Free 350-901 Exam Braindumps (page: 43)

Page 43 of 96

Which two techniques protect against injection attacks? (Choose two.)

  1. input validation
  2. trim whitespace
  3. limit text areas to 255 characters
  4. string escaping of user free text and data entry
  5. only use dropdown, checkbox, and radio button fields

Answer(s): A,D



Refer to the exhibit. A kubeconfig file to manage access to clusters is provided.

How many clusters are defined and which of them are accessed using username/password authentication versus certificate?

  1. two clusters; scratch
  2. three clusters; scratch
  3. three clusters; development
  4. two clusters; development

Answer(s): A



Which two strategies are used to protect personally identifiable information? (Choose two.)

  1. Encrypt data in transit.
  2. Encrypt hash values of data.
  3. Encrypt data at rest.
  4. Only hash usernames and passwords for efficient lookup.
  5. Only encrypt usernames and passwords for efficient lookup.

Answer(s): A,C



The response from a server includes the header ETag: W/”7eb8b94419e371767916ef13e0d6e63d”. Which statement is true?

  1. The ETag has a Strong validator directive.
  2. The ETag has a Weak validator directive, which is an optional directive.
  3. The ETag has a Weak validator directive, which is a mandatory directive.
  4. The ETag has a Strong validator directive, which it is incorrectly formatted.

Answer(s): B



Page 43 of 96



Post your Comments and Discuss Cisco® 350-901 exam with other Community members:

Court commented on October 26, 2024
Wonderful study material. Very well written and up to date. I recommend this.
UNITED STATES
upvote

Walczak commented on January 22, 2023
The last update provided for this exam contains the same questions from the real exam. Good work guys.
AUSTRALIA
upvote