11.11 Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Questions and Answers

Questions 4

A developer corrects an application bug with ID buglDa98416945110x and then installs it on a Cisco Catalyst 9300 series switch. Which command will enable the application called myapp?

Options:

A.

app-hosting install appid myapp package usbflash1:myapp.tar

B.

app-hosting run re-start appid my app bugfix

C.

app-hosting activate appid myapp

D.

app-hosting start appid myapp

Buy Now
Questions 5

Refer to the exhibit.

Drag and drop the steps from the left into the correct order of operation on the right for a successful OAuth2 three-legged authorization code grant flow.

Options:

Buy Now
Questions 6

A developer is building an application to access a website. When running the application, an HTTP 403 error

code has been received. How should the application be modified to handle this code?

Options:

A.

Create a loop on cancel the operation and run a new one after the code is received.

B.

Use exponential backoff when retrying distributed services and other remote endpoints.

C.

Build a try/except around the urlopen to find errors occurring in the request.

D.

Redirect the request to an internal web server and make a new request from the internal resource.

Buy Now
Questions 7

Which type of file is created from issued intermediate, root, and primary certificates for SSL installation on a server?

Options:

A.

DER

B.

CSR

C.

PEM

D.

CRT

Buy Now
Questions 8

A cloud native project is being worked on in which all source code and dependencies are written in Python, Ruby, and/or JavaScipt. A change in code triggers a notification to the CI/CD tool to run the CI/CD pipeline.

Which step should be omitted from the pipeline?

Options:

A.

Deploy the code to one or more environments, such as staging and/or production.

B.

Build one of more containers that package up code and all its dependencies.

C.

Compile code.

D.

Run automated tests to validate the correctness.

Buy Now
Questions 9

Which two countermeasures help reduce the risk of playback attacks? (Choose two.)

Options:

A.

Store data in a NoSQL database.

B.

Implement message authentication (HMAC).

C.

Enable end-to-end encryption.

D.

Remove stack traces from errors.

E.

Use short-lived access tokens.

Buy Now
Questions 10

Drag and drop the code from the bottom onto the box where the code is missing to provision a new Cisco Unified Computing System server by using the UCS XML API. Options may be used more than once. Not all options are used.

Options:

Buy Now
Questions 11

Which two actions must be taken when an observable microservice application is developed? (Choose two.)

Options:

A.

Know the state of a single instance of a single service.

B.

Place “try/except” statement in code.

C.

Place log statements in the code.

D.

Use distributed tracing techniques.

E.

Deploy microservice to multiple datacenters.

Buy Now
Questions 12

Drag and drop the code from the bottom onto the box where the code is missing to create a Puppet manifest that implements an NTP configuration when applied to a device in the master inventory. Not all options are used.

Options:

Buy Now
Questions 13

Refer to the exhibit.

This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type.

Which two words are required to complete the script? (Choose two.)

Options:

A.

ensure

B.

commit

C.

false

D.

replace

E.

none

Buy Now
Questions 14

Which two data encoding techniques are supported by gRPC? (Choose two.)

Options:

A.

XML

B.

JSON

C.

ASCII

D.

ProtoBuf

E.

YAML

Buy Now
Questions 15

Where mus! the data be encrypted to ensure end-to-end encryption when using an API?

Options:

A.

on the device that consumes the API

B.

on the source device before transmission

C.

on the end device after a request is received

D.

on the server that stores the data

Buy Now
Questions 16

Refer to the exhibit , The command docker build -tag=friendlyhello . is run to build a docker image from the given Dockerfile,

requirements,txt, and app.py, Then the command docker run -p 4000:80 friendlyhello is executed to run the application. Which URL is entered in the web browser to see the content served by the application?

Options:

B.

http ://localhost:80

C.

http ://127.0.0.1:80

Buy Now
Questions 17

Refer to the exhibit.

An application is being developed as an information repository. The application will be used to store details about television shows, including the scenario, year, and category. Which database type must used for high performance for the data structure?

Options:

A.

time series

B.

Eidocument-based

C.

graph

D.

columnar

Buy Now
Questions 18

What is a consideration for using gRPC as the model-driven telemetry protocol on a Cisco IOS XE device?

Options:

A.

XML-based transmission format

B.

works in dial-out mode

C.

human-readable transmission format

D.

works in call-out mode

Buy Now
Questions 19

In the three-legged OAuth2 authorization workflow, which entity grants access to a protected resource?

Options:

A.

resource server

B.

resource owner

C.

client

D.

authorization server

Buy Now
Questions 20

Refer to the exhibit.

An application has been developed to serve the users in an enterprise After HTTP cache controls are implemented m the application users report that they receive state data when they refresh the page Without removing HTTP cache controls, which change ensures that the users get current data when refreshing the page'

Options:

A.

Reduce the expire_after value to 60.

B.

Add a Cache-Control header that has a value of no-cache, no-store must-revalidate.

C.

Add an H-None-Match header that has a value of an Entity Tag.

D.

Add an Expires header that has a value of 0.

Buy Now
Questions 21

An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances.

Which two actions can improve the design of the application to identify the faults? (Choose two.)

Options:

A.

Automatically pull out the container that fails the most over a time period.

B.

Implement a tagging methodology that follows the application execution from service to service.

C.

Add logging on exception and provide immediate notification.

D.

Do a write to the datastore every time there is an application failure.

E.

Implement an SNMP logging system with alerts in case a network link is slow.

Buy Now
Questions 22

Refer to the exhibit.

A developer must review an intern's code for a script they wrote to automate backups to the storage server. The script must connect to the network device and copy the running-config to the server. When considering maintainability, which two changes must be made to the code? (Choose two.)

Options:

A.

Rename the class to "ArchiveManager".

B.

The code is incorrect because the class does not have an__init__() method.

C.

The command sent to the network device is incorrect.

D.

Refactor the code placing the "for" loop steps inside a single nc method.

E.

The intern must use IP addresses because DNS is unreliable.

Buy Now
Questions 23

Refer to the exhibit.

One part of an application routinely uses the Cisco Meraki API to collate data about all clients Other parts of the application also use the Meraki API, but a single API key is used within the application The organization has approximately 4.000 clients across 30 networks Some of the application users report poor performance and missing data. Which two changes improve the performance of the application? (Choose two.)

Options:

A.

Check for HTTP code 429 and wait until Retry-After time before further calls are made

B.

Configure multiple API keys in the application and rotate usage of each one.

C.

Use random values in the User-Agent header when HTTP calls are made.

D.

Use fewer API calls to create a more efficient endpoint.

E.

Check API response payloads for later reuse in real time during code execution.

Buy Now
Questions 24

Refer to the exhibit.

The application follows a containerized microservices architecture that has one container per microservice. The microservices communicate with each other by using REST APIs The double-headed arrows m the diagram display chains of synchronous HTTP calls needed for a single use/request Which action ensures the resilience of the application in the scope of a single user request?

Options:

A.

Redesign the application to be separated into these three layers Presentation. API. and Data

B.

Implement retries with exponential backoff during HTTP API calls

C.

Set up multiple instances of each microservice m active/active mode by using the Orchestrator

D.

Create two virtual machines that each host an instance of the application and set up a cluster

Buy Now
Questions 25

A network engineer needs to retrieve interface data using the Cisco IOS XE YANG Model. Drag and drop the

components from the bottom onto the box where the code is missing to complete the RESTCONF URI. Not all

options are used.

Options:

Buy Now
Questions 26

Drag and drop the code from the bottom onto the box where the code is missing to construct a UCS XML API request to generate two service profiles from the template org-root/is-service-template. Not at options are used

Options:

Buy Now
Questions 27

Where should distributed load balancing occur in a horizontally scalable architecture?

Options:

A.

firewall-side/policy load balancing

B.

network-side/central load balancing

C.

service-side/remote load balancing

D.

client-side/local load balancing

Buy Now
Questions 28

A developer needs to configure an environment to orchestrate and configure. Which two tools should be used for each task? (Choose two.)

Options:

A.

Puppet for orchestration

B.

Terraform for orchestration

C.

Terraform for configuration

D.

Ansible for orchestration

E.

Ansible for configuration

Buy Now
Questions 29

{'lat': 37.4180951010362, 'lng': -122.098531723022, 'address': '', 'serial': 'Q2HP-F5K5-F98Q',

'mac': '88:15:44:ea:f5:bf', 'lanIp': '10.10.10.15',

'url': 'https://n149.meraki.com/DevNet-Sandbox/n/EFZDavc/manage/nodes/new_list/78214561218351',

'model': 'MS220-8P', 'switchProfileId': None, 'firmware': 'switch-11-31', 'floorPlanId': None}

Refer to the exhibit. A developer needs to find the geographical coordinates of a device on the network L_397561557481105433 using a Python script to query the Meraki API. After running response = requests.get() against the Meraki API, the value of response.text is shown in the exhibit.

What Python code is needed to retrieve the longitude and latitude coordinates of the device?

Options:

A.

latitude = response.text['lat']

longitude = response.text['lng']

B.

latitude = response.json()['lat']

longitude = response.json()['lng']

C.

latitude = response.json()[0]

longitude = response.json()[1]

D.

latitude = response.text[0]

longitude = response.text[1]

Buy Now
Questions 30

Refer to the exhibit.

A network administrator copies SSL certificates to a Cisco NX-OS switch. An Ansible playbook is created to enable NX-API, which will use the new certificate. In the group_vars/vars.yml file, which code snippet must be used to define the properly formatted variables?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 31

Refer to the exhibit.

An Intersight API is being used to query RackUnit resources that have a tag keyword set to “Site”. What is the expected output of this command?

Options:

A.

list of all resources that have a tag with the keyword “Site”

B.

error message because the Value field was not specified

C.

error message because the tag filter should be lowercase

D.

list of all sites that contain RackUnit tagged compute resources

Buy Now
Questions 32

Refer to the exhibit.

The Python script is supposed to make an API call to Cisco DNA Center querying a wireless profile for the “ChicagoCampus” and then parsing out its enable FlexConnect value. Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit.

Options:

Buy Now
Questions 33

Refer to the exhibit.

Which action should be performed to avoid an SQL injection attack?

Options:

A.

Encrypt the password that is used to connect to the database

B.

Develop a denial of service response plan

C.

Vacate the input on the platform variable

D.

Compile the Python file instead of allowing live interpretation

Buy Now
Questions 34

Refer to the exhibit.

Which word is missing from this Ansible playbook shown, to allow the Cisco IOS XE commands for router configuration to be pushed after the playbook is executed?

Options:

A.

Commands

B.

Input

C.

Lines

D.

cofig

Buy Now
Questions 35

Drag and drop the code from the bottom onto the box where the code is missing in the diagram to show how data is processed in Webex Teams. Not all options are used.

Options:

Buy Now
Questions 36

A developer is creating a Python script to use the Webex Teams REST API to list joined spaces, and gracefully handle and print the errors it receives. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script.

Options:

Buy Now
Questions 37

Refer to the exhibit above and click on the tab in the top left corner to view a diagram that describes the typical flow of requests involved when a webhook is created for a booking service. Drag and drop the requests from the left onto the item numbers on the right that match the missing sections in the sequence diagram to design the complete flow of requests involved as a booking is updated from a web application.

Options:

Buy Now
Questions 38

Drag and drop the code from the bottom onto the where the code is missing to create a host object by using the Cisco Firepower Device Manager API. Not all options are used.

Options:

Buy Now
Questions 39

A developer must recommend an appropriate tool to deploy a configuration to hundreds of servers. The configuration management solution must meet these requirements.

• The servers must initiate the connection to obtain updates

• The configuration must be defined in a declarative style

Which tool should be used?

Options:

A.

Chef

B.

Terraform

C.

Puppet

D.

Ansible

Buy Now
Questions 40

Users report that they are no longer able to process transactions with the online ordering application, and the logging dashboard is

displaying these messages:

Fri Jan 10 19:37:31.123 ESI 2020 [FRONTEND] [NFO: Incoming request to add item to cart from user 45834534858

Fri Jan 10 19:37:31.247 EST 2020 [BACKEND] INFO: Attempting to add item to cart

Fri Jan 10 19:37:31.250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused

What is causing the problem seen in these log messages?

Options:

A.

The database server container has crashed.

B.

The backend process is overwhelmed with too many transactions.

C.

The backend is not authorized to commit to the database.

D.

The user is not authorized to add the item to their cart.

Buy Now
Questions 41

Refer to the exhibit.

An engineer is configuring Ansible to run playbooks against Cisco IOS XE Software. What

should be configured in ansible.cfg as the connection type?

Options:

A.

network_cli

B.

ssh

C.

shell

D.

command

Buy Now
Questions 42

When an application is designed that requires high availability, what is a reason to use a cross-region cloud?

Options:

A.

Provide disaster recovery protection

B.

Protect from a single component failure

C.

Minimize costs

D.

Account for failure in another zone

Buy Now
Questions 43

Refer to the exhibit.

Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow.

Options:

Buy Now
Questions 44

Refer to the exhibit.

What is the output of this IOS-XE configuration program?

Options:

A.

interface operational status in IPv6 addresses

B.

interface administrative status in IPv4 addresses

C.

interface operational status in IPv4 addresses

D.

interface administrative status in IPv6 addresses

Buy Now
Questions 45

A new record-keeping application for employees to track customer orders must be deployed to a company's existing infrastructure. The host servers reside in a data center in a different country to where the majority of users work. The new network configuration for the database server is: •IP: 10.8.32.10

• Subnet Mask: 255.255.255.0

• Hostname: CustOrd423320458-Prod-010

• MAC: 18-46-AC-6F-F4-52.

The performance of the client-side application is a priority due to the high demand placed on it by employees. Which area should the team consider in terms of impact to application performance due to the planned deployment?

Options:

A.

jitter

B.

decreased bandwidth

C.

latency

D.

connectivity loss

Buy Now
Questions 46

A local data center deployment using Cisco NX-OS switches is scaling and requires automatic configuration at scale Configuration management must be set up for a Cisco NX-OS switch by using Ansible. The Ansible control server is currently located on a different subnet than the switch The solution has these requirements

• The transport protocol used must be encrypted

• The connections must originate from a server m the same local network

• Enable mode must be supported

Which connectivity method must be used?

Options:

A.

SSH through a bastion host and ansible_become method for privilege escalation.

B.

HTTPS through a repository and ansible_become method for privilege escalation

C.

XML-RPC through a web proxy.

D.

HTTP through a web proxy.

Buy Now
Questions 47

Refer to the exhibit.

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 48

Refer to the exhibit.

The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file “@token_data” that cURL is handling?

Options:

A.

This file is a container to log possible error responses in the request.

B.

This file is given as input to store the access token received from FDM.

C.

This file is used to send authentication related headers.

D.

This file contains raw data that is needed for token authentication.

Buy Now
Questions 49

Which two statements about a stateless application are true? (Choose two.)

Options:

A.

Different requests can be processed by different servers.

B.

Requests are based only on information relayed with each request.

C.

Information about earlier requests must be kept and must be accessible.

D.

The same server must be used to process all requests that are linked to the same state.

E.

No state information can be shared across servers.

Buy Now
Questions 50

Refer to the exhibit.

Which key value pair from the ios_ntp Ansible module creates an NTP server peer?

Options:

A.

state: present

B.

state: True

C.

config: present

D.

config: True

Buy Now
Questions 51

Refer to the exhibit.

This snippet of a script has recently started exiting abnormally with an exception stating “Unexpected HTTP Response code: 429”.

Which solution handles rate limiting by the remote API?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 52

Refer to the exhibit.

An architect wrote an application to collect device information from the Cisco Meraki Dashboard API. Every time a network change occurs the application collects information and records new endpoint MAC addresses. The application stopped working after the locations and network equipment of a competitor were acquired. Which application approach must be applied to reduce latency and rate limiting?

Options:

A.

MOS scoring system before collecting information

B.

leaky faucet algorithm for fault categorizing

C.

error handling to check for reachability first

D.

webhooks to trigger updates

Buy Now
Questions 53

Drag and drop the code from the bottom onto the box where the code is missing in the Python code to query for user permissions while mitigating against SQL Injection Not all options are used.

Options:

Buy Now
Questions 54

Refer to the exhibit.

Cisco IOS XE switches are used across the entire network and the description that is filed for all interfaces must be configured. Which code snippet must be placed in the blank in the script to leverage RESTCONF to query all the devices in the device list for the interfaces that are present?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Exam Code: 350-901
Exam Name: Developing Applications using Cisco Core Platforms and APIs (DEVCOR)
Last Update: Nov 15, 2024
Questions: 363

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90