Free 350-901 Exam Braindumps

A developer has created an application based on customer requirements. The customer needs to run the application with the minimum downtime. Which design approach regarding high-availability applications, Recovery Time Objective, and Recovery Point Objective must be taken?

  1. Active/passive results in lower RTO and RPO. For RPO, data synchronization between the two data centers must be timely to allow seamless request flow.
  2. Active/passive results in lower RTO and RPO. For RPO, data synchronization between the two data centers does not need to be timely to allow seamless request flow.
  3. Active/active results in lower RTO and RPO. For RPO, data synchronization between the two data centers does not need to be timely to allow seamless request flow.
  4. Active/active results in lower RTO and RPO. For RPO, data synchronization between the two data centers must be timely to allow seamless request flow.

Answer(s): A



Refer to the exhibit.


Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content?

  1. CMD [“/bin/echo”, “Test1”]
  2. RUN [“/bin/echo”, “Test1”]
  3. ENTRYPOINT [“/bin/echo”, “Test1”]
  4. CMD [“/bin/echo Test1”]

Answer(s): C



Which two techniques protect against injection attacks? (Choose two.)

  1. input validation
  2. trim whitespace
  3. limit text areas to 255 characters
  4. string escaping of user free text and data entry
  5. only use dropdown, checkbox, and radio button fields

Answer(s): A,E



Refer to the exhibit. A kubeconfig file to manage access to clusters is provided.

How many clusters are defined and which of them are accessed using username/password authentication versus certificate?

  1. two clusters; scratch
  2. three clusters; scratch
  3. three clusters; development
  4. two clusters; development

Answer(s): C



Which two strategies are used to protect personally identifiable information? (Choose two.)

  1. Encrypt data in transit.
  2. Encrypt hash values of data.
  3. Encrypt data at rest.
  4. Only hash usernames and passwords for efficient lookup.
  5. Only encrypt usernames and passwords for efficient lookup.

Answer(s): A,B