engine, it is essential to encapsulate it within a Docker container. This is achieved by crafting a Dockerfile that outlines how the Docker image for the application should be constructed. This image then becomes deployable on Kubernetes. Importantly, rewriting in another language or creating coding wrappers are not prerequisites for deployment in this context. Instead, ensuring your application and its modules are correctly dockerized is critical to leverage Kubernetes effectively.
send
light_mode
delete
Question #12
DRAG DROP -
Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits.
Select and Place:

Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits.
Select and Place:

send
light_mode
delete
Question #13
Which database type should be used with highly structured data and provides support for ACID transactions?
- Atime series
- Bdocument
- Cgraph
- DrelationalMost Voted
Correct Answer:
D
D

Absolutely, D is the way to go for handling highly structured data with ACID support. Relational databases are built to manage structured data excellently. They adhere strictly to ACID properties, ensuring data integrity and reliability especially in transaction processing. This makes them ideal when you need a trustworthy system that can handle operations requiring precise data management, consistency, and recovery mechanisms. So, if you're looking for a database system that provides strong transactional support and structured data handling, relational databases are your go-to.
send
light_mode
delete
Question #14
Where should distributed load balancing occur in a horizontally scalable architecture?
- Afirewall-side/policy load balancing
- Bnetwork-side/central load balancing
- Cservice-side/remote load balancing
- Dclient-side/local load balancingMost Voted
Correct Answer:
B
B

In the scenario of a horizontally scalable architecture, distributed load balancing optimally occurs on the network side, usually handled by central systems designed to manage increased traffic across multiple servers smoothly. This approach allows efficient management of network traffic and provides a single point of control for balancing the loads, which is crucial in maintaining performance and reliability as the scale increases. While other forms of load balancing exist, such as client-side or service-side, the network-side approach directly addresses the distribution needs inherent in horizontal scalability by evenly distributing client requests across all available servers.
send
light_mode
delete
Question #15
Which two statements about a stateless application are true? (Choose two.)
- ADifferent requests can be processed by different servers.Most Voted
- BRequests are based only on information relayed with each request.Most Voted
- CInformation about earlier requests must be kept and must be accessible.
- DThe same server must be used to process all requests that are linked to the same state.
- ENo state information can be shared across servers.
Correct Answer:
AB
AB

In a stateless application, each request must be able to operate independently. This is why answers A and B are correct. Since the app doesn't rely on previous interactions, different requests can be handled by different servers, and each request carries all the necessary information within itself. This architecture allows for greater scalability and flexibility. It's important to note that while servers might technically be capable of sharing state information via databases or caches, this does not align with the fundamental definition of a 'stateless' app which treats each request as complete in itself.
send
light_mode
delete
Question #16
Which statement about microservices architecture is true?
- AApplications are written in a single unit.
- BIt is a complex application composed of multiple independent parts.Most Voted
- CIt is often a challenge to scale individual parts.
- DA single faulty service can bring the whole application down.
Correct Answer:
B
B

Microservices architecture indeed centers on decomposing complex applications into smaller, independent parts, commonly referred to as services. Each microservice performs distinct business functionalities and can be developed, deployed, and scaled independently. This modular approach enhances maintainability and flexibility - key attributes in dynamic software development environments. The architecture's power lies in its ability to simplify the development of large systems by isolating services, resulting in independent lifecycle management for each component without affecting others.
send
light_mode
delete
Question #17
DRAG DROP -
Drag and drop the characteristics from the left onto the correct data processing techniques on the right, in the context of GDPR.
Select and Place:

Drag and drop the characteristics from the left onto the correct data processing techniques on the right, in the context of GDPR.
Select and Place:

send
light_mode
delete
Question #18
Which two data encoding techniques are supported by gRPC? (Choose two.)
- AXML
- BJSONMost Voted
- CASCII
- DProtoBufMost Voted
- EYAML
Correct Answer:
BE
BE

In gRPC, JSON and ProtoBuf are indeed two primary data encoding techniques utilized. ProtoBuf, short for Protocol Buffers developed by Google, is the standard encoding, offering efficient and streamlined data structuring across multiple languages. JSON, although traditionally associated with web applications, is also adopted in gRPC especially for interoperability with systems that already use JSON. This combination offers flexibility, allowing developers to choose between efficiency with ProtoBuf and tooling and readability with JSON. However, contrary to user comments suggesting YAML as a correct choice, YAML is not natively supported by gRPC for data encoding.
send
light_mode
delete
Question #19

Refer to the exhibit. Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)
- ATerminate the TLS over the UDP connection from the router and originate an HTTPS connection to the selected server.
- BTerminate the TLS over the UDP connection from the router and originate an HTTP connection to the selected server.
- CTerminate the TLS over the TCP connection from the router and originate an HTTP connection to the selected server.Most Voted
- DTerminate the TLS over the TCP connection from the router and originate an HTTPS connection to the selected server.Most Voted
- ETerminate the TLS over the SCTP connection from the router and originate an HTTPS connection to the selected server.
Correct Answer:
DE
DE
send
light_mode
delete
Question #20
Which transport protocol is used by gNMI?
- AHTTP/2Most Voted
- BHTTP 1.1
- CSSH
- DMQTT
Correct Answer:
A
A

The correct transport protocol used by gNMI is HTTP/2. This is because gNMI, which stands for gRPC Network Management Interface, operates on gRPC. gRPC, a modern open-source high-performance RPC framework, fundamentally uses HTTP/2 as its transport layer. HTTP/2 provides essential features such as multiplexing and header compression that are critical for efficient network management and communication, enhancing the gNMI’s functionality in managing network configurations and viewing operational data effectively. Thus, HTTP/2 is the backbone enabling these capabilities in gNMI.
send
light_mode
delete
All Pages