Free 350-901 Exam Braindumps (page: 44)

Page 43 of 96

Which two techniques protect against injection attacks? (Choose two.)

  1. input validation
  2. trim whitespace
  3. limit text areas to 255 characters
  4. string escaping of user free text and data entry
  5. only use dropdown, checkbox, and radio button fields

Answer(s): A,D



Refer to the exhibit. A kubeconfig file to manage access to clusters is provided.

How many clusters are defined and which of them are accessed using username/password authentication versus certificate?

  1. two clusters; scratch
  2. three clusters; scratch
  3. three clusters; development
  4. two clusters; development

Answer(s): A



Which two strategies are used to protect personally identifiable information? (Choose two.)

  1. Encrypt data in transit.
  2. Encrypt hash values of data.
  3. Encrypt data at rest.
  4. Only hash usernames and passwords for efficient lookup.
  5. Only encrypt usernames and passwords for efficient lookup.

Answer(s): A,C



The response from a server includes the header ETag: W/”7eb8b94419e371767916ef13e0d6e63d”. Which statement is true?

  1. The ETag has a Strong validator directive.
  2. The ETag has a Weak validator directive, which is an optional directive.
  3. The ETag has a Weak validator directive, which is a mandatory directive.
  4. The ETag has a Strong validator directive, which it is incorrectly formatted.

Answer(s): B






Post your Comments and Discuss Cisco® 350-901 exam with other Community members:

Exam Discussions & Posts