Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Questions and Answers

Questions 4

Refer to the exhibit.

350-901 Question 4

Drag and drop the steps from the left into the order of operation on the right for a successful OAuth2 three-legged authorization code grant flow,

Options:

Buy Now
Questions 5

Refer to the exhibit.

350-901 Question 5

Which cURL request is included in the presented XML as the body of the response?

A)

350-901 Question 5

B)

350-901 Question 5

C)

350-901 Question 5

D)

350-901 Question 5

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 6

A development team is working on a bug fix in a remote branch named " UXbug000222134 ' and the current working primary branch is named ,prod409024967’ A developer who just joined the learn needs to checkout the remote branch Which Git commands must be used?

A)

350-901 Question 6

B)

350-901 Question 6

C)

350-901 Question 6

D)

350-901 Question 6

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 7

Refer to the exhibit.

350-901 Question 7

The cisco_devnet Docker swarm service runs across five replicas The development team tags and imports a new image named devnet ' test 1 1 and requests that the image be upgraded on each container There must be no service outages during the upgrade process Which two design approaches must be used? (Choose two.)

Options:

A.

Implement rolling upgrades by using the docker service update command.

B.

Enable parallel upgrades by using the docker service update command.

C.

Ensure that the service is hosted behind a VIP with no session persistence.

D.

Update the restart policy of the containers to restart upon failure.

E.

Ensure that the service replicas are set to a minimum of 5

Buy Now
Questions 8

Refer to the exhibit. Which snippet creates a Webex Teams space and adds the users in the variable user list to that space?

A)

350-901 Question 8

B)

350-901 Question 8

C)

350-901 Question 8

D)

350-901 Question 8

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 9

When an application is designed that requires high availability, what is a reason to use a cross-region cloud?

Options:

A.

Provide disaster recovery protection

B.

Protect from a single component failure

C.

Minimize costs

D.

Account for failure in another zone

Buy Now
Questions 10

DRAG DROP

350-901 Question 10

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question.

350-901 Question 10

350-901 Question 10

A developer is creating a Python Script that will use the Webex Teams REST API to automatical ly create a new collaboration space with him and his team leads on-demand via a Linux terminal command. Drag and drop the code snippets from the left onto the numbers on the right that match the missing sections in the exhibit to complete the script. Not a ll code snippets are used.

350-901 Question 10

Options:

Buy Now
Questions 11

What is a benefit of running multiple instances of a back-end service and using load balancing to distribute the communication between the front-end and back-end services?

Options:

A.

The consistency of data for stateful services increases.

B.

High availability is provided for the back-end services.

C.

Scaling horizontally is automated out of the box.

D.

The total load on the database servers decreases.

Buy Now
Questions 12

350-901 Question 12

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python script to create messages in a Cisco Webex room using the Webex API. Not all options are used.

350-901 Question 12

Options:

Buy Now
Questions 13

What is an effective logging strategy according 10 the 12-factor app tenets?

Options:

A.

Capture togs by the execution environment and route to a centralized destination

B.

Tag and save togs in a local document database that has querying capabilities.

C.

Back up log files in a high-availability remote cluster on the public cloud

D.

Timestamp and save logs in a local time-series database that has querying capabilities

Buy Now
Questions 14

Drag and drop the steps from the left into the order on the right to configure and install a container on a Cisco Catalyst 9000 Series Switch.

350-901 Question 14

Options:

Buy Now
Questions 15

A developer needs to configure an environment to orchestrate and configure. Which two tools should be used for each task? (Choose two.)

Options:

A.

Puppet for orchestration

B.

Terraform for orchestration

C.

Terraform for configuration

D.

Ansible for orchestration

E.

Ansible for configuration

Buy Now
Questions 16

Which two gRPC modes of model-driven telemetry are supported on Cisco IOS XE Software? (Choose two.)

Options:

A.

dial-in

B.

dial-out

C.

call-in

D.

call-out

E.

passive

Buy Now
Questions 17

An application requires SSL certificates signed by an intermediate CA certificate. The crt files must be available to the application:

• The root CA certificate is root_certrficate.crt.

• The intermediate CA certificate is intermediate_certificate.crt

• The application-specific SSL certificate is crt_certificate.crt.

Which Bash command outputs the certificate bundle as a .pern file?

A)

350-901 Question 17

B)

350-901 Question 17

C)

350-901 Question 17

D)

350-901 Question 17

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 18

A container running a Python script is failing when it reaches the integration testing phase of the CI/CD process. The code has been reviewed thoroughly and the build process works on this container and all other containers pass unit and integration testing.

What should be verified to resolve the issue?

Options:

A.

that the correct port is exposed in the Dockerfile

B.

that the necessary modules and packages are installed on build

C.

that the script is running from the right directory

D.

that the Python version of the container image is correct

Buy Now
Questions 19

Drag and drop the code from the bottom onto the box where the code is missing on the Ansible task to enable a VLAN on a Meraki MX Device, Not all options are used.

350-901 Question 19

Options:

Buy Now
Questions 20

A developer is creating a Python script to analyze errors during REST API call operations. The script will be used with Cisco solution and devices. Drag and drop the code from the bottom to the box where the code is missing to implement control flow for handling unrecoverable REST API calls. Not all options are used.

350-901 Question 20

Options:

Buy Now
Questions 21

Refer to the exhibit.

350-901 Question 21

Refer to the exhibit An application hosting server with the local data center is experiencing large amounts of traffic from enclusers. A developer must optimize this API server to reduce the toad on its host. What are two ways to optimize this code through HTTP cache controls? (Choose two.)

Include the " ETag " header in the API response.

Options:

A.

Include the " Last-Modified " header in the API response.

B.

Include the " Content-Type " header in the API response.

C.

Leverage middleware caching and respond with HTTP code 104 m the API response

D.

Leverage middleware caching and respond with HTTP code 204 m the API response.

Buy Now
Questions 22

Which two data encoding techniques are supported by gRPC? (Choose two.)

Options:

A.

XML

B.

JSON

C.

ASCII

D.

ProtoBuf

E.

YAML

Buy Now
Questions 23

How does the use of release packaging allow dependencies to be effectively managed during deployments?

Options:

A.

dependencies are staggered between multiple releases

B.

designed to prevent any dependencies between release units

C.

dependencies are tested after the release is deployed

D.

removal of release units if they have issues in testing

Buy Now
Questions 24

Drag and drop the code from the bottom onto the box where the code is missing to provision a new Cisco Unified Computing System server by using the UCS XML API. Options may be used more than once. Not all options are used.

350-901 Question 24

Options:

Buy Now
Questions 25

The response from a server includes the header ETag: W/”7eb8b94419e371767916ef13e0d6e63d”. Which statement is true?

Options:

A.

The ETag has a Strong validator directive.

B.

The ETag has a Weak validator directive, which is an optional directive.

C.

The ETag has a Weak validator directive, which is a mandatory directive.

D.

The ETag has a Strong validator directive, which it is incorrectly formatted.

Buy Now
Questions 26

An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online.

Which configuration management and/or automation tooling is needed for this solution?

Options:

A.

Ansible

B.

Ansible and Terraform

C.

NSO

D.

Terraform

E.

Ansible and NSO

Buy Now
Questions 27

A developer is containerizing an application using Docker. A local Docker alpine image has been created, and it has the image ID ' b9c2d50f0b6y74998 ' with the tag ' dev ' . The developer must make a running container based on the tagged image, with the container port 80 bound to port 8080 on the host. Which command must be used?

Options:

A.

docker run -p 8080:80 alpine:dev

B.

docker start -p 8080:80 alpine:dev

C.

docker build -p 8080:80 alpine:dev

D.

docker exec -p 8080:80 alpine:dev

Buy Now
Questions 28

An application is hosted on Google Kubernetes Engine. A new JavaScript module is created to work with the existing application. Which task is mandatory to make the code ready to deploy?

Options:

A.

Create a Dockerfile for the code base.

B.

Rewrite the code in Python.

C.

Build a wrapper for the code to “containerize” it.

D.

Rebase the code from the upstream git repo.

Buy Now
Questions 29

Refer to the exhibit.

350-901 Question 29

A developer has created a Python script that retrieves information about the deployment of Cisco wireless access points using REST API. Which two code snippets must be added to the blank in the code to print the value of the userid key instead of printing the full JSON response? (Choose two.)

A)

350-901 Question 29

B)

350-901 Question 29

C)

350-901 Question 29

D)

350-901 Question 29

E)

350-901 Question 29

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 30

Refer to the exhibit.

350-901 Question 30

Drag and drop the components from the Oauth2 authorization protocol flow on the left onto the letter that matches the location in the exhibit.

350-901 Question 30

Options:

Buy Now
Questions 31

350-901 Question 31

Refer to the exhibit above and click on the tab in the top left corner to view a diagram that describes the typical flow of requests involved when a webhook is created for a booking service. Drag and drop the requests from the left onto the item numbers on the right that match the missing sections in the sequence diagram to design the complete flow of requests involved as a booking is updated from a web application.

350-901 Question 31

Options:

Buy Now
Questions 32

Refer to the exhibit.

350-901 Question 32

Which key value pair from the ios_ntp Ansible module creates an NTP server peer?

Options:

A.

state: present

B.

state: True

C.

config: present

D.

config: True

Buy Now
Questions 33

Refer to the exhibit.

350-901 Question 33

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that will retrieve location data Not all options are used.

350-901 Question 33

Options:

Buy Now
Questions 34

An application is made up of multiple microservices, each communicating via APIs. One service is beginning to be a bottleneck for the application because it can take a lot of time to complete requests. An engineer tried adding additional instances of this service behind the load balancer, but it did not have any effect. Which application design change must be implemented m this scenario?

Options:

A.

Move from synchronous to asynchronous interactions with the service and implement a message queue.

B.

Deploy an API gateway to centralize all inbound communication requests and offload authentication

C.

Vendor all dependencies into the service that is causing delays to remove external dependency checks.

D.

Leverage serverless architecture instead of containers to gain the advantage of event driven APIs.

Buy Now
Questions 35

Refer to the exhibit.

350-901 Question 35

Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content?

Options:

A.

CMD [“/bin/echo”, “Test”]

B.

RUN [“/bin/echo”, “Test”]

C.

ENTRYPOINT [“/bin/echo”, “Test”]

D.

CMD [“/bin/echo Test”]

Buy Now
Questions 36

The Meraki API URL https://api.meraki.com/api/v0/networks/123456789/ssids/2 has been stored in the environment variable meraki_url and the API key has been stored in meraki_api_key. Which snippet present s the API call to configure, secure and enable an SSID using the Meraki API?

A)

350-901 Question 36

B)

350-901 Question 36

C)

350-901 Question 36

D)

350-901 Question 36

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 37

A DevOps engineer needs to design an application to send emails based on incoming webhooks. No more than 10,000 outgoing emails should be sent per hour. How will the engineer ensure that all webhook transactions are processed within the email constraints?

Options:

A.

rate limit incoming webhooks and pagination

B.

send emails in batches and on a cadence

C.

message queues and rate limiting

D.

APIs for internal and external communication

Buy Now
Questions 38

350-901 Question 38

Refer to the exhibit. The got interfaces function is implemented already, and the interfaces must be retrieved in a controlled manner. Drag and drop the code snippets from the bottom onto the blanks in the Python function to split the job into batches of a maximum of 50 records. Not all options are used.

350-901 Question 38

Options:

Buy Now
Questions 39

A developer releases a new application for network automation of Cisco devices deployed m a local data center. The application utilizes complex design patterns such as microservices that host multiple third-party libraries and programming languages. The development must be simplified by implementing an observability-driven development lifecycle. Which two considerations must be taken to meet the requirements? (Choose two.)

Options:

A.

description of low-level errors

B.

which KPls to monitor

C.

relevant metrics to expose

D.

which monitoring tools to use

E.

identifying customer priorities

Buy Now
Questions 40

An application is developed in order to communicate with Cisco Webex. For reporting, the application must retrieve all the messages sent to a Cisco Webex room on a monthly basis.

Which action calls /v1/messages directly?

Options:

A.

Set up a webhook that has messages as the resource type and store the results locally.

B.

Utilize the pagination functionality by defining the max property.

C.

Recursively call the /vl/messages endpoint by using the beforeMessage property.

D.

Filter the response results by specifying the created property in the request.

Buy Now
Questions 41

Refer to the exhibit.

350-901 Question 41

An application ' s REST API GET call is tested to the inventory database. Which missing code must be included to limit

the number of values that are returned from the query to 20?

Options:

A.

Inventory=20

B.

limit=?2Q

C.

inventory=limit?20

D.

inventory? Iimit20

Buy Now
Questions 42

350-901 Question 42

Refer to the exhibit Drag and drop the code from the bottom onto the box where the code is missing to query the last 10 Bluetooth clients seen by APs in their network using the Meraki Dashboard API Not all options are used.

350-901 Question 42

Options:

Buy Now
Questions 43

350-901 Question 43

Refer to the exhibit. The presented application consists of a Nginx container and a load balancer service. Which GitLab CI/CD configuration implements the Kubernetes deployment?

350-901 Question 43

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 44

Which transport layer protocol does gRPC use to retrieve telemetry information?

Options:

A.

SSH

B.

SNMP

C.

TCP

D.

HTTP/2

Buy Now
Questions 45

Drag and drop the code snippets from the bottom onto the boxes in the Terraform cod© to create a new application profile and EPG. Not all code snippets are used.

350-901 Question 45

Options:

Buy Now
Questions 46

Refer to the exhibit.

350-901 Question 46

A)

350-901 Question 46

B)

350-901 Question 46

C)

350-901 Question 46

D)

350-901 Question 46

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 47

350-901 Question 47

Refer to the exhibit. Drag and drop parts of the URL from the left onto the item numbers on the right that match the missing sections in the exhibit to create the appropriate RESTCONF URL to query the VLAN configuration given this YANG model. Not all URL parts are used.

350-901 Question 47

Options:

Buy Now
Questions 48

Refer to the exhibit.

350-901 Question 48

The cisco_devnet Docker swarm service runs across five replicas.The development team tags and imports a new image named devnet/ test:1.1 and requests that the image be upgraded on each container.There must be no service outages during the upgrade process. Which two design approaches must be used? (Choose two.)

Options:

A.

Enable parallel upgrades by using the docker service update command

B.

Ensure that the service replicas are set to a minimum of 5

C.

Implement rolling upgrades by using the docker service update command

D.

Ensure that the service is hosted behind a VIP with no session persistence

E.

Update the restart policy of the containers to restart upon failure

Buy Now
Questions 49

350-901 Question 49

Refer to the exhibit. An engineer is setting up a CI/CD pipeline for a new application that depends on other services. The services must be prepared beforehand. Build dependencies must be installed by the pipeline. One of the pipeline stages fails. What is the cause of the issue?

Options:

A.

The CI syntax is invalid.

B.

A package is missing.

C.

The dependent services are not ready.

D.

The unit test failed.

Buy Now
Questions 50

Drag and drop the code from the bottom onto the box where the code is missing to create a new Cisco Webex space and attach a previously configured bot named ' sampleBot ' . Not all options are used.

350-901 Question 50

Options:

Buy Now
Questions 51

Drag and drop the steps from the left into the order on the right to build and run a customized Python DocKer image. Not all options are used

350-901 Question 51

Options:

Buy Now
Questions 52

350-901 Question 52

Refer to the exhibit. An engineer is attempting to retrieve information about free resources in the Cily-Adata center. The engineer wants to know only about resources in the testing environment. Drag and drop the code snippets from the bottom onto the blanks in the API call to meet this requirement. Some options may be used more than once. Not all options arc used.

350-901 Question 52

Options:

Buy Now
Questions 53

An Etag header is included in the HTTP response for an API resource. What are two benefits of using the value of the Etag for future interactions involving the same API resource? (Choose two.)

Options:

A.

caching and optimization of response payloads

B.

creating conditional requests

C.

categorizing and comparing this API resource with others

D.

checking the integrity of the resource

E.

requesting the list of operations authorized for this resource

Buy Now
Questions 54

A team is developing a cloud-native application. The project has these architecture requirements:

* Leverage the use of containers for effective usage of resources.

* Scale up the application automatically when more resources are needed.

* Ensure that the application is developed as a stateless application.

Which two guidelines must be met? (Choose two.)

Options:

A.

Rely on the web server to help provide sticky sessions for web transactions.

B.

Use Python class definition to leverage object-oriented techniques for development.

C.

Ensure that all data that should persist is stored in a data store such as a database.

D.

Use memory or disk space for temporary data that should not persist between nodes.

E.

Develop the application using Python and virtual environments.

Buy Now
Questions 55

350-901 Question 55350-901 Question 55

350-901 Question 55

Click on the Meraki Resources tab in the left corner to view Meraki documentation to help with this question.Drag and drop the parts of the python code from the left onto the item numbers on the right that match the missing sections in the exhibit to enable an SSID. Not all code parts are used.

350-901 Question 55

Options:

Buy Now
Questions 56

Drag and drop the code from the bottom onto the box where the code is missing in the Python script to execute a REST API call to query all the NTP policy names and print the name of each policy. Not all options are used.

350-901 Question 56

Options:

Buy Now
Questions 57

Refer to the exhibit.

350-901 Question 57

A Python developer is creating a wireless network device inventory application for local deployment of Cisco access points The developer is retrieving an access point ID by using a REST API The output indicates that there was a KeyError when parsing the JSON response. What returns the expected output of 266 at line 14?

A)

350-901 Question 57

B)

350-901 Question 57

C)

350-901 Question 57

D)

350-901 Question 57

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 58

A developer wants to automate virtual infrastructure to provision and manage it. The system will be implemented m large-scale deployment while offering redundancy and scalability with ease of management The solution must meet these requirements:

• Support the provisioning of up to 500 new virtual machines into private datacenters or the public cloud

• Support the modeling of a complex environment that consists of multiple virtual machines while supporting disaster recovery

• Maintain steady-state environments

Which configuration management solution must the developer use?

Options:

A.

Puppet

B.

Terraform

C.

Docker

D.

Arable

Buy Now
Questions 59

How is client code that consumes gRPC telemetry implemented, assuming that the preferred language is able to be chosen?

Options:

A.

Parse the OpenAPI spec model

B.

Compile the protocol buffers IDL

C.

Leverage a Thrift code generator to parse a Thrift IDL

D.

Review the Swagger API documentation to build client code

Buy Now
Questions 60

Cisco sensorBase gathers threat information from a variety of cisco products and services and performs analytics on threats. Which term describes this process?

Options:

A.

consumption

B.

deployment

C.

sharing

D.

authoring

Buy Now
Questions 61

350-901 Question 61

350-901 Question 61

350-901 Question 61

350-901 Question 61

350-901 Question 61

350-901 Question 61

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Python code using the UCS Python SDK is creating a server pool named “devcore_pool” and populating the pool with all servers from chassis 7 and then the server pool is associated to existing service profile template “devcore_template”. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the python exhibit.

Refer to the above and click on the resource labs in the top left corner to view resources to help with this question.

Python code using the UCS Python SDK is creating a server pool named " devcore_pool " and populating the pool with all servers from chassis 7, and then the server pool is associated to existing Service Profile template " devcore_template " Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the Python exhibit.

350-901 Question 61

Options:

Buy Now
Questions 62

An application has these characteristics

• provide one service or function

• distributed database

• API gateway

• central repository for code

• configuration database

• uses session management

Which two design approaches contribute to the scalability of the application? (Choose two.)

Options:

A.

built to scale based on a star topology

B.

modular design iteration

C.

session management in a stateless architecture

D.

planned before the first device is deployed

E.

distributed computing with tightly coupled components

Buy Now
Questions 63

Which snippet presents the correct API call to configure, secure, and enable an SSID using the Meraki API?

A)

350-901 Question 63

B)

350-901 Question 63

C)

350-901 Question 63

D)

350-901 Question 63

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 64

Refer to the exhibit.

350-901 Question 64

A network engineer must integrate error handling tor time-outs on network devices using the REST interface. Which line of code needs to be placed on the snippet where the code is missing to accomplish this task?

Options:

A.

elif resp.status_code == 429 or serf._retries < selff._MAX_RETRIES:

B.

elif resp.status_code == 404 or self, retries < self._MAX_RETRIES:

C.

elif resp.status_code == 429 and self .retries < self._MAX_RETRIES:

D.

elif resp.status_code == 404 and self._relries < self._MAX_RETRIES:

Buy Now
Questions 65

350-901 Question 65

350-901 Question 65

350-901 Question 65

350-901 Question 65

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. The script uses the Cisco Intersight REST API. Drag and drop the code snippets from the left onto the item numbers on the right to match the missing sections in the Python script to update the firmware on specific Cisco Intersight USC rack server.DMZ_R-L3-ADJM. Not all code snippets are used.

350-901 Question 65

Options:

Buy Now
Questions 66

350-901 Question 66

350-901 Question 66

350-901 Question 66

Refer to the exhibit above and click on the resource tabs in the top left corner to view an IETF TANG MODEL and a Python file that changes the configuration via RESTCONF. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the JSON file that changes configuration of interface GigabitEthernet1 to have an IPv4 configuration of 10.10.0.1/24. Not all options are used.

350-901 Question 66

Options:

Buy Now
Questions 67

Drag and drop the code from the bottom onto the box where the code is missing in the Python code to query for user permissions while mitigating against SQL Injection Not all options are used.

350-901 Question 67

Options:

Buy Now
Questions 68

Refer to the exhibit.

350-901 Question 68

An engineer creates an application that leverages the Ansible framework to provision CPE endpoints that have configuration changes. The application contains an Ansible playbook named provision_cpes.yml that uses the ansible.builtin.script Ansible module to execute these two Python scripts:

• gather and_create.py. which creates a JSON file named bios.json that contains the CPE models and their respective IOS file information

• load and parse.py. which loads the file data and parses it for later consumption

After several successful runs, the application fails. During a review of the Ansible execution logs, the engineer discovers an error output that indicates that one of the stages failed. What is the cause of this issue?

Options:

A.

ansible builtm script Ansible module

B.

gather and create.py Python script

C.

load_and_parse.py Python script

D.

provision cpes.yml Ansibte playbook

Buy Now
Questions 69

An enterprise refactors its monolithic application into a modem cloud-native application that is based on microservices. A key requirement of the application design is to ensure that the IT team is aware of performance issues or bottlenecks in the new application Which two approaches must be part of the design considerations ' ' (Choose two.)

Options:

A.

Periodically scale up the resources of the host machines when the application starts to experience high loads

B.

Instrument the application code to gather telemetry data from logs, metrics or tracing

C.

Adopt a service-oriented architecture to handle communication between the services that make up the application

D.

Deploy infrastructure monitoring agents into the operating system of the host machines

E.

Implement infrastructure monitoring to ensure that pipeline components interoperate smoothly and reliably

Buy Now
Questions 70

Refer to the exhibit , The command docker build -tag=friendlyhello . is run to build a docker image from the given Dockerfile,

requirements,txt, and app.py, Then the command docker run -p 4000:80 friendlyhello is executed to run the application. Which URL is entered in the web browser to see the content served by the application?

Options:

A.

http://localhost:4000

B.

http ://localhost:80

C.

http ://127.0.0.1:80

D.

http:///4000:80

Buy Now
Questions 71

Drag and drop the code snippets from the bottom onto the boxes where the code is missing to deploy three Cisco UCS servers each from a different template Not all options ate used.

350-901 Question 71

Options:

Buy Now
Questions 72

Which command is used 10 enable application hosting on a Cisco IOS XE device?

Options:

A.

iox

B.

iox-service

C.

application -honing

D.

app- hosting

Buy Now
Questions 73

Refer to the exhibit.

350-901 Question 73

An Intersight API is being used to query RackUnit resources that have a tag keyword set to “Site”. What is the expected output of this command?

Options:

A.

list of all resources that have a tag with the keyword “Site”

B.

error message because the Value field was not specified

C.

error message because the tag filter should be lowercase

D.

list of all sites that contain RackUnit tagged compute resources

Buy Now
Questions 74

Refer to the exhibit.

350-901 Question 74

Which command results in a detached HEAD scenario?

Options:

A.

git checkout 5af25b

B.

git checkout Branch-5

C.

git checkout master

D.

git checkout log -2

Buy Now
Questions 75

Refer to the exhibit.

350-901 Question 75

The virtual next-generation firewalls running in the public cloud must be scaled out to meet the throughput requirements of the application layer. Which component is deployed to location A in the diagram?

Options:

A.

frontend caching server

B.

forward proxy

C.

backend database

D.

internal load balancer

Buy Now
Questions 76

What is a well-defined concept of GDPR compliance?

Options:

A.

Data subjects can require that the data controller erase their personal data.

B.

Records that are relevant to an existing contract agreement can be retained as long as the contract is in effect.

C.

Personal data that was collected before the compliance standards were set do not need to be protected

D.

Compliance standards appry to organizations that have a physical presence in Europe

Buy Now
Questions 77

Why is end-to-end encryption deployed when exposing sensitive data through APIs?

Options:

A.

Traffic is encrypted and decrypted at every hop in the network path.

B.

Data transfers are untraceable from source to destination.

C.

Data cannot be read or modified other than by the true source and destination.

D.

Server-side encryption enables the destination to control data protection.

Buy Now
Questions 78

How should a web application be designed to work on a platform where up to 1000 requests per second can be served?

Options:

A.

Use algorithms like random early detection to deny excessive requests.

B.

Set a per-user limit (for example, 5 requests/minute/user) and deny the requests from the users who have reached the limit.

C.

Only 1000 user connections are allowed; further connections are denied so that all connected users can be served.

D.

All requests are saved and processed one by one so that all users can be served eventually.

Buy Now
Questions 79

A developer deploys a SQLite database in a Docker container. Single-use secret keys are generated each time

a user accesses the database. The keys expire after 24 hours. Where should the keys be stored?

Options:

A.

Outside of the Docker container in the source code of applications that connect to the SQLite database.

B.

In a separate file inside the Docker container that runs the SQLite database.

C.

In an encrypted database table within the SQLite database.

D.

In a separate storage volume within the Docker container.

Buy Now
Questions 80

What are two principles according to the build, release, run principle of the twelve-factor app methodology?

(Choose two.)

Options:

A.

Code changes are able to be made at runtime.

B.

Separation between the build, release, and run phases.

C.

Releases should have a unique identifier.

D.

Existing releases are able to be mutated after creation.

E.

Release stage is responsible for compilation of assets and binaries.

Buy Now
Questions 81

What is the result of a successful OAuth2 authorization grant flow?

Options:

A.

The user has the application rights that correspond to the user ' s role within the application ' s database

B.

The application is provided with a token that allows actions on services on the user ' s behalf

C.

The user has administrative rights to the application ' s backend services

D.

The third-party service is provided with a token that allows actions to be performed

Buy Now
Questions 82

In the three-legged OAuth2 authorization workflow, which entity grants access to a protected resource?

Options:

A.

resource server

B.

resource owner

C.

client

D.

authorization server

Buy Now
Questions 83

Refer to the exhibit.

350-901 Question 83

Which AP! call does an engineer use to delete the FQDN object?

Options:

A.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f

B.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns/005056BB-0B24-0ed3-0000-858993545263

C.

DELETE /api/fmc_config/v1/domain?id=e276abec-e0f2-11e3-8169-6d9ed49b625f

D.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns?id=005056BB-0B24-0ed3-0000-858993545263

Buy Now
Questions 84

Drag and drop the code snippets from the bottom onto.the boxes where the code is missing to create a Cisco Webex meeting by using the Webex API. Not all options are used.

350-901 Question 84

Options:

Buy Now
Questions 85

A developer is working on an enhancement for an application feature and has made changes to a branch called ‘devcor-432436127a-enhance4‘. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?

Options:

A.

git merge -no-edit

B.

git merge -abort

C.

git merge -revert

D.

git merge —comrmt

Buy Now
Questions 86

Which two techniques protect against injection attacks? (Choose two.)

Options:

A.

input validation

B.

trim whitespace

C.

limit text areas to 255 characters

D.

string escaping of user free text and data entry

E.

only use dropdown, checkbox, and radio button fields

Buy Now
Questions 87

Refer to the exhibit.

350-901 Question 87

350-901 Question 87

The Python script is supposed to make an API call to Cisco DNA Center querying a wireless profile for the “ChicagoCampus” and then parsing out its enable FlexConnect value. Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit.

350-901 Question 87

Options:

Buy Now
Questions 88

Refer to the exhibit.

350-901 Question 88

Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the cURL exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used.

350-901 Question 88

Options:

Buy Now
Questions 89

Drag and drop the coda snippets from the bottom onto the blanks in the code to implement error handling for an application that will attempt to call a REST API. In the event of an error, the script must back off for 10 seconds before trying again, adding an extra 10 seconds to the backoff period for every failure that occurs. Not all options are used.

350-901 Question 89

Options:

Buy Now
Questions 90

Drag and drop the code from the bottom onto the box where the code is missing in the Python script to display the error message to the user. The script uses Python to connect to Cisco DNA Center and provides details if the connection fails. Not all options are used.

350-901 Question 90

Options:

Buy Now
Questions 91

Drag and drop the code from the bottom onto the where the code is missing to create a host object by using the Cisco Firepower Device Manager API. Not all options are used.

350-901 Question 91

Options:

Buy Now
Questions 92

Refer to the exhibit.

350-901 Question 92

A)

350-901 Question 92

B)

350-901 Question 92

C)

350-901 Question 92

D)

350-901 Question 92

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 93

Refer to the exhibit.

350-901 Question 93

Drag and drop the steps from the left into the correct order of operation on the right for a successful OAuth2 three-legged authorization code grant flow.

350-901 Question 93

Options:

Buy Now
Questions 94

Which two statements describe advantages of static code analysis over unit tests? (Choose two.)

Options:

A.

It checks for potential tainted data where input is not checked.

B.

It enforces proper coding standards and style.

C.

It performs a quick analysis of whether tests will pass or fail when run.

D.

It checks for race conditions in threaded applications.

E.

It estimates the performance of the code when run.

Buy Now
Questions 95

What are two advantages of using model-driven telemetry, such as gRPC. instead of traditional telemetry gathering methods? (Choose two.)

Options:

A.

all data is ad-hoc

B.

efficient use of bandwidth

C.

no overhead

D.

decentralized storage of telemetry

E.

continuous information with incremental updates

Buy Now
Questions 96

What are two building blocks of the 12-factor app? (Choose two.)

Options:

A.

Stateful Processes

B.

Easy access to underlying systems

C.

Dev and Prod must be different

D.

One codebase

E.

Isolated Dependencies

Buy Now
Questions 97

A local Docker image has an image ID of 386231131. Fill in the blanks to complete the command in order to tag the image into the " cisco " repository with " version1 0’ " .

350-901 Question 97

Options:

Buy Now
Questions 98

What securely stores and encrypts the API keys and tokens that are used for an application deployment?

Options:

A.

ITSM

B.

Artifactory

C.

GitHub

D.

Vault

Buy Now
Questions 99

Refer to the exhibit.

350-901 Question 99

What is the output of this IOS-XE configuration program?

Options:

A.

interface operational status in IPv6 addresses

B.

interface administrative status in IPv4 addresses

C.

interface operational status in IPv4 addresses

D.

interface administrative status in IPv6 addresses

Buy Now
Questions 100

Refer to the exhibit.

350-901 Question 100

A network engineer needs to handle API errors in their requests when users do not have permission to access the resource, even if they are authenticated and authorized. Which line of code needs to be placed on the snippet where the code is missing to handle these API errors?

Options:

A.

if r.status_code == 403

B.

il if r.raise for status() == 403

C.

if r.raise for_status() = 401

D.

if r.status_code = 401

Buy Now
Questions 101

Drag and drop the code from the bottom onto the box where the code is missing to retrieve and display wireless network hearth information. The wireless network devices are being managed by Cisco DNA Center and are compatible with REST API Not all options are used.

350-901 Question 101

Options:

Buy Now
Questions 102

Drag and drop the code from the bottom onto the box where the code is missing to create a Webex space Not all options are used.

350-901 Question 102

Options:

Buy Now
Questions 103

Which two principles are included in the codebase tenet of the 12-factor app methodology? (Choose two.)

Options:

A.

An application is always tracked in a version control system.

B.

There are multiple codebases per application.

C.

The codebase is the same across all deploys.

D.

There can be a many-to-one correlation between codebase and application.

E.

It is only possible to have one application deployment per codebase.

Buy Now
Questions 104

How is AppDynamics used to instrument an application?

Options:

A.

Provides visibility into the transaction logs that can be correlated to specific business transaction requests

B.

Enables instrumenting a backend web server (or packet installation by using an AppDynamics agent

C.

Retrieves a significant amount of information from the perspective of the database server by using application monitoring

D.

Monitors traffic flows by using an AppDynamics agent installed on a network infrastructure device

Buy Now
Questions 105

Refer to the exhibit.

350-901 Question 105

Recently, users have reported problems logging into an application with their usernames and passwords. The logs have captured an authentication attempt. Based on the messages and errors contained, what is the cause of the problem?

Options:

A.

The sign-in redirection is sending clients to the wrong server for SSO.

B.

There is a time synchronization issue between the application and LDAP.

C.

Users are providing incorrect credentials when logging in.

D.

The LDAP server used for authentication fails to respond to connection requests

Buy Now
Questions 106

350-901 Question 106

Refer to the exhibit. The JSON response is received from the Meraki location API. Which parameter is missing?

Options:

A.

apMac

B.

clientMac

C.

clientId

D.

accesspoint

Buy Now
Questions 107

Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)

Options:

A.

Application code writes its event stream to stdout.

B.

Application log streams are archived in multiple replicated databases.

C.

Application log streams are sent to log indexing and analysis systems.

D.

Application code writes its event stream to specific log files.

E.

Log files are aggregated into a single file on individual nodes.

Buy Now
Questions 108

A Python script must query the Cisco DNA center API for the number of unique wireless clients that are exhibiting poor health behavior. Drag and drop the code from the bottom onto the box where the code is missing to complete the script Not all options are used.

350-901 Question 108

Options:

Buy Now
Questions 109

Refer to the exhibit.

350-901 Question 109

A Python script has these requirements

• Retrieve a list of Bluetooth clients seen by the access pants on a network.

• Print the content of the response

• Retrieve the next page only if it is available in the response headers

What must be added where the code is missing to get the remaining pages by using the next link from the link response header of the last request?

A)

350-901 Question 109

B)

350-901 Question 109

C)

350-901 Question 109

D)

350-901 Question 109

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 110

A developer corrects an application bug with ID buglDa98416945110x and then installs it on a Cisco Catalyst 9300 series switch. Which command will enable the application called myapp?

Options:

A.

app-hosting install appid myapp package usbflash1:myapp.tar

B.

app-hosting run re-start appid my app bugfix

C.

app-hosting activate appid myapp

D.

app-hosting start appid myapp

Buy Now
Questions 111

Which OAuth mechanism enables clients to continue to have an active access token without further interaction from the user?

Options:

A.

JWT

B.

password grant

C.

refresh grant

D.

preshared key

Buy Now
Questions 112

When end-to-end encryption is implemented, which area is most vulnerable to exploitation?

Options:

A.

cryptographic key exchange

B.

endpoint security

C.

cryptographic key generation

D.

security of data in transit

Buy Now
Questions 113

350-901 Question 113

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the Python scrip; to retrieve wireless c lent health data by using the Cisco Catalyst Center (formerly DNA Center) API. Not all options are used.

350-901 Question 113

Options:

Buy Now
Questions 114

A developer has created a local Docker alpine image that has the image ID ' dockapp432195596ffr ' and tagged as ‘new’. Which command creates a running container based on the tagged image, with the container port 80 bound to port 8080 on the host?

Options:

A.

docker build -p 8080:80 alpine new

B.

docker exec -p 808080 alpine new

C.

docker start -p 808080 alpine new

D.

docker run -p 8080.80 alpine.now

Buy Now
Questions 115

A web application is susceptible to cross-site scripting. Which two methods allow this issue to be mitigated? (Choose two.)

Options:

A.

Use only drop downs.

B.

Limit user input to acceptable characters.

C.

Encrypt user input on the client side.

D.

Use AES encryption to secure the script.

E.

Remove all HTML/XML tags from user input.

Buy Now
Questions 116

Into which two areas are AppDynamics APIs categorized? (Choose two.)

Options:

A.

application-centric

B.

analytics-events

C.

database-visibility

D.

platform-side

E.

agent-side

Buy Now
Questions 117

Which data encoding format uses gRPC by default for serializing structured sets of information?

Options:

A.

JSON

B.

YAML

C.

Protobuf

D.

XML

Buy Now
Questions 118

Refer to the exhibit.

350-901 Question 118

Which code snippet must be added to the blank in the code to automate the evaluation and handling of errors due to wrong credentials when Basic Authorization is used?

A)

350-901 Question 118

B)

350-901 Question 118

C)

350-901 Question 118

D)

350-901 Question 118

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 119

An application has been developed for monitoring rooms in Cisco Webex. An engineer uses the application to

retrieve all the messages from a Cisco Webex room, but the results are slowly presented. Which action

optimizes calls to retrieve the messages from the /v1/messages endpoint?

Options:

A.

Define the ma property by using the pagination functionality.

B.

Set the beforeMessage property to retrieve the messages sent before a specific message ID.

C.

Avoid unnecessary calls by using a prior request to /v1/rooms to retrieve the last activity property.

D.

Filter the response results by specifying the created property in the request.

Buy Now
Questions 120

Refer to the exhibit.

350-901 Question 120

The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file “@token_data” that cURL is handling?

Options:

A.

This file is a container to log possible error responses in the request.

B.

This file is given as input to store the access token received from FDM.

C.

This file is used to send authentication related headers.

D.

This file contains raw data that is needed for token authentication.

Buy Now
Questions 121

350-901 Question 121

Refer to the exhibit. Which URI string retrieves configured static routes in a VRF named CUSTOMER from a RESTCONF-enabled device?

A)

350-901 Question 121

B)

350-901 Question 121

C)

350-901 Question 121

D)

350-901 Question 121

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 122

Refer to the exhibit.

350-901 Question 122

Which RESTCONF verb changes the GigabitEthernet2 interface from 192.168.100.1/24 to 10.10.10.1/24

Options:

A.

POST

B.

PATCH

C.

GET

D.

HEAD

Buy Now
Questions 123

A developer is deploying an application to automate the configuration and management of Osco network files and routers The application must use REST API interface lo achieve programmability. The security team mandates that the network must be protected against DDoS attacks What mitigates the attacks without impacting genuine requests?

Options:

A.

API rate limiting at the application layer

B.

IP address filtering at the application layer

C.

traffic routing on the network perimeter

D.

firewall on the network perimeter

Buy Now
Questions 124

A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority.

Which approach must be taken to secure API keys and passwords?

Options:

A.

Embed them directly in the code.

B.

Store them in a hidden file.

C.

Store them inside the source tree of the application.

D.

Change them periodically.

Buy Now
Questions 125

A new record-keeping application for employees to track customer orders must be deployed to a company ' s existing infrastructure. The host servers reside in a data center in a different country to where the majority of users work. The new network configuration for the database server is: •IP: 10.8.32.10

• Subnet Mask: 255.255.255.0

• Hostname: CustOrd423320458-Prod-010

• MAC: 18-46-AC-6F-F4-52.

The performance of the client-side application is a priority due to the high demand placed on it by employees. Which area should the team consider in terms of impact to application performance due to the planned deployment?

Options:

A.

jitter

B.

decreased bandwidth

C.

latency

D.

connectivity loss

Buy Now
Questions 126

Drag and drop the code snippets from the bottom onto the blanks in the code to disable X11Forwarding on the SSH service of a CentOS server. Not all options are used.

350-901 Question 126

Options:

Buy Now
Questions 127

Which type of file is created from issued intermediate, root, and primary certificates for SSL installation on a server?

Options:

A.

DER

B.

CSR

C.

PEM

D.

CRT

Buy Now
Questions 128

A user is receiving a 429 Too Many Requests error. Which scheme is the server employing that causes this error?

Options:

A.

rate limiting

B.

time outs

C.

caching

D.

redirection

Buy Now
Questions 129

350-901 Question 129

350-901 Question 129

350-901 Question 129

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Python code that uses the UCS Python SDK is instantiating a service profile named ' ' devcore-server-01 ' ' from service profile template ' ' device-template ' ' , then associating the service profile instance to blade 3 in chassis 7. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the Python exhibit.

350-901 Question 129

Options:

Buy Now
Questions 130

Which approach is used to protect East-West API traffic?

Options:

A.

Use encryption between services

B.

Install a perimeter firewall

C.

Use a dedicated cloud connection service.

D.

Implement an API gateway

Buy Now
Exam Code: 350-901
Exam Name: Developing Applications using Cisco Core Platforms and APIs (DEVCOR)
Last Update: May 5, 2026
Questions: 434

PDF + Testing Engine

$65.27  $186.49

Testing Engine

$52.32  $149.49
buy now 350-901 testing engine

PDF (Q&A)

$48.12  $137.49
buy now 350-901 pdf