Summer Sale - Special Discounts Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 63r59951

350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Questions and Answers

Questions 4

Refer to the exhibit.

350-901 Question 4

Refer to the exhibit An application hosting server with the local data center is experiencing large amounts of traffic from enclusers. A developer must optimize this API server to reduce the toad on its host. What are two ways to optimize this code through HTTP cache controls? (Choose two.)

Include the "ETag" header in the API response.

Options:

A.

Include the "Last-Modified" header in the API response.

B.

Include the "Content-Type" header in the API response.

C.

Leverage middleware caching and respond with HTTP code 104 m the API response

D.

Leverage middleware caching and respond with HTTP code 204 m the API response.

Buy Now
Questions 5

A developer needs to build a new Docker image and has created a tag by using the command:

$ docker tag 32df423320458 local/app.1.2

Which command must be executed next to build the Docker image using the tag?

A)

350-901 Question 5

B)

350-901 Question 5

C)

350-901 Question 5

D)

350-901 Question 5

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 6

Refer to the exhibit.

350-901 Question 6

Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content?

Options:

A.

CMD [“/bin/echo”, “Test”]

B.

RUN [“/bin/echo”, “Test”]

C.

ENTRYPOINT [“/bin/echo”, “Test”]

D.

CMD [“/bin/echo Test”]

Buy Now
Questions 7

Refer to the exhibit.

350-901 Question 7

A developer has created a Python script that retrieves information about the deployment of Cisco wireless access points using REST API. Which two code snippets must be added to the blank in the code to print the value of the userid key instead of printing the full JSON response? (Choose two.)

A)

350-901 Question 7

B)

350-901 Question 7

C)

350-901 Question 7

D)

350-901 Question 7

E)

350-901 Question 7

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 8

Click on the GET Resource button above to view resources that will help with this question.

350-901 Question 8

350-901 Question 8

350-901 Question 8

An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB.

Which REST API call accomplishes this task?

Options:

A.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=not(Model eq ‘UCSC’) and AvailableMemory le 5000

B.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=Model eq ‘UCSB’ and AvailableMemory lt 5000

C.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory lt 5000

D.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory le 5000

Buy Now
Questions 9

Drag and drop the code onto the snippet to update a SSID in Meraki using the Dashboard API. Not all options are used.

350-901 Question 9

Options:

Buy Now
Questions 10

Why is end-to-end encryption deployed when exposing sensitive data through APIs?

Options:

A.

Traffic is encrypted and decrypted at every hop in the network path.

B.

Data transfers are untraceable from source to destination.

C.

Data cannot be read or modified other than by the true source and destination.

D.

Server-side encryption enables the destination to control data protection.

Buy Now
Questions 11

A client is written that uses a REST API to interact with a server. Using HTTPS as the transport, an HTTP request is sent and received an HTTP response. The response contains the HTTP response status code: 503 Service Unavailable.

Which action is the appropriate response?

Options:

A.

Add an Authorization header that supplies appropriate credentials and sends the updated request.

B.

Resend the request using HTTP as the transport instead of HTTPS.

C.

Add an Accept header that indicates the content types that the client understands and send the updated request.

D.

Look for a Retry-After header in the response and resend the request after the amount of time indicated.

Buy Now
Questions 12

Which configuration stop must be performed on a Cisco IOS XE device to present collected data in Cisco DNA Center?

Options:

A.

Create an SNMPv3 user account.

B.

Apply a telemetry profile.

C.

Synchronize the device and the data collector.

D.

Enable Cisco NetFlow collection.

Buy Now
Questions 13

Refer to the exhibit.

350-901 Question 13

A network administrator copies SSL certificates to a Cisco NX-OS switch. An Ansible playbook is created to enable NX-API, which will use the new certificate. In the group_vars/vars.yml file, which code snippet must be used to define the properly formatted variables?

A)

350-901 Question 13

B)

350-901 Question 13

C)

350-901 Question 13

D)

350-901 Question 13

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 14

Refer to the exhibit.

350-901 Question 14

An application has been developed to serve the users in an enterprise After HTTP cache controls are implemented m the application users report that they receive state data when they refresh the page Without removing HTTP cache controls, which change ensures that the users get current data when refreshing the page'

Options:

A.

Reduce the expire_after value to 60.

B.

Add a Cache-Control header that has a value of no-cache, no-store must-revalidate.

C.

Add an H-None-Match header that has a value of an Entity Tag.

D.

Add an Expires header that has a value of 0.

Buy Now
Questions 15

Refer to the exhibit

350-901 Question 15

350-901 Question 15

An application is developed to perform multiple API calls. The calls will be performed on the infrastructure devices Delays in the information transfer occur when the application is executed What are two reasons for the issue? (Choose two )

Options:

A.

The list devices API call is failing and does not return a result

B.

Listing devices lakes longer than usual due to high network latency

C.

One of the API calls takes roughly three times as long to complete

D.

The list devices API call is inefficient and should be refactored

E.

The requests are being rate limited to prevent multiple calls causing the excessive load

Buy Now
Questions 16

Refer to the exhibit.

350-901 Question 16

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that will retrieve location data Not all options are used.

350-901 Question 16

Options:

Buy Now
Questions 17

350-901 Question 17

Refer to the exhibit. Which command resolves the merge conflict by removing the previous commit from the commit history?

350-901 Question 17

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 18

Which transport layer protocol does gRPC use to retrieve telemetry information?

Options:

A.

SSH

B.

SNMP

C.

TCP

D.

HTTP/2

Buy Now
Questions 19

Refer to the exhibit.

350-901 Question 19

A Python script has these requirements

• Retrieve a list of Bluetooth clients seen by the access pants on a network.

• Print the content of the response

• Retrieve the next page only if it is available in the response headers

What must be added where the code is missing to get the remaining pages by using the next link from the link response header of the last request?

A)

350-901 Question 19

B)

350-901 Question 19

C)

350-901 Question 19

D)

350-901 Question 19

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 20

A bot has been created, called "386231131”, to respond to alarm messages. A developer is now creating a Webhook to allow the bot to respond to messages. Which format allows the Webhook to respond to messages for the bot within Webex Teams?

A)

350-901 Question 20

B)

350-901 Question 20

C)

350-901 Question 20

D)

350-901 Question 20

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 21

Drag and drop the steps from the left into the order on the right to ensure that an application requiring communication to the external network is hosted on a Cisco Catalyst 9000 switch.

350-901 Question 21

Options:

Buy Now
Questions 22

Drag and drop the steps from the left into the order on the right to build and run a customized Python DocKer image. Not all options are used

350-901 Question 22

Options:

Buy Now
Questions 23

Refer to the exhibit.

350-901 Question 23

A network engineer created a simple Python Flask application but must incorporate a CSRF token. Which code snippet must be added in the blank in the script to manually incorporate the token?

Options:

A.

_access_tokenM value=M{{ csrf_token}}

B.

_csrMoken" value="{{ csrf_grant()}}

C.

_csrMoken" value="{{ csrf_token()}}

D.

_xssjoken" value="{{ csrMoken}}

Buy Now
Questions 24

Which approach is used to protect East-West API traffic?

Options:

A.

Use encryption between services

B.

Install a perimeter firewall

C.

Use a dedicated cloud connection service.

D.

Implement an API gateway

Buy Now
Questions 25

In the three-legged OAuth2 authorization workflow, which entity grants access to a protected resource?

Options:

A.

resource server

B.

resource owner

C.

client

D.

authorization server

Buy Now
Questions 26

Drag and drop the code from the bottom onto the box where the code is missing to enable an SSID by using the Cisco Meraki Dashboard API. Not all options are used.

350-901 Question 26

Options:

Buy Now
Questions 27

Refer to the exhibit.

350-901 Question 27

Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit that consumes REST API pagination.

350-901 Question 27

Options:

Buy Now
Questions 28

Refer to the exhibit.

350-901 Question 28

Cisco IOS XE switches are used across the entire network and the description that is filed for all interfaces must be configured. Which code snippet must be placed in the blank in the script to leverage RESTCONF to query all the devices in the device list for the interfaces that are present?

A)

350-901 Question 28

B)

350-901 Question 28

C)

350-901 Question 28

D)

350-901 Question 28

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 29

Which command is used to enable application hosting on a Cisco IOS XE device?

Options:

A.

app-hosting

B.

application-hosting

C.

iox

D.

iox-service

Buy Now
Questions 30

An application requires SSL certificates signed by an intermediate CA certificate. The crt files must be available to the application:

• The root CA certificate is root_certrficate.crt.

• The intermediate CA certificate is intermediate_certificate.crt

• The application-specific SSL certificate is crt_certificate.crt.

Which Bash command outputs the certificate bundle as a .pern file?

A)

350-901 Question 30

B)

350-901 Question 30

C)

350-901 Question 30

D)

350-901 Question 30

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 31

An application is developed in order to communicate with Cisco Webex. For reporting, the application must retrieve all the messages sent to a Cisco Webex room on a monthly basis.

Which action calls /v1/messages directly?

Options:

A.

Set up a webhook that has messages as the resource type and store the results locally.

B.

Utilize the pagination functionality by defining the max property.

C.

Recursively call the /vl/messages endpoint by using the beforeMessage property.

D.

Filter the response results by specifying the created property in the request.

Buy Now
Questions 32

What is submitted when an SSL certificate is requested?

Options:

A.

PEM

B.

CRT

C.

DER

D.

CSR

Buy Now
Questions 33

Refer to the exhibit.

350-901 Question 33

Drag and drop the code from the bottom onto the box where the code is missing to complete the API request. An engineer is using this API request to implement Chat-Ops to generate notifications m a Webex space by using webhooks. Not all options are used.

350-901 Question 33

Options:

Buy Now
Questions 34

Drag and drop the code from the bottom onto the box where the code is missing to stop the REST API requests if a 'Too Many Requests" response is received Not all options are used.

350-901 Question 34

Options:

Buy Now
Questions 35

There is a requirement to securely store unique usernames and passwords. Given a valid username, it is also required to validate that the password provided is correct. Which action accomplishes this task?

Options:

A.

Encrypt the username, hash the password, and store these values.

B.

Hash the username, hash the password, and store these values.

C.

Encrypt the username, encrypt the password, and store these values.

D.

Hash the username, encrypt the password, and store these values.

Buy Now
Questions 36

A developer corrects an application bug with ID buglDa98416945110x and then installs it on a Cisco Catalyst 9300 series switch. Which command will enable the application called myapp?

Options:

A.

app-hosting install appid myapp package usbflash1:myapp.tar

B.

app-hosting run re-start appid my app bugfix

C.

app-hosting activate appid myapp

D.

app-hosting start appid myapp

Buy Now
Questions 37

Refer to the exhibit.

350-901 Question 37

An engineer needs to change the IP address via RESTCOMF on interface GigabitEthernet2. An error message is received when the script is run. Which amendment to the code will result in a successful RESTCONF action?

Options:

A.

Change POST to PATCH.

B.

Issue a DELETE before POST.

C.

Issue a DELETE before PATCH

D.

Change POST to GET

Buy Now
Questions 38

What is a consideration for using gRPC as the model-driven telemetry protocol on a Cisco IOS XE device?

Options:

A.

XML-based transmission format

B.

works in dial-out mode

C.

human-readable transmission format

D.

works in call-out mode

Buy Now
Questions 39

While developing an application following the 12-factor app methodology, which approach should be used in the application for logging?

Options:

A.

Write a log to a file in the application directory.

B.

Write a log to a file in /var/log.

C.

Write the logs buffered to stdout.

D.

Write the logs unbuffered to stdout.

Buy Now
Questions 40

What is a well-defined concept for GDPR compliance?

Options:

A.

Records that are relevant to an existing contract agreement can be retained as long as the contract is in effect.

B.

Data controllers must confirm to data subjects as to whether where, and why personal data is being processed.

C.

Personal data that was collected before the compliance standards were set do not need to be protected.

D.

Compliance standards apply to organizations that have a physical presence in Europe.

Buy Now
Questions 41

Which two methods are API security best practices? (Choose two.)

Options:

A.

Use tokens after the identity of a client has been established.

B.

Use the same operating system throughout the infrastructure.

C.

Use encryption and signatures to secure data.

D.

Use basic auth credentials over all internal API interactions.

E.

Use cloud hosting services to manage security configuration.

Buy Now
Questions 42

What is a risk to data privacy during the storage and transmission of data?

Options:

A.

The risk of exposure is increased when data is shared between applications.

B.

The transfer of unencrypted data between storage devices increases the risk of exposure.

C.

Data breaches cause ongoing exposure of personal information.

D.

The transfer of unencrypted personally identifiable financial information from a storage device increases the risk of a data broach.

Buy Now
Questions 43

What is an effective logging strategy according 10 the 12-factor app tenets?

Options:

A.

Capture togs by the execution environment and route to a centralized destination

B.

Tag and save togs in a local document database that has querying capabilities.

C.

Back up log files in a high-availability remote cluster on the public cloud

D.

Timestamp and save logs in a local time-series database that has querying capabilities

Buy Now
Questions 44

A timeframe custom dashboard must be developed to present data collected from Cisco Meraki. The dashboard must include a wireless health alert count. What needs to be built as a prerequisite?

Options:

A.

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Dashboard API

B.

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Scanning API

C.

A daemon to consume the Wireless Health endpoint of the Meraki Scanning API

D.

A daemon to consume the Wireless Health endpoint of the Meraki Dashboard API

Buy Now
Questions 45

A developer is working on a live project and must apply a new feature. After the commit,the manager informs the team that the wrong file was applied. The developer must undo the single commit and apply the file with the name feature-App-UXU1411841916ADD. Which command must the developer use?

Options:

A.

git revert

B.

git checkout

C.

git clean

D.

git reset

Buy Now
Questions 46

Refer to the exhibit.

350-901 Question 46

Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)

Options:

A.

Terminate the TLS over the UDP connection from the router and originate an HTTPS connection to the selected server.

B.

Terminate the TLS over the UDP connection from the router and originate an HTTP connection to the selected server.

C.

Terminate the TLS over the TCP connection from the router and originate an HTTP connection to the selected server.

D.

Terminate the TLS over the TCP connection from the router and originate an HTTPS connection to the selected server.

E.

Terminate the TLS over the SCTP connection from the router and originate an HTTPS connection to the selected server.

Buy Now
Questions 47

Refer to the exhibit. The code fetches the latest order from the purchases table for a specific user. An engineer needs to pass query parameters to the execute function to prevent an SQL injection attack. Which code snippet must be placed in the blank in the code to meet this requirement?

A)

350-901 Question 47

B)

350-901 Question 47

C)

350-901 Question 47

D)

350-901 Question 47

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 48

Refer to the exhibit.

350-901 Question 48

Which word is missing from this Ansible playbook shown, to allow the Cisco IOS XE commands for router configuration to be pushed after the playbook is executed?

Options:

A.

Commands

B.

Input

C.

Lines

D.

cofig

Buy Now
Questions 49

A developer plans to create a new bugfix branch to fix a bug that was found on the release branch. Which command completes the task?

Options:

A.

git checkout -b RELEASE BUGFIX

B.

git checkout -t BUGF1X RELEASE

C.

git checkout -b BUG FIX RELEASE

D.

git checkout -t RELEASE BUGFIX

Buy Now
Questions 50

Drag and Drop the application requirement on the left onto the database type that should be selected for the requirement on the right.

350-901 Question 50

Options:

Buy Now
Questions 51

Refer to the exhibit.

350-901 Question 51

Which command results in a detached HEAD scenario?

Options:

A.

git checkout 5af25b

B.

git checkout Branch-5

C.

git checkout master

D.

git checkout log -2

Buy Now
Questions 52

An application has these characteristics

• provide one service or function

• distributed database

• API gateway

• central repository for code

• configuration database

• uses session management

Which two design approaches contribute to the scalability of the application? (Choose two.)

Options:

A.

built to scale based on a star topology

B.

modular design iteration

C.

session management in a stateless architecture

D.

planned before the first device is deployed

E.

distributed computing with tightly coupled components

Buy Now
Questions 53

Refer to the exhibit.

350-901 Question 53

Which AP! call does an engineer use to delete the FQDN object?

Options:

A.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f

B.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns/005056BB-0B24-0ed3-0000-858993545263

C.

DELETE /api/fmc_config/v1/domain?id=e276abec-e0f2-11e3-8169-6d9ed49b625f

D.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns?id=005056BB-0B24-0ed3-0000-858993545263

Buy Now
Questions 54

A development team is working on a bug fix in a remote branch named "UXbug000222134' and the current working primary branch is named ,prod409024967’ A developer who just joined the learn needs to checkout the remote branch Which Git commands must be used?

A)

350-901 Question 54

B)

350-901 Question 54

C)

350-901 Question 54

D)

350-901 Question 54

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 55

Refer to the exhibit.

350-901 Question 55

A developer runs the docker service scale command to increase the number of replicas for the cisco_devnet service. The swarm cluster is using a private IP address subnet. The service has these design requirements:

  • It must be hosted behind a virtual IP address that is reachable from the Internet.
  • For security reasons, the Docker swarm cluster subnet must not be reachable from the Internet.

Which design approach is used to fulfill the requirements?

Options:

A.

Create an overlay network by using a globally roulable subnet and enable a routing mesh within the swarm cluster.

B.

Create a bridge network by using a globally routable subnet and enable a routing mesh within the swarm cluster.

C.

Configure an external load balancer to route requests to the swarm service by using VPN.

D.

Configure an external load balancer to route requests to the swarm service by using NAT.

Buy Now
Questions 56

Which two gRPC modes of model-driven telemetry are supported on Cisco IOS XE Software? (Choose two.)

Options:

A.

dial-in

B.

dial-out

C.

call-in

D.

call-out

E.

passive

Buy Now
Questions 57

Which HTTP status code indicates that a client application is experiencing intentional rate limiting by the server?

Options:

A.

202

B.

401

C.

429

D.

503

Buy Now
Questions 58

Drag and drop the expressions from below onto the code to implement error handling. Not all options are used.

350-901 Question 58

Options:

Buy Now
Questions 59

350-901 Question 59

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the code to provision a new UCS server. Not all options are used.

350-901 Question 59

Options:

Buy Now
Questions 60

Refer to the exhibit.

350-901 Question 60

Refer to the exhibit A Docker swarm service is currently running m a local data center The service is hosting an HTML website it the container fads then the service becomes unavailable The design must meet these requirements

• The service must be highly available and resilient against a data center outage.

• The service must be accessible from a single URL

• The HTTP session must remain on the server from which the original request was sent

• Failure of the server must force the client to reconnect

Which two design approaches must be used to meet the requirements? (Choose two.)

Options:

A.

Create another swarm cluster within a data center and deploy a secondary instance of the service.

B.

Create another node in the swarm duster to scale the service across the nodes over two replicas.

C.

Configure an external load balancer to route requests to the swarm service by using session persistence

D.

Scale the Docker swarm service to 2 and set endpoint-mode to DNSRR instead of the default value of VIP

E.

Configure a routing mesh to route requests to the swarm service by using NAT on the network side

Buy Now
Questions 61

A web application has those requirements for HTTP cache control:

  • The client browser must be prevented from storing responses that contain sensitive information.
  • Assets must be downloaded from the remote server every time.

Which header must the engineer use?

Options:

A.

must-revabdate

B.

no-store

C.

public

D.

private

Buy Now
Questions 62

Which Puppet manifest needs to be used to configure an interface GigabitEthernet 0/1 on a Cisco IOS switch?

350-901 Question 62

350-901 Question 62

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 63

Refer to the exhibit.

350-901 Question 63

The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file “@token_data” that cURL is handling?

Options:

A.

This file is a container to log possible error responses in the request.

B.

This file is given as input to store the access token received from FDM.

C.

This file is used to send authentication related headers.

D.

This file contains raw data that is needed for token authentication.

Buy Now
Questions 64

A developer has created an application based on customer requirements. The customer needs to run the application with the minimum downtime. Which design approach regarding high-availability applications, Recovery Time Objective, and Recovery Point Objective must be taken?

Options:

A.

Active/passive results in lower RTO and RPO. For RPO, data synchronization between the two data centers must be timely to allow seamless request flow.

B.

Active/passive results in lower RTO and RPO. For RPO, data synchronization between the two data centers does not need to be timely to allow seamless request flow.

C.

Active/active results in lower RTO and RPO. For RPO, data synchronization between the two data centers does not need to be timely to allow seamless request flow.

D.

Active/active results in lower RTO and RPO. For RPO, data synchronization between the two data centers must be timely to allow seamless request flow.

Buy Now
Questions 65

Refer to the exhibit.

350-901 Question 65

An engineer is managing a network that consists of Cisco IOSXE devices. There is a need to retrieve the details of the interface GigabitEthernet2 using RESTCONF. Which URI will accomplish this by providing the same response as shown in the JSON body?

A)

350-901 Question 65

B)

350-901 Question 65

C)

350-901 Question 65

D)

350-901 Question 65

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 66

Drag and drop the operations from the left into the order on the right to create a web dashboard that displays Cisco DNA Center data for an organization.

350-901 Question 66

Options:

Buy Now
Questions 67

Refer to the exhibit.

350-901 Question 67

A kubeconfig file to manage access to Kubernetes clusters is shown. How many Kubernetes clusters are defined in the

file, and which cluster FS accessed using username/password authentication rather than using a certificate?

Options:

A.

three dusters; scratch

B.

three clusters: development

C.

two dusters; development

D.

two clusters: scratch

Buy Now
Questions 68

A user is receiving a 429 Too Many Requests error. Which scheme is the server employing that causes this error?

Options:

A.

rate limiting

B.

time outs

C.

caching

D.

redirection

Buy Now
Questions 69

Drag and drop the code from the bottom onto the box where the code is missing to create a new Cisco Webex space and attach a previously configured bot named 'sampleBot'. Not all options are used.

350-901 Question 69

Options:

Buy Now
Questions 70

Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?

Options:

A.

environment variables

B.

YAML files

C.

Python libraries

D.

Dockerfiles

E.

INI files

Buy Now
Questions 71

An application is made up of multiple microservices, each communicating via APIs. One service is beginning to be a bottleneck for the application because it can take a lot of time to complete requests. An engineer tried adding additional instances of this service behind the load balancer, but it did not have any effect. Which application design change must be implemented m this scenario?

Options:

A.

Move from synchronous to asynchronous interactions with the service and implement a message queue.

B.

Deploy an API gateway to centralize all inbound communication requests and offload authentication

C.

Vendor all dependencies into the service that is causing delays to remove external dependency checks.

D.

Leverage serverless architecture instead of containers to gain the advantage of event driven APIs.

Buy Now
Questions 72

Refer to the exhibit.

350-901 Question 72

Drag and drop the code snippets from the bottom onto the boxes where the code is missing to retrieve a list of all the members of a specific Cisco Webex organization Not at options are used.

350-901 Question 72

Options:

Buy Now
Questions 73

A container running a Python script is failing when it reaches the integration testing phase of the CI/CD process. The code has been reviewed thoroughly and the build process works on this container and all other containers pass unit and integration testing.

What should be verified to resolve the issue?

Options:

A.

that the correct port is exposed in the Dockerfile

B.

that the necessary modules and packages are installed on build

C.

that the script is running from the right directory

D.

that the Python version of the container image is correct

Buy Now
Questions 74

350-901 Question 74

Refer to the exhibit A script returns the location of a specific access point when given the access point name If a user enters a search value such as DROP TABLE access points then the entire table is removed. What must be added to the box where the code is missing to prevent a SQL injection attack?

A)

350-901 Question 74

B)

350-901 Question 74

C)

350-901 Question 74

D)

350-901 Question 74

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 75

An application must be able to print the values of the variables in specific modules. Different message levels will be used for production and for development. Proof of access and activity must be documented. What must be included in the implementation to support these observability requirements?

Options:

A.

print

B.

metrics

C.

logging

D.

streaming

Buy Now
Questions 76

Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits.

350-901 Question 76

Options:

Buy Now
Questions 77

Drag and drop the components from the left into the order on the right to create the flow of the three-legged OAuth2.

350-901 Question 77

Options:

Buy Now
Questions 78

A developer is creating a Python script to analyze errors during REST API call operations. The script will be used with Cisco solution and devices. Drag and drop the code from the bottom to the box where the code is missing to implement control flow for handling unrecoverable REST API calls. Not all options are used.

350-901 Question 78

Options:

Buy Now
Questions 79

Refer to the exhibit.

350-901 Question 79

Which code snippet completes this code to handle API rate-limit?

Options:

A.

response.status_code !*= 408

B.

response.status != 408

C.

response.status_code != 429

D.

response.status_code == 429

Buy Now
Questions 80

Drag and drop the steps on the left into the order on the right for an end-user to access an OAuth2 protected resource using the Authorization Code Grant1 flow.

350-901 Question 80

Options:

Buy Now
Questions 81

A developer is working on an enhancement for an application feature and has made changes to a branch called ‘devcor-432436127a-enhance4‘. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?

Options:

A.

git merge -no-edit

B.

git merge -abort

C.

git merge -revert

D.

git merge —comrmt

Buy Now
Questions 82

Drag and drop the code from the bottom onto the box where the code is missing to permit network traffic between 10.0.0.0/8 and all other networks on port 80 for a Cisco Nexus 9000 switch by using the Puppet module. Not all options are used.

350-901 Question 82

Options:

Buy Now
Questions 83

Refer to the exhibit.

350-901 Question 83

An architect wrote an application to collect device information from the Cisco Meraki Dashboard API. Every time a network change occurs the application collects information and records new endpoint MAC addresses. The application stopped working after the locations and network equipment of a competitor were acquired. Which application approach must be applied to reduce latency and rate limiting?

Options:

A.

MOS scoring system before collecting information

B.

leaky faucet algorithm for fault categorizing

C.

error handling to check for reachability first

D.

webhooks to trigger updates

Buy Now
Questions 84

The Meraki API URL https://api.meraki.com/api/v0/networks/123456789/ssids/2 has been stored in the environment variable meraki_url and the API key has been stored in meraki_api_key. Which snippet presents the API call to configure, secure and enable an SSID using the Meraki API?

A)

350-901 Question 84

B)

350-901 Question 84

C)

350-901 Question 84

D)

350-901 Question 84

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 85

Drag and drop the code from the bottom onto the box where the code is missing on the Ansible task to enable a VLAN on a Meraki MX Device, Not all options are used.

350-901 Question 85

Options:

Buy Now
Questions 86

An enterprise refactors its monolithic application into a modem cloud-native application that is based on microservices. A key requirement of the application design is to ensure that the IT team is aware of performance issues or bottlenecks in the new application Which two approaches must be part of the design considerations'' (Choose two.)

Options:

A.

Periodically scale up the resources of the host machines when the application starts to experience high loads

B.

Instrument the application code to gather telemetry data from logs, metrics or tracing

C.

Adopt a service-oriented architecture to handle communication between the services that make up the application

D.

Deploy infrastructure monitoring agents into the operating system of the host machines

E.

Implement infrastructure monitoring to ensure that pipeline components interoperate smoothly and reliably

Buy Now
Questions 87

Refer to the exhibit.

350-901 Question 87

This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type.

Which two words are required to complete the script? (Choose two.)

Options:

A.

ensure

B.

commit

C.

false

D.

replace

E.

none

Buy Now
Questions 88

What are two building blocks of the 12-factor app? (Choose two.)

Options:

A.

Stateful Processes

B.

Easy access to underlying systems

C.

Dev and Prod must be different

D.

One codebase

E.

Isolated Dependencies

Buy Now
Questions 89

A team is developing a cloud-native application for network monitoring and management of various devices. An increased growth rate of users is expected. The solution must be easily managed and meet these requirements:

•able to use dependencies

•easy disposability

•flexible configuration

Which application design approach must be used?

Options:

A.

waterfall model

B.

12-factor app framework

C.

object-oriented programming

D.

agile software development

Buy Now
Questions 90

Refer to the exhibit.

350-901 Question 90

The virtual next-generation firewalls running in the public cloud must be scaled out to meet the throughput requirements of the application layer. Which component is deployed to location A in the diagram?

Options:

A.

frontend caching server

B.

forward proxy

C.

backend database

D.

internal load balancer

Buy Now
Questions 91

An engineer needs to configure an interface named GigabitEthernet3 with an IP address on several RESTCONF-enabled Cisco IOS XE devices. Which code snippet must be placed in the blank in the code to meet this requirement?

Options:

A.

(item["name"])'

B.

(item["name"])/ip/addres3

C.

item["name"]:/ip/address/primary'

D.

(ltemt"name"]} /ip

Buy Now
Questions 92

An engineer needs to automate the configuration on a Cisco NX-OS switch. The solution must meet these requirements:

•Ansible is used

•The transport protocol is encrypted

•Support for Asynchronous requests.

Which two access mechanisms must be used? (Choose two.)

Options:

A.

SNMP Version 2c

B.

NETCONF

C.

NX-API

D.

HTTPS

E.

JSON-RPC

Buy Now
Questions 93

350-901 Question 93

Refer to the exhibit Drag and drop the code from the bottom onto the box where the code is missing to query the last 10 Bluetooth clients seen by APs in their network using the Meraki Dashboard API Not all options are used.

350-901 Question 93

Options:

Buy Now
Questions 94

Refer to the exhibit.

350-901 Question 94

Which set of API requests must be executed by a Webex Teams bot after receiving a webhook callback to process messages in a room and reply with a new message back to the same room?

350-901 Question 94

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 95

Which two countermeasures help reduce the risk of playback attacks? (Choose two.)

Options:

A.

Store data in a NoSQL database.

B.

Implement message authentication (HMAC).

C.

Enable end-to-end encryption.

D.

Remove stack traces from errors.

E.

Use short-lived access tokens.

Buy Now
Questions 96

While working with the Webex Teams API, on an application that uses end-to-end encryption, a webhook has

been received. What must be considered to read the message?

Options:

A.

Webhook information cannot be used to read the message because of end-to-end encryption. The API key

is needed to decrypt the message.

B.

Webhook returns the full unencrypted message. Only the body is needed to query the API.

C.

Webhook returns a hashed version of the message that must be unhashed with the API key.

D.

Webhook returns message identification. To query, the API is needed for that message to get the decrypted

information.

Buy Now
Questions 97

Refer to the exhibit.

350-901 Question 97

An engineer creates an application that leverages the Ansible framework to provision CPE endpoints that have configuration changes. The application contains an Ansible playbook named provision_cpes.yml that uses the ansible.builtin.script Ansible module to execute these two Python scripts:

•gather and_create.py. which creates a JSON file named bios.json that contains the CPE models and their respective IOS file information

•load and parse.py. which loads the file data and parses it for later consumption

After several successful runs, the application fails. During a review of the Ansible execution logs, the engineer discovers an error output that indicates that one of the stages failed. What is the cause of this issue?

Options:

A.

ansible builtm script Ansible module

B.

gather and create.py Python script

C.

load_and_parse.py Python script

D.

provision cpes.yml Ansibte playbook

Buy Now
Questions 98

Refer to the exhibit.

350-901 Question 98

Many faults have occurred in the ACI environment and a sample of them needs to be examined. Which API call retrieves faults 30 through 45?

Options:

A.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=1&page- size=15

B.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=2&page- size=15

C.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=30

D.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=2&page- size=30

Buy Now
Questions 99

A developer wants to automate virtual infrastructure to provision and manage it. The system will be implemented m large-scale deployment while offering redundancy and scalability with ease of management The solution must meet these requirements:

• Support the provisioning of up to 500 new virtual machines into private datacenters or the public cloud

• Support the modeling of a complex environment that consists of multiple virtual machines while supporting disaster recovery

• Maintain steady-state environments

Which configuration management solution must the developer use?

Options:

A.

Puppet

B.

Terraform

C.

Docker

D.

Arable

Buy Now
Questions 100

Refer to the exhibit.

350-901 Question 100

A developer is creating a Python script to use the Webex Teams REST API to list joined spaces, retry after the server-specified amount of time if a “Too many requests” response is received, and print any other error that is received. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.

350-901 Question 100

Options:

Buy Now
Questions 101

350-901 Question 101

Refer to the exhibit. Which action resolves the error for the GitLab CI/CD pipeline execution?

Options:

A.

Download the correct artifacts by specifying them in GitLab.

B.

Use the python:3.9.0a4-alpine3.10 Docker image

C.

Install the missing python libraries via pip3.

D.

Add the absolute path to the python3 executable

Buy Now
Questions 102

Refer to the exhibit.

350-901 Question 102

Recently, users have reported problems logging into an application with their usernames and passwords. The logs have captured an authentication attempt. Based on the messages and errors contained, what is the cause of the problem?

Options:

A.

The sign-in redirection is sending clients to the wrong server for SSO.

B.

There is a time synchronization issue between the application and LDAP.

C.

Users are providing incorrect credentials when logging in.

D.

The LDAP server used for authentication fails to respond to connection requests

Buy Now
Questions 103

What is the result of a successful OAuth2 authorization grant flow?

Options:

A.

The user has the application rights that correspond to the user's role within the application's database

B.

The application is provided with a token that allows actions on services on the user's behalf

C.

The user has administrative rights to the application's backend services

D.

The third-party service is provided with a token that allows actions to be performed

Buy Now
Questions 104

Refer to the exhibit.

350-901 Question 104

A)

350-901 Question 104

B)

350-901 Question 104

C)

350-901 Question 104

D)

350-901 Question 104

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 105

A developer is working on a new feature in a branch named 'newfeay000222118' and the current working primary branch is named 'pnm409024967' The developer requires a merge commit during a fast forward merge for record-keeping purposes. Which Git command must Be used?

A)

350-901 Question 105

B)

350-901 Question 105

C)

350-901 Question 105

D)

350-901 Question 105

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 106

Drag and drop the code snippets from the bottom onto the boxes where the code is missing to complete the API call to implement error handling Not all options are used.

350-901 Question 106

Options:

Buy Now
Questions 107

How does the use of release packaging allow dependencies to be effectively managed during deployments?

Options:

A.

dependencies are staggered between multiple releases

B.

designed to prevent any dependencies between release units

C.

dependencies are tested after the release is deployed

D.

removal of release units if they have issues in testing

Buy Now
Questions 108

Refer to the exhibit.

350-901 Question 108

Which code snippet must be added to the blank in the code to automate the evaluation and handling of errors due to wrong credentials when Basic Authorization is used?

A)

350-901 Question 108

B)

350-901 Question 108

C)

350-901 Question 108

D)

350-901 Question 108

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Exam Code: 350-901
Exam Name: Developing Applications using Cisco Core Platforms and APIs (DEVCOR)
Last Update: Apr 18, 2024
Questions: 363

PDF + Testing Engine

$78.75  $174.99

Testing Engine

$60.75  $134.99
buy now 350-901 testing engine

PDF (Q&A)

$54  $119.99
buy now 350-901 pdf